S1 - Cybersecurity

13 Nov - From 10:00 to 11:50

Introduction

A concerned member contacted us on this topic after Russian warships had gone very close to their offshore wind farm. Cybersecurity is a critical consideration for wind asset owners. Safeguarding wind farms from potential cyber threats is imperative to ensure the turbines' reliability, efficiency, and uninterrupted operation. This entails comprehensive measures such as protecting data integrity, securing communication networks, and implementing robust defences against cyber-attacks. As wind farms become more interconnected and digitally reliant, understanding and addressing cybersecurity risks becomes paramount for wind asset owners to safeguard their investments and contribute to the resilience of the renewable energy sector.

Is this your cup of tea?

Are these the challenges you are expected to develop in your professional role?

  • How to address and manage sophisticated cyber threats in interconnected energy systems

  • Securing the supply chain for turbine components and preventing malicious activities.

  • Managing security risks from integrating IoT devices in wind turbines.

  • Dealing with cybersecurity challenges in older or legacy systems in your wind turbines.

  • Can the OEM’s integrated role be a cybersecurity weakness, and what’s the response from the OEM on this?

  • Could we collaborate on keeping track of and interpreting evolving cybersecurity regulations in the energy sector?

  • Would it be useful/possible to compare our emergency planning on a high level on how to handle and solve severe cybersecurity incidents in wind energy infrastructure?

  • Various cybersecurity suppliers and software - what works well and what to avoid?

Joining this discussion with identical peers from other WTG owners will give you a broader understanding, an expanded network and valuable insights.

Your top challenge – directly included

This roundtable is based on real and current challenges held among the participants. You will have direct input on your top challenge and insights into your peer’s top challenges.

  1. Before the event - submit your top challenge.

  2. At the event - discover your peers' challenges, have input on yours and discuss solutions.

  3. After the event - receive a summary of the findings from all roundtables, providing valuable insights for all.

Once you have registered your team, each individual will receive a link to select roundtables and submit their top challenges. A dummy is shown at this link.