Cybersecurity solutions Beyond IT

#networks #computer #engineering #computing #cloud #software #programming
Share

Industrial Cybersecurity Solutions


Mr. Youness Rashidi will speak on the folliwng topics:

  • What is OT Cybersecurity?
  • IT Cybersecurity vs. OT cybersecurity
  • Trends in OT Cybersecurity?
  • OT Cybersecurity Myths
  • A Real Example of an OT Cyber Attack
  • Best Practices for OT Cybersecurity
  • Future of OT Cybersecurity


  Date and Time

  Location

  Hosts

  Registration



  • Date: 17 Oct 2023
  • Time: 02:30 PM to 03:30 PM
  • All times are (UTC-07:00) Pacific Time (US & Canada)
  • Add_To_Calendar_icon Add Event to Calendar
  • 3700 WILLINGDON AVENUE
  • BURNABY, British Columbia
  • Canada V5G 3H2
  • Building: SW5
  • Room Number: 1840

  • Contact Event Hosts
  • Starts 25 September 2023 11:54 AM
  • Ends 16 October 2023 11:54 PM
  • All times are (UTC-07:00) Pacific Time (US & Canada)
  • No Admission Charge


  Speakers

Younes Younes of Hedgehog Technologies

Topic:

Industrial Cybersecurity - Beyond IT

Operational technology (OT) cybersecurity, also known as Industrial Automation Control System (IACS) cybersecurity, is an area of concern for organizations that depend on industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems to operate critical infrastructure. Having a robust cybersecurity strategy will prevent unforeseen cyber attacks but there are some considerations to acknowledge first.

Unfortunately, there are myths surrounding OT cybersecurity that are leading to a false sense of security. One of the most common myths is that since ICS and SCADA systems are not connected to the internet, they are not vulnerable to cyber attacks. This is no longer the case given the rise of internet-connected devices being used in industrial environments.

Misconceptions in OT cybersecurity

Another common misconception is that IT cybersecurity solutions can be applied to OT systems without any modification. The truth is that OT systems have unique characteristics and requirements that separate them from IT systems. For example, OT systems are often built using proprietary technologies that might not be compatible with the standard IT security solution. Additionally, the OT system could have catastrophic consequences on the physical processes that it controls.

Incompatible solutions in OT/IT 

One of the main reasons why IT security solutions are insufficient for OT systems is that they are not designed to address the specific threats pertaining to each. While IT solutions focus on protecting against external threats such as malware or phishing attacks, OT systems are also vulnerable to internal threats including misconfigured systems, disgruntled employees, and broader supply chain risks. The strict availability and performance requirements of OT systems require solutions that are designed to minimize disruption while still effectively shielding against cyber threats.

Biography:

Younes Rashidi: VP of Engineering Operations at Hedgehog Technologies Inc

Younes Rashidi is a highly respected leader with over 25 years of experience in industries such as renewable energy, electrical power and automation, amusement rides, and oil and gas sectors. He is known for his excellent leadership skills and visionary approach to problem-solving, which have helped him to successfully guide teams on a wide range of projects.
In addition to his impressive work experience, Younes Rashidi holds an Executive MBA and an M.A.Sc. in Mechatronic Systems Engineering, which has provided him with the knowledge and expertise to excel in his field. He is highly skilled in decision-making, critical thinking, and forward-thinking and is able to apply these skills to navigate complex challenges and achieve success for his clients. His dedication to his work and his ability to inspire and motivate those around him make him a valuable asset to any team seeking to achieve its goals.

Address:Canada





Agenda

2:30pm: Instroduction to speaker and the topic at hand

2:35-3:20: Speakers Talk

3:20-3:30: Networking.