SlideShare a Scribd company logo
1 of 16
Control System Cyber Security A different approach Bob Huba Sr. Product Manager Emerson Process Management
Goals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is SCADA Cyber Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Impending Government Regulations
Cyber-Security Strategy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Develop a Security Policy  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Goals for control system security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use a familiar Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Develop a “Culture of Security” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why this Model? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Model Fits into overall Security Program ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Program Elements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Program Elements
A MOST IMPORTANT PERSON ,[object Object]
Got to have an owner ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 
Flaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemFlaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemNetIQ
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MISAaDi Malik
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System PresentationAaDi Malik
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slidesprojectwinner
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?ESET
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHanaysha
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 
Cybersecurity of Physical Systems
Cybersecurity of Physical Systems Cybersecurity of Physical Systems
Cybersecurity of Physical Systems Erin Hillier
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighChristina McVeigh
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devicessunnay
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMIvanti
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4MLG College of Learning, Inc
 

What's hot (20)

Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
Flaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemFlaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid Them
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
develop security policy
develop security policydevelop security policy
develop security policy
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Cybersecurity of Physical Systems
Cybersecurity of Physical Systems Cybersecurity of Physical Systems
Cybersecurity of Physical Systems
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeigh
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 

Viewers also liked

01 sable
01 sable01 sable
01 sablerukford
 
MHM Smart Machinery Technologies
MHM Smart Machinery TechnologiesMHM Smart Machinery Technologies
MHM Smart Machinery TechnologiesVitucciLinkedin
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation Living Online
 
Advances In Digital Automation Within Refining
Advances In Digital Automation Within RefiningAdvances In Digital Automation Within Refining
Advances In Digital Automation Within RefiningJim Cahill
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationISA Boston Section
 
Blendingwith DeltaV
Blendingwith DeltaVBlendingwith DeltaV
Blendingwith DeltaVLuis Atencio
 
80 instrumentation interview questions with answers
80 instrumentation interview questions with answers80 instrumentation interview questions with answers
80 instrumentation interview questions with answerskirstymoore071
 

Viewers also liked (8)

01 sable
01 sable01 sable
01 sable
 
MHM Smart Machinery Technologies
MHM Smart Machinery TechnologiesMHM Smart Machinery Technologies
MHM Smart Machinery Technologies
 
Safety system
Safety systemSafety system
Safety system
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation
 
Advances In Digital Automation Within Refining
Advances In Digital Automation Within RefiningAdvances In Digital Automation Within Refining
Advances In Digital Automation Within Refining
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Blendingwith DeltaV
Blendingwith DeltaVBlendingwith DeltaV
Blendingwith DeltaV
 
80 instrumentation interview questions with answers
80 instrumentation interview questions with answers80 instrumentation interview questions with answers
80 instrumentation interview questions with answers
 

Similar to Control System Cyber Security - A Different Approach

Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesGreenway Health
 
Learn about Security Orchestration
Learn about Security OrchestrationLearn about Security Orchestration
Learn about Security Orchestrationsecuraa
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxMark Simos
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsPECB
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D cscpconf
 

Similar to Control System Cyber Security - A Different Approach (20)

Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Learn about Security Orchestration
Learn about Security OrchestrationLearn about Security Orchestration
Learn about Security Orchestration
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
information security management
information security managementinformation security management
information security management
 
Role management
Role managementRole management
Role management
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
 

More from Jim Cahill

New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...
New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...
New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...Jim Cahill
 
Social Media Impact on Emerson B2B World of Process Automation
Social Media Impact on Emerson B2B World of Process AutomationSocial Media Impact on Emerson B2B World of Process Automation
Social Media Impact on Emerson B2B World of Process AutomationJim Cahill
 
A Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant ObjectivesA Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant ObjectivesJim Cahill
 
Social Media and Collaboration in Automation and Manufacturing
Social Media and Collaboration in Automation and ManufacturingSocial Media and Collaboration in Automation and Manufacturing
Social Media and Collaboration in Automation and ManufacturingJim Cahill
 
Social Media for Process Automation - Why?
Social Media for Process Automation - Why?Social Media for Process Automation - Why?
Social Media for Process Automation - Why?Jim Cahill
 
Social Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesSocial Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesJim Cahill
 
Foundation Fieldbus - Control in the Field
Foundation Fieldbus - Control in the FieldFoundation Fieldbus - Control in the Field
Foundation Fieldbus - Control in the FieldJim Cahill
 
pH Control Solutions - Greg McMillan
pH Control Solutions - Greg McMillanpH Control Solutions - Greg McMillan
pH Control Solutions - Greg McMillanJim Cahill
 
Wireless Measurement and Control - AIChE New Orleans
Wireless Measurement and Control - AIChE New OrleansWireless Measurement and Control - AIChE New Orleans
Wireless Measurement and Control - AIChE New OrleansJim Cahill
 
Split Range Control - Greg McMillan Deminar
Split Range Control - Greg McMillan DeminarSplit Range Control - Greg McMillan Deminar
Split Range Control - Greg McMillan DeminarJim Cahill
 
How to Setup and Adjust the Dynamic Compensation of Feedforward Signals
How to Setup and Adjust the Dynamic Compensation of Feedforward SignalsHow to Setup and Adjust the Dynamic Compensation of Feedforward Signals
How to Setup and Adjust the Dynamic Compensation of Feedforward SignalsJim Cahill
 
Isa saint-louis-advanced-p h-short-course-day-2
Isa saint-louis-advanced-p h-short-course-day-2Isa saint-louis-advanced-p h-short-course-day-2
Isa saint-louis-advanced-p h-short-course-day-2Jim Cahill
 
Isa saint-louis-advanced-p h-short-course-day-1
Isa saint-louis-advanced-p h-short-course-day-1Isa saint-louis-advanced-p h-short-course-day-1
Isa saint-louis-advanced-p h-short-course-day-1Jim Cahill
 
Isa saint-louis-exceptional-opportunities-short-course-day-1
Isa saint-louis-exceptional-opportunities-short-course-day-1Isa saint-louis-exceptional-opportunities-short-course-day-1
Isa saint-louis-exceptional-opportunities-short-course-day-1Jim Cahill
 
Isa saint-louis-exceptional-opportunities-short-course-day-2
Isa saint-louis-exceptional-opportunities-short-course-day-2Isa saint-louis-exceptional-opportunities-short-course-day-2
Isa saint-louis-exceptional-opportunities-short-course-day-2Jim Cahill
 
Isa saint-louis-exceptional-opportunities-short-course-day-3
Isa saint-louis-exceptional-opportunities-short-course-day-3Isa saint-louis-exceptional-opportunities-short-course-day-3
Isa saint-louis-exceptional-opportunities-short-course-day-3Jim Cahill
 
Social Media and Communities - Part 1
Social Media and Communities - Part 1Social Media and Communities - Part 1
Social Media and Communities - Part 1Jim Cahill
 
Process Control Improvement Primer - Greg McMillan Deminar
Process Control Improvement Primer - Greg McMillan DeminarProcess Control Improvement Primer - Greg McMillan Deminar
Process Control Improvement Primer - Greg McMillan DeminarJim Cahill
 
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingSocial Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingJim Cahill
 
PID Control of Runaway Processes - Greg McMillan Deminar
PID Control of Runaway Processes - Greg McMillan DeminarPID Control of Runaway Processes - Greg McMillan Deminar
PID Control of Runaway Processes - Greg McMillan DeminarJim Cahill
 

More from Jim Cahill (20)

New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...
New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...
New Kids on the I/O Block - Transferring Process Control Knowledge to Millenn...
 
Social Media Impact on Emerson B2B World of Process Automation
Social Media Impact on Emerson B2B World of Process AutomationSocial Media Impact on Emerson B2B World of Process Automation
Social Media Impact on Emerson B2B World of Process Automation
 
A Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant ObjectivesA Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant Objectives
 
Social Media and Collaboration in Automation and Manufacturing
Social Media and Collaboration in Automation and ManufacturingSocial Media and Collaboration in Automation and Manufacturing
Social Media and Collaboration in Automation and Manufacturing
 
Social Media for Process Automation - Why?
Social Media for Process Automation - Why?Social Media for Process Automation - Why?
Social Media for Process Automation - Why?
 
Social Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesSocial Media: Perspectives from the Trenches
Social Media: Perspectives from the Trenches
 
Foundation Fieldbus - Control in the Field
Foundation Fieldbus - Control in the FieldFoundation Fieldbus - Control in the Field
Foundation Fieldbus - Control in the Field
 
pH Control Solutions - Greg McMillan
pH Control Solutions - Greg McMillanpH Control Solutions - Greg McMillan
pH Control Solutions - Greg McMillan
 
Wireless Measurement and Control - AIChE New Orleans
Wireless Measurement and Control - AIChE New OrleansWireless Measurement and Control - AIChE New Orleans
Wireless Measurement and Control - AIChE New Orleans
 
Split Range Control - Greg McMillan Deminar
Split Range Control - Greg McMillan DeminarSplit Range Control - Greg McMillan Deminar
Split Range Control - Greg McMillan Deminar
 
How to Setup and Adjust the Dynamic Compensation of Feedforward Signals
How to Setup and Adjust the Dynamic Compensation of Feedforward SignalsHow to Setup and Adjust the Dynamic Compensation of Feedforward Signals
How to Setup and Adjust the Dynamic Compensation of Feedforward Signals
 
Isa saint-louis-advanced-p h-short-course-day-2
Isa saint-louis-advanced-p h-short-course-day-2Isa saint-louis-advanced-p h-short-course-day-2
Isa saint-louis-advanced-p h-short-course-day-2
 
Isa saint-louis-advanced-p h-short-course-day-1
Isa saint-louis-advanced-p h-short-course-day-1Isa saint-louis-advanced-p h-short-course-day-1
Isa saint-louis-advanced-p h-short-course-day-1
 
Isa saint-louis-exceptional-opportunities-short-course-day-1
Isa saint-louis-exceptional-opportunities-short-course-day-1Isa saint-louis-exceptional-opportunities-short-course-day-1
Isa saint-louis-exceptional-opportunities-short-course-day-1
 
Isa saint-louis-exceptional-opportunities-short-course-day-2
Isa saint-louis-exceptional-opportunities-short-course-day-2Isa saint-louis-exceptional-opportunities-short-course-day-2
Isa saint-louis-exceptional-opportunities-short-course-day-2
 
Isa saint-louis-exceptional-opportunities-short-course-day-3
Isa saint-louis-exceptional-opportunities-short-course-day-3Isa saint-louis-exceptional-opportunities-short-course-day-3
Isa saint-louis-exceptional-opportunities-short-course-day-3
 
Social Media and Communities - Part 1
Social Media and Communities - Part 1Social Media and Communities - Part 1
Social Media and Communities - Part 1
 
Process Control Improvement Primer - Greg McMillan Deminar
Process Control Improvement Primer - Greg McMillan DeminarProcess Control Improvement Primer - Greg McMillan Deminar
Process Control Improvement Primer - Greg McMillan Deminar
 
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingSocial Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
 
PID Control of Runaway Processes - Greg McMillan Deminar
PID Control of Runaway Processes - Greg McMillan DeminarPID Control of Runaway Processes - Greg McMillan Deminar
PID Control of Runaway Processes - Greg McMillan Deminar
 

Recently uploaded

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 

Recently uploaded (20)

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 

Control System Cyber Security - A Different Approach

  • 1. Control System Cyber Security A different approach Bob Huba Sr. Product Manager Emerson Process Management
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.