OATI Logo

How OATI Hub Streamlines Customer Interaction and Flow of Information

See how OATI Hub streamlines your day-to-day processes by offering a one-stop solution for all of OATI needs.

September 20 , 2021 Read More

The Importance of Pipeline Security for the Energy Industry

Pipeline security is a major concern for energy companies looking to protect and safeguard their data. In this blog, we highlight the latest steps taken to combat pipeline threats, shed some light on the different industry standards, and discuss how OATI is leading the way to support security standards, including pipeline security standards.

December 19, 2019 Read More

OATI Expert Addresses Cybersecurity Concerns and Exposes Cloud Computing Myths

Unease is growing over cybersecurity issues after recent cyberattacks, including those that affected Energy Transfer Partners this April. At the annual LDC Gas Forums – Northeast event, OATI expert Jerrod Montoya addressed these concerns and the increasing myths surrounding Cloud computing.

August 14, 2018 Read More

Wayzata High School Students Learn About Cybersecurity with OATI

OATI recently coordinated with Wayzata High School to teach seniors about cybersecurity, the business of OATI, and the energy industry. Jerrod Montoya, the newly appointed Deputy CISO for OATI’s Security and Risk Management team, presented information to students at the OATI Microgrid Technology Center.

March 29, 2018 Read More

Developing a Security Plan

As digital viruses and attacks become more advanced, it’s vital to protect your business online. Develop a plan to help secure your operating systems and applications through technology, policies, and training.

December 11, 2017 Read More

Defense in Depth: Preventing Cyber Attacks and Data Loss

Learn how to practice defense in depth to protect your business from cyber-attacks. Create a strategy of having several layers of protection so if an attack does break through one barrier, it will be stopped at the next.

November 13, 2017 Read More

What is Access Control and Why Do We Need It?

Develop a comprehensive access control system of role-based access, password policy, multi factor authentication, and more to protect your data. From basic to advanced systems, following the policies ensures your business is secure.

September 28, 2017 Read More

Understanding Your Attack Surface Area

Understand your attack surface area to reduce the exposure your network, software, and human components face. If a single element is compromised, the result could be significant damage in the event of an actual threat. Control your exposure and stay ahead of cyber attackers. 

August 30, 2017 Read More

Security Best Practices for Small Organizations

With the vast number of threats to your cybersecurity out there, there’s always a new security practice to enact. This can be incredibly overwhelming, especially for smaller organizations that lack resources or security focused staff. Here are OATI’s Top Seven Security Best Practices for entities in the energy industry.

July 17, 2017 Read More

OATI Security Star: Manifesto

Building an effective program to protect critical solutions takes more than the review and implementation of published best practices. Learn more about our approach as defined by OATI Security Star.

June 7, 2017 Read More

Centralized Demand Response Management Systems and Data Privacy

When it comes to harnessing DR from their Distribution Member Cooperatives, G&Ts have an interest in protecting the privacy of the Personally Identifiable Information of their member co-op end consumers. OATI shares information on data privacy and centralized demand response management systems.

April 25, 2017 Read More

Understanding the Alleged Russian Hacking of Vermont Utility

There is a lot of confusion surrounding the alleged Russian hack on Vermont utility Burlington Electric Department. OATI took this story very seriously and, in accordance with our security policies and procedures, immediately investigated the report to determine what, if any, action OATI must take. 

January 10, 2017 Read More

How Microgrids Can Improve Grid Security

OATI’s David Heim, Chief Strategy Officer and Microgrid Business Development, and Jerrod Montoya, Security and Compliance Counsel, discuss how microgrids can improve grid security in our latest blog post:

October 31, 2016 Read More

Ensuring the Cybersecurity of Cloud Solutions

Many companies are turning to cloud-based, Software-as-a-Service (SaaS) solutions to manage everything from ETRM/CTRM to CVR. While these solutions afford many benefits, they can also expose your organization to increased security risks without proper execution. Here are some things to consider before purchasing:

August 29, 2016 Read More