Cybersecurity solutions Beyond IT
Industrial Cybersecurity Solutions
Mr. Youness Rashidi will speak on the folliwng topics:
- What is OT Cybersecurity?
- IT Cybersecurity vs. OT cybersecurity
- Trends in OT Cybersecurity?
- OT Cybersecurity Myths
- A Real Example of an OT Cyber Attack
- Best Practices for OT Cybersecurity
- Future of OT Cybersecurity
Date and Time
Location
Hosts
Registration
- Date: 17 Oct 2023
- Time: 02:30 PM to 03:30 PM
- All times are (UTC-07:00) Pacific Time (US & Canada)
- Add Event to Calendar
- Starts 25 September 2023 11:54 AM
- Ends 16 October 2023 11:54 PM
- All times are (UTC-07:00) Pacific Time (US & Canada)
- No Admission Charge
Speakers
Younes of Hedgehog Technologies
Industrial Cybersecurity - Beyond IT
Operational technology (OT) cybersecurity, also known as Industrial Automation Control System (IACS) cybersecurity, is an area of concern for organizations that depend on industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems to operate critical infrastructure. Having a robust cybersecurity strategy will prevent unforeseen cyber attacks but there are some considerations to acknowledge first.
Unfortunately, there are myths surrounding OT cybersecurity that are leading to a false sense of security. One of the most common myths is that since ICS and SCADA systems are not connected to the internet, they are not vulnerable to cyber attacks. This is no longer the case given the rise of internet-connected devices being used in industrial environments.
Misconceptions in OT cybersecurity
Another common misconception is that IT cybersecurity solutions can be applied to OT systems without any modification. The truth is that OT systems have unique characteristics and requirements that separate them from IT systems. For example, OT systems are often built using proprietary technologies that might not be compatible with the standard IT security solution. Additionally, the OT system could have catastrophic consequences on the physical processes that it controls.
Incompatible solutions in OT/IT
One of the main reasons why IT security solutions are insufficient for OT systems is that they are not designed to address the specific threats pertaining to each. While IT solutions focus on protecting against external threats such as malware or phishing attacks, OT systems are also vulnerable to internal threats including misconfigured systems, disgruntled employees, and broader supply chain risks. The strict availability and performance requirements of OT systems require solutions that are designed to minimize disruption while still effectively shielding against cyber threats.
Biography:
Younes Rashidi: VP of Engineering Operations at Hedgehog Technologies Inc
Younes Rashidi is a highly respected leader with over 25 years of experience in industries such as renewable energy, electrical power and automation, amusement rides, and oil and gas sectors. He is known for his excellent leadership skills and visionary approach to problem-solving, which have helped him to successfully guide teams on a wide range of projects.
In addition to his impressive work experience, Younes Rashidi holds an Executive MBA and an M.A.Sc. in Mechatronic Systems Engineering, which has provided him with the knowledge and expertise to excel in his field. He is highly skilled in decision-making, critical thinking, and forward-thinking and is able to apply these skills to navigate complex challenges and achieve success for his clients. His dedication to his work and his ability to inspire and motivate those around him make him a valuable asset to any team seeking to achieve its goals.
Address:Canada
Agenda
2:30pm: Instroduction to speaker and the topic at hand
2:35-3:20: Speakers Talk
3:20-3:30: Networking.