Author: Waterfall Team

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column width="2/3"][vc_column_text]Patrick Miller discusses how technology advances in Industrial Control Systems are out-pacing existing industrial cybersecurity and business risk management programs and what needs to change to keep pace.Patrick Miller is a Managing Partner at Archer Energy Solutions,...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column width="2/3"][vc_column_text]Gabi Siboni joins us to talk about standards, challenges and current initiatives in Israel - perhaps most thoroughly-cyber-protected nation on the planet.Dr. Gabi Siboni - Director of the Military and Strategic Affairs Program and the Cyber Security...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column width="2/3"][vc_column_text]The differences between IT and OT teams and approaches both make life difficult and represent opportunities to improve industrial operations. Dr. Art Conklin is the Director of the Center for Information Security and Education at the University of...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column width="2/3"][vc_column_text] Marty Edwards discusses the need for a standard way to classify the criticality of industrial control systems - eg: safety-critical vs. equipment-critical vs. reliability-critical systems, and what implications such classification should have for industrial security programs. Marty Edwards...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column width="2/3"][vc_column_text] Buki Carmeli walks us through the evolution of government programs and legislation for securing Israel's critical infrastructure. Buki Carmeli is the former Director General of the Israeli Cyber Authority and the official Cyber Security advisor to the Israeli...

Thoroughly-secured sites strictly differentiate control-critical from non-critical networks and protect the two classes of networks very differently. Such sites determine criticality by the potential business impacts of cyber attacks, analogous to how critical infrastructure standards evaluate potential societal impacts. Secure sites deploy conventional IT Security (IT-SEC)...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column width="2/3"][vc_column_text]We caught Jens Weisner at S4 and he talks about cybersecurity in Germany – progress, challenges and a little comparing of the German approach to what he sees happening in North America. Jens Weisner, Industrial Cybersecurity Unit Head...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column width="2/3"][vc_column_text]Jonathan Pollet, CEO of Red Tiger Security, walks us through how his crew does control system penetration testing, often with live, running systems as a target, with examples of findings and how customers use those findings. Jonathan is...