ABOUT NPCC Careers Contact Us Governance & Corporate Membership Resources Leadership Team PROGRAM AREAS Standards & Criteria Compliance RAPA SAIS COMMITTEES DER/VER Forum Gov/Reg Affairs Reliability Coordinating Regional Standards NEWS Search SIGN IN

Posted: 09/22/2022

Cybersecurity Initiative for Electric Utilities

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) is introducing the development of CESER’s Rural and Municipal Utility Advanced Cybersecurity Grant and Technical Assistance Program (RMUC Program) - Rural and Municipal Utility Advanced Cybersecurity Grant and Technical Assistance (RMUC) Program | Department of Energy.

The goal of the RMUC Program is to enhance the security posture of rural, municipal, and small investor-owned electric utilities and improve their ability to protect against, detect, respond to, or recover from a cybersecurity threat. 

The primary objectives of the RMUC Program are to deploy advanced cybersecurity technologies (defined as any technology, operational capability, or service for electric utility systems that enhances a utility’s security posture), and to increase participation of eligible entities in threat information sharing programs.




Compliance Bulletin Decisions & Notices ERO Enterprise Media Release NERC NPCC Regional Entities & Others Reliability Assessment Security Bulletin


  Upcoming Events

  News Highlights

NPCC 2023 Annual Member Meeting

November 29, 2023

NPCC Announces Northeast Gas/Electric System Study

November 29, 2023

Security Notice

This is a Northeast Power Coordinating Council, Inc. (NPCC) information system. You have no reasonable expectation of privacy regarding communications or data transiting or stored on NPCC’s information system. At any time and for any lawful purpose, NPCC may monitor, intercept, record, and search any communications or data transiting or stored on this information system. At NPCC’s sole discretion, NPCC may disclose pertinent information to the U.S. Government and its authorized representatives to protect the security of critical infrastructure and key resources, ensure information security, or to comply with any applicable law, regulation, legal process, or enforceable governmental request. By continuing, you acknowledge that you understand and consent to the terms and conditions described in this notice. The actual or attempted unauthorized access, use, or modification of this system is strictly prohibited and may subject violators to criminal, civil, and/or administrative action.