Emergent Properties of Doing — an ICS-ISAC Public Briefing

By   ISBuzz Team
Writer , Information Security Buzz | Sep 03, 2013 04:12 am PST

In the realm of infrastructure cybersecurity the period of contemplation has passed and the time for action is upon us.Join the Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) for a panel discussion facilitated by ICS-ISAC Chair Chris Blask on the Situational Awareness Reference Architecture (SARA) pilot currently being executed by the Center and its membership. In this session representatives from the vendors, integrators and industry experts involved — including Adam Vincent (CyberSquared), Matt Jonkman (EmergingThreats), Jon Stanford (PwC) and Michael Glover (Prime Controls) — will discuss the pilot as well as the opportunity for lessons learned from construction of a realtime knowledge sharing network needed to secure critical infrastructure.

Designed to benefit both the technical & non-technical attendee the ICS-ISAC Public Briefing series takes a no-nonsense approach to addressing issues that cut across industry, sector, and job function. So whether you are hands-on ICS, administrator, or C-level decision-maker you will find valuable information that you can take and implement to further secure your industrial control systems.

Emergent Properties of Doing

Wednesday Sept 18th, 2013 – 1:00-2:30pm ET

Register on the ICS-ISAC Events page.

Adam Vincent – Chief Executive Officer for Cyber Squared
Adam Vincent, entrepreneur and cybersecurity visionary, is currently Chief Executive Officer for Cyber Squared, Inc.  Prior to founding Cyber Squared Adam founded and then served as Chief Technology Officer (CTO) for the Public Sector Division at Layer 7 Technologies, a Cyber Security & Cloud Company. The MITRE Corporation was beneficiary of Adam’s expertise as Senior Information Security Engineer before his leaving to start Layer7.

One of Adam’s latest endeavors is Cyber Squared’s recent successful launch of ThreatConnect, a collaborative threat intelligence platform.  This unique combination of powerful analytical tools that assist in finding and analyzing threat indicators combined with community-based sharing features enable communication and collaboration on emerging threats.

Adam holds an MS in Computer Science with a graduate certificate in Computer Security and Information Assurance from George Washington University. He is an active blogger in the area of cybersecurity and a sought-after speaker at security industry conferences and events.

Matt Jonkman – Chief Technology Officer at EmergingThreats
In 2003, Emerging Threats founder and current Chief Technology Officer (CTO) Matt Jonkman started the open source community dedicated to collecting IDS signatures to combat malware attacks.  Emerging Threats has since grown to be a world-leading provider of open source and commercial threat and malware intelligence.

In addition to his responsibilities at Emerging Threats Matt is also the President of the Open Information Security Foundation (OISF), a non-profit funded by the Department of Homeland Security (DHS) and industry partners to build a next-generation IDS/IPS engine.

Matt served five years in the Army as an Air Traffic Control RADAR and Communications Tech, attended ISU and the Rose-Hulman Institute and has over 10 years experience in security consulting in the telecom and financial sectors.

Jon Stanford – Director  & Critical Infrastructure Security Lead for PwC Power & Utilities Practice
Jon Stanford is a nationally recognized leader in applying the National Institute of Standards & Technology (NIST) Risk Management Framework and the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) cyber security standards in utility environments. He contributed to Industrial Control System enhancements in the NIST Special Publications standards and served over two years as an inaugural member of the NERC standard drafting team chartered to revise the CIP cyber security standards.

Jon is Director of and Critical Infrastructure Security Lead for PwC’s Power & Utilities Practice where he works with C-suite and operations executives at US power and utilities companies to develop and manage innovative solutions focused on transforming security programs to achieve sustainable high performance.  He leads assessments of critical infrastructure, Smart Grid, SCADA and process control systems and industrial control networks as well as serves as a trusted industry advisor in risk management and compliance strategies, advanced threat and cyber crime prevention, detection, mitigation and recovery.

In addition to his responsibilities at PwC Jon serves as an ICS-ISAC Board Member.

Michael Glover – Chief Information Officer at Prime Controls
As Chief Information Officer for Prime Controls, Mike Glover brings over 15 years of information technology management and information security leadership experience to the table.  He has advised the National Security Council on ICS related incident response; was a key architect in the design of the University of Houston ICS Security Lab focused on Critical Infrastructure Security Training; and, participated at the I3P at George Washington University on a panel consisting of former DOD directors and other ICS security experts.

In the area of critical infrastructure security and resilience standards Mike has worked projects to align with NERC-CIP, NIST, NICE and ISA as well as provided input into a DHS crosswalk of knowledge, skills and abilities (KSAs) to facilitate development of industry agnostic security standards.  He is former SCC Co-Chair for the DHS – Control System Security Program – ICSJWG – Workforce Development Subgroup.

Additional projects have included supporting major industrial asset owners in the US, while simultaneously managing the development of security standards for the water and wastewater industry and recently he was involved in the assistance of several ICS-CERT coordinated responses on vetted ICS attacks on critical infrastructure.

Mike is also currently participating in a DOD research and development project of Industrial Control System Honeypots targeted at Smart Grid application; helping to define the Industrial Control Systems Incident Response Program for DOD contractors; supporting a two million-dollar DHS-funded research project collaborating with Air Force Institute of Technology and the DHS; and developing national awareness of System Integrator Security Policies and Procedures.

Mike is a founding member of the ICS-ISAC.

Chris Blask – Chair of the ICS-ISAC
Chris Blask has a career that spans the breadth of the industrial control system cybersecurity space. From humble beginnings as a control system engineer he soon saw the need for and invented one of the first commercial firewall products. Joining Cisco Systems he then led their firewall business to a position of global leadership, a legacy that continues to this day.  Recognizing the need to apply Security Information and Event Management (SIEM) technology to ICS cybersecurity he founded Lofty Perch, authored the first book on SIEM, and created AlienVault’s ICS Group. Today, Chris is actively involved with a wide range of domestic and international efforts in the cybersecurity arena.

— ### — 

The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) is a member driven organization supported by valued industry partners. It exists to bring together key stakeholders for the purpose of sharing knowledge about risks, threats and best practices across our shared critical infrastructure. The Center was created to provide the ICS community with a common platform where collaboration can be performed in an environment best suited to the needs of all involved parties.

Interested organizations, researchers, vendors, and asset owners can become a part of the Industrial Control System Information Sharing and Analysis Center at ICS-ISAC.org.

POC – Debbie Windle  ●  979-204-7218  ●  dwindle@ics-isac.org

Notify of
0 Expert Comments
Inline Feedbacks
View all comments

Recent Posts

Would love your thoughts, please comment.x