SlideShare a Scribd company logo
1 of 16
Control System Cyber Security A different approach Bob Huba Sr. Product Manager Emerson Process Management
Goals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is SCADA Cyber Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Impending Government Regulations
Cyber-Security Strategy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Develop a Security Policy  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Goals for control system security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use a familiar Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Develop a “Culture of Security” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why this Model? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Model Fits into overall Security Program ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Program Elements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Program Elements
A MOST IMPORTANT PERSON ,[object Object]
Got to have an owner ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 
Flaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemFlaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemNetIQ
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MISAaDi Malik
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System PresentationAaDi Malik
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slidesprojectwinner
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?ESET
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHanaysha
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 
Cybersecurity of Physical Systems
Cybersecurity of Physical Systems Cybersecurity of Physical Systems
Cybersecurity of Physical Systems Erin Hillier
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighChristina McVeigh
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devicessunnay
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMIvanti
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4MLG College of Learning, Inc
 

What's hot (20)

Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
Flaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemFlaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid Them
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
develop security policy
develop security policydevelop security policy
develop security policy
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Cybersecurity of Physical Systems
Cybersecurity of Physical Systems Cybersecurity of Physical Systems
Cybersecurity of Physical Systems
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeigh
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 

Viewers also liked

01 sable
01 sable01 sable
01 sablerukford
 
MHM Smart Machinery Technologies
MHM Smart Machinery TechnologiesMHM Smart Machinery Technologies
MHM Smart Machinery TechnologiesVitucciLinkedin
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation Living Online
 
Advances In Digital Automation Within Refining
Advances In Digital Automation Within RefiningAdvances In Digital Automation Within Refining
Advances In Digital Automation Within RefiningJim Cahill
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationISA Boston Section
 
Blendingwith DeltaV
Blendingwith DeltaVBlendingwith DeltaV
Blendingwith DeltaVLuis Atencio
 
80 instrumentation interview questions with answers
80 instrumentation interview questions with answers80 instrumentation interview questions with answers
80 instrumentation interview questions with answerskirstymoore071
 

Viewers also liked (8)

01 sable
01 sable01 sable
01 sable
 
MHM Smart Machinery Technologies
MHM Smart Machinery TechnologiesMHM Smart Machinery Technologies
MHM Smart Machinery Technologies
 
Safety system
Safety systemSafety system
Safety system
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation
 
Advances In Digital Automation Within Refining
Advances In Digital Automation Within RefiningAdvances In Digital Automation Within Refining
Advances In Digital Automation Within Refining
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Blendingwith DeltaV
Blendingwith DeltaVBlendingwith DeltaV
Blendingwith DeltaV
 
80 instrumentation interview questions with answers
80 instrumentation interview questions with answers80 instrumentation interview questions with answers
80 instrumentation interview questions with answers
 

Similar to Control System Cyber Security - A Different Approach

Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesGreenway Health
 
Learn about Security Orchestration
Learn about Security OrchestrationLearn about Security Orchestration
Learn about Security Orchestrationsecuraa
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxMark Simos
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsPECB
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D cscpconf
 

Similar to Control System Cyber Security - A Different Approach (20)

Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Learn about Security Orchestration
Learn about Security OrchestrationLearn about Security Orchestration
Learn about Security Orchestration
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
information security management
information security managementinformation security management
information security management
 
Role management
Role managementRole management
Role management
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
 

More from Jim Cahill

New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...
New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...
New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...Jim Cahill
 
Social Media Impact on Emerson B2B World of Process Automation
Social Media Impact on Emerson B2B World of Process AutomationSocial Media Impact on Emerson B2B World of Process Automation
Social Media Impact on Emerson B2B World of Process AutomationJim Cahill
 
A Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant ObjectivesA Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant ObjectivesJim Cahill
 
Social Media and Collaboration in Automation and Manufacturing
Social Media and Collaboration in Automation and ManufacturingSocial Media and Collaboration in Automation and Manufacturing
Social Media and Collaboration in Automation and ManufacturingJim Cahill
 
Social Media for Process Automation - Why?
Social Media for Process Automation - Why?Social Media for Process Automation - Why?
Social Media for Process Automation - Why?Jim Cahill
 
Social Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesSocial Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesJim Cahill
 
Foundation Fieldbus - Control in the Field
Foundation Fieldbus - Control in the FieldFoundation Fieldbus - Control in the Field
Foundation Fieldbus - Control in the FieldJim Cahill
 
pH Control Solutions - Greg McMillan
pH Control Solutions - Greg McMillanpH Control Solutions - Greg McMillan
pH Control Solutions - Greg McMillanJim Cahill
 
Wireless Measurement and Control - AIChE New Orleans
Wireless Measurement and Control - AIChE New OrleansWireless Measurement and Control - AIChE New Orleans
Wireless Measurement and Control - AIChE New OrleansJim Cahill
 
Split Range Control - Greg McMillan Deminar
Split Range Control - Greg McMillan DeminarSplit Range Control - Greg McMillan Deminar
Split Range Control - Greg McMillan DeminarJim Cahill
 
How to Setup and Adjust the Dynamic Compensation of Feedforward Signals
How to Setup and Adjust the Dynamic Compensation of Feedforward SignalsHow to Setup and Adjust the Dynamic Compensation of Feedforward Signals
How to Setup and Adjust the Dynamic Compensation of Feedforward SignalsJim Cahill
 
Isa saint-louis-advanced-p h-short-course-day-2
Isa saint-louis-advanced-p h-short-course-day-2Isa saint-louis-advanced-p h-short-course-day-2
Isa saint-louis-advanced-p h-short-course-day-2Jim Cahill
 
Isa saint-louis-advanced-p h-short-course-day-1
Isa saint-louis-advanced-p h-short-course-day-1Isa saint-louis-advanced-p h-short-course-day-1
Isa saint-louis-advanced-p h-short-course-day-1Jim Cahill
 
Isa saint-louis-exceptional-opportunities-short-course-day-1
Isa saint-louis-exceptional-opportunities-short-course-day-1Isa saint-louis-exceptional-opportunities-short-course-day-1
Isa saint-louis-exceptional-opportunities-short-course-day-1Jim Cahill
 
Isa saint-louis-exceptional-opportunities-short-course-day-2
Isa saint-louis-exceptional-opportunities-short-course-day-2Isa saint-louis-exceptional-opportunities-short-course-day-2
Isa saint-louis-exceptional-opportunities-short-course-day-2Jim Cahill
 
Isa saint-louis-exceptional-opportunities-short-course-day-3
Isa saint-louis-exceptional-opportunities-short-course-day-3Isa saint-louis-exceptional-opportunities-short-course-day-3
Isa saint-louis-exceptional-opportunities-short-course-day-3Jim Cahill
 
Social Media and Communities - Part 1
Social Media and Communities - Part 1Social Media and Communities - Part 1
Social Media and Communities - Part 1Jim Cahill
 
Process Control Improvement Primer - Greg McMillan Deminar
Process Control Improvement Primer - Greg McMillan DeminarProcess Control Improvement Primer - Greg McMillan Deminar
Process Control Improvement Primer - Greg McMillan DeminarJim Cahill
 
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingSocial Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingJim Cahill
 
PID Control of Runaway Processes - Greg McMillan Deminar
PID Control of Runaway Processes - Greg McMillan DeminarPID Control of Runaway Processes - Greg McMillan Deminar
PID Control of Runaway Processes - Greg McMillan DeminarJim Cahill
 

More from Jim Cahill (20)

New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...
New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...
New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...
 
Social Media Impact on Emerson B2B World of Process Automation
Social Media Impact on Emerson B2B World of Process AutomationSocial Media Impact on Emerson B2B World of Process Automation
Social Media Impact on Emerson B2B World of Process Automation
 
A Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant ObjectivesA Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant Objectives
 
Social Media and Collaboration in Automation and Manufacturing
Social Media and Collaboration in Automation and ManufacturingSocial Media and Collaboration in Automation and Manufacturing
Social Media and Collaboration in Automation and Manufacturing
 
Social Media for Process Automation - Why?
Social Media for Process Automation - Why?Social Media for Process Automation - Why?
Social Media for Process Automation - Why?
 
Social Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesSocial Media: Perspectives from the Trenches
Social Media: Perspectives from the Trenches
 
Foundation Fieldbus - Control in the Field
Foundation Fieldbus - Control in the FieldFoundation Fieldbus - Control in the Field
Foundation Fieldbus - Control in the Field
 
pH Control Solutions - Greg McMillan
pH Control Solutions - Greg McMillanpH Control Solutions - Greg McMillan
pH Control Solutions - Greg McMillan
 
Wireless Measurement and Control - AIChE New Orleans
Wireless Measurement and Control - AIChE New OrleansWireless Measurement and Control - AIChE New Orleans
Wireless Measurement and Control - AIChE New Orleans
 
Split Range Control - Greg McMillan Deminar
Split Range Control - Greg McMillan DeminarSplit Range Control - Greg McMillan Deminar
Split Range Control - Greg McMillan Deminar
 
How to Setup and Adjust the Dynamic Compensation of Feedforward Signals
How to Setup and Adjust the Dynamic Compensation of Feedforward SignalsHow to Setup and Adjust the Dynamic Compensation of Feedforward Signals
How to Setup and Adjust the Dynamic Compensation of Feedforward Signals
 
Isa saint-louis-advanced-p h-short-course-day-2
Isa saint-louis-advanced-p h-short-course-day-2Isa saint-louis-advanced-p h-short-course-day-2
Isa saint-louis-advanced-p h-short-course-day-2
 
Isa saint-louis-advanced-p h-short-course-day-1
Isa saint-louis-advanced-p h-short-course-day-1Isa saint-louis-advanced-p h-short-course-day-1
Isa saint-louis-advanced-p h-short-course-day-1
 
Isa saint-louis-exceptional-opportunities-short-course-day-1
Isa saint-louis-exceptional-opportunities-short-course-day-1Isa saint-louis-exceptional-opportunities-short-course-day-1
Isa saint-louis-exceptional-opportunities-short-course-day-1
 
Isa saint-louis-exceptional-opportunities-short-course-day-2
Isa saint-louis-exceptional-opportunities-short-course-day-2Isa saint-louis-exceptional-opportunities-short-course-day-2
Isa saint-louis-exceptional-opportunities-short-course-day-2
 
Isa saint-louis-exceptional-opportunities-short-course-day-3
Isa saint-louis-exceptional-opportunities-short-course-day-3Isa saint-louis-exceptional-opportunities-short-course-day-3
Isa saint-louis-exceptional-opportunities-short-course-day-3
 
Social Media and Communities - Part 1
Social Media and Communities - Part 1Social Media and Communities - Part 1
Social Media and Communities - Part 1
 
Process Control Improvement Primer - Greg McMillan Deminar
Process Control Improvement Primer - Greg McMillan DeminarProcess Control Improvement Primer - Greg McMillan Deminar
Process Control Improvement Primer - Greg McMillan Deminar
 
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingSocial Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
 
PID Control of Runaway Processes - Greg McMillan Deminar
PID Control of Runaway Processes - Greg McMillan DeminarPID Control of Runaway Processes - Greg McMillan Deminar
PID Control of Runaway Processes - Greg McMillan Deminar
 

Recently uploaded

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 

Recently uploaded (20)

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 

Control System Cyber Security - A Different Approach

  • 1. Control System Cyber Security A different approach Bob Huba Sr. Product Manager Emerson Process Management
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.