Colorado Springs Utilities Board discusses cybersecurity | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


COLORADO SPRINGS, Colo. (KKTV) – Cybersecurity was a topic of discussion among Colorado Springs Utilities board members Wednesday.

Members met with the provider’s cybersecurity team to learn how they are protecting their infrastructure and customers’ information from data breaches.

Board members said cyber is a big part of Springs Utilities’ business through securing systems and maintaining reliability.

The cybersecurity experts addressed the Iranian conflict and said attacks on critical infrastructure, like utilities, are a common tactic.

The team said this type of attack puts pressure on governments and gives bad actors more control over an area.

So to keep Colorado Springs Utilities safe, Cybersecurity Manager Jessica Rheinschmidt said federal government partnerships have been very helpful.

The expert said the FBI, groups within Homeland Security and the Department of Energy offer her team insight into threats and attacks happening around the world.

Rheinschmidt said these federal agencies also let organizations know how they should be protecting themselves.

The utility provider’s cybersecurity team said it also uses a layered security approach, so if a hacker breaches through one layer, it won’t affect the entire network.

The amount of military infrastructure in and around Colorado Springs is also something the team keeps in mind.

“We have to consider the community we serve,” Rheinschmidt continued. “So that might be a factor that is considered when looking at causing disruption in certain areas.”

The team is also staying on top of new technology like artificial intelligence.

“It’s kind of changed the game and some of the attacks we are seeing, and so we are always trying to prepare for that next technology,” said Rheinschmidt

The cybersecurity meeting was followed by a regular Colorado Springs Utilities meeting.

Copyright 2026 KKTV. All rights reserved.

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW