Other experts have concluded that an attack on the system for transmitting power from generation to end consumers would have devastating consequences. Authentication Mechanisms for Energy Delivery Systems: Automated Methods to Discover and Mitigate Vulnerabilities: Cybersecurity through Advanced Software Solutions: Integration of New Concepts and Technologies with Existing Infrastructure. US energy industry faces imminent cyber security threat Hundreds participate in electric grid cyberattack simulation amid If attacks escalate, they are likely to go after our power grid. Putin's threat of 'consequences' heightens worries - POLITICO Secretary of the Army Christine Wormuth recently told reporters that the power grid . In 2019, we recommendedthat FERC consider adopting changes to its approved standards to more fully address federal guidance and evaluate the potential risks of a coordinated attack. For example, the strategy does not include a complete assessment of all the cybersecurity risks to the grid. Thus, the United States should take measures to prevent a cyberattack on its power grid and mitigate the potential harm should preventive efforts fail. US Department of Homeland Security (DHS) report. According to French think-tank Institut Franais des relations internationals (IFRI), the power sector has become a prime target for cyber-criminals in the last decade, with cyberattacks surging by 380% between 2014 and 2015. In each case, the United States should consider not only the potential damage and disruption caused by a cyberattack but also its broader effects on U.S. actions at the time it occurs. "This is a military hacking team . The founder of the alliance is John Miri is a 25-year tech and cybersecurity veteran who has spent the last decade in the electric utility industry. Potential indicators could include smaller test-run attacks outside the United States on systems that are used in the United States; intelligence collection that indicates an adversary is conducting reconnaissance or is in the planning stages; deterioration in relations leading to escalatory steps such as increased intelligence operations, hostile rhetoric, and recurring threats; and increased probing of electric sector networks and/or the implementation of malware that is detected by more sophisticated utilities. Finally, the Trump administration should ensure that utilities can invest sufficiently in cybersecurity and do not need to make tradeoffs between traditional risk management activities and addressing national security threats.