Don't be the next victim: Cloak and secure your critical infrastructure and devices

  • Webcast Aired Thursday, 22 Jan 2015 1:00PM EDT (22 Jan 2015 18:00 UTC)
  • Speaker: David Mattes

This webcast will address the challenges facing critical infrastructure environments, including industrial automation infrastructure across a variety of segments. Examples of common network architectures that have high risk exposure will be presented. These examples will be driven by common needs such as remote connectivity; employee, vendor, and contractor access; and integration with untrusted networks such as cellular, ISP, and shared infrastructure.

Attendees will learn about various standards, architecture documents, and best-practice recommendations that together align to provide a powerful model for advanced network security for industrial environments. Standards and architectures will be referenced from the ISA, IETF and TCG.

David Mattes will present a case study of deployments that have successfully leveraged the previously discussed standards and architecture models. The importance of people, process, and technology in these examples will be highlighted, along with the importance of simplicity and ease of use of security products. David will explain how effective security controls can be deployed into new environments, as well as transparently added to existing environments--leveraging existing infrastructure and IT security investments. As the threat landscape escalates and new regulatory requirements emerge for various critical infrastructure sectors, the talk will conclude with proposed next steps and a call to action.