Cybersecurity Guidance at ConnectedPlant Conference

by | Feb 26, 2018 | Control & Safety Systems, Cybersecurity, Industry, Power Generation

Jim Cahill

Jim Cahill

Chief Blogger, Social Marketing Leader

This week, the ConnectedPlant conference is being held in Charlotte, North Carolina. The conference is focused for professionals in the chemicals and power industries who are leading digital transformations in their organizations. The focus includes:

…actionable information and strategies to maximize the use of data, analytics, and related technology to drive efficiency improvements, preventative and predictive maintenance programs, and staff safety.

Emerson's David Foose


Emerson’s David Foose will co-present at two sessions at this conference on Tuesday, February 27. The first session is Safeguarding Critical Assets in an Era of Cyber Threats and the second is CyberSecurity – Emerging Threats & Strategies to Address them. The description for this first session is:

With connectivity comes an increased vulnerability to cyber threats, which, though worrisome, can be effectively managed. Learn about the nature of existing and emerging threats and what strategies are available to address them.

The second session’s description is:

What cyber security issues emerge as connected plant strategies are adopted? Given the fast-changing nature of cyber threats, are existing strategies sufficiently forward-looking and adaptable? With connectivity comes an increased vulnerability to cyber threats, which, though worrisome, can be effectively managed. Learn about the nature of existing and emerging threats and what strategies are available to address them.

In these presentations David will address threat intelligences and how to understand the risks of the most common and severe threats. He’ll share common terminology used by cybersecurity professionals and sources of threat intelligence—including suppliers, governmental agencies, industry groups and self-gathering methods.

He will share some examples of these sources and examples of breeches. Some recommendations to improve your cybersecurity readiness are to get a complete asset list and find or acquire access to these assets. It’s critical to perform a detailed gap analysis and make sure your organization is staffed with people with experience and have focus in driving the cybersecurity programs and periodic reviews.

At the recent ARC Industry Forum, I heard that an organization’s cybersecurity posture should not be a matter of if something will happen, but when it will happen, and what contingencies should be made in advance, such as frequent backups to restore operating conditions. This is not to say that something will indeed happen, but that planning and execution must extend beyond just methods of prevention to include methods of recovery.

If you’re not able to join David at the ConnectedPlant conference this week, make sure to connect with him in LinkedIn where he shares updates and trends in cybersecurity threats and best practices.

You can also connect and interact with other cybersecurity experts in the Ovation and DeltaV groups in the Emerson Exchange 365 community.

Popular Posts

Comments

Follow Us

We invite you to follow us on Facebook, LinkedIn, Twitter and YouTube to stay up to date on the latest news, events and innovations that will help you face and solve your toughest challenges.

Do you want to reuse or translate content?

Just post a link to the entry and send us a quick note so we can share your work. Thank you very much.

Our Global Community

Emerson Exchange 365

The opinions expressed here are the personal opinions of the authors. Content published here is not read or approved by Emerson before it is posted and does not necessarily represent the views and opinions of Emerson.

PHP Code Snippets Powered By : XYZScripts.com