As manufacturing, utilities and essential services incorporate more interconnected sensors, controllers and other devices, it increases the risk for these highly sensitive facilities. However, there are recommended practices and methods that can mitigate the exposure and risk of industrial internet of things devices in highly controlled and regulated environments. Join our industrial security experts as we review key practices to help create a reliable and safe industrial system.
Overview
In the past, businesses created networks that were designed to run within an open architecture environment. One of the biggest threats was for hackers to breach an organization's boundary protection and potentially move laterally within a trusted environment. Now, a simple email attachment or link can provide a hacker access to an entire network within minutes.
As manufacturing, utilities and essential services incorporate more interconnected sensors, controllers and other devices, it increases the risk for these highly sensitive facilities. However, there are recommended practices and methods that can mitigate the exposure and risk of industrial internet of things devices in highly controlled and regulated environments.
Zero trust strategies eliminates implicit trust within a system. Every digital interaction must be validated before access is granted. It protects the system from known and unknown threats and limits the damage of an unauthorized user by making it more difficult to access assets. It heightens previously configured security implementations and creates secure policies, strong authentication methods and network segmentation to protect the most sensitive data and assets.
Join our industrial security experts as we review key practices to help create a reliable and safe industrial system.
Speakers
Sotter and his team look to the technology horizon for new developments and applications that could present opportunities for CSA's Test, Inspection and Certification business.
Prior to joining CSA, Sotter worked as senior director, product strategies & client solutions at Systems with Intelligence Inc. (SWI), a manufacturer of monitoring products for the electrical sector.
Sotter has 20 years of combined academic, technical and business experience. He has a Ph.D in electronic engineering from Universidad Rovira I Virgili (Spain), an executive MBA from the University of Toronto (Canada) and a bachelor's of science in electronic engineering from Universidad del Norte (Colombia).
Jablanski is a nonresident fellow at the Cyber Statecraft Initiative of the Atlantic Council's Scowcroft Center for Strategy and Security and an OT cybersecurity strategist at Nozomi Networks. She is responsible for researching global cybersecurity topics and promoting operational technology and industrial control systems cybersecurity awareness throughout the industry. Jablanski serves as a staff and advisory board member of the nonprofit organization Building Cyber Security. Jablanski has also served as the president of the North Texas Section of the International Society of Automation. She is also a member of the Cybersecurity Apprenticeship Advisory Taskforc, sponsored by the U.S. Department of Labor. Jablanski has been responsible for conducting academic and market research on emerging technologies throughout her career. She has independently consulted for the US government and a technology startup. She holds a master's degree in international security from the Josef Korbel School of International Studies at the University of Denver and a bachelor's degree in political science from the University of Missouri - Columbia.
Armstrong has 25 years' experience working on OPC standards and developing communication software for industrial automation applications. He is one of the main architects behind the zero trust security model that is incorporated into OPC UA. He has also designed and developed software used to centrally manage the security configuration for IA devices.
Baker has more than 15 years of experience in automation and industrial security. He is responsible for global leadership with enterprise responsibility for guiding all of Rockwell Automation's products, services and solutions to meet modern security and safety standards, capabilities and regulations. Throughout his career, Baker has worked with industrial controls and the applications of cybersecurity concepts, practices and technologies. He has a background in systems engineering, product development and business management. Baker holds a B.S. in electrical and computer engineering from the Ohio State University .
Arutyunov, Co-founder, VP of products at Xage, has over 20 years of experience in cybersecurity, distributed systems, networking, and industrial applications. Most recently, he led product management and R&D globally at ABB industrial communications, establishing market leadership in utility, energy, transportation, and DoD federal markets. Prior to ABB, he developed malware protection, data security, and content filtering solutions for Fortune 100 enterprises at Blue Coat Systems (Symantec) and led engineering at Mimosa Networks and Tropos Networks, launching first-to-market large scale fixed and mobile mesh networking products that connecting millions of IoT devices and applications. Arutyunov holds a BS in applied mathematics from the University of California, Berkeley and an MBA from Columbia University.
Mike Hoffman, Principal Industrial Consultant at Dragos, has over 20 years of experience focused on oil and gas, with roles in downstream, upstream and global technical leadership. His past titles have included principal ICS security engineer, controls and automation specialist, process/CEMS analyzer specialist and instrumentation and electrical technician. He has a master's degree in information security engineering from SANS Technology Institute, and is a SANS instructor in development for the ICS curriculum. Hoffman is driven to continual learning and has over 10 GIAC certifications. He is currently studying for the GIAC GSE certification.