How OATI Hub Streamlines Customer Interaction and Flow of Information
See how OATI Hub streamlines your day-to-day processes by offering a one-stop solution for all of OATI needs.
The Importance of Pipeline Security for the Energy Industry
Pipeline security is a major concern for energy companies looking to protect and safeguard their data. In this blog, we highlight the latest steps taken to combat pipeline threats, shed some light on the different industry standards, and discuss how OATI is leading the way to support security standards, including pipeline security standards.
OATI Expert Addresses Cybersecurity Concerns and Exposes Cloud Computing Myths
Unease is growing over cybersecurity issues after recent cyberattacks, including those that affected Energy Transfer Partners this April. At the annual LDC Gas Forums – Northeast event, OATI expert Jerrod Montoya addressed these concerns and the increasing myths surrounding Cloud computing.
Wayzata High School Students Learn About Cybersecurity with OATI
OATI recently coordinated with Wayzata High School to teach seniors about cybersecurity, the business of OATI, and the energy industry. Jerrod Montoya, the newly appointed Deputy CISO for OATI’s Security and Risk Management team, presented information to students at the OATI Microgrid Technology Center.
Developing a Security Plan
As digital viruses and attacks become more advanced, it’s vital to protect your business online. Develop a plan to help secure your operating systems and applications through technology, policies, and training.
Defense in Depth: Preventing Cyber Attacks and Data Loss
Learn how to practice defense in depth to protect your business from cyber-attacks. Create a strategy of having several layers of protection so if an attack does break through one barrier, it will be stopped at the next.
What is Access Control and Why Do We Need It?
Develop a comprehensive access control system of role-based access, password policy, multi factor authentication, and more to protect your data. From basic to advanced systems, following the policies ensures your business is secure.
Understanding Your Attack Surface Area
Understand your attack surface area to reduce the exposure your network, software, and human components face. If a single element is compromised, the result could be significant damage in the event of an actual threat. Control your exposure and stay ahead of cyber attackers.
Security Best Practices for Small Organizations
With the vast number of threats to your cybersecurity out there, there’s always a new security practice to enact. This can be incredibly overwhelming, especially for smaller organizations that lack resources or security focused staff. Here are OATI’s Top Seven Security Best Practices for entities in the energy industry.
OATI Security Star: Manifesto
Building an effective program to protect critical solutions takes more than the review and implementation of published best practices. Learn more about our approach as defined by OATI Security Star.
Centralized Demand Response Management Systems and Data Privacy
When it comes to harnessing DR from their Distribution Member Cooperatives, G&Ts have an interest in protecting the privacy of the Personally Identifiable Information of their member co-op end consumers. OATI shares information on data privacy and centralized demand response management systems.
Understanding the Alleged Russian Hacking of Vermont Utility
There is a lot of confusion surrounding the alleged Russian hack on Vermont utility Burlington Electric Department. OATI took this story very seriously and, in accordance with our security policies and procedures, immediately investigated the report to determine what, if any, action OATI must take.
How Microgrids Can Improve Grid Security
OATI’s David Heim, Chief Strategy Officer and Microgrid Business Development, and Jerrod Montoya, Security and Compliance Counsel, discuss how microgrids can improve grid security in our latest blog post:
Ensuring the Cybersecurity of Cloud Solutions
Many companies are turning to cloud-based, Software-as-a-Service (SaaS) solutions to manage everything from ETRM/CTRM to CVR. While these solutions afford many benefits, they can also expose your organization to increased security risks without proper execution. Here are some things to consider before purchasing: