| speaker1_bio | David Bacqué is the Director of Cybersecurity Consulting and Vice President of Strategic Development for RED Group, an Industrial Control Systems (ICS) technology development and integration firm specializing in Process Automation, IT/OT Consulting, and Industrial Cybersecurity.  Dave is an experienced industrial cybersecurity and operational technology (OT) professional who has led, advised on, and delivered cybersecurity projects and initiatives with industrial clients around the world to help operators of critical infrastructure become more resilient to cyber threats. Dave has a B.S. in Information Systems and Decision Sciences from Louisiana State University and is a holder of the Global Industrial Cybersecurity Professional (GICSP) and Project Management Professional (PMP) certifications. | 
|---|
| Abstract Text | SCADA 
save time and lower operating costs by having crews respond to known issues via SCADA alarms vs routine site visits and finding unknown issuesdata at your fingertips for maintenance and preventive maintenanceremote control options to solve issues without visiting the sitescommunication options: cellular, radio, hardwired, satellite.  Redundancy options as well.on premises servers vs hosted clous server: weigh the benefits for each based on your unique situationnonproprietary software: don’t get locked into a contract or a provider where they are the only company who can help you.  We use off the shelf solutions that work well in the space, and if you want to take over the responsibility of the system, or contract with another firm, you can.standardized parts at each site to reduce stock inventory, software types, and technical capability of maintenance staff   OT/ ICS Cybersecurity 
build out your security road map
remote access SCADA systems and industrial controls in the field need to be secured from outside sources trying to gain access (threats)asset inventory: what technologies do you have, what software are they using, what communication protocols do they use, etc.risk assessment: identify all risks with current and new technologies to be usedremediation plan: you’ve found a vulnerability, now what do you do?  You need a written plan in placeincident response plan: what will you do if hackers hold your system hostage for ransom?user permission can be granted at different levels: maintenance, engineer, operator, manager, etc. each with their own unique set of permissions and login credentialsdesign the architecture for best practice: secure VPN tunnels utilizing best protocols, dedicated cellular or radio plans, multi factor authentication, etc.tools in place to constantly scan your systems for vulnerabilities and breaches | 
|---|