Powering Strong Communities

Search Results

Disaster Response and Mutual Aid
This guidebook is to help public power utilities, joint action agencies, state associations, and other industry representatives in the development or continuous improvement of emergency preparedness programs and all-hazards planning...

Public power utilities can receive funding and support to implement technology to improve their cybersecurity stance. The Cybersecurity Technology Assistance Program helps public power utilities to find a cybersecurity technology solution, match utilities with providers, and provide partial funding to deploy the technology. The program is administered through the American Public Power Association in cooperation with the U.S. Department of Energy.

Customer Service
A look at how journalism has changed in recent years - to be even more fast-paced and dynamic - and how this change affects how utilities should interact with the...
Generation
An analysis of the types of financial arrangements behind new electric generation capacity that completed construction and came online in 2018 and 2019. While there are extensive data available on...
Workforce
In order to build the workforce of our future, supporting students through academic scholarships, research projects, internships and mentorships is important to Silicon Valley Power, the City of Santa Clara’s...
Security
This series of videos describes key cybersecurity concepts for public power utilities. Utilities are welcome to share these videos with staff, third party service providers, and customers to help build...
Electricity Markets
Almost 50,000 megawatts of new capacity began operating in the United States in 2016 and 2017. These new resources were developed by everyone from traditional vertically-integrated utilities and merchant developers...
Security
Anatomy of a cyber attack Reconnaissance – The threat actor uses the internet, social media, or other tools to discover likely courses of attack. Weaponization – Code and other tactics, techniques, and procedures are found or developed to exploit the target’s vulnerabilities. Delivery – Weaponized