Overview

The Infrastructure Protection & Security Interest Group is a technical forum for utility personnel tasked with the security of generation, transmission, and distribution assets. The program includes both a strategic component – with a focus on security program design, implementation, operation, evaluation, and improvement – and a tactical component, which enables rapid exchange of information and intelligence on an ad hoc basis.

Focus areas

  • Right arrow
    Security Response and Recovery to Incidents and Emergencies
  • Right arrow
    Security Assets and Threats
  • Right arrow
    Training for Employees and Contractors
  • Right arrow
    New Technologies and Operational Practices
  • Right arrow
    Security Assessment of Risks
  • Right arrow

This group is for

Security directors, managers, engineers, and specialists
Preview Resource LibraryPreview Resource Library
Technical Advisor Support
Lisa Moller
Lisa Moller
Infrastructure Protection & Security

Lisa Moller brings 35 years of utility experience spent between Alliant Energy and American Transmission Company, with the last 24 years spent in managing physical security and the protection of assets. Her broad band of experience covers the development of implementing an Integrated Security Operation Center, contract guard services, theft prevention and asset protection through a variety of technologies, controlled access programs, background investigations and PRA's and NERC CIP protection of assets. Lisa has held leadership roles in EEI working groups as well as ASIS Chapters. Lisa holds a Bachelor's Degree in Business Management and a CPP certification through ASIS.

+
Top Resources
ASSESSMENT TOOL
Physical Security Maturity Matrix (PSMM)
Preview resource >
CEATI’s Physical Security Maturity Matrix (PSMM) tool helps electric utilities assess the maturity of their physical security programs. The PSMM enables you to evaluate the current capabilities of your organization's physical security practices, processes, and methods, as well as set goals and priorities for improvement.
GUIDANCE DOCUMENT
Joint Cyber and Physical Security Operations Center (SOC) Best Practices
Preview resource >
This report examines the integration of physical and cyber security operations into a unified Joint Security Operations Center (JSOC), with a focus on applications in the energy sector. It outlines key requirements for an effective JSOC, reviews common tools used for operations and management, and provides practical recommendations. The report also addresses staffing considerations, including strategies for recruiting and retaining skilled personnel.
RESEARCH REPORT
Best Practices in Copper Theft Mitigation 
Preview resource >
This report assists utilities in making quick decisions in response to copper theft and presents a spectrum of available mitigation solutions. It 1) captures various staged responses in the event of theft, 2) identifies several utility assets requiring protection against copper theft, and 3) details numerous broad measures that are or can be adopted by utilities to deter copper theft or can be applied by engaging law enforcement or via legislative action. Each of these copper theft mitigation measures are discussed and analyzed based on pros and cons, approximate cost, complexity, and efficiency. 
GUIDANCE DOCUMENT
Electric Utility Guideline for Asset Management of Physical Security Assets 
Preview resource >
This guide provides a basis for understanding the equipment that falls under physical security, the terms and definitions that allow for communication alignment, and best practices for lifecycle management of these assets, including procurement, installation, commissioning, operations, maintenance, and disposal. The guide also contains information on general risks to consider during the asset management process of physical security assets and high-level financial information on lifecycle costs.
WORKSHOP
Design Basis Threat/VISA Methodology Workshop Series
Preview resource >
This multi-session workshop helps utilities strengthen physical protection system assessments and upgrade planning. The series introduces design basis threat (DBT) concepts and the Vulnerability of Integrated Security Analysis (VISA) methodology through a combination of three virtual training sessions and an in-person workshop and site tour, giving participants hands-on experience evaluating vulnerabilities and improving site security.