Cyber Security In Cyber Security In Industry: Industry: How How - - PowerPoint PPT Presentation

cyber security in cyber security in industry industry how
SMART_READER_LITE
LIVE PREVIEW

Cyber Security In Cyber Security In Industry: Industry: How How - - PowerPoint PPT Presentation

Cyber Security In Cyber Security In Industry: Industry: How How vulnerable is your plant? vulnerable is your plant? vulnerable is your plant? vulnerable is your plant? Brian Cole Brian Cole Research Projects Developer Research Projects


slide-1
SLIDE 1

Cyber Security In Cyber Security In Industry: Industry: How How vulnerable is your plant? vulnerable is your plant? vulnerable is your plant? vulnerable is your plant?

Brian Cole Brian Cole Research Projects Developer Research Projects Developer University of Waikato, Hamilton, New Zealand University of Waikato, Hamilton, New Zealand

slide-2
SLIDE 2

Has anyone here not been told how Has anyone here not been told how important cyber is? important cyber is?

slide-3
SLIDE 3

Ukraine Power Grid Ukraine Power Grid

slide-4
SLIDE 4

Let’s see it in action Let’s see it in action

slide-5
SLIDE 5

What do they want? What do they want?

slide-6
SLIDE 6

Developing in Complexity Developing in Complexity

slide-7
SLIDE 7

Cybersecurity is serious Cybersecurity is serious

slide-8
SLIDE 8

Things to have on your radar Things to have on your radar

  • Security Audit

Security Audit

  • Certification

Certification

  • Collaboration

Collaboration

  • Collaboration

Collaboration

  • Systems and Processes

Systems and Processes

  • Protection

Protection

slide-9
SLIDE 9

Where to go for help? Where to go for help?

slide-10
SLIDE 10

Some examples of unsafe practices Some examples of unsafe practices

  • Sharing Accounts/Passwords.

Sharing Accounts/Passwords.

  • Leaving Computers Logged in.

Leaving Computers Logged in.

  • Using default username and passwords (i.e.

Using default username and passwords (i.e. admin/admin). admin/admin).

  • Giving everyone access to everything.

Giving everyone access to everything.

  • Assuming a defenceless posture.

Assuming a defenceless posture.

slide-11
SLIDE 11

Some practical advise Some practical advise

slide-12
SLIDE 12

Questions? Questions?

slide-13
SLIDE 13

Contact Information Contact Information

  • bcole@waikato.ac.nz

bcole@waikato.ac.nz

  • Cyber Security Challenge

Cyber Security Challenge

  • Cyber Security Challenge

Cyber Security Challenge

  • CROW Lab

CROW Lab -

  • publications

publications

  • NZISCS and EBPC

NZISCS and EBPC

  • STRATUS.org.nz

STRATUS.org.nz