Who We Serve · Government & Utilities

Public Utilities & Critical Infrastructure

Independent technology governance for the systems where the cost of failure is measured in public health, public safety, and lives.

THE CRITICAL INFRASTRUCTURE REALITY

Built for the operators who keep water moving, power flowing, and the lights on, while attackers test every interface they expose.

Utilities and critical infrastructure operators run OT, IT, SCADA, AMI, and operational technology platforms whose failure has consequences far beyond the budget. Federal directive cycles tighten. Cyber-physical threat surface grows. The cost of a wrong vendor decision is measured in customers, communities, and regulatory exposure.

0

US critical infrastructure sectors designated under PPD-21, each with its own regulatory architecture

0

community water systems serving the United States, the largest sector in PPD-21 by count

0

cyberattacks on utility infrastructure in 2024, a 70 percent year-over-year increase

0

incidents tracked through the CISA Operations Center in 2025

THE PROBLEM WE SOLVE

OT and IT converging. Federal directives accelerating. Vendors selling platforms. Operators carrying the consequences.

Critical infrastructure operators inherit a vendor-driven OT landscape that was never engineered with current threat surface in mind, on top of regulatory frameworks that change faster than the equipment lifecycle. AWIA. NERC CIP. TSA Security Directives. Each has its own audit posture, its own evidence trail, its own consequence structure. The operators on the inside need someone whose loyalty runs to the operation, not to the platform.

That is the work Sentinel does for utilities and critical infrastructure. We govern the program. We never sell the platforms.

Independent. Practitioner-led. Vendor-neutral.

Position

One utility. Many vendors. One operational governance discipline.

Operational technology does not fail in the boardroom. It fails at three in the morning, in the field, with a crew on overtime and a public health officer asking when service is restored. Sentinel sits on the operator’s side of every vendor decision, every regulatory checkpoint, and every board briefing. And we produce the documentation that proves the operational discipline is real, not aspirational.

The Pressures

Five forces are reshaping how utilities deliver and defend technology.

These are the structural pressures we hear from utility CIOs, plant managers, and operations directors in nearly every conversation. Sentinel’s role is to help you navigate them with documentation and evidence on your side.

Heightened in 2025-2026 by the 2024 Aliquippa intrusion, CISA CPG enforcement, and the AI-for-predictive-maintenance procurement wave.
PRESSURE 01

OT/IT convergence accelerating without governance

SCADA systems are no longer air-gapped in any meaningful sense. The convergence with corporate IT delivers efficiency. It also delivers an attack surface most operators have not fully mapped. The governance to manage that boundary rarely exists in a written form anyone can audit.

PRESSURE 02

CISA CPGs and sector frameworks raising the floor

CISA Cross-Sector Cybersecurity Performance Goals are the de facto baseline. AWIA for water. CIP/NERC for electric. TSA Security Directives for pipeline. Each cycle raises the bar, and operators are expected to keep pace without proportional budget increases.

PRESSURE 03

Insurance carriers driving operational discipline

Cyberinsurance for utility operations now requires a posture that looks more like a federal compliance regime than a small-utility reality. Premiums rise, coverage narrows, and the carrier questionnaire is increasingly the document driving the actual cyber program.

PRESSURE 04

Aging assets meeting modern threats

Control systems built in the 1990s are running production today, with patches the manufacturer no longer supports and protocols that predate the modern threat landscape. Modernization is unavoidable. The path between legacy and modern is where the operational risk concentrates.

PRESSURE 05

AI for predictive maintenance without procurement governance

Vendors offer AI-driven predictive maintenance, leak detection, and asset optimization. Most utilities have no AI procurement governance framework. The data flowing into the model is operational data. The risks of an opaque vendor model running against critical infrastructure data have not been fully scoped.

Our Approach

We sit on the operator’s side of the room. We never sell the SCADA.

Public utilities and critical infrastructure governance

Critical infrastructure technology is not a product purchase. It is a multi-decade operational discipline built on regulatory authority, sector-specific frameworks, and the contracts a utility signs with every vendor that touches the production environment. Most utilities inherit a posture written by procurement, defended by IT, and never owned by an independent governance authority that answers to the board, the regulator, and the public health officer in equal measure. We change that.

Sentinel reads the actual contract language. We map it against the regulatory framework the utility operates under, the CISA performance goals, and the operational practices the field crews actually follow. We document the decisions before the audit cycle, before the insurance renewal, and before the next intrusion attempt. The artifacts we produce are structured under the assumption that they will be read by the regulator, by counsel, by the carrier, and by the public officer who has to explain a service interruption to the press.

Our work is independent. We sell no platforms. We collect no referral fees. We are not the EPC firm that built the system, and we are not aligned with the vendor that wants to upgrade it. Every recommendation is auditable, defensible, and built to survive the year-five conversation when the original vendor has been acquired and the utility still owns the consequences.

While the phases move, Sentinel stays.

What We Do Here

How Sentinel shows up inside a utility, public works, or critical infrastructure program.

Independent program assessment against the system's operational requirements, not a vendor's product roadmap
Vendor selection oversight and procurement evaluation, with documented adequacy review at every checkpoint
Configuration authority across SCADA, EAM, GIS, CIS, OMS, and CMMS platforms, translating operational reality into platform behavior
OT/IT convergence governance and segmentation review, balancing analytics ambition with control system integrity
Cyber posture review aligned with NERC-CIP, EPA Water and Wastewater Systems Cybersecurity, CISA advisories, and insurance carrier requirements
Audit-ready documentation that holds up to PUC oversight, federal regulator review, and rate case scrutiny
Change management for cross-discipline rollouts spanning operations, engineering, and field crews
Post-go-live value assurance and sustainment, so the system is still delivering operational outcomes three years out
Workforce continuity planning for retirements and the deep operator institutional knowledge that runs the system
Long-term roadmap independent of any single vendor's incentive structure or product release cycle
The Sentinel Difference

Four practices. One operational discipline. End to end.

Forged in public safety. Hardened by critical infrastructure. From regulatory authorization to asset-lifecycle outcome, Sentinel’s signature practices govern every phase of the utility’s technology program.

CRITICAL INFRASTRUCTURE OPERATIONAL LIFECYCLEREGULATORYAUTHORIZATIONAWIA / NERC / TSAVENDORSELECTIONOT/IT scope reviewOPERATIONALRUN24/7 productionAUDIT &INSURANCEAnnual posture reviewASSET-LIFECYCLEOUTCOMEMulti-decade horizonSDFSENTINEL DELIVERYFRAMEWORKPRACTICEOperational ProgramDeliverySRMSENTINEL READINESSMETHODPRACTICEOperator & FieldCrew ReadinessSDBSENTINEL DEPLOYMENTBLUEPRINTPRACTICEOT/IT ConfigurationAuthoritySVASENTINEL VALUEASSURANCEPRACTICEAsset-LifecycleOutcome Governance
Specialized Services

Three discrete deliverables. Scope-defined. Boundary-respected.

For utilities that need a defensible artifact this quarter, not a six-month conversation. Each engagement is fixed-scope, independently delivered, and structured to survive scrutiny.

OT/IT Convergence Risk Assessment

Where the boundary is breaking

Independent review of the boundary between operational technology (SCADA, control systems, field devices) and information technology, including alignment to CISA Cross-Sector Cybersecurity Performance Goals. Sentinel maps the actual data flows, identifies the unmapped attack surface, and delivers a board-presentable risk surface that survives a regulator’s questioning.

Output: a board-presentable OT/IT risk surface and remediation roadmap.

CISA & Sector-Specific Compliance Posture

AWIA, NERC CIP, TSA Security Directives

Readiness review against the framework the utility actually operates under. AWIA for water systems. NERC CIP for bulk electric. TSA Security Directives for pipeline. Sentinel reads the active version of the rule, maps the utility’s posture against it, and documents the gaps in a form the regulator and the carrier both accept.

Output: a compliance-posture memo with regulator-ready and carrier-ready language.

Pre-Investment Independent Validation

Before the board approves

Independent assessment of major capital technology investments before board, council, or commission vote. Sentinel does not work for the EPC firm proposing the investment. We work for the utility evaluating it, with a defensible recommendation that survives a public-meeting question and an audit three years later.

Output: a defensible investment-decision package and procurement-file evidence.

The Four Practices

How Sentinel’s signature practices show up inside a utility program.

Every engagement draws on the practices below. Each has its own discipline, its own training pedigree, and its own boundary. None of them are platforms.

SDF

Sentinel Delivery Framework™

Public-sector program management. Used on every deployment.

Operational program delivery means coordinating regulatory compliance, vendor management, OT/IT scope review, and field-crew coordination in one documented motion. SDF is the program management discipline Sentinel runs on every utility engagement, from the first scoping memo through the regulator-facing audit. Every checkpoint is documented to survive a regulator inquiry. Every decision is captured in a record the next plant manager can pick up.

SRM

Sentinel Readiness Method™

Public-sector organizational change management. Used on every rollout.

A new control system or asset management platform is a change management problem before it is a technology problem. SRM coordinates the readiness work across operators, field crews, and the office staff who depend on the new system. The discipline manages stakeholder alignment, training cadence, communication architecture, and the operational handoff. Go-live becomes an operational event, not a surprise to the night shift.

SDB

Sentinel Deployment Blueprint™

Configuration authority on the operator’s side of the table. Practitioner-delivered only.

When the vendor builds the SCADA system or the asset management platform, someone has to govern the configuration choices. Operational practice becomes platform behavior through a thousand small decisions, each one with regulatory implications. SDB is Sentinel’s configuration authority discipline, deployed on strategic utility engagements where the configuration decisions need an independent custodian on the operator’s side. Never offered as training. Practitioner-delivered, on the operator’s side of the table.

SVA

Sentinel Value Assurance™

Post-deployment outcome governance. Advisory and non-binding by design.

A go-live is not an outcome. SVA is Sentinel’s post-deployment governance discipline, designed for the multi-decade asset-lifecycle reality where the original vendor has been acquired, the original engineering team has retired, and the system is still expected to deliver service to the public. Findings are advisory and non-binding by design. Sentinel documents. We do not litigate.

Deep Expertise

The layers of expertise we bring to utility and critical infrastructure governance.

Sentinel’s critical infrastructure bench leans on cross-domain pedigree. The disciplines that show up on day one of a utility engagement.

OT/IT Convergence Fluency

The boundary between operational technology and information technology is collapsing in every utility we work with. Sentinel maps the actual data flows, the actual access paths, and the actual change-control disciplines on both sides of the boundary. Then we document the gaps before the regulator, the carrier, or an adversary identifies them first.

Sector-Specific Framework Depth

AWIA for water systems. NERC CIP for bulk electric. TSA Security Directives for pipeline operations. Each framework has its own enforcement posture, its own audit cadence, and its own documentation requirements. Sentinel reads the active version of the rule and maps the utility’s posture against it, in language the regulator and the carrier both accept.

Field-Operations Practitioner Pedigree

Field crews do not run the technology in the conference room. They run it in the field, at three in the morning, on overtime, in a storm. Sentinel’s engagement governance respects the operational reality. The artifacts we produce are usable by the staff who actually do the work, not just by the people in the boardroom approving the budget.

Bench-In-Flight Honest Framing

Sentinel’s critical infrastructure bench leans on Jason Floyd’s engineering and infrastructure pedigree, with additional sector specialists brought in as engagements require. Where additional SCADA-OT or sector-specific specialists are needed for a specific engagement, we say so up front, name the bench-in-flight specialist, and bring them in under the engagement governance the utility already trusts. We do not invent expertise we do not have.

We Know the Tricks

Five vendor games utilities see, and how to read them.

The utility vendor playbook is patterned. Once you have sat through enough board briefings and read enough post-incident reports, the moves become obvious. These are five Sentinel sees most often.

02 Trick of the Trade

The "CISA-Aligned" Without Specifying Which CPG

A vendor markets the platform as CISA-aligned without naming which Cross-Sector Cybersecurity Performance Goals it actually meets. The phrase is reassuring. It is also unenforceable. We require the specific CPG mapping, in writing, before the configuration goes into the procurement file. The regulator will, eventually, ask for it.

03 Trick of the Trade

The "Backup System" Untested at Scale

A vendor demonstrates the backup or failover capability in a controlled test environment. Production never sees the failover until it has to. The first real-world failover is the worst time to discover the recovery window does not match the regulatory tolerance. We require the documented full-scale failover test in the procurement file, with witness signatures.

04 Trick of the Trade

The "Federally Funded Cyber Upgrade" Path

A vendor frames a major capital investment as a federally fundable cyber upgrade, implying the grant program will cover the cost. The grant rules are specific. The vendor’s reading of them rarely is. We require the citation to the specific grant authority and allowable cost rule before the procurement file accepts the financing claim.

05 Trick of the Trade

The "Vendor-Managed Patching" Promise

A vendor offers managed patching for the OT environment as a value-add. The promise is real. The execution depends on which patches the vendor decides are critical, on what schedule, and with what change-control discipline. We require the actual SLA, the actual change-control process, and the actual escalation path in the contract, not the marketing material.

WHO YOU ARE WORKING WITH

The people on the other side of the engagement, and the bench they bring.

The people on the other side of every Sentinel utility engagement have run critical infrastructure programs from inside the operations. Not consultants who learned them in slide decks.

JF

Jason Floyd

Lead Practitioner · Engineering, OT/IT Convergence

Two decades inside mission-critical CAD, RMS, P25, and dispatch architectures at the country's largest agencies, with deep operational technology and convergence experience. DC Metro CAD/RMS. National Capital Region Mutual Aid Hub. LAPD. LA County Sheriff. The architecture posture he brings to a utility or sector engagement is the same one he brought to the dispatch floor when the system had to come back up before shift change.

On every Sentinel utility engagement, Jason owns the engineering, OT/IT convergence, and operational technical posture, anchoring the program against AWIA, NERC CIP, and TSA Security Directives.

JS

Justin Scott

Managing Partner · Operations & Change

Twenty years inside the largest public safety and government technology programs in the country. The program management discipline he ran at LAPD became the foundation of the Sentinel Delivery Framework.

Justin owns the operations and change management arc, audit-defensible documentation, and council-grade communications.

SCADA-OT & SECTOR SPECIALISTS · NAMED IN-FLIGHT PER ENGAGEMENT

The bench Sentinel built specifically for critical infrastructure work.

Sentinel's critical infrastructure work is anchored by Jason Floyd, with sector-specific specialists named in-flight per engagement. Where additional SCADA-OT, water-system, electric-utility, or pipeline-specific specialty is required, Sentinel names the practitioner, the credential, and the role on the engagement record before the work begins.

We do not invent expertise we do not have. We name it and bring it in.

How We Work Together

Four ways to bring Sentinel into a utility program.

The right engagement depends on where the utility is in the program lifecycle. Each tier has its own scope discipline and its own deliverable cadence.

Sentinel Sustain

Managed Technology Subscription

End-to-end managed operations for the platforms Sentinel helped you stand up. Sustainment, on-site systems administration, vendor coordination, version-upgrade discipline, and 24/7 incident response. The system is still delivering safely, reliably, and on the regulator’s expected posture, because someone is still accountable for it.

Sentinel Guardian

Retained Governance & Advisory

Ongoing retainer with quarterly governance reviews, pre-decision advisory, and an open line for board briefings, regulator response, insurance renewal, and vendor escalations. The utility has independent counsel on the technology and operations side of the table, every cycle.

Practice-Led Engagement

Anchored to one of the four signature practices

Anchored to one of SDF, SRM, SDB, or SVA. Best when the utility knows which discipline is needed: program delivery, change readiness, OT/IT configuration authority, or post-deployment outcome governance. Fixed scope, named practice, defined deliverables.

The Integrated Package

Specialized Services + Practice + Institute

A specialized service plus a signature practice plus Sentinel Institute training, packaged as a single integrated engagement. For utilities standing up a major modernization and building the institutional capacity to operate it themselves.

Ready to talk about your utility's technology program?

Tell us where you are in the program lifecycle, and we will tell you honestly whether Sentinel is the right fit, or recommend someone better if we are not.

Schedule a Conversation →