2022-09-30 Cyber and Physical Threat Report
342.6 KB
09/30/2022
This browser is not supported.
NPCC’s Security Outreach Program is focused on the development, coordination and promotion of physical and cyber security efforts, including sharing of best practices; development of security training and participation in security exercises; and supporting NERC, other Regions and industry on matters related to the interface between reliability and security. Security Outreach builds/enhances training and education to entities to reduce incidence of known risks to reliability and mitigation of emerging security risks.
Documents
2022-09-30 Cyber and Physical Threat Report
342.6 KB
09/30/2022
2022-10-18 Cyber and Physical Threat Report
315.7 KB
10/18/2022
2022-11-02 Cyber and Physical Threat Report
309.2 KB
11/07/2022
2022-11-21 Cyber and Physical Threat Report
267.8 KB
02/28/2023
2023-01-11 Cyber and Physical Threat Report
274.3 KB
02/28/2023
2023-01-18 Cyber and Physical Threat Report
271.2 KB
02/28/2023
2023-01-31 Cyber and Physical Threat Report
258.1 KB
02/28/2023
2023-02-17 Cyber and Physical Threat Report
237.5 KB
02/28/2023
2023-03-06 Cyber and Physical Threat Report
237.7 KB
03/22/2023
Apr
7
CIP ERT Overview and Lessons Learned
May
18
NPCC 2023 Spring Compliance and Reliability Webinar
Oct
17
GridSecCon 2023
VIEW ALL
GridSecCon 2023 Call for Abstracts – Deadline March 31
March 01, 2023
Generator Welcome Package is Now Available
January 18, 2023
NPCC Electrical System Map
NPCC Directory
Security Notice
This is a Northeast Power Coordinating Council, Inc. (NPCC) information system. You have no reasonable expectation of privacy regarding communications or data transiting or stored on NPCC’s information system. At any time and for any lawful purpose, NPCC may monitor, intercept, record, and search any communications or data transiting or stored on this information system. At NPCC’s sole discretion, NPCC may disclose pertinent information to the U.S. Government and its authorized representatives to protect the security of critical infrastructure and key resources, ensure information security, or to comply with any applicable law, regulation, legal process, or enforceable governmental request. By continuing, you acknowledge that you understand and consent to the terms and conditions described in this notice. The actual or attempted unauthorized access, use, or modification of this system is strictly prohibited and may subject violators to criminal, civil, and/or administrative action.