At Celsia, we have a strategy that integrates information security, personal-data protection and cybersecurity.
GRI (103-1) Aligned with our Corporate Objectives, at Celsia we permanently seek to guarantee the reliable, safe delivery of the electrical energy service. To achieve this, we have a strategy that integrates information security, personal-data protection and cybersecurity.
GRI (103-2) To manage this issue, at Celsia we have different elements that structure the management framework. Within this, we highlight the following practices, processes, instances and procedures.
We have a Security Operations Center, a Cybersecurity Committee and a Technology-Risk Committee.
We carry out monitoring 7x24x365 from the Security Operations Center to the databases that contain personal data, critical cyber assets and ICT infrastructure.
Through ethical hacking and with the support of cybersecurity tools, we conduct permanent vulnerability management, which is reported by the Security Operations Center. Its results and scope are reviewed monthly through the associated corrective actions.
DJSI (1.8.1) GRI (102-20, 102-19) The Board of Directors and the Steering Committee are actively involved in defining the Cybersecurity Strategy, its monitoring and review. In accordance with the Code of Good Governance, the Board of Directors has defined an Audit, Finance and Risk Committee, where members of the Board of Director, audit and Steering Committee members participate.
One of the functions of this Committee is to review and evaluate risk management and propose the improvements it deems necessary, seeking that it promotes the configuration of a risk profile, in accordance with the Company’s Strategic Objectives. It meets quarterly or when necessary. The people primarily responsible for supervising the Cybersecurity Strategy on the Board of Directors are María Fernanda Mejía, David Yanovich and Alejandro Piedrahíta.
Within this framework, and taking into account that cybersecurity is one of the main risks that Celsia faces, the Committee supervises the management developed by the Administration to implement the Cybersecurity Strategy, which is formulated by the Cybersecurity Leader. As for the Steering Committee, the person in charge of showing the cybersecurity program and its respective progress is the Technology Leader.
To strengthen the knowledge of the members of the Board of Directors and the Steering Committee, they took the Universidad de los Andes Cybersecurity for Executives certified course, where different leaders of the teams that manage the issue also participated.
GRI (103-3)
We carried out ethical hacking at the Alto Tuluá, Cucuana, Río Piedras, San André de Cuerquia and Hidromontañitas hydroelectric plants; at the Merielectrica thermal plant; at the ESFERA project; at Internet Hogar; at the Recrew, Palmira, Candelaria, Cerrito and Carmelo substations; and Enerbit.
For Central America, the inventory of cyber assets, social-engineering campaigns and ethical hacking were carried out at the Chiriqui, Prudencia Solar Plant and the Guanacaste Wind Plant.
GRI (418-1) DJSI (1.8.4) Our own Indicator: (Cybersecurity Breaches and Incidents). In the last four years, we have maintained zero (0) breaches in information security or other cybersecurity incidents related to our clients.
DJSI (1.8.5) GRI (103-2) SASB (IF-EU-550a.1.) In the last four years, we have maintained zero incidents on the IT infrastructure for which we have had to pay fines or with which we have suffered the loss of income.
These are our challenges in the short, medium and long term:
Move from the maturity level DEFINED to MANAGED and complete the implementation of the National Operation Council’s Cybersecurity Guide to mitigate the risk of a cyber attach on critical cyber assets through the implementation of the following controls:
Maintain the MANAGED level of maturity through the following activities, in addition to the previously mentioned controls which already exist:
Mitigate the risk of a cyberattack with a MANAGED level of cybersecurity maturity, maintaining good practices in cybersecurity, such as ISO27000, NIST, NERC, 62443 and the FIRTS membership for the Security Operations Center, in compliance with the cybersecurity agreements of the National Operation Council.
Cyberattack: Attempt to expose, alter, destabilize, destroy or gain unauthorized access to a computer asset.
Cybersecurity by Design: This introduces agile security controls that can adapt to changing digital environments; it is based on an understanding of the landscape of threats, people, scalability and speed.
Ethical Hacking: Tests carried out on networks by people with computer and security knowledge to find vulnerabilities, then report them and take corrective actions.
Information Security / Cybersecurity: Protection of the computer infrastructure and everything related to it, especially information.
Intelligent Electronic Devices (IEDs): Electronic-regulation equipment immersed in electrical systems and used in switches, transformers, among others.
Level of Maturity: An evolutionary plateau towards the achievement of a mature software process. Each level of maturity provides a layer in the base for continuous process improvement. Under this framework:
Social-Engineering Campaigns: Campaigns that seek to sensitize employees against the manipulations used to unduly gain access to information.
Copyright © 2022 Celsia. All rights reserved
Medellín, Colombia
Design and Development: Taller de edición
For a better experience on our site, we recommend using the Web Chrome 4.3 or higher, Firefox 3.8 or higher, Safari 8 or higher, Internet Explorer 10, 11 navigators