The Challenge

The defense of the energy sector, which is one of the areas where cyber-attacks are most concentrated, is very critical.

SureLOg SIEM Security for Turkey’s Critical HEPP Infrastructure

Noting that energy has never lost its popularity in terms of cyber-attacks, lead researcher Abdullah ALTAY infrastructures, including energy against cyber-attacks, can sometimes give passage to attacks. The cyber threat is not something that can be ignored.
When it is somehow collapsed, energy is one of the most important ones that can cause serious damage to the country, loss of life and property. As Tubitak Energy Institute, we take precautions with SureLog SIEN in hydroelectric power plants.”
SureLog SIEM Security for Turkey’s Critical HEPP Infrastructure

“We have been working successfully since 2018 with SureLog SIEM, which has successfully completed 7 HEPP projects with EUAŞ in 2017 in order to control everything that is under computer control and therefore open to cyber threats with SureLog SIEM, and we have continued our success with the new project in 2021.”

Abdullah ALTAY

Lead Researcher TUBITAK MAM Energy Institute

Team working

The Process

With SureLog SIEM, after successfully completing the security of 7 hydroelectric power plants of Elektirk Üretim A.Ş. with one of Turkey’s largest technology companies operating in the defense, security and IT sector, the security of Deriner Hydroelectric Power Plant in 2018 and Aslantaş Hydroelectric Power Plants in 2021 was successfully provided with TUBITAK MAM Energy Institute.

The project aims to ensure that the automation and information systems of the HEPPs operated with the SCADA system belonging to EÜAŞ are protected against possible cyber-attacks and risks and that the necessary internal audit processes are successfully carried out during their life cycle.

Marketing Project

Conclusion

The project aims to ensure that the automation and information systems of the HEPPs operated with the SCADA system belonging to EÜAŞ are protected against possible cyber-attacks and risks and that the necessary internal audit processes are successfully carried out during their life cycle.

For more information

Customer Service Officer

Customer Services

By submitting my data I agree to be contacted