Daryl Haegley, OCP, CCO
Track A | Energy Security & Government Energy Management | FedEnergy Works
Every day we depend upon many Control Systems (CS); most now networked and potentially easily exploitable, i.e. utility, water, wastewater, natural gas,
facility lighting, petroleum systems, smart meters, building heating and air conditioning equipment, research and development equipment, medical devices,
vehicles and fire and life safety systems.Damage to or compromise of any control system may be a business or mission disabler as disruption of a computerized
chiller controller could adversely impact network or data-base servers. Perhaps more concerning and debilitating would be when the control system is
used as a gateway into the organization's information system or the organization's broader global information networks. All rely on control systems
24 x 7 x 365; yet identifying those responsible for cyber securing those networks remains a challenge by policy, standards and technical expertise.Learn
the fundamentals and relevance of how automated networks of sensors, actuators and controllers require unique cyber intelligence and security requirements
from those used to secure traditional information systems (such as email systems) and gain insight to how DoD and businesses are addressing the challenges
to assure the security of operations, critical infrastructure and mission continuity.
No Spam - only latest news, program and activity updates!