Live Webinar – Digital Transformation “Cyber-Safety Challenges and Opportunities”

On this webcast, we’ll be considering how the technologies and platforms have evolved. We will discuss the high-level goals of Digital Transformation or IIoT programs and projects and how their project execution typically unfolds. We will also discuss how these programs can create unintended consequences within the  OT environment if cybersecurity and safety are not evaluated. 

This presentation will put forth 5 simple areas of focus for plant personnel when impacted by Digital Transformation or IIoT projects or programs. The 5 areas of focus ensure a fundamental work process and approach to mitigating plant cybersecurity and safety risks.

To achieve true change a successful Digital Transformation or IIoT Program should leverage the experience, know-how and technical understanding that site Engineering, Operations and Maintenance teams bring to the table. This allows the programs or projects to be more effective and facilitate a cultural transformation in safety, cybersecurity, profitability and quality.

The link to the event will be available on this page when the webcast goes Live.

Speaker bios: Dave Gunter – Industrial Cybersecurity Senior Principal Specialist

Dave is an experienced process automation expert who has over 20 years’ experience with a global owner operator. In addition, Dave has worked within the consulting engineering field with numerous clients on the topics of process safety, cybersecurity and alarm management.

Dave has participated on various industry standards committees, conducted Gap assessments vulnerability analysis on a broad range of industries. Dave deep understanding of the challenges the  end -user/ owner operator faces form the backbone of his approach to solving cybersecurity problems in a complex environment.

Dave is a published author “Implementing IEC 62443 – A Pragmatic Approach to Cybersecurity 1st Edition”.

.

John Cusimano, aeSolutions’ Vice President of Industrial Cybersecurity

John has over 20 years of experience and has performed many control system cybersecurity vulnerability and cyber risk assessments. He is a member of the International Society of Automation (ISA) and is a voting member of the ISA 99 cybersecurity standards committee. As part of that committee, he is the chair of the zones and conduits working group, and co-chair of the product development working group. He is the developer and primary instructor of the ISA courses on cybersecurity. John is a Certified Functional Safety Expert (CFSE), a Certified Information Systems Security Professional (CISSP), and a Global Industrial Cyber Security Professional (GICSP). John has a B.S. in Electrical and Computer Engineering from Clarkson University in New York.

“I am passionate about helping the process industries mature in their understanding and ability to manage operational (i.e. control system) cybersecurity risk by developing and applying engineering discipline to the process. Recognizing that operational cybersecurity risk is a subset of process safety risk, my goal is to leverage and align existing process safety management processes with operational cybersecurity management processes. I have been focused on developing, applying and sharing what I have learned with industry via client projects, standards committees and training since 2009.”

.

Chad Vicknair – Industrial Cybersecurity Technical Project Manager  

Chad Vicknair brings a true shop-floor to top-floor perspective with over 27 years in the regulated and highly hazardous chemical industry. In 1992, while working as a maintenance contractor at a chemical facility in Louisiana, he accepted an employment offer in operations. Driven by a natural desire to understand systems from end to end, he quickly moved through various roles developing a strong understanding of interoperability between not only systems, but the people interacting with them. Continuing a personal pursuit of education, Chad earned a Bachelor’s degree and multiple certifications in process control and cybersecurity. At the site level, he administered BPCS, SIS, PCN and MES systems, supported PSM, PHA, LOPA and alarm rationalization programs, and helped to develop and sustain regulatory programs for CFATS, MTSA, RCSC, and the EPA. As a corporate global ICS cybersecurity consultant and PM, Chad navigated across multiple business functions to promote IT/OT collaboration, adaption of the NIST CSF and a risk-based approach to cybersecurity aligning the business mission with regulatory requirements

The link to the event will be available on this page when the webcast goes Live.