Cyber Threats to Industrial Control and Other Vertical-Industry Systems

Whether you work in utilities, manufacturing, health care, or another industry, it’s likely that you have purpose-built systems that are both digital and unprotected by conventional IT security tools. As your use of these vertical systems grows, how can you be sure that they won’t be hacked?  In this Dark Reading webinar, top experts offer insight on the threat posed to industrial control systems (ICS) and other vertical-industry systems, and how you can expand your enterprise security strategies to protect them.

On Demand
1h 00min

When you attend this webinar, you will:

  • Learn how attackers are exploiting these systems, directly and indirectly, now
  • Discover ways to improve visibility of your environment without jeopardizing operations  
  • Understand how to address vulnerabilities without jeopardizing uptime
  • Explore how to address security after a software company stops supporting the only operating system your most essential application runs on
  • Get tips on how to enhance security through improving communications and cooperation between IT and operational teams.

Featured Speakers

  • Paul Brager Jr
    Paul Brager Jr
    Technical Product Security Leader, Digital Technology
    Baker Hughes, a GE Company

    Paul has been a contributing member of the cyber security community for over twenty-three (23) years, with expert level knowledge of security architecture and defense-in-depth design, critical infrastructure/industrial cyber, IoT, and IIoT. He has extensive cyber experience in the oil and gas, manufacturing, power utility, chemical, banking and telecommunications sector. In his current capacity as a Technical Product Security Leader, Digital Technology with Baker Hughes, a GE Company, Paul works closely with oil and gas, energy, and internal clients to integrate cyber security capabilities and strategies into their critical manufacturing and operating infrastructure lifecycles. His efforts enable customers and internal clients to weave defense-in-depth cyber strategies into the overall design of products and solutions, thereby contributing to the oil and gas industry’s ability to have a more defensible posture against some of the world’s most complex adversaries. Paul holds a Bachelor of Science degree from Texas A&M University in Political Science, with a minor in Business, a Master’s of Science in Administration of Justice and Security (Criminal Justice/Cyber fusion) from the University of Phoenix, and is an Alpha Phi Sigma (National Criminal Justice Honor Society) inductee since 2009. Mr. Brager is CISSP, GICSP and CISM certified, in addition to serving as an adjunct professor with the University of Phoenix, teaching cyber security courses within the IS&T program, and providing course module support to a number of education bodies including InfoSec Institute, and other related endeavors. He is currently involved as an ISA-99 Working Committee member, ICSJWG committee member and contributor, and is a member of ISA, InfraGard (O&G and Power Utility SIGs), OWASP, ISACA, ISC2, NSBE and various other focus groups and cyber-focused organizations. Paul has also provided commentary on a number of cyber security related podcasts and publications that provide insight into threats that may impact critical infrastructure and potential ways to manage them.

  • Travis Farral
    Travis Farral
    Director of Security Strategy

    Travis Farral is the Director of Security Strategy for Anomali. With over 20 years of security industry experience, he has developed a strong background in threat intelligence, incident response, and Industrial Control Systems security. Previously Travis ran the Cybersecurity Intelligence & Strategic Services team at ExxonMobil and spent several years at companies such as Nokia and XTO Energy.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By