What do really secure OT / ICS sites do differently? WEBINAR​

Thursday | May 28 | 14:00 Berlin/Madrid/Paris time

This is a repeat of the April 30, 2020 webinar for the convenience of European attendees. Another version of this webinar will also run on Wednesday, June 3, 1 PM GMT+8 for the convenience of Asia-Pacific attendees

Duration:

60 Minutes

Abstract:

This webinar reviews what the world’s most secure industrial sites do differently – they ask different questions, they get different answers, and they apply those answers to produce very different security program designs. Given the steadily worsening threat environment, it seems clear that we all need to start exploring and deploying at least some of the cybersecurity approaches and designs that are commonplace at thoroughly-secured operations.

Who's it for?

Anyone who designs, or approves spending for, OT / industrial control system security programs, such as those for power plants, refineries, railways, airports, water utilities, large buildings and campuses and many others.

In this webinar you will learn:

  • What questions thoroughly-secured OT/ICS sites ask?
  • What solutions they prefer?
  • What tools and technologies these sites deploy routinely?
  • And how much these designs actually improve cybersecurity over classic cyber-hygiene approaches?

Register now:

About The Speaker

Andrew GinterAndrew Ginter is the VP Industrial Security at Waterfall Security Solutions and works with many of the most secure industrial sites on the planet. He is the co-chair of ISA’s SP-99 Working Group 1, a co-author of the Industrial Internet Consortium Security Framework and the author of two books on industrial security: SCADA Security – What’s broken and how to fix it and Secure Operations Technology. Andrew spent 20 years developing SCADA system and IT/OT middleware products and another 20 designing control system security products. He holds a BS in Applied Mathematics and an MS in Computer Science, both from the University of Calgary.

More Info

Most ICS security programs seek to “protect the information.” Secure OT/industrial sites do not do this. Instead, they protect industrial operations from information, more specifically from cyber attacks that may be embedded in information.

This webinar introduces Secure Operations Technology (SEC-OT) as a perspective, a methodology, and a set of best practices used by the world’s most secure industrial sites. These sites deploy comprehensive software-based security programs, but do not stop there. Secure sites also deploy Physical protection from cyber attacks that may be embedded in offline and online information flows entering control-critical networks.
Cyber attacks on industrial sites continue to become more sophisticated, with more serious physical consequences. Most industrial sites are therefore increasing the strength of their defensive postures in response to this steadily worsening threat environment. The techniques used today by the world’s most secure sites are techniques that we must all consider for tomorrow.

Request a FREE copy of Andrew's SEC-OT Book

Share this with your colleagues

Share on whatsapp
WhatsApp
Share on linkedin
LinkedIn
Share on facebook
Facebook
Share on twitter
Twitter
Share on email
Email
Anna Plot