NESCO Town Hall Meeting – Denver, CO – Sept. 19, 2013

  The next Town Hall Meeting will be held in Denver, Colorado as part of the EnergySec 9th Annual Security Summit. This will be the 6th Town Hall meeting in our on-going series of electric sector cybersecurity moderated discussions. Be sure to put this meeting on your calendar! It’s certain to be another great conversation […]

Join NESCO Today

Did you know that membership with NESCO provides resources for hosting information sharing events around the nation, social networking opportunities, and advocacy for security best practices in the electric sector?   Read more about the benefits of being a NESCO member at us-nesco.org/membership.

Become a TAC Volunteer Handler

We are still taking applications for volunteer handlers. If you would like to apply to be part of the TAC handlers team, fill out this quick application.  

Recent News

Categories:

Thoughts from Defcon

By Jack Whitsitt Since I returned from the yearly hacking & security mega-conference Defcon (and the less well known, but perhaps more interesting, Bsides Las Vegas) last month, I’ve been asked on several occasions  to comment on the various control systems specific talks.  The truth is, I only went to one or two. This is […]

Read More 1 Comment

In classified cyberwar against Iran, trail of Stuxnet leak leads to White House | Washington Times

Mr. Sanger wrote a June 1, 2012, article on Stuxnet that was adapted from his book, which debuted later that week. In the story, he quoted “participants” in White House meetings on whether to continue attacking Iran with Stuxnet, which somehow had broken free into the Internet.“ At a tense meeting in the White House […]

Read More 0 Comments

Industrial Security: The Beltway Bandits and Cybersecurity | CONTROL

“Just when it seemed as though we were finally getting people at the top of corporations and government to listen about the differences between IT and industrial control system ICS security, the Obama Administrations executive order mandating improved cybersecurity for critical infrastructure seems to have taken us all back five years. What do I mean? […]

Read More 0 Comments

How to Protect Yourself from Cybercrime

Cybercrimes are a major concern to most people, and students are not an exception. A significant number of people have been victims of fraud and hackers who access their private information and use it to rob them. The situation has been caused by the emergence of technology that makes information readily available to enemies. The hackers also continue to devise new ways of attacking the Internet users. Thus, people should also have better strategies to deal with this challenge. This essay, therefore, discusses the various tactics that an average student may use to curb the cybercrimes.

Read More 3 Comments

Tom Alrich’s Blog: My (Final) Fantasy CIP-002-5

“I recently wrote my longest post so far, describing how I would rewrite Version 5 of CIP-002 to change what I see as fatal imprecision in the language of that standard.  However, I decided to leave part of the required changes for another post, since I wanted to think about them a little more before writing it.  Here is […]

Read More 0 Comments

Order Cyber Security Essay from EssaysCreator.com to Get Quality Writing Help

hether you need to submit a cloud-computing essay, a computer security essay, a privacy issues essay, or any other type of academic essay writing related to the computing area, be sure that you can rely on our company for expert writing help. We guarantee that we will complete the assignment in a quality way and promptly if you order essays from us.

Read More 0 Comments