Looking for research and development projects made possible through DEED grants and scholarships? Check out the DEED Project Database.
Trying to find information about specific public power utilities? If you are member, check out the Public Power Directory.
This guidebook is to help public power utilities, joint action agencies, state associations, and other industry representatives in the development or continuous improvement of emergency preparedness programs and all-hazards planning...
Public power utilities can receive funding and support to implement technology to improve their cybersecurity stance. The Cybersecurity Technology Assistance Program helps public power utilities to find a cybersecurity technology solution, match utilities with providers, and provide partial funding to deploy the technology. The program is administered through the American Public Power Association in cooperation with the U.S. Department of Energy.
A look at how journalism has changed in recent years - to be even more fast-paced and dynamic - and how this change affects how utilities should interact with the...
An analysis of the types of financial arrangements behind new electric generation capacity that completed construction and came online in 2018 and 2019. While there are extensive data available on...
In order to build the workforce of our future, supporting students through academic scholarships, research projects, internships and mentorships is important to Silicon Valley Power, the City of Santa Clara’s...
This series of videos describes key cybersecurity concepts for public power utilities. Utilities are welcome to share these videos with staff, third party service providers, and customers to help build...
Almost 50,000 megawatts of new capacity began operating in the United States in 2016 and 2017. These new resources were developed by everyone from traditional vertically-integrated utilities and merchant developers...
Anatomy of a cyber attack Reconnaissance – The threat actor uses the internet, social media, or other tools to discover likely courses of attack. Weaponization – Code and other tactics, techniques, and procedures are found or developed to exploit the target’s vulnerabilities. Delivery – Weaponized