How we protect the work you trust us with

Security & Privacy

Clients trust NewGen with rate cases, testimony drafts, customer and meter data, and regulatory strategy. Our security program is designed to protect this confidentiality.

Monitoring
Continuous, managed
Access
MFA + role-based
Data
Encrypted in transit & at rest
Coverage
Cyber liability insured
Why this matters

We apply the same level of care to your data security as we do to your analysis.

We handle highly sensitive utility information, including load forecasts, customer billing data, draft testimony, regulatory positioning, and competitive rate strategy. A data leak can alter the outcome of a rate case, undermine a CCA’s competitive position, or compromise a regulatory filing.

Our security program aligns with utility regulation requirements, ensuring confidentiality across clients, defensible audit trails, and a structured response to incidents.
Layer 1 · Protect

How we protect client information

Every NewGen consultant operates within a controlled environment. Devices, identities, and data are managed according to standards maintained and reviewed by our IT team.

Multi-factor authentication

Access to systems containing client data requires more than a password. Each consultant verifies their identity with a second factor before accessing sensitive information.

Endpoint and at-rest encryption

Company-issued laptops use full-disk encryption. Client data stored in our cloud environments is encrypted at rest, preventing exposure if devices are lost or stolen.

Role-based access & offboarding

Consultants receive access to highly confidential work only if they are approved for the project. Access is removed promptly through a documented offboarding process when a project ends or a team member leaves.

Subcontractor governance

We do not subcontract client work without written consent. Vendors with access to client data are held to the same standards as our internal team.

Cyber liability insurance

NewGen maintains cyber liability insurance. Certificates of insurance, including named-insured language when required, are available upon request during procurement.

DNS and web filtering

Our network filters outbound traffic to block known-malicious destinations. This prevents accidental clicks on phishing links from resulting in a connection, providing a protective layer of defense.

Layer 2 · Detect & respond

How we monitor and respond

Passive defenses are not sufficient. Our environment is continuously monitored by a managed detection and response provider, with vulnerabilities triaged and remediated through a documented program. If an incident occurs, we respond from a written plan.

Managed detection & response

A third-party security operations team continuously monitors our environment and can investigate and contain incidents at any time.

Risk-based vulnerability management

We routinely assess our systems for security weaknesses. Findings are prioritized by exposure and impact, then remediated through a documented program reviewed by IT leadership.

Documented incident response

Our written incident response plan outlines how we identify, contain, and recover from security events, including communication protocols with affected clients in accordance with engagement terms.

Email defenses

We use email filtering and anti-phishing controls, and authenticate outbound mail (SPF, DKIM, DMARC) to reduce the risk of domain impersonation.

Dark web credential monitoring

We continuously monitor underground forums and credential dumps for exposed NewGen email addresses or passwords. If credentials are found, we rotate them and investigate before they can be used against client data.

Independently verifiable

Email authentication, in public

Our domain’s SPF, DKIM, and DMARC records are public DNS records. Any procurement or security team can independently verify them — no NDA required.

SPF
Sender authorization
DKIM
Cryptographic signing
DMARC
Spoofing reduction
Continuous monitoring
Documented response
Risk-based remediation
Recurring training

Recurring security awareness training

All consultants participate in recurring security awareness training that covers phishing, social engineering, and the practical habits that keep client data safe.

Background checks on consultants

Personnel with access to client data are subject to background checks consistent with applicable law and the requirements of the engagement.

Clear ownership

A designated IT lead is responsible for the security program. Policies are reviewed annually, and any changes to our security infrastructure prompt a review of these public commitments.

Layer 3 · People

Security is an active practice for our team, not just a statement.

Even the most advanced control can fail if a consultant clicks a malicious link. We invest in training our team to recognize threats, ask critical questions, and escalate issues promptly, as your engagement team is the first line of defense for your data.

We ensure transparency by mapping each commitment on this page to a documented control that our IT team can provide during procurement. We update this page as controls change.

Standards

Modeled on standards utility teams already recognize.

Our internal security program follows industry-recognized frameworks, including the NIST Cybersecurity Framework and CIS Controls, and is tracked through a centralized control catalog reviewed annually. If a client requires alignment with a specific standard or contractual security exhibit, we work with their team during onboarding.

NIST CSF

Our program is organized around the lifecycle of identify, protect, detect, respond, and recover.

CIS Controls

We use practical, prioritized safeguards to evaluate the maturity of each control area.

Engagement security exhibit

Our master services agreement includes a security exhibit covering data handling, breach notification, and audit rights.

Data Processing Addendum (DPA)

Available where your contracting or compliance team requires a separate DPA for client data.

For procurement & security teams

Two layers of detail, by design.

This public page is intentionally concise. Detailed controls, vendor information, and scoped attestations are included in a separate security packet, which we share with your procurement and security teams under your standard terms.

This page

Public, plain-English

  • What we do, in categories
  • How we think about utility-data confidentiality
  • Insurance and people commitments
  • Externally verifiable items (SPF/DKIM/DMARC)
Under NDA

Security packet

  • CAIQ-style questionnaire response
  • Cyber liability certificate of insurance
  • Data Processing Addendum & MSA security exhibit
  • Specific controls, vendors, & cadence on request

For procurement teams

Need our security packet for an RFP or security review?

We respond promptly. Please contact us, and we will provide the materials your security and procurement teams need to complete vendor onboarding.

  • Standard security questionnaire response (CAIQ-style)
  • Cyber liability certificate of insurance
  • Data Processing Addendum
  • MSA security exhibit & breach-notification terms
Request our security packet security@newgenstrategies.net