, –pm EST with Raef Meeuwisse, Cybersecurity Expert and Author
Production environments and critical infrastructure were once kept so locally isolated and managed that compromising their security was unthinkable. It now seems that anything from manufacturing facilities, hospitals, power stations and even pipelines can be brought down or held to ransom with a single keystroke.
In this on-demand webinar Raef Meeuwisse, an OT Cybersecurity Expert, analyzes the root causes of some of the largest security failures that have caused wide-scale disruption and even death in manufacturing, clinical and industrial control systems (operational technology) environments.
What are the most critical vulnerabilities that, if left to fester, are most likely to lead to an Operational Technology (OT) environment’s compromise?
Raef Meeuwisse is one of the most popular authors in the field of cyber-security and social engineering. Raef’s titles include the global best-seller, ‘Cybersecurity for Beginners’, the frequently evolving ‘Cybersecurity to English Dictionary’ and ‘How to Hack a Human’; an exploration of how easily us humans can be controlled and influenced. His experience includes running eight digit security budgets, consulting on security at over 50 different organisations, designing a multi-million-pound security software platform, training as a hypnotist (yes, you read that correctly) and occasionally flying helicopters.
In addition to making public appearances at countless conferences across Europe, the UK and the US, he is also a frequent provider of commentary for multiple technologies and mainstream news outlets and has appeared in Infosec magazine, ZDNet, TechTarget, TEISS and on Sky News.
Tal Guest is a Director of Product Management with over 20 years of industry experience. He directs a group of product managers, responsible for expanding privileged access management core capabilities in the areas of remote access and the service desk. Tal also helps establish long-term business strategies based on current/future market conditions and problems faced in the privileged access management area of cybersecurity.