<img src="https://ws.zoominfo.com/pixel/4CagHYMZMRWAjWFEK36G" width="1" height="1" style="display: none;">
Request Demo

Energy & Utilities

What to Know About Scaling NERC CIP Compliance Across Your Organization

down-arrow

NERC CIP currently stands to be the oldest and most critical regulatory framework for protecting and securing our bulk electric systems as a whole as it relates to cybersecurity. On all levels, the consumer through a corporation, NERC CIP sets the gold standard for how to operate and protect the individuals who rely on its functionality. With so many mandated requirements, NERC CIP can be difficult to understand for those under-equipped, but knowing where to look and how to report on your organization's assets, policies, and personnel, can make the process digestible and replicable for your future compliance efforts. One of the things that makes NERC CIP unique is that it is centered around a risk-based model. To satisfy the controls within NERC CIP, your organization will have to account for everything it does, as it relates to operating in the BES, NERC outlines many resources available to meet these needs on their website.

The standards of NERC CIP at the time of writing consist of 17 controls and 91 sub-requirements. Out of these controls, only 11 are actively being enforced, 5 are subject to future enforcement and one is being transitioned to an inactive state. With this, we’ve developed a method to optimize your NERC CIP compliance efforts to not only speed up your risk initiatives but also to communicate them in a way your entire company can stay on the same page.

BlogInfographic-NERC CIP

 

You may also like

3 Ways Financial Institutions are ...
on January 14, 2021

Financial services firms have often been at the forefront of security since the inception of the first Chief Information Security Officer in the 1980s. Why? For the same reason ...

3 Steps for Secure Digital ...
on January 12, 2021

It comes as no surprise to readers that the COVID-19 pandemic vastly catalyzed digital business. From the rapid, necessary adoption of remote work to the precipitous rise in ...

Augmenting Legacy GRCs During ...
on January 7, 2021

From Silos to a Category to Modern-Day From the early days of internal audit and external audit, governance, and policy management silos and into the era of enterprise governance, ...

Alison Furneaux
Embrace Cyber Risk Transformation ...
on January 5, 2021

Widespread Digitalization Puts Increasing Demands on Risk and Compliance Programs The scope of risks to be managed is increasing. Especially over the past year amid the COVID-19 ...

Alison Furneaux
Practice vs Process Maturity: ...
on December 18, 2020

Information security maturity has never been more important. In the wake of the COVID-19 pandemic, the catalyzation of digital transformation and the ripple effects on businesses ...

Top 5 Cyber Events 2020
on December 15, 2020

2020 brought a lot of unforeseen circumstances with it. A lot has happened between the rampant risk in cyber attacks across the digital landscape to the COVID-19 pandemic ...