Trial lock

This content is not available with your current subscription.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to learn more about gaining access to Utilities.

Contact Your Representative or Call: 1-888-670-8889 (US) or 1-844-618-3192 (CAN)

Date published:


There is a lucrative bounty on the backs’ of utility organizations. The evolution of industrial control systems (ICS) has resulted in the emergence of digital automation, data accessibility, and consequently, various vulnerabilities. One successful breach from the wrong attack vector could have devastating repercussions, compromising the integrity of utility infrastructure nation-wide. The need for visibility into the threat landscape is more prominent now than ever; establish a threat intelligence function and improve your organizational situational awareness.
  • Edward Gray