Wednesday, May 18, 2016

Presentation & Webinar | Cybersecurity in a mobile first, cloud first world.

Hello Folks!

Just yesterday, in partnership with our friends at Wonderware PacWest, I had the privilege of presenting on the topic of Cybersecurity for Industrial Control Systems.

With the culmination of mobile devices, cloud services and now the Internet of Things, many analysts say 2016 is the year to start seriously paying attention to Cybersecurity at your facility. Continue to read on.

To listen to the webinar, head over to the Wonderware PacWest website using this link below:
CyberSecurity for Cloud Solutions & Connected Devices in Industrial Control Systems.

Then head over to SlideShare for a copy of the slide deck using this link below:
Wonderware presentation on Cybersecurity.

Let me know what you think of the content. Is there anything that you agree or disagree with?
What is your level of cybersecurity maturity like at your facility?
Do you think that mobile devices and cloud services can safely participate in your Industrial Control System cybersecurity posture?



  1. As your one-stop shop transcription provider, we transcribe a broad range of audio and video transcription provider

  2. To Saadi

    Thanks you a lot for your efforts in cyber world . I'm interested in your person. What do you think, is it possible for you to check this POS system device that I use on my laptop?
    I want to have security assessments of this device. How much is it going to cost?

  3. Si un iPhone está siendo monitoreado para asegurarse de que un empleado o ser querido pueda ser localizado fácilmente en una situación insegura, o para rastrear el uso de los niños de varias funciones del iPhone, o incluso para reunir evidencia sobre la falta de honradez del empleado o del matrimonio, un espía del iPhone La aplicación puede aprovechar las características particulares del dispositivo de comunicaciones para registrar y monitorear todo uso y actividad. Sin embargo, para dispositivos Apple, solo necesita realizar rooting si desea acceder a las aplicaciones avanzadas de espionaje como Facebook, WhatsApp y otras aplicaciones similares.