Event Type : FREE
Start : October 2, 2024
End : October 2, 2024
Time : 11:00 AM - 1:30 PM
Location : Wood
17325 Park Row Dr,
Houston , TX - 77084
United States.
Contact : 832-809-8000
Register for this meeting by clicking here
After registering, you will receive a confirmation email containing information about
joining the meeting.
You may join the meeting starting at approximately 11:00 am for socializing and
announcements.
The presentation will begin at 11:30 am.
Online attendees:
Download and install Zoom software if necessary
You should have received a Zoom meeting link in your confirmation email, if you did not please contact Jane Buchanan. Register for the zoom meeting using the link, after registering, you will receive a confirmation email containing information about joining the meeting (it includes the meeting passcode).
Presenters: Vince White – Systems and Network Technical Authority, Systems Integration, Wood
Vince is the Systems and Network Technical Authority for Wood’s Systems Integration
business. He has over 25 years of experience in systems and networking for many
clients and ICSS vendors. Vince supports clients by ensuring that their OT systems are
robust and secure.
Brice Leffel – Automation and Controls SME, Wood
Brice is an Automation and Controls SME for Wood’s Systems Integration business. He has over 17 years of experience with a variety of PLC, DCS, and SIS System. He excels at integrating these controls in both legacy and modern network designs. Brice delivers tailored solutions to clients’ complex needs.
Key Takeaways for OT professionals in the O&G Industry:
1. Emphasizing Fundamental Principles: Adhering to core security principles is crucial
for protecting operational technology systems. This ensures the primary focus remains
on overall security objectives, rather than getting bogged down by specific threats,
vulnerabilities or procedures.
2. Cyber-SYSTEM Resiliency – Move from What-if to Even-if: Understand the
requirements for routine and proven backup/recovery processes for the operational
technology infrastructure. Incorporating these practices is essential for preserving system
integrity and resilience against cyber threats, while also protecting the system from
accidental/incidental outages due to software/hardware failure or routine maintenance,
including required patching and updates.
3. Focus Beyond Vulnerabilities: Attackers often exploit the most vulnerable points in a
system. Identifying, protecting and/or mitigating these target areas is crucial for securing
operational technology environments from targeted cyber-attacks. Learn implementation
strategies for reducing attack surface and ensure continual system monitoring. Review
the 2024 top Cyber-attack vectors and how companies navigated recent cyber-attacks.