Well supplied! Are you sure?

‘Solutions for sustainable security of supply for industry and society’ was the title of the press conference, which was also streamed in hybrid form as part of the Hanover trade fair on 30 May 2022. Holger Berens, Managing Partner at Concepture and Chairman of the Board at the Federal Association for the Protection of Critical Infrastructures (BSKI), was also present.
Podium Hannover Messe 2022

Panel line-up

Ansgar Hinz, CEO of the VDE Group, moderates the conference and puts questions to the participants. These are (from left to right) Marten Jensen, Managing Partner of GreenTEC Campus, Burkhard Holder, Managing Director of VDE Renewables GmbH, Holger Berens, Chairman of the Federal Association for the Protection of Critical Infrastructures (BSKI) e.V. and Managing Partner at Concepture, joined via video by Prof Tonio Buonassisi, Global Head Solar Programs, Massachusetts Institute of Technology (MIT).

Findings from the last few months

The war in Ukraine also features prominently in this round of talks. Moderator Ansgar Hinz begins by pointing out that a paradigm shift in security and energy policy is unavoidable in view of the developments in Ukraine and Germany’s associated dependence on Russian energy imports. The sharp rise in attacks from cyberspace can also be directly or indirectly linked to the war.

Accelerating the energy transition

Everyone agrees on the first major topic of the energy transition. In order to manage the transition away from Russian fossil fuels, the expansion of the grid for renewable energies must be accelerated, bureaucracy reduced and storage capacities of various kinds built up. Burkhard Holder from VDE Renewables brings an interesting aspect into the discussion, which is often somewhat overlooked in the debate: all this new infrastructure, all this new energy has to be built, installed and maintained by people. However, there are currently not enough of them available. Unfortunately, the shortage of skilled labour is also having an impact here.

Security of supply – what is it actually?

The topic switches to security of supply and attacks from cyberspace. Holger Berens describes once again that security of supply in this context must be seen in its three core elements (cyber or information security, energy security and transport security). Focusing on just one of the pillars is not enough.

Holger Berens begins by pointing out that cyber attacks are not a new phenomenon. He also points out the different motives of the attackers. We have already explained these types of perpetrators in more detail in another of our articles. Organised crime has now built up a veritable ‘franchise system’ that has spread across the darknet. For example, it is possible to download and distribute pre-programmed ransomware for a share of the extorted sum.

An old acquaintance: Human vulnerability

Holger Berens must also take this opportunity to point out that one of the biggest and recurring vulnerabilities remains the human factor. However, creating awareness is not just a matter for employees. Managing directors and management staff must also live this and take it seriously.

At this point, Prof Buonassisi provides an interesting insight into an MIT experiment. A freshly installed PC system was connected to the network. After just 12 hours, 25,000 port scans from bots were recorded on the system. This gives an indication of how active the criminals are in cyberspace.

Do not counteract measures

An exciting topic is also touched on in the discussion. Despite all caution and all measures, care should be taken to ensure that the safety measures taken are not counteracted elsewhere by negligence or poor planning. To make the example a little more tangible: A perfectly protected network is unfortunately of no use if you can physically access all IT locations in the company building without any problems (e.g. server room). This is where the disciplines of security become blurred. Security must be viewed and planned holistically at this point – an old credo and a strength of Concepture.

Conclusion

In order to master the challenges of the future and be able to provide energy securely and reliably, several things need to work together. Bureaucracy must be reduced and storage capacities created. From a security perspective, however, a rethink must also take place to some extent. Municipalities in particular need to see themselves as part of critical infrastructure. There also needs to be a realisation that there can be no such thing as 100% security – a risk assessment, i.e. the identification of priorities, is a prerequisite for ensuring that these can be effectively protected.

Picture credits Cover picture: Copyright: Hannibal / VDE

Clemens Schindler

Security Consultant
Clemens Schindler is your contact person for everything to do with fire protection and security technologies and advises our customers online and on site.

Jetzt weiterlesen!

Cyber Security, Management Consulting, Security Consulting

Security 2025: The top trends that no company can ignore

The security landscape is changing rapidly. To stay protected in the future, companies must focus on trends like OSINT, robotics, and Zero Trust by 2025. This article outlines the five key developments that you can’t ignore and a groundbreaking technology that could transform security.

Uncategorized

Deepfakes: More Than Just a Digital Facelift – A Cybersecurity Threat

I recently came across an interesting article by BlackBerry titled "Deepfakes and Digital Deception." It painted a vivid picture of the rising threat of deepfakes in the cybersecurity landscape. While deepfakes can be entertaining, their potential for malicious use is what truly caught my attention. The article effectively highlights how deepfakes, fueled by advancements in generative AI, are becoming increasingly sophisticated and accessible. This ease of creation, coupled with the persuasive power of deepfakes, makes them a potent tool for cybercriminals.

Uncategorized

EU Cyber Resilience Act: Everything you need to know

The EU Cyber Resilience Act (CRA) is a pioneering step towards greater cyber security for digital products in the European Union. This regulation defines binding security standards and protects consumers and companies from increasing cyber threats. In this article, you will learn everything you need to know about the CRA, its scope of application, the requirements and how companies can prepare themselves.

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.