Helping LDCs better serve their communities

Cybersecurity of Local distribution companies (LDCs) is only as strong as the weakest link and a vulnerability on one local distribution company (LDC) could bring down the entire provincial network, causing untold damage to businesses, communities and the economy at large.

Digitalization initiatives and the expansion of remote workforces have transformed enterprises, causing once-isolated operational technology (OT) environments to become interconnected with their information technology (IT) counterparts. The result is the rise of converged IT/OT industrial networks with complex and expanded attack surfaces that IT security teams are increasingly responsible for protecting. The challenge is the OT portions of these industrial networks typically comprise proprietary protocols and unfamiliar assets, making them incompatible with IT security tools and invisible to IT security teams.

To help mitigate these risks, the firm has assembled an experienced team capable of delivering a specialized set of cybersecurity services geared specifically towards power utilities. Grant Thornton can provide utility-specific assessment services using frameworks such as NIST CSF, C2M2, NIST SP800-82R2 as well as benchmark against NERC CIP. We also provide tactical solutions such as the deployment of OT passive monitoring solutions allowing full visibility securely over a utility’s OT network.

Below are some offerings where we provide advisory services:

Cyber Assessment Solutions​

  • T/OT Cybersecurity maturity assessments – utilities focused frameworks (i.e. C2M2, NIST CSF, ISO 27019, NISTIR 8259)​
  • Cybersecurity compliance (NERC CIP)​
  • Architecture assessment (NIST SP800-82R2, SP 800-213)

Tactical Cyber Assessments​

  • OT passive asset discovery and vulnerability assessment
  • OT/IT penetration testing
  • Red Teaming and social engineering
  • Table-top and simulation exercises

Cyber Strategy & Transformation​

  • Passive monitoring solutions
  • 3rd party Security Program Assessment and Design
  • Cyber risk management, target operating model, and cyber program development
  • Cybersecurity Metrics and audience specific reporting

Digital Identity Services​

  • Secure remote access solutions
  • Privileged account management implementation
  • Role based access control implementation
  • Identity services key performance & risk indicators

Cyber Breach Response​

  • OT/IoT Incident response plan development
  • Business continuity / disaster recovery
  • Breach coaching
  • Breach response
  • Forensic investigation
  • Litigation support

Download the PDF [ 177 kb ]