VIDEO: Grantek and Panduit on Cybersecurity – 3 Ways to Protect Manufacturing Operations from Malicious Foreign Threats

August 30, 2018

Grantek and Panduit present Complete Cybersecurity: 3 Ways to Go Beyond Compliance When Protecting Manufacturing Operations from Malicious Foreign Threats. Hear directly from Chris Hamilton, Grantek’s Director of Industrial IT/OT and Cybersecurity, and Jason Campbell, Panduit’s Industrial Automation Solutions Channel Account Manager.

Presented by Grantek’s Director of Industrial IT/OT and Cybersecurity, this video is the next installment of Thought Leadership in Cybersecurity and will cover the latest cyber threats to manufacturing operations, providing attendees with tangible insights and information to improve operations.

Key Takeaways:

  • Learn how the July threat assessment released by the Department of Homeland Security relates to manufacturing operations
  • Gain insights on how to proactively integrate physical and logical cybersecurity to mitigate threats and costly reactionary measures
  • Understand the emerging cybersecurity threats from malicious foreign actors
  • Production or Patching? Learn the best options to protect operations

About the Presenter: Chris Hamilton started his professional career in web design, databases, and server management with a focus in security at every level, but grew up around process flow and P&IDs in Biochemical Pharmaceuticals. In his roles at Grantek he has worked as a controls engineer, a systems engineer and an IT/OT consultant to bridge the gap between IT and Controls teams in order to help clients realize more efficient operations, leverage or implement standardized systems and most importantly understand the line between IT and OT and how it can and will shift with emerging technology and industry changes. He specifically focuses on the OT side today providing network assessments and road mapping a migration plan for a client’s legacy or inefficient hardware as part of a client provided, or jointly developed OSA (Manufacturing Operations Systems Architecture).

Copyright ©2022 Grantek

CONTACT US NOW
X