SLIDE 1 Cyber Security In Cyber Security In Industry: Industry: How How vulnerable is your plant? vulnerable is your plant? vulnerable is your plant? vulnerable is your plant?
Brian Cole Brian Cole Research Projects Developer Research Projects Developer University of Waikato, Hamilton, New Zealand University of Waikato, Hamilton, New Zealand
SLIDE 2
Has anyone here not been told how Has anyone here not been told how important cyber is? important cyber is?
SLIDE 3
Ukraine Power Grid Ukraine Power Grid
SLIDE 4
Let’s see it in action Let’s see it in action
SLIDE 5
What do they want? What do they want?
SLIDE 6
Developing in Complexity Developing in Complexity
SLIDE 7
Cybersecurity is serious Cybersecurity is serious
SLIDE 8 Things to have on your radar Things to have on your radar
Security Audit
Certification
Collaboration
Collaboration
Systems and Processes
Protection
SLIDE 9
Where to go for help? Where to go for help?
SLIDE 10 Some examples of unsafe practices Some examples of unsafe practices
- Sharing Accounts/Passwords.
Sharing Accounts/Passwords.
- Leaving Computers Logged in.
Leaving Computers Logged in.
- Using default username and passwords (i.e.
Using default username and passwords (i.e. admin/admin). admin/admin).
- Giving everyone access to everything.
Giving everyone access to everything.
- Assuming a defenceless posture.
Assuming a defenceless posture.
SLIDE 11
Some practical advise Some practical advise
SLIDE 12
Questions? Questions?
SLIDE 13 Contact Information Contact Information
bcole@waikato.ac.nz
Cyber Security Challenge
Cyber Security Challenge
CROW Lab -
publications
NZISCS and EBPC
STRATUS.org.nz