{"id":24751,"date":"2023-05-30T08:00:00","date_gmt":"2023-05-30T12:00:00","guid":{"rendered":"https:\/\/www.parsons.com\/?p=24751"},"modified":"2024-04-18T10:14:00","modified_gmt":"2024-04-18T14:14:00","slug":"writing-an-awesome-cybersecurity-policy-statement","status":"publish","type":"post","link":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/","title":{"rendered":"Writing An Awesome Cybersecurity Policy Statement"},"content":{"rendered":"\n
\"Generic<\/figure>\n\n\n\n

When was the last time you thought about your utility\u2019s cybersecurity policy statement? Was it during onboarding? The two words \u201cpolicy statement\u201d likely manifest more groans than being invited to meetings that should be e-mails. But the truth is, your policy statement is critical to the everyday mission of your utility and likely needs a refresher.<\/p>\n\n\n\n

This cybersecurity policy statement will lay out to your customers and teammates, at a high level, what you\u2019re doing to protect customer data. This includes how you plan to protect the entire infrastructure of your utility. It\u2019s meant to be the outward-facing message of comfort to anyone with a stake in your utility, stating that:<\/p>\n\n\n\n

    \n
  1. You care about uninterrupted service, and, if there\u2019s an interruption, you have a plan to fix it<\/li>\n\n\n\n
  2. You\u2019re committed to protecting customer data your utility may have with proper safeguards<\/li>\n<\/ol>\n\n\n\n

    This statement sets the tone for all of the compliance documents you write, for all the disaster response checklists you update, and serves as the reminder on what your purpose as a utility is to the community.<\/p>\n\n\n\n

    So, how do you write one for your utility?<\/p>\n\n\n\n

      \n
    • Keep it simple: this is not a statement for going into the \u201chows\u201d but for the \u201cwhy\u201d \u2013 don\u2019t get technical and definitely don\u2019t use jargon that you and your coworkers use. Think about how you\u2019d sum up why you have cybersecurity policies in place who doesn\u2019t work with you.<\/li>\n\n\n\n
    • State the Commitment to the Community: You\u2019ve got to make it clear that you have policies in place specifically to safeguard data and to keep the resource you\u2019re providing flowing.<\/li>\n\n\n\n
    • Use Action Words: Words that describe being proactive are crucial. Cybersecurity is not a passive thing, you\u2019re always needing to be on top of things. Use words like \u201cprotect,\u201d \u201cmitigate\u201d, \u201crespond\u201d<\/li>\n\n\n\n
    • Mention Relevant Regulations: Your customers (and coworkers) want to know you\u2019re also not making up the response playbook on your own. There is comfort in mentioning that a higher authority, focused on several utilities, is giving you mandates on the levels of security you need to be providing.<\/li>\n<\/ul>\n\n\n\n

      Below are three examples of clear cybersecurity policy statements you can use for guidance as you rework your own:<\/p>\n\n\n\n

      Example 1:<\/strong><\/p>\n\n\n\n

      \u201cOur power utility is dedicated to safeguarding our customers\u2019 personal information and the availability and integrity of our company\u2019s assets. We have implemented strict security measures to protect against cyber-attacks, including regular software updates and monitoring systems. Our employees and contractors receive regular training on our cybersecurity policies, and we are committed to compliance with all applicable regulations. In the event of a security incident, we have an incident response plan to address and resolve the issue quickly.\u201d<\/p>\n\n\n\n

      Example 2:<\/strong><\/p>\n\n\n\n

      \u201cAt our power utility, the protection of our customers\u2019 data is of the utmost importance. We have implemented various technical and administrative controls to secure our systems and data and are committed to complying with all applicable regulations. Our employees and contractors receive regular cybersecurity training and are held accountable for adhering to our policies. In the event of a security incident, we have a rapid response plan in place to quickly address and resolve the issue.\u201d<\/p>\n\n\n\n

      Example 3:<\/strong><\/p>\n\n\n\n

      \u201cOur power utility is committed to providing safe and secure service to our customers. We understand the importance of protecting our customers’ sensitive information and company assets from cyber-attacks. We have implemented advanced security measures and continuously assess and update them to align with industry standards and best practices. Our incident response plan ensures that security incidents are handled promptly and effectively. Our employees and contractors are trained and held accountable for adhering to our cybersecurity policies and complying with the industry standards and regulations.\u201d<\/p>\n\n\n\n

      Your cybersecurity policy needs to stay relevant and is worth looking at often. Your utility exists to serve the community; being reminded of that commitment can help focus you. Next time you\u2019re reaching for a 3rd<\/sup> cup of coffee while sorting through all the planning and paperwork that comes with adequately securing your part of the grid \u2013 keep this big picture in mind. The policy will be your guide in keeping your entire cybersecurity posture in great health.<\/p>\n\n\n\n

      <\/span>
      About The Author<\/h5>

      John Daly is one of our Sr. Growth Operations Managers, helping North American utilities effectively leverage technology to meet and manage their growing energy demands. John\u2019s passion within the organization is in mobility electrification and how our platform can help North American utilities\u2019 decarbonization efforts in the battle against climate change.<\/p><\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"

      When was the last time you thought about your utility\u2019s cybersecurity policy statement? Was it during onboarding? The two words \u201cpolicy statement\u201d likely manifest more groans than being invited to meetings that should be e-mails. But the truth is, your policy statement is critical to the everyday mission of your utility and likely needs a refresher.<\/p>\n","protected":false},"author":29,"featured_media":25121,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"286,762,764,770,773,778","_relevanssi_noindex_reason":"","footnotes":""},"categories":[7663,7717],"tags":[],"class_list":["post-24751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber","category-defense"],"yoast_head":"\nWriting An Awesome Cybersecurity Policy Statement<\/title>\n<meta name=\"description\" content=\"Cybersecurity statements set the tone for all compliance documents and remind you what your purpose as a utility is to the community.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Writing An Awesome Cybersecurity Policy Statement\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity statements set the tone for all compliance documents and remind you what your purpose as a utility is to the community.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/\" \/>\n<meta property=\"og:site_name\" content=\"Parsons Corporation\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/parsonscorporation\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-30T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-18T14:14:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.parsons.com\/wp-content\/uploads\/2023\/05\/ip_keys_innovation_cyber_780x419_hi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Theresa Wederman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@parsonscorp\" \/>\n<meta name=\"twitter:site\" content=\"@parsonscorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Theresa Wederman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/\"},\"author\":{\"name\":\"Theresa Wederman\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f\"},\"headline\":\"Writing An Awesome Cybersecurity Policy Statement\",\"datePublished\":\"2023-05-30T12:00:00+00:00\",\"dateModified\":\"2024-04-18T14:14:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/\"},\"wordCount\":762,\"publisher\":{\"@id\":\"https:\/\/www.parsons.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2023\/05\/ip_keys_innovation_cyber_780x419_hi.jpg\",\"articleSection\":[\"Cyber\",\"Defense\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/\",\"url\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/\",\"name\":\"Writing An Awesome Cybersecurity Policy Statement\",\"isPartOf\":{\"@id\":\"https:\/\/www.parsons.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2023\/05\/ip_keys_innovation_cyber_780x419_hi.jpg\",\"datePublished\":\"2023-05-30T12:00:00+00:00\",\"dateModified\":\"2024-04-18T14:14:00+00:00\",\"description\":\"Cybersecurity statements set the tone for all compliance documents and remind you what your purpose as a utility is to the community.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#primaryimage\",\"url\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2023\/05\/ip_keys_innovation_cyber_780x419_hi.jpg\",\"contentUrl\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2023\/05\/ip_keys_innovation_cyber_780x419_hi.jpg\",\"width\":780,\"height\":419},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.parsons.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Writing An Awesome Cybersecurity Policy Statement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.parsons.com\/#website\",\"url\":\"https:\/\/www.parsons.com\/\",\"name\":\"Parsons Corporation\",\"description\":\"Infrastructure, Defense, Security, and Construction\",\"publisher\":{\"@id\":\"https:\/\/www.parsons.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.parsons.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.parsons.com\/#organization\",\"name\":\"Parsons Corporation\",\"url\":\"https:\/\/www.parsons.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png\",\"contentUrl\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png\",\"width\":684,\"height\":353,\"caption\":\"Parsons Corporation\"},\"image\":{\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/parsonscorporation\",\"https:\/\/x.com\/parsonscorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f\",\"name\":\"Theresa Wederman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g\",\"caption\":\"Theresa Wederman\"},\"url\":\"https:\/\/www.parsons.com\/author\/theresa-wederman\/\"}]}<\/script>\n","yoast_head_json":{"title":"Writing An Awesome Cybersecurity Policy Statement","description":"Cybersecurity statements set the tone for all compliance documents and remind you what your purpose as a utility is to the community.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/","og_locale":"en_US","og_type":"article","og_title":"Writing An Awesome Cybersecurity Policy Statement","og_description":"Cybersecurity statements set the tone for all compliance documents and remind you what your purpose as a utility is to the community.","og_url":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/","og_site_name":"Parsons Corporation","article_publisher":"https:\/\/www.facebook.com\/parsonscorporation","article_published_time":"2023-05-30T12:00:00+00:00","article_modified_time":"2024-04-18T14:14:00+00:00","og_image":[{"width":780,"height":419,"url":"https:\/\/www.parsons.com\/wp-content\/uploads\/2023\/05\/ip_keys_innovation_cyber_780x419_hi.jpg","type":"image\/jpeg"}],"author":"Theresa Wederman","twitter_card":"summary_large_image","twitter_creator":"@parsonscorp","twitter_site":"@parsonscorp","twitter_misc":{"Written by":"Theresa Wederman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#article","isPartOf":{"@id":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/"},"author":{"name":"Theresa Wederman","@id":"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f"},"headline":"Writing An Awesome Cybersecurity Policy Statement","datePublished":"2023-05-30T12:00:00+00:00","dateModified":"2024-04-18T14:14:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/"},"wordCount":762,"publisher":{"@id":"https:\/\/www.parsons.com\/#organization"},"image":{"@id":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#primaryimage"},"thumbnailUrl":"https:\/\/www.parsons.com\/wp-content\/uploads\/2023\/05\/ip_keys_innovation_cyber_780x419_hi.jpg","articleSection":["Cyber","Defense"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/","url":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/","name":"Writing An Awesome Cybersecurity Policy Statement","isPartOf":{"@id":"https:\/\/www.parsons.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#primaryimage"},"image":{"@id":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#primaryimage"},"thumbnailUrl":"https:\/\/www.parsons.com\/wp-content\/uploads\/2023\/05\/ip_keys_innovation_cyber_780x419_hi.jpg","datePublished":"2023-05-30T12:00:00+00:00","dateModified":"2024-04-18T14:14:00+00:00","description":"Cybersecurity statements set the tone for all compliance documents and remind you what your purpose as a utility is to the community.","breadcrumb":{"@id":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#primaryimage","url":"https:\/\/www.parsons.com\/wp-content\/uploads\/2023\/05\/ip_keys_innovation_cyber_780x419_hi.jpg","contentUrl":"https:\/\/www.parsons.com\/wp-content\/uploads\/2023\/05\/ip_keys_innovation_cyber_780x419_hi.jpg","width":780,"height":419},{"@type":"BreadcrumbList","@id":"https:\/\/www.parsons.com\/2023\/05\/writing-an-awesome-cybersecurity-policy-statement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.parsons.com\/"},{"@type":"ListItem","position":2,"name":"Writing An Awesome Cybersecurity Policy Statement"}]},{"@type":"WebSite","@id":"https:\/\/www.parsons.com\/#website","url":"https:\/\/www.parsons.com\/","name":"Parsons Corporation","description":"Infrastructure, Defense, Security, and Construction","publisher":{"@id":"https:\/\/www.parsons.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.parsons.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.parsons.com\/#organization","name":"Parsons Corporation","url":"https:\/\/www.parsons.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png","contentUrl":"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png","width":684,"height":353,"caption":"Parsons Corporation"},"image":{"@id":"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/parsonscorporation","https:\/\/x.com\/parsonscorp"]},{"@type":"Person","@id":"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f","name":"Theresa Wederman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.parsons.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g","caption":"Theresa Wederman"},"url":"https:\/\/www.parsons.com\/author\/theresa-wederman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/posts\/24751"}],"collection":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/comments?post=24751"}],"version-history":[{"count":0,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/posts\/24751\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/media\/25121"}],"wp:attachment":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/media?parent=24751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/categories?post=24751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/tags?post=24751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}