Cybersecurity
How legitimate is a threat to U.S. cybersecurity?

“It becomes a real heavy exercise in our risk awareness posture. But it also becomes a heavy exercise in layered controls, because we have a very outdated energy architecture right now. We’re plugging in a lot of the newer stuff right now which is growing the threat surface, and again, that provides us a lot of opportunities for folks that want to disrupt us to be able to do that,” Hugenberg said.