Cyber security webcast

This webcast will explain perceptions and challenges of cyber security and what this means for businesses and for workers in the future.


Now available for viewing on-demand.

Original broadcast was June 13, 2013.

Click here to register and view.

In 2009, Control Engineering released a survey to determine how industrial users perceive threats to their networks, and what steps they’ve taken to defend against cyber attackers. The results then suggested that companies were moving slowly in recognizing threats and preparing defenses, and one out of four industrial users reported that they saw no potential cyber threats that could affect their businesses. Much has happened in that world over the last four years, including Stuxnet and other high-profile disturbances in a variety of industries.

So the question is, have those perceptions changed in the face of what seems to be a more threatening landscape? A new cyber security perceptions and practices survey, available now, duplicates many of the questions from 2009, along with a few new ones that have emerged with the evolving picture. Take the survey here. How do you see the threat? How are you building your defenses?

The results of this new survey will be discussed by two industrial cyber security experts, Matt Luallen and Tim Conway, in a free webcast on June 13, and will be the basis for a Control Engineering article. Luallen is a cyber security trainer and consultant with Cybati and regular contributor to Control Engineering. Conway recently joined the SANS Institute as technical director, ICS and SCADA. Prior to that, he was director of NERC compliance and operations technology at NIPSCO. Peter Welander, Control Engineering editor, will moderate the discussion. The participants will provide situational analysis and suggestions based on the responses. You can make your voice heard in the discussion, and pick up some practical pointers for protecting yourself. When you register for the webcast, please include questions or specific topics you would like to see the presenters address.


  • Matt Luallen, Cyber Security Trainer and Consultant with Cybati
  • Tim Conway, Technical Director, ICS and SCADA with SANS Institute

Moderator: Peter Welander, Content Manager and Moderator, Control Engineering

Sponsors: Belden, Honeywell

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
Industrial wireless cyber security: More complex than black and white; IIoT at the I/O level; Process modeling; Cyber security research
Robotic advances: Software, form factors; System-based ROI; Embedded control; MES and information integration; SCADA and cyber security; Position sensor; Controller, I/O module
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security
Cyber security attack: The threat is real; Hacking O&G control systems: Understanding the cyber risk; The active cyber defense cycle