Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

DOE’s cybersecurity accelerator to focus on industrial control systems with 2nd cohort | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


The U.S. Department of Energy is taking applications for the second cohort of its Clean Energy Cybersecurity Accelerator, or CECA, program, seeking solutions that can “identify all industrial control system assets connected to a utility’s infrastructure, both physically and virtually.”

DOE is planning a Jan. 17 webinar to discuss the program. The application period will remain open through Feb. 10.

The CECA program connects clean energy security developers with federal experts and energy industry representatives to secure an increasingly automated and distributed electric grid.

The accelerator is run by DOE’s Office of Cybersecurity, Energy Security, and Emergency Response and its Office of Energy Efficiency and Renewable Energy, with Berkshire Hathaway Energy, Duke Energy, and Xcel Energy.

The CECA program “will help bring cutting-edge solutions to market more rapidly — ensuring our nation’s electric grid is secure and reliable as it transitions to 100% clean energy,” Secretary of Energy Jennifer Granholm said in a statement.

Up to five participants will receive evaluations of their technologies and partnership opportunities across a period of three to 12 months, DOE said. Applicants must be based in the United States and offer technology solutions “focused on solving hidden risks due to incomplete system visibility and device security and configuration,” according to the agency.

CECA’s first cohort was announced in December and focused on the security of distributed energy resources, and ensuring critical infrastructure cannot be accessed without proper authorization. Participants include Blue Ridge Networks, Sierra Nevada Corp. and Xage.

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW