Security Investments for Energy Infrastructure Technical Conference; Supplemental Notice of Technical Conference, 11777-11779 [2019-05894]

Download as PDF Federal Register / Vol. 84, No. 60 / Thursday, March 28, 2019 / Notices word-processing formats. Documents created electronically using wordprocessing software should be filed in native applications or print-to-PDF format and not in a scanned format. Commenters filing electronically do not need to make a paper filing. 41. Commenters that are not able to file comments electronically must send an original of their comments to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street NE, Washington, DC 20426. 42. All comments will be placed in the Commission’s public files and may be viewed, printed, or downloaded remotely as described in the Document Availability section below. Commenters on this proposal are not required to serve copies of their comments on other commenters. IV. Document Availability amozie on DSK9F9SC42PROD with NOTICES 43. In addition to publishing the full text of this document in the Federal Register, the Commission provides all interested persons an opportunity to view and/or print the contents of this document via the internet through the Commission’s Home Page (https:// www.ferc.gov) and in the Commission’s Public Reference Room during normal business hours (8:30 a.m. to 5:00 p.m. eastern time) at 888 First Street NE, Room 2A, Washington, DC 20426. 44. From the Commission’s Home Page on the internet, this information is available on eLibrary. The full text of this document is available on eLibrary in PDF and Microsoft Word format for viewing, printing, and/or downloading. To access this document in eLibrary, type the docket number excluding the last three digits of this document in the docket number field. 45. User assistance is available for eLibrary and the Commission’s website during normal business hours from the Commission’s Online Support at (202) 502–6652 (toll free at 1–866–208–3676) or email at ferconlinesupport@ferc.gov, or the Public Reference Room at (202) 502–8371, TTY (202) 502–8659. Email the Public Reference Room at public.referenceroom@ferc.gov. By direction of the Commission. Issued: March 21, 2019. Nathaniel J. Davis, Sr., Deputy Secretary. [FR Doc. 2019–05893 Filed 3–27–19; 8:45 am] BILLING CODE 6717–01–P VerDate Sep<11>2014 18:57 Mar 27, 2019 Jkt 247001 DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. AD19–12–000] Security Investments for Energy Infrastructure Technical Conference; Supplemental Notice of Technical Conference Take notice that the Federal Energy Regulatory Commission (Commission) and the United States Department of Energy (DOE) will co-host a Security Investments for Energy Infrastructure Technical Conference (conference) on Thursday, March 28, 2019, from 10:00 a.m. to 4:00 p.m. This Commissionerand DOE senior official-led conference will be held in the Commission Meeting Room at the Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426. The purpose of the conference is to discuss current cyber and physical security practices used to protect energy infrastructure and will explore how federal and state authorities can provide incentives and cost recovery for security investments in energy infrastructure, particularly the electric and natural gas sectors. Attached is the final agenda for this event with the confirmed list of panelists. The conference will be open and free to the public; however, interested attendees are encouraged to preregister online at: https://www.ferc.gov/whatsnew/registration/03-28-19-form.asp. Inperson attendees should allow ample time to pass through building security procedures before the 10:00 a.m. start time of the conference. The Commission intends to solicit post-technical conference comments and will issue a public notice with further directions following the conclusion of the conference. Information regarding the conference will be posted on the Calendar of Events on the Commission’s website, https:// www.ferc.gov, prior to the event. The conference will also be webcast and transcribed. Anyone with internet access who desires to listen to this event can do so by navigating to the Calendar of Events at https://www.ferc.gov and locating this event in the Calendar. The event will contain a link to the webcast. The Capitol Connection provides technical support for webcasts and offers the option of listening to the meeting via phone-bridge for a fee. If you have any questions, visit https:// www.CapitolConnection.org or call (703) 993–3100. Transcripts of the technical conference will be available for a fee PO 00000 Frm 00039 Fmt 4703 Sfmt 4703 11777 from Ace-Federal Reporters, Inc. at (202) 347–3700. Commission conferences are accessible under section 508 of the Rehabilitation Act of 1973. For accessibility accommodations, please send an email to accessibility@ferc.gov or call toll free 1 (866) 208–3372 (voice) or (202) 502–8659 (TTY), or send a fax to (202) 208–2106 with the required accommodations. For more information about this technical conference, please contact Carolyn Templeton by phone at (202) 502–8785 or by email at carolyn.templeton@ferc.gov. For information related to logistics, please contact Sarah McKinley at (202) 502– 8368 or by email at sarah.mckinley@ ferc.gov. Dated: March 21, 2019. Nathaniel J. Davis, Sr., Deputy Secretary. FERC/DOE Security Investments for Energy Infrastructure Technical Conference Docket No. AD19–12–000 Thursday, March 28, 2019—10:00 a.m.– 4:00 p.m. The Commission has a welldeveloped set of mandatory and enforceable reliability standards that set baseline protections for both cyber and physical security of the bulk electric system. Moreover, the Commission has well established policies that allow for the opportunity to recover prudently incurred costs to comply with those mandatory reliability standards. This technical conference is aimed at better understanding (1) the need for security investments that go beyond those measures already required by mandatory reliability standards, including in infrastructure not subject to those standards (e.g., natural gas pipelines); (2) how the costs of such investments are or could be recovered; and (3) whether additional incentives for making such investments are needed, and if so, how those incentives should be designed. 10:00 a.m. Opening Remarks and Introductions 10:30 a.m. Panel I: Cyber and Physical Security, Best Practices, and Industry and Government Engagement Objectives: This panel will discuss types of cyber and physical security threats to energy infrastructure, particularly electric transmission, generation, and natural gas pipelines. In addition, the panel will explore best practices for cyber and physical security mitigation beyond those measures already required by mandatory E:\FR\FM\28MRN1.SGM 28MRN1 amozie on DSK9F9SC42PROD with NOTICES 11778 Federal Register / Vol. 84, No. 60 / Thursday, March 28, 2019 / Notices reliability standards and industry and government engagement needed to address these matters. Panelists will be asked to address the following: Threats to Energy Infrastructure: 1. What cyber and physical security threats are most concerning for the energy industry? What critical factors should industry consider when evaluating the risk these threats present and prioritizing risk-mitigating security initiatives to address these threats? 2. Does industry have adequate resources to evaluate sophisticated threats such as whether adversaries have established access to their networks, whether insider threats exist, or whether supply chain equipment or subcomponents are compromised? 3. How are interdependencies among energy infrastructure sectors considered in risk management analyses? 4. What are some of the challenges (e.g., staffing or technology), that industry faces, in order to keep current with the threats? 5. What other current or emerging threats should be addressed? For example, what are some of the types of physical and cyber security threats that Unmanned Aircraft Systems (i.e., drones) can present? What experience has industry had with commerciallyavailable products used to address these issues? Mitigation: Strategies and Best Practices: 6. What are some of the best practices that industry uses to ensure effective action against cyber and physical security threats? Are adequate tools available for industry to assess where to apply best practices (e.g., risk management analyses) for cyber and physical security threats? Do these analyses differ between cyber and physical security threats? 7. How does industry validate the effectiveness of, and maintain its mitigation techniques/measures (e.g., red teaming, manufacturers recommendations) for, both physical and cyber protection? What are the processes to confirm the results are addressed? Are these lessons shared with others in the industry? 8. What resources are available to assist industry in evaluating risk to energy infrastructure and implementing mitigation measures, especially for small to medium size owners and operators? 9. What training opportunities are available to owners and operators to understand the various risks to their energy infrastructure and the measures taken to mitigate against physical and cyber threats? What training is necessary and not available? VerDate Sep<11>2014 18:57 Mar 27, 2019 Jkt 247001 10. How does industry mitigate key vulnerabilities to address disruptions from a cyber or physical attack or an extreme natural event (e.g., geomagnetic disturbance)? How should spare equipment, sharing programs, contractor and mutual assistance programs, and other processes be considered in addressing disruptions? What role should the federal government play in helping industry prevent and respond to disruptions? What preparations should be made by industry to assure adequate response and recovery efforts? Panelists: • William R. Evanina; Director, Office of the Director of National Intelligence, National Counterintelligence and Security Center • Robert Kolasky; Director, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency, National Risk Management Center • Charles P. Kosak; Deputy Assistant Secretary, Department of Defense, Defense Continuity and Mission Assurance • Sonya T. Proctor; Assistant Administrator of Surface Operations Department of Homeland Security, Transportation Security Administration, Security Operations • Nicholas K. Akins; President and CEO, American Electric Power • Mark A. Gabriel; Administrator and CEO, Western Area Power Administration • James B. Robb; President and CEO, North American Electric Reliability Corporation • Thomas J. Galloway; President and CEO, North American Transmission Forum • Donald F. Santa; President and CEO, Interstate Natural Gas Association of America 12:30 p.m. Lunch Break 1:45 p.m. Panel II: Incentives and Cost Recovery for Security Investments Objectives: This panel will explore how federal and state authorities can provide incentives and cost recovery for security investments in energy infrastructure, particularly electric transmission, generation, and natural gas pipeline infrastructure. Panelists will be asked to address the following: Cost Recovery: 1. What role do states currently play in requiring and/or facilitating energy infrastructure security investments? Do states require industry to have plans and programs to prevent and recover from cyber and physical attacks? Is industry subject to requirements to assess risk PO 00000 Frm 00040 Fmt 4703 Sfmt 4703 and prioritize action based on state priorities? 2. Are current cost recovery policies of the federal and state governments affecting the ability of owners and operators of energy infrastructure to invest in cyber and physical security for this energy infrastructure? Do federal and state policies complement or conflict with each other? Are these policies helping or hindering security investments? 3. Do cost recovery policies at the state and federal level facilitate the adoption of best practices for threat mitigation at energy infrastructures? Do they allow for cost recovery for investment to address mitigation of new and emerging threats (e.g., intentional electromagnetic interference and electromagnetic pulse)? 4. Is FERC’s September 14, 2001 Statement of Policy on Extraordinary Expenditures Necessary to Safeguard National Energy Supplies 1 still helpful to facilitate investment that supports physical and cyber security of energy infrastructure, or are any revisions to the Policy Statement needed to facilitate such investment? 5. For competitive generators that do not recover their costs through retail rates, are there mechanisms under which they may recover costs for physical or cybersecurity investments other than through their market-based rates? 6. If federal standards, guidelines, or authorities indicate that an energy facility is high-risk or critical (i.e., designation as Defense Critical Electric Infrastructure under Section 215A of the Federal Power Act), how would such designations be considered as a company prioritizes security investments? How would such a designation be considered by state regulators when reviewing cost recovery filings for measures taken above and beyond compliance with mandatory reliability standards? 7. What factors should the states be aware of when reviewing cost recovery filings for cyber and physical security investments? Can these factors be included on an industry-wide or multistate level? 8. Certain events could require significant unbudgeted resources to respond effectively. How should these costs be considered by federal and state authorities for cost recovery? Financial Incentives: 9. What type of incentives would be most effective to facilitate investment in 1 Extraordinary Expenditures Necessary to Safeguard National Energy Supplies, 96 FERC ¶ 61,299 (2001) (Policy Statement). E:\FR\FM\28MRN1.SGM 28MRN1 Federal Register / Vol. 84, No. 60 / Thursday, March 28, 2019 / Notices cyber and physical security? How could costs for these incentives be recovered? 10. How could the Commission use its authority under Section 219 of the Federal Power Act to establish incentives for improved cyber and physical security? Are there other ratemaking or accounting changes that would help incent investments in cyber and physical security? 11. Are there any grants or other cost recovery mechanisms available for industry to assist with security investments at their facilities? 12. What changes could federal and state authorities make to current policies to better incent the adoption of best practices for cyber and physical security at energy infrastructure facilities? 13. How should state and federal authorities prioritize incentives for various security investments? How should such incentives balance the need for improved security with the rate impact on consumers? Panelists: • Christopher M. Crane; President and CEO, Exelon Corporation • Nicholas A. Brown; President and CEO, Southwest Power Pool, Inc. • Jay Scott Emler; Commissioner, Kansas Corporation Commission • Kevin G. Wailes; CEO, Lincoln Electric System and Co-Chair, Electricity Subsector Coordinating Council • Paul Kjellander; Commissioner, Idaho Public Utilities Commission • Alan S. Armstrong; President and CEO, Williams • Upendra J. Chivukula; Commissioner, New Jersey Board of Public Utilities 3:45 p.m. Closing Remarks 4:00 p.m. Adjourn Any person desiring to intervene or to protest this filing must file in accordance with Rules 211 and 214 of the Commission’s Rules of Practice and Procedure (18 CFR 385.211, 385.214). Protests will be considered by the Commission in determining the appropriate action to be taken, but will not serve to make protestants parties to the proceeding. Any person wishing to become a party must file a notice of intervention or motion to intervene, as appropriate. Such notices, motions, or protests must be filed on or before the comment date. On or before the comment date, it is not necessary to serve motions to intervene or protests on persons other than the Applicant. The Commission encourages electronic submission of protests and interventions in lieu of paper using the ‘‘eFiling’’ link at https://www.ferc.gov. Persons unable to file electronically should submit an original and 5 copies of the protest or intervention to the Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426. This filing is accessible on-line at https://www.ferc.gov, using the ‘‘eLibrary’’ link and is available for review in the Commission’s Public Reference Room in Washington, DC. There is an ‘‘eSubscription’’ link on the website that enables subscribers to receive email notification when a document is added to a subscribed docket(s). For assistance with any FERC Online service, please email FERCOnlineSupport@ferc.gov, or call (866) 208–3676 (toll free). For TTY, call (202) 502–8659. Comment Date: 5:00 p.m. Eastern Time on April 10, 2019. [FR Doc. 2019–05894 Filed 3–27–19; 8:45 am] Nathaniel J. Davis, Sr., Deputy Secretary. BILLING CODE 6717–01–P [FR Doc. 2019–05899 Filed 3–27–19; 8:45 am] BILLING CODE 6717–01–P DEPARTMENT OF ENERGY ENVIRONMENTAL PROTECTION AGENCY Federal Energy Regulatory Commission [EPA–HQ–OW–2004–0013; FRL–9990–95– OEI] [Docket No. EL19–56–000] amozie on DSK9F9SC42PROD with NOTICES Hoosier Energy Rural Electric Cooperative, Inc.; Notice of Filing Take notice that on March 20, 2019, Hoosier Energy Rural Electric Cooperative, Inc., filed a proposed revenue requirement for reactive supply and voltage control for the Lawrence Generating Station, Merom Generating Station, and Worthington Generating Station, under Midcontinent Independent System Operator Inc. Tariff Schedule 2. VerDate Sep<11>2014 18:57 Mar 27, 2019 Jkt 247001 Information Collection Request Submitted to OMB for Review and Approval; Comment Request; EPA Strategic Plan Information on Source Water Protection (Renewal) Environmental Protection Agency (EPA). ACTION: Notice. AGENCY: The Environmental Protection Agency (EPA) has submitted an information collection request (ICR), SUMMARY: PO 00000 Frm 00041 Fmt 4703 Sfmt 4703 11779 EPA Strategic Plan Information on Source Water Protection (EPA ICR Number 1816.07, OMB Control Number 2040–0197) to the Office of Management and Budget (OMB) for review and approval in accordance with the Paperwork Reduction Act. This is a proposed renewal of the ICR, which is currently approved through March 31, 2019. Public comments were previously requested via the Federal Register on November 9, 2018 during a 60-day comment period. This notice allows for an additional 30 days for public comments. A fuller description of the ICR is given below, including its estimated burden and cost to the public. An agency may not conduct or sponsor and a person is not required to respond to a collection of information unless it displays a currently valid OMB control number. DATES: Additional comments may be submitted on or before April 29, 2019. ADDRESSES: Submit your comments, referencing Docket ID Number EPA– HQ–OW–2004–0013, to (1) EPA online using www.regulations.gov (our preferred method), by email to the OW Docket at OW-Docket@epa.gov, or by mail to: the OW Docket, EPA Docket Center, Environmental Protection Agency, Mail Code 28221T, 1200 Pennsylvania Ave. NW, Washington, DC 20460, and (2) OMB via email to oira_ submission@omb.eop.gov. Address comments to OMB Desk Officer for EPA. EPA’s policy is that all comments received will be included in the public docket without change including any personal information provided, unless the comment includes profanity, threats, information claimed to be Confidential Business Information (CBI) or other information whose disclosure is restricted by statute. FOR FURTHER INFORMATION CONTACT: Sherri Comerford, Drinking Water Protection Division—Prevention Branch, Office of Ground Water and Drinking Water, (MC 4606M), Environmental Protection Agency, 1200 Pennsylvania Ave. NW, Washington, DC 20460; telephone number: 202–564– 4639; fax number: 202–564–3756; email address: Comerford.Sherri@epa.gov. SUPPLEMENTARY INFORMATION: Supporting documents, which explain in detail the information that the EPA will be collecting, are available in the public docket for this ICR. The docket can be viewed online at www.regulations.gov or in person at the EPA Docket Center, WJC West, Room 3334, 1301 Constitution Ave. NW, Washington, DC. The telephone number for the Docket Center is 202–566–1744. For additional information about EPA’s E:\FR\FM\28MRN1.SGM 28MRN1

Agencies

[Federal Register Volume 84, Number 60 (Thursday, March 28, 2019)]
[Notices]
[Pages 11777-11779]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-05894]


-----------------------------------------------------------------------

DEPARTMENT OF ENERGY

Federal Energy Regulatory Commission

[Docket No. AD19-12-000]


Security Investments for Energy Infrastructure Technical 
Conference; Supplemental Notice of Technical Conference

    Take notice that the Federal Energy Regulatory Commission 
(Commission) and the United States Department of Energy (DOE) will co-
host a Security Investments for Energy Infrastructure Technical 
Conference (conference) on Thursday, March 28, 2019, from 10:00 a.m. to 
4:00 p.m. This Commissioner- and DOE senior official-led conference 
will be held in the Commission Meeting Room at the Federal Energy 
Regulatory Commission, 888 First Street NE, Washington, DC 20426. The 
purpose of the conference is to discuss current cyber and physical 
security practices used to protect energy infrastructure and will 
explore how federal and state authorities can provide incentives and 
cost recovery for security investments in energy infrastructure, 
particularly the electric and natural gas sectors. Attached is the 
final agenda for this event with the confirmed list of panelists.
    The conference will be open and free to the public; however, 
interested attendees are encouraged to preregister online at: https://www.ferc.gov/whats-new/registration/03-28-19-form.asp. In-person 
attendees should allow ample time to pass through building security 
procedures before the 10:00 a.m. start time of the conference.
    The Commission intends to solicit post-technical conference 
comments and will issue a public notice with further directions 
following the conclusion of the conference.
    Information regarding the conference will be posted on the Calendar 
of Events on the Commission's website, https://www.ferc.gov, prior to 
the event. The conference will also be webcast and transcribed. Anyone 
with internet access who desires to listen to this event can do so by 
navigating to the Calendar of Events at https://www.ferc.gov and 
locating this event in the Calendar. The event will contain a link to 
the webcast. The Capitol Connection provides technical support for 
webcasts and offers the option of listening to the meeting via phone-
bridge for a fee. If you have any questions, visit https://www.CapitolConnection.org or call (703) 993-3100. Transcripts of the 
technical conference will be available for a fee from Ace-Federal 
Reporters, Inc. at (202) 347-3700.
    Commission conferences are accessible under section 508 of the 
Rehabilitation Act of 1973. For accessibility accommodations, please 
send an email to [email protected] or call toll free 1 (866) 208-
3372 (voice) or (202) 502-8659 (TTY), or send a fax to (202) 208-2106 
with the required accommodations.
    For more information about this technical conference, please 
contact Carolyn Templeton by phone at (202) 502-8785 or by email at 
[email protected]. For information related to logistics, 
please contact Sarah McKinley at (202) 502-8368 or by email at 
[email protected].

    Dated: March 21, 2019.
Nathaniel J. Davis, Sr.,
Deputy Secretary.

FERC/DOE Security Investments for Energy Infrastructure Technical 
Conference

Docket No. AD19-12-000

Thursday, March 28, 2019--10:00 a.m.-4:00 p.m.

    The Commission has a well-developed set of mandatory and 
enforceable reliability standards that set baseline protections for 
both cyber and physical security of the bulk electric system. Moreover, 
the Commission has well established policies that allow for the 
opportunity to recover prudently incurred costs to comply with those 
mandatory reliability standards. This technical conference is aimed at 
better understanding (1) the need for security investments that go 
beyond those measures already required by mandatory reliability 
standards, including in infrastructure not subject to those standards 
(e.g., natural gas pipelines); (2) how the costs of such investments 
are or could be recovered; and (3) whether additional incentives for 
making such investments are needed, and if so, how those incentives 
should be designed.

10:00 a.m. Opening Remarks and Introductions
10:30 a.m. Panel I: Cyber and Physical Security, Best Practices, and 
Industry and Government Engagement

    Objectives: This panel will discuss types of cyber and physical 
security threats to energy infrastructure, particularly electric 
transmission, generation, and natural gas pipelines. In addition, the 
panel will explore best practices for cyber and physical security 
mitigation beyond those measures already required by mandatory

[[Page 11778]]

reliability standards and industry and government engagement needed to 
address these matters. Panelists will be asked to address the 
following:
    Threats to Energy Infrastructure:
    1. What cyber and physical security threats are most concerning for 
the energy industry? What critical factors should industry consider 
when evaluating the risk these threats present and prioritizing risk-
mitigating security initiatives to address these threats?
    2. Does industry have adequate resources to evaluate sophisticated 
threats such as whether adversaries have established access to their 
networks, whether insider threats exist, or whether supply chain 
equipment or subcomponents are compromised?
    3. How are interdependencies among energy infrastructure sectors 
considered in risk management analyses?
    4. What are some of the challenges (e.g., staffing or technology), 
that industry faces, in order to keep current with the threats?
    5. What other current or emerging threats should be addressed? For 
example, what are some of the types of physical and cyber security 
threats that Unmanned Aircraft Systems (i.e., drones) can present? What 
experience has industry had with commercially-available products used 
to address these issues?
    Mitigation: Strategies and Best Practices:
    6. What are some of the best practices that industry uses to ensure 
effective action against cyber and physical security threats? Are 
adequate tools available for industry to assess where to apply best 
practices (e.g., risk management analyses) for cyber and physical 
security threats? Do these analyses differ between cyber and physical 
security threats?
    7. How does industry validate the effectiveness of, and maintain 
its mitigation techniques/measures (e.g., red teaming, manufacturers 
recommendations) for, both physical and cyber protection? What are the 
processes to confirm the results are addressed? Are these lessons 
shared with others in the industry?
    8. What resources are available to assist industry in evaluating 
risk to energy infrastructure and implementing mitigation measures, 
especially for small to medium size owners and operators?
    9. What training opportunities are available to owners and 
operators to understand the various risks to their energy 
infrastructure and the measures taken to mitigate against physical and 
cyber threats? What training is necessary and not available?
    10. How does industry mitigate key vulnerabilities to address 
disruptions from a cyber or physical attack or an extreme natural event 
(e.g., geomagnetic disturbance)? How should spare equipment, sharing 
programs, contractor and mutual assistance programs, and other 
processes be considered in addressing disruptions? What role should the 
federal government play in helping industry prevent and respond to 
disruptions? What preparations should be made by industry to assure 
adequate response and recovery efforts?
    Panelists:

     William R. Evanina; Director, Office of the Director of 
National Intelligence, National Counterintelligence and Security Center
     Robert Kolasky; Director, Department of Homeland Security, 
Cybersecurity and Infrastructure Security Agency, National Risk 
Management Center
     Charles P. Kosak; Deputy Assistant Secretary, Department 
of Defense, Defense Continuity and Mission Assurance
     Sonya T. Proctor; Assistant Administrator of Surface 
Operations Department of Homeland Security, Transportation Security 
Administration, Security Operations
     Nicholas K. Akins; President and CEO, American Electric 
Power
     Mark A. Gabriel; Administrator and CEO, Western Area Power 
Administration
     James B. Robb; President and CEO, North American Electric 
Reliability Corporation
     Thomas J. Galloway; President and CEO, North American 
Transmission Forum
     Donald F. Santa; President and CEO, Interstate Natural Gas 
Association of America
12:30 p.m. Lunch Break
1:45 p.m. Panel II: Incentives and Cost Recovery for Security 
Investments

    Objectives: This panel will explore how federal and state 
authorities can provide incentives and cost recovery for security 
investments in energy infrastructure, particularly electric 
transmission, generation, and natural gas pipeline infrastructure. 
Panelists will be asked to address the following:
    Cost Recovery:
    1. What role do states currently play in requiring and/or 
facilitating energy infrastructure security investments? Do states 
require industry to have plans and programs to prevent and recover from 
cyber and physical attacks? Is industry subject to requirements to 
assess risk and prioritize action based on state priorities?
    2. Are current cost recovery policies of the federal and state 
governments affecting the ability of owners and operators of energy 
infrastructure to invest in cyber and physical security for this energy 
infrastructure? Do federal and state policies complement or conflict 
with each other? Are these policies helping or hindering security 
investments?
    3. Do cost recovery policies at the state and federal level 
facilitate the adoption of best practices for threat mitigation at 
energy infrastructures? Do they allow for cost recovery for investment 
to address mitigation of new and emerging threats (e.g., intentional 
electromagnetic interference and electromagnetic pulse)?
    4. Is FERC's September 14, 2001 Statement of Policy on 
Extraordinary Expenditures Necessary to Safeguard National Energy 
Supplies \1\ still helpful to facilitate investment that supports 
physical and cyber security of energy infrastructure, or are any 
revisions to the Policy Statement needed to facilitate such investment?
---------------------------------------------------------------------------

    \1\ Extraordinary Expenditures Necessary to Safeguard National 
Energy Supplies, 96 FERC ] 61,299 (2001) (Policy Statement).
---------------------------------------------------------------------------

    5. For competitive generators that do not recover their costs 
through retail rates, are there mechanisms under which they may recover 
costs for physical or cybersecurity investments other than through 
their market-based rates?
    6. If federal standards, guidelines, or authorities indicate that 
an energy facility is high-risk or critical (i.e., designation as 
Defense Critical Electric Infrastructure under Section 215A of the 
Federal Power Act), how would such designations be considered as a 
company prioritizes security investments? How would such a designation 
be considered by state regulators when reviewing cost recovery filings 
for measures taken above and beyond compliance with mandatory 
reliability standards?
    7. What factors should the states be aware of when reviewing cost 
recovery filings for cyber and physical security investments? Can these 
factors be included on an industry-wide or multi-state level?
    8. Certain events could require significant unbudgeted resources to 
respond effectively. How should these costs be considered by federal 
and state authorities for cost recovery?
    Financial Incentives:
    9. What type of incentives would be most effective to facilitate 
investment in

[[Page 11779]]

cyber and physical security? How could costs for these incentives be 
recovered?
    10. How could the Commission use its authority under Section 219 of 
the Federal Power Act to establish incentives for improved cyber and 
physical security? Are there other ratemaking or accounting changes 
that would help incent investments in cyber and physical security?
    11. Are there any grants or other cost recovery mechanisms 
available for industry to assist with security investments at their 
facilities?
    12. What changes could federal and state authorities make to 
current policies to better incent the adoption of best practices for 
cyber and physical security at energy infrastructure facilities?
    13. How should state and federal authorities prioritize incentives 
for various security investments? How should such incentives balance 
the need for improved security with the rate impact on consumers?
    Panelists:

     Christopher M. Crane; President and CEO, Exelon 
Corporation
     Nicholas A. Brown; President and CEO, Southwest Power 
Pool, Inc.
     Jay Scott Emler; Commissioner, Kansas Corporation 
Commission
     Kevin G. Wailes; CEO, Lincoln Electric System and Co-
Chair, Electricity Subsector Coordinating Council
     Paul Kjellander; Commissioner, Idaho Public Utilities 
Commission
     Alan S. Armstrong; President and CEO, Williams
     Upendra J. Chivukula; Commissioner, New Jersey Board of 
Public Utilities
3:45 p.m. Closing Remarks
4:00 p.m. Adjourn

[FR Doc. 2019-05894 Filed 3-27-19; 8:45 am]
BILLING CODE 6717-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.