Protect critical energy assets
Physical security. Cyber attacks. Customer database breaches.
Deter Utility Threats
Power systems are prime targets for planned and coordinated physical and cyber attacks, and utilities need to be prepared to protect the grid. The best protection comes from an appropriate blend of risk management analysis, grid design, security technology implementation, and facility hardening. Leidos offers robust experience in programs and procedures that achieve full compliance while anticipating and deterring evolving threats.
Leidos is uniquely equipped to help utilities meet regulatory standards and retool their physical security, cybersecurity, critical communications, and grid resiliency to protect critical assets from evolving threat vectors.
Leidos has performed grid engineering work with more than 600 utility clients. This foundational utility expertise along with years of proven experience protecting government interests—including physical security measures, cybersecurity and digital forensics, critical communications design, and mission-critical logistics—combine to give Leidos a unique edge in protecting the grid.
With proven experience and superior expertise in critical infrastructure protection, Leidos works collaboratively with its utility partners to provide enhanced security measures to deter, detect, delay, assess, communicate, and respond to potential threats. Our experience includes:
- NERC CIP 014 compliance
- Security strategic planning
- Outage vulnerability and impact analysis
- Secure substation design and retrofit
- Hardening of critical assets
- Security technology implementation
- Operations/data center construction
Effective process safety management prevents catastrophic, expensive and potentially fatal incidents from occurring; it helps protect your people, your assets and the environment. To be successful, effective barrier management must be implemented and sustained.
Are you in control? Leidos helps clients answer this question by enhancing the visibility and the status of an organization’s key safety systems (i.e., the barriers used to control the hazards within its operations). Led by the principles set out in key industry regulations, guidelines and our extensive practical experience, our team works in conjunction with leading stakeholders from production, operations, engineering and maintenance to review and enhance the measurement of these barriers, allowing you to make the right decisions at the right time.
Industry is currently facing a series of significant digital transformation challenges as Operational Technology (OT) environments become increasingly interconnected and smarter. The business demand for the raw data and information produced by these systems is growing exponentially both from an internal and external perspective. While interconnected systems offer great advantages, including the speed at which information can be shared, greater business efficiencies and reduced costs, it also introduces new challenges and risks with the most significant relating to Cyber Security within the OT environment.
Cyber-attacks specifically aimed at OT systems have become significantly more sophisticated, advanced and persistent in recent years. Such an attack has the potential to impact a number of aspects of a company’s business including:
- Safety, Health and Environment;
- Production operations;
- Legal and Regulatory compliance;
- Information integrity;
- Financial performance;
- Reputation and “license to operate”.
With a focus on safeguarding Critical National Infrastructure, find out how our integrated and intelligent approach to OT security allows organisations to gain an initial overview and understanding of the existing OT security posture in order to identify key priority areas for improvement.
Utility companies need a holistic approach that protects the entire enterprise—both operational technology and information technology environments. With attacks becoming more frequent and more severe, it is imperative that utilities continue to evolve and mature their cybersecurity posture to ensure operational uptime, improve situational awareness, minimize risk and promote the safety of employees and the community.