{"id":17662,"date":"2022-03-30T19:02:09","date_gmt":"2022-03-30T18:02:09","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=17662"},"modified":"2022-03-30T19:03:34","modified_gmt":"2022-03-30T18:03:34","slug":"17662","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/","title":{"rendered":"Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services"},"content":{"rendered":"\n<h2>Cyber issues in the energy sector<\/h2>\n<p>The energy sector is made up of <strong>vital infrastructures<\/strong> and provides essential services for a country.\u00a0The sector, shaped by <strong>increasing digitalization<\/strong>, is undoubtedly <strong>a prime target for cyber attackers<\/strong> with consequences that are liable to create shockwaves throughout the service industry as well as all major infrastructure. Taking electricity as an example, an outage spanning a few days would have grave consequences on transport, health and communication almost guaranteeing they cannot perform their core functions.<\/p>\n<p>\u00a0<\/p>\n<h2>A sector undergoing transformation<\/h2>\n<p>The energy sector began its <strong>transition with the arrival of renewable energy<\/strong>. The shift in the sector is also due to innovative techniques and systems that have been integrated into the power grid to<strong> help manage the complex task of balancing energy levels<\/strong><strong>,<\/strong> because it is vital that the energy pumped in and out of the grid at any one time always remain equal. This level of transformation leads to <strong>an increased need for flexibility<\/strong> to ensure security of both the power supply and the significant investments in the power grid. These are the objectives that have and will continue to drive concepts such as<strong> smart grids<\/strong>, to enable the control of energy consumption and optimization.<\/p>\n<p>In response to these business evolutions (market shifts), <strong>the energy sector is undergoing a digital transformation<\/strong> that is disrupting the way energy is produced, processed, stored, transported, and consumed. Overall, information and communication technologies have helped optimize the supply chain. An example being the widespread deployment of <strong>industrial internet of things<\/strong> (IIOT) devices. The switch to these devices has led to an explosion in the volume of data in day to day activities. While energy companies must now use this data to be more <strong>agile <\/strong>in their decision making by effectively leveraging it, the large volumes of data expose the industry as a whole to a host of data based malicious actions, making <strong>cyber security a priority for the energy sector.<\/strong><\/p>\n<p>Here is a concrete example: remotely piloted, wind turbines and solar panels are by nature connected objects. They must be accessible remotely and therefore secure. However, these new projects do not systematically consider all cybersecurity constraints and related technical solutions (secure protocols, appropriate access technologies, etc.) from the design phase.<\/p>\n<p>\u00a0<\/p>\n<h2>An increasingly targeted sector<\/h2>\n<p>Let\u2019s look at the \u201chistory\u201d of cybersecurity in relation to this sector: the discovery of <strong>Stuxnet<\/strong> in 2010 created a shock wave within the energy industry. This attack highlighted unknown vulnerabilities at the time.<\/p>\n<p>In December 2016, some inhabitants of Kiev and its periphery were deprived of electricity for about 1 hour due to the disconnection of the substation of the Pivnichna electricity transmission power grid. The attack began as part of <strong>a massive phishing campaign<\/strong> in July of the same year, which exploited a vulnerability in Windows XP. The failure was caused by the remote switching of the circuit breakers to cut power.<\/p>\n<p>Since then, cyber events have become recurring occurrences. Another example: renewable energies are new targets for cyber attackers. In 2019, in Utah in the United States, <strong>a wind and solar power system<\/strong> suffered connection losses with the company\u2019s control center for 12 hours, causing power outages in surrounding homes. Cyber attackers had exploited a known vulnerability on unpatched firewalls causing a denial of service of equipment.<\/p>\n<p>In 2021, the executives of Colonial Pipeline, which connects refineries across the United States, decided to block all their distribution operations following <strong>the spread of ransomware<\/strong>. The company said they paid $4.4 million in ransom for hackers to provide a computer tool to restore their business<sup> [1]<\/sup>.<\/p>\n<p>The energy sector is one of the most targeted sectors. According to the X-Force Threat Intelligence Index 2022 <sup>[2]<\/sup>, the energy sector ranked <strong>as the fourth most affected sector<\/strong> in 2021, with 8.2% of all observed attacks, behind the manufacturing industry, the financial sector, and the professional services sector.<\/p>\n<p>In 2021, <strong>ransomware was the most common type of attack<\/strong> against energy organizations with 25% of attacks. Oil and gas companies are particularly affected by this phenomenon. Remote Access Trojan (RAT), DDoS and Business Email Compromise (BEC) follow with 17% of attacks each.<\/p>\n<p>While cyber-attacks are most often <strong>targeted for profit and espionage<\/strong>, the energy industry also deals with <strong>sabotage intentions<\/strong>, sometimes <strong>for geopolitical reasons<\/strong>. Some <strong>hacktivists<\/strong> can also pose a threat by attacking critical infrastructure. The recent ongoing major geopolitical destabilization events reinforce these risks.<\/p>\n<p>The energy sector has critical infrastructure. In an increasingly interdependent world, any disruption, even initially limited to an entity or geographic area, can produce broader cascading effects as outlined below:<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17663 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1-1.png\" alt=\"\" width=\"643\" height=\"257\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1-1.png 643w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1-1-437x175.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1-1-71x28.png 71w\" sizes=\"auto, (max-width: 643px) 100vw, 643px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Impact Chain-Wavestone<\/em><\/p>\n<p>\u00a0<\/p>\n<p>To fight effectively against these new threats, <strong>the States and the European Union have adopted binding regulations<\/strong> to ensure a higher level of cybersecurity on the most critical facilities.<\/p>\n<h2>\u00a0<\/h2>\n<h2>What role for regulation?<\/h2>\n<p>In France, the competent authority for cybersecurity is the <strong><em>Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information<\/em><\/strong> (ANSSI). To respond to the increase in threats, the concept for the defence strategy has been based on the <strong>Military Programming Law<\/strong> (LPM) since 2013 in order to secure the <strong>Operators of Vital Importance<\/strong> (OIV). ANSSI mainly insists on procedures for the approval, control, and maintenance in security conditions of <strong>Vital Information Systems<\/strong> (SIIV).<\/p>\n<p>At European level, the objective is also to protect sensitive organizations such as <strong>operators of essential services<\/strong> (OES) in the energy sector. The reference point for cybersecurity is currently the <strong>Network and Information System Security (NIS) directive<\/strong>. Its primary objectives are to <strong>increase cooperation between EU Member States<\/strong>, by facilitating the exchange of strategic and operational information, and to <strong>improve the cyber resilience of public and private entities in key sectors<\/strong> such as energy. When it comes to energy, ENISA wants to protect from large-scale threats with increasingly cross-border and interdependent power grid.<\/p>\n<p><strong>The complexity lies in the operational application<\/strong> of specific measures in industrial environments where equipment and means of production are expected to last <strong>several decades<\/strong>.\u00a0Thus, modifying operational processes and\/or equipment to incorporate additional cybersecurity is a concrete challenge.\u00a0The impacts of this transition are significant both in financial and operational terms.\u00a0This makes <strong>cooperation and sharing even more important for energy stakeholders to find pragmatic and adapted solutions<\/strong>: adapted network architecture, technical solutions compatible with the industrial world, vulnerability management processes and updates built with operational teams for example.<\/p>\n<p>\u00a0<\/p>\n<h2>Conclusion<\/h2>\n<p>Considering the critical nature of the energy sector infrastructure, it is essential that business and cybersecurity actors in the energy sector communicate on good cybersecurity practices<strong>, learn from previous attacks,<\/strong> and contribute to changing the overall level of protection.\u00a0It is in this context that the first forum dedicated to energy stakeholders <strong>\u00abCyber4Energy\u00bb<\/strong> will be held in Marseille on 30-31 March 2022.\u00a0This event will be an opportunity for professionals <strong>to discuss cybersecurity challenges and dedicated solutions available to the sector.<\/strong><\/p>\n<p>R\u00e9f\u00e9rences\u00a0:<\/p>\n<p>[1] <a href=\"https:\/\/www.lemonde.fr\/international\/article\/2021\/05\/19\/etats-unis-les-oleoducs-colonial-pipeline-ont-verse-une-rancon-de-4-4-millions-de-dollars-a-des-hackeurs_6080761_3210.html\">Etats-Unis\u00a0: les ol\u00e9oducs Colonial Pipeline ont vers\u00e9 une ran\u00e7on de 4,4\u00a0millions de dollars \u00e0 des hackeurs (lemonde.fr)<\/a><\/p>\n<p>[2] X-Force Threat Intelligence Index 2022, IBM Security <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/M1X3B7QG\">X-Force Threat Intelligence Index 2022 (ibm.com)<\/a><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber issues in the energy sector The energy sector is made up of vital infrastructures and provides essential services for a country.\u00a0The sector, shaped by increasing digitalization, is undoubtedly a prime target for cyber attackers with consequences that are liable&#8230;<\/p>\n","protected":false},"author":1347,"featured_media":17649,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3977,3274],"tags":[2772,3394,3466,3834],"coauthors":[3141,4046,4047],"class_list":["post-17662","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-focus","category-manufacturing-industry-4-0-en","tag-cybersecurity","tag-energy","tag-industry","tag-ot-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Cyber issues in the energy sector The energy sector is made up of vital infrastructures and provides essential services for a country.\u00a0The sector, shaped by increasing digitalization, is undoubtedly a prime target for cyber attackers with consequences that are liable...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-30T18:02:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-30T18:03:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1332\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lo\u00efc Lebain, Arthur BERNARDEAU, Manon NAITMAZI\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lo\u00efc Lebain, Arthur BERNARDEAU, Manon NAITMAZI\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/\"},\"author\":{\"name\":\"Lo\u00efc Lebain\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c\"},\"headline\":\"Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services\",\"datePublished\":\"2022-03-30T18:02:09+00:00\",\"dateModified\":\"2022-03-30T18:03:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/\"},\"wordCount\":1171,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1.jpg\",\"keywords\":[\"cybersecurity\",\"energy\",\"Industry\",\"OT\"],\"articleSection\":[\"Focus\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/\",\"name\":\"Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1.jpg\",\"datePublished\":\"2022-03-30T18:02:09+00:00\",\"dateModified\":\"2022-03-30T18:03:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1.jpg\",\"width\":2000,\"height\":1332},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c\",\"name\":\"Lo\u00efc Lebain\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/loic-lebain\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/","og_locale":"en_US","og_type":"article","og_title":"Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services - RiskInsight","og_description":"Cyber issues in the energy sector The energy sector is made up of vital infrastructures and provides essential services for a country.\u00a0The sector, shaped by increasing digitalization, is undoubtedly a prime target for cyber attackers with consequences that are liable...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/","og_site_name":"RiskInsight","article_published_time":"2022-03-30T18:02:09+00:00","article_modified_time":"2022-03-30T18:03:34+00:00","og_image":[{"width":2000,"height":1332,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1.jpg","type":"image\/jpeg"}],"author":"Lo\u00efc Lebain, Arthur BERNARDEAU, Manon NAITMAZI","twitter_misc":{"Written by":"Lo\u00efc Lebain, Arthur BERNARDEAU, Manon NAITMAZI","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/"},"author":{"name":"Lo\u00efc Lebain","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c"},"headline":"Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services","datePublished":"2022-03-30T18:02:09+00:00","dateModified":"2022-03-30T18:03:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/"},"wordCount":1171,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1.jpg","keywords":["cybersecurity","energy","Industry","OT"],"articleSection":["Focus","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/","name":"Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1.jpg","datePublished":"2022-03-30T18:02:09+00:00","dateModified":"2022-03-30T18:03:34+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/Picture1.jpg","width":2000,"height":1332},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/03\/17662\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c","name":"Lo\u00efc Lebain","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/loic-lebain\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/17662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1347"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=17662"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/17662\/revisions"}],"predecessor-version":[{"id":17668,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/17662\/revisions\/17668"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/17649"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=17662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=17662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=17662"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=17662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}