{"id":7130,"date":"2014-10-24T13:15:08","date_gmt":"2014-10-24T20:15:08","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7130"},"modified":"2022-04-05T05:38:36","modified_gmt":"2022-04-05T12:38:36","slug":"cip-version-5-approaches-best-secure-energy-utilities","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/10\/cip-version-5-approaches-best-secure-energy-utilities\/","title":{"rendered":"CIP Version 5 Approaches: How Best to Secure Energy Utilities"},"content":{"rendered":"<p>The effective date for CIP version 5 Standards is rapidly approaching and entities are beginning to implement new controls to meet the updated requirements.<\/p>\n<p>Palo Alto Networks expert Del Rodillas, along with experts from EnergySec and ENMAX will discuss the new requirements and potential technical approaches to meeting compliance obligations.<\/p>\n<p>Register now, and see full details below:<\/p>\n<p><a href=\"https:\/\/fg106.infusionsoft.com\/app\/page\/register-for-a-webinar141\" rel=\"nofollow,noopener\" ><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:10%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7131 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/energy-webinar-500x50.png\" alt=\"energy webinar\" width=\"500\" height=\"50\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/energy-webinar-500x50.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/energy-webinar-230x23.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/energy-webinar-510x51.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/energy-webinar-240x24.png 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/energy-webinar.png 935w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><!--more--><\/p>\n<p><strong>CIP Version 5 Standards: Electronic Security Perimeters and Interactive Remote Access<\/strong><\/p>\n<ul>\n<li>Wednesday, October 29, 2014, 10 a.m. PT \/ 1 p.m. ET<\/li>\n<li><a href=\"http:\/\/grids.ec\/Cv5_ESPs\" target=\"_blank\" rel=\"noopener\">Register now<\/a>.<\/li>\n<\/ul>\n<h3>For more on Palo Alto Networks solutions for ICS, SCADA and utilities<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/industry\/scada-and-industrial-control\" target=\"_blank\" rel=\"noopener\">Visit the Palo Alto Networks SCADA and Industrial Control resources page<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/10\/watch-reduce-cyber-risks-industrial-control-systems\/\" target=\"_blank\" rel=\"noopener\">Access recent ICS webinars featuring Del and other experts<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/del-rodillas\/\" target=\"_blank\" rel=\"noopener\">Read Del's recent discussions of SCADA and ICS security issues on the blog<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The effective date for CIP version 5 Standards is rapidly approaching and entities are beginning to implement new controls to meet the updated requirements. Palo Alto Networks expert Del Rodillas, along with &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,566],"tags":[843,846,844,845],"coauthors":[709],"class_list":["post-7130","post","type-post","status-publish","format-standard","hentry","category-events","category-scada-ics","tag-cip-version-5","tag-del-rodillas","tag-energysec","tag-enmax"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7130"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7130\/revisions"}],"predecessor-version":[{"id":7135,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7130\/revisions\/7135"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7130"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}