logo logo
  • Who We Are
  • What We Do
  • Insights & News
  • Careers
  • Who We Are
    • Who We Are
    • What Drives Us
    • Meet Our People
    • Employee Ownership
    • Social Responsibility
  • What We Do
    • What We Do
    • Industries
      • Aviation
      • Commercial, Retail & Institutional
      • Environmental
      • Government & Military
      • Manufacturing & Industrial
      • Mining & Minerals
      • Oil, Gas & Chemicals
      • Power
      • Telecommunications
      • Transportation
      • Water
    • Services
      • Services
      • 1898 & Co: Business, Technology & Security Consulting
      • Architecture
      • Commissioning
      • Construction
      • Engineering
      • Operations & Maintenance
      • Program Management
    • Projects
  • Insights & News
  • Careers
    • Careers
    • Search Jobs
    • Find Your Career
    • Benefits & Rewards
    • Applying & Interviewing
    • Training & Development
    • Careers FAQ
  • Honors
  • Industry Rankings
  • Blog
  • Locations
  • Suppliers
  • Contact Us

The Importance of Security Orchestration in the Utility Space

Summary

Electric grids are modernizing to support microgrids, smart city devices, automation and grid operations, and integration of distributed energy resources (DERs). In this dynamic environment, utilities face new cybersecurity challenges.

Utilities are combating everchanging cybersecurity threats with a suite of disparate technologies and tools that take time to manage and do not natively work together. Furthermore, cybersecurity teams working for utilities are understaffed, overworked and regularly bombarded with alarms from these disparate technologies. Fortunately, when utilities adopt security orchestration, they can effectively manage security operations, while freeing up time for the cybersecurity team to address threats.

This webinar will cover:

  • The importance of security orchestration.
  • The role of security orchestration in maturing operational technology resilience.
  • Action plans to reduce the risk of exposure for utilities.
  • Strategies to comply with industry regulations.

Speakers

John Biasi

Senior Cybersecurity Consultant

Connect on LinkedIn

John leads IT security initiatives and has experience in network design. As a consultant, he supports planning, analysis and implementation efforts that drive business objectives.

Joe Bonventre

Senior Managing Consultant

Connect on LinkedIn

Joe has led strategic planning efforts for regulatory compliance and security initiatives. He conducts both physical and cybersecurity risk assessments, and coordinates comprehensive security system solutions.

On Demand

 

Making Our Clients Successful

Contact Us  

What We Do

  • Industries
  • Projects
  • Services

Careers

  • Benefits & Rewards
  • Find Your Career
  • Search Jobs

Who We Are

  • Diversity, Equity & Inclusion
  • Employee Ownership
  • Ethics & Compliance
  • Meet Our People
  • STEM Commitment
  • Safety
  • Sustainability
  • What Drives Us

 

  • Blog
  • Business Diversity
  • Industry Rankings
  • Insights & News
  • Locations
  • Manage Your Subscriptions
  • Media Contact
  • Suppliers

© 2025 Burns & McDonnell. All rights reserved.

  • Accessibility
  • Privacy Statement

At this time, Burns & McDonnell is not offering pure architectural services in the states of Illinois, Montana, New Hampshire or New Jersey. We may, however, provide design-build services for architectural projects.