Cyber Security In Cyber Security In Industry: Industry: How How vulnerable is your plant? vulnerable is your plant? vulnerable is your plant? vulnerable is your plant? Brian Cole Brian Cole Research Projects Developer Research Projects Developer University of Waikato, Hamilton, New Zealand University of Waikato, Hamilton, New Zealand
Has anyone here not been told how Has anyone here not been told how important cyber is? important cyber is?
Ukraine Power Grid Ukraine Power Grid
Let’s see it in action Let’s see it in action
What do they want? What do they want?
Developing in Complexity Developing in Complexity
Cybersecurity is serious Cybersecurity is serious
Things to have on your radar Things to have on your radar • Security Audit Security Audit • Certification Certification • Collaboration • Collaboration Collaboration Collaboration • Systems and Processes Systems and Processes • Protection Protection
Where to go for help? Where to go for help?
Some examples of unsafe practices Some examples of unsafe practices • Sharing Accounts/Passwords. Sharing Accounts/Passwords. • Leaving Computers Logged in. Leaving Computers Logged in. • Using default username and passwords (i.e. Using default username and passwords (i.e. admin/admin). admin/admin). • Giving everyone access to everything. Giving everyone access to everything. • Assuming a defenceless posture. Assuming a defenceless posture.
Some practical advise Some practical advise
Questions? Questions?
Contact Information Contact Information • • bcole@waikato.ac.nz bcole@waikato.ac.nz • Cyber Security Challenge • Cyber Security Challenge Cyber Security Challenge Cyber Security Challenge • CROW Lab CROW Lab - - publications publications • NZISCS and EBPC NZISCS and EBPC • STRATUS.org.nz STRATUS.org.nz
Recommend
More recommend