14.11.2022

Strong digital shielding of the Hellenic Electricity Tsansmission System

Utilizing state-of-the-art technologies, IPTO's new Center can monitor, detect and manage any cyber threat incidents

Strong digital shielding of the Electricity Transmission System is provided by the state-of-the-art Security Operations Centre of IPTO (SOC), which was successfully launched a few days ago.

The new critical digital infrastructure designed and implemented by the Operator further enhances the resilience and cyber defence of the electrical System, as it can monitor, detect and manage in real time even the most complex cyber threats.   

Leveraging cutting-edge technologies such as Machine Learning and Artificial Intelligence, a dedicated security incident management platform processes advanced analytics of any digital breaches, enabling immediate assessment and decision-making by the Centre’s analysts. 

Unlike traditional cybersecurity systems, which are limited to the mere collection and analysis of events, the IPTO platform is designed with a holistic approach that allows the Organization to collect and correlate security data from its entire infrastructure (users, end devices, cloud services, networks, industrial control systems). 

The operational model of the Security Operations Centre of IPTO is based on the “zero trust architecture”, which ensures maximum efficiency in preventing possible security breaches in all infrastructures, while the Centre will also be fed with data from international sources of intelligent threat analysis.

The Chairman and CEO of IPTO, Mr. Manos Manousakis, said in this regard: “With the operation of the new Security Operations Centre, IPTO has completed another important milestone for the digital shielding of the Transmission System, within the framework of the Single Cybersecurity Strategy that we have been consistently implementing in recent years. Given the rise of cyber-attacks worldwide, the new Operator’s platform puts at the service of the electrical infrastructure of the System the most state-of-the-art technological tools that make it possible to prevent even the most complex digital security breaches”.