SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
SMART Modular Technologies Presents

2014SMARTGRID
CYBERSECURITY SURVEY
The smart grid has expanded rapidly over the past few years

but security is a growing concern
HOW BIG OF A PROBLEM IS SECURITY
NOW FOR THE SMART GRID?

8%

21%

A small problem
A moderate problem

32%

A big problem

40%

A very big problem

HOW BIG OF A PROBLEM DO YOU BELIEVE SECURITY FOR
THE SMART GRID WILL BE IN FIVE YEARS?

10%

29%

A small problem
A moderate problem

23%

A big problem
A very big problem

37%

Power outages occur
4.3

System failure (outages)
4.6

Power flow is disrupted
4.1

Consumer data privacy
3.8

Equipment is damaged
4.0

Energy theft or hacking
of smart meters
3.6

Smart meters are hacked
3.5

SMART GRID AREA
OF CONCERN RATING*

CONSEQUENCE SEVERITY OF UTILITY
SECURITY BREACH RATING*

*Respondents were asked to rate their level of concern and severity on these areas of security using a scale
of 1 to 5. With 1 being low concern/low severity and 5 being extremely high concern/extremely high severity.

WHAT IS THE BEST WAY TO REMEDY SMART GRID SECURITY CONCERNS?

15%
38%
Customer
demand
Government
standards

30%

Legal
ramifications,
penalties
6%
Public pressure
(media attention)

Incentives
11% (e.g., government grants)

IS GRID PREPARED FOR THE THREATS TO ITS SECURITY?

13%

4%

Yes, well prepared
Yes, moderately prepared

32%

Yes, but only slightly prepared

51%

No, not prepared at all

HOW MUCH IS YOUR ORGANIZATION PLANNING TO INVEST IN CYBER
SECURITY TECHNOLOGIES OVER THE NEXT YEAR?
han $500
ss t
,0
Le

More than
$5,000,000

00

$100,000
than
ess
L

22%

34%

13%

ss

,0

Le

a n $ 1, 0 0

7% Less than
$5,000,000

Less than $2,500,000

00

15%
th

8%

0

WHAT AREA OF THE GRID WILL THE LARGEST AMOUNT OF INVESTMENT
BE MADE OVER THE NEXT YEAR?
Distribution
Automation
Advanced
Metering
Infrastructure

20%

Transmission
Systems

30%

7%
Substation
Automation

www.smartm.com

16%

Enterprise
Level IT systems

7%

20%

Customer
Systems

www.smartgridresearch.org

Source: Zpryme online survey of 111 energy and utility executives conducted in November 2013. SMART Modular is
a technology leader in the design, development, and deployment of current and next-generation memory products.
Combining leading-edge design and manufacturing with proven world-class support, SMART Modular leverages its
deep expertise in DRAM, SRAM and Flash architectures with world-class board-layout design. SMART Modular
delivers high-quality, high-reliability solutions to a broad customer base, including tier one computing and telecom
OEMs as well as industrial, medical and automotive customers. In support of these designs, SMART Modular
provides award-winning innovations in memory and embedded storage

Mais conteúdo relacionado

Mais procurados

Network solutions
Network solutionsNetwork solutions
Network solutionsMidshire
 
Lisa Conference 2014: DevOps and AppSec - Who is Responsible
Lisa Conference 2014: DevOps and AppSec - Who is ResponsibleLisa Conference 2014: DevOps and AppSec - Who is Responsible
Lisa Conference 2014: DevOps and AppSec - Who is ResponsibleSeniorStoryteller
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA
 
Flipping the Script & Changing the Game in Cyber
Flipping the Script & Changing the Game in CyberFlipping the Script & Changing the Game in Cyber
Flipping the Script & Changing the Game in Cyberscoopnewsgroup
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsBitglass
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyAdam Radly
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)Lora O'Haver
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSolarWinds
 
EMA Network Security Survey and Recommendations
EMA Network Security Survey and RecommendationsEMA Network Security Survey and Recommendations
EMA Network Security Survey and RecommendationsLora O'Haver
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Nonprofit Tech Needs - Western Balkans (presentation)
Nonprofit Tech Needs - Western Balkans (presentation)Nonprofit Tech Needs - Western Balkans (presentation)
Nonprofit Tech Needs - Western Balkans (presentation)Catalyst Balkans
 
Are Your Cyber Defenses Strong Enough?
Are Your Cyber Defenses Strong Enough?Are Your Cyber Defenses Strong Enough?
Are Your Cyber Defenses Strong Enough?Cygilant
 
Nuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogaresNuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogaresMiriam Ortega
 
The Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilityThe Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilitySymantec
 
What's Keeping Higher Education CIOs Up at Night?
What's Keeping Higher Education CIOs Up at Night?What's Keeping Higher Education CIOs Up at Night?
What's Keeping Higher Education CIOs Up at Night?Vala Afshar
 

Mais procurados (18)

Network solutions
Network solutionsNetwork solutions
Network solutions
 
Lisa Conference 2014: DevOps and AppSec - Who is Responsible
Lisa Conference 2014: DevOps and AppSec - Who is ResponsibleLisa Conference 2014: DevOps and AppSec - Who is Responsible
Lisa Conference 2014: DevOps and AppSec - Who is Responsible
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT Security
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in Mobility
 
Flipping the Script & Changing the Game in Cyber
Flipping the Script & Changing the Game in CyberFlipping the Script & Changing the Game in Cyber
Flipping the Script & Changing the Game in Cyber
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
 
University-of-Miami_MEDINA
University-of-Miami_MEDINAUniversity-of-Miami_MEDINA
University-of-Miami_MEDINA
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and Intelligence
 
EMA Network Security Survey and Recommendations
EMA Network Security Survey and RecommendationsEMA Network Security Survey and Recommendations
EMA Network Security Survey and Recommendations
 
10 Incredible BYOD Facts
10 Incredible BYOD Facts10 Incredible BYOD Facts
10 Incredible BYOD Facts
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Nonprofit Tech Needs - Western Balkans (presentation)
Nonprofit Tech Needs - Western Balkans (presentation)Nonprofit Tech Needs - Western Balkans (presentation)
Nonprofit Tech Needs - Western Balkans (presentation)
 
Are Your Cyber Defenses Strong Enough?
Are Your Cyber Defenses Strong Enough?Are Your Cyber Defenses Strong Enough?
Are Your Cyber Defenses Strong Enough?
 
Nuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogaresNuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogares
 
The Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilityThe Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP Mobility
 
What's Keeping Higher Education CIOs Up at Night?
What's Keeping Higher Education CIOs Up at Night?What's Keeping Higher Education CIOs Up at Night?
What's Keeping Higher Education CIOs Up at Night?
 

Semelhante a Smart Grid Cybersecurity Survey Results

Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
IoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITIoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITSolarWinds
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Agility webinar draft sme v2 without notes
Agility webinar draft sme v2 without notesAgility webinar draft sme v2 without notes
Agility webinar draft sme v2 without notesTalkTalk Business
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index Insight
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Edelman
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019Precisely
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Eoin Keary
 

Semelhante a Smart Grid Cybersecurity Survey Results (20)

Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
IoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITIoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of IT
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Escaping the middle ground
Escaping the middle groundEscaping the middle ground
Escaping the middle ground
 
Agility webinar draft sme v2 without notes
Agility webinar draft sme v2 without notesAgility webinar draft sme v2 without notes
Agility webinar draft sme v2 without notes
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Smart Grid Cybersecurity Survey Results

  • 1. SMART Modular Technologies Presents 2014SMARTGRID CYBERSECURITY SURVEY The smart grid has expanded rapidly over the past few years but security is a growing concern HOW BIG OF A PROBLEM IS SECURITY NOW FOR THE SMART GRID? 8% 21% A small problem A moderate problem 32% A big problem 40% A very big problem HOW BIG OF A PROBLEM DO YOU BELIEVE SECURITY FOR THE SMART GRID WILL BE IN FIVE YEARS? 10% 29% A small problem A moderate problem 23% A big problem A very big problem 37% Power outages occur 4.3 System failure (outages) 4.6 Power flow is disrupted 4.1 Consumer data privacy 3.8 Equipment is damaged 4.0 Energy theft or hacking of smart meters 3.6 Smart meters are hacked 3.5 SMART GRID AREA OF CONCERN RATING* CONSEQUENCE SEVERITY OF UTILITY SECURITY BREACH RATING* *Respondents were asked to rate their level of concern and severity on these areas of security using a scale of 1 to 5. With 1 being low concern/low severity and 5 being extremely high concern/extremely high severity. WHAT IS THE BEST WAY TO REMEDY SMART GRID SECURITY CONCERNS? 15% 38% Customer demand Government standards 30% Legal ramifications, penalties 6% Public pressure (media attention) Incentives 11% (e.g., government grants) IS GRID PREPARED FOR THE THREATS TO ITS SECURITY? 13% 4% Yes, well prepared Yes, moderately prepared 32% Yes, but only slightly prepared 51% No, not prepared at all HOW MUCH IS YOUR ORGANIZATION PLANNING TO INVEST IN CYBER SECURITY TECHNOLOGIES OVER THE NEXT YEAR? han $500 ss t ,0 Le More than $5,000,000 00 $100,000 than ess L 22% 34% 13% ss ,0 Le a n $ 1, 0 0 7% Less than $5,000,000 Less than $2,500,000 00 15% th 8% 0 WHAT AREA OF THE GRID WILL THE LARGEST AMOUNT OF INVESTMENT BE MADE OVER THE NEXT YEAR? Distribution Automation Advanced Metering Infrastructure 20% Transmission Systems 30% 7% Substation Automation www.smartm.com 16% Enterprise Level IT systems 7% 20% Customer Systems www.smartgridresearch.org Source: Zpryme online survey of 111 energy and utility executives conducted in November 2013. SMART Modular is a technology leader in the design, development, and deployment of current and next-generation memory products. Combining leading-edge design and manufacturing with proven world-class support, SMART Modular leverages its deep expertise in DRAM, SRAM and Flash architectures with world-class board-layout design. SMART Modular delivers high-quality, high-reliability solutions to a broad customer base, including tier one computing and telecom OEMs as well as industrial, medical and automotive customers. In support of these designs, SMART Modular provides award-winning innovations in memory and embedded storage