Cybersecurity vulnerabilities in firmware or software code typically require deep understanding and specific coding language(s) knowledge to exploit. Such vulnerabilities are effective targets for state-level exploitation and occasionally skilled scripting exploitation amateurs. Far more exploitable and far more common however, are the weaknesses within data infrastructure and their operation, resulting from improper design, ineffective Operation, Administration and Maintenance and the resulting system entropy.

For most businesses improper design and unintended or even well intentioned but mis-guided human powered OA&M, cause far more loss of system stability, availability, and revenue than intentional malicious code exploits. You will read in these publications that I and my teams apply validated designs, implementation and sustainment process techniques to elevate the prospect of creating reliable, secure and sustainable systems from a desired outcome, to a certainty.


Co-Author
- 'Utilities Must Constantly Be on Offense in Cat-and-Mouse Game Against Hackers', Black & Veatch, Strategic Directions Smart Utilities Report, March 2020 ©

BV Smart Utilities Report 2020

BV Smart Utilities Report 2020 pg 1
BV Smart Utilities Report 2020 pg 2

BV Smart Utilities Report 2020 pg 3

BV Smart Utilities Report 2020 pg 4

BV Smart Utilities Report 2020 pg 5

Quoted Industry Subject Matter Expert
- 'War Games', Oklahoma Living, February 2020 ©

Pasted Graphic

Pasted Graphic 1


Co-Author
- 'NERC CIP Low-Impact Compliance Drives Opportunity to Improve Operational Technology Security', Black & Veatch, Strategic Directions Smart Utilities Report, February 2019 ©

Pasted Graphic

SDR 2019 1

SDR 2019 2


Quoted Industry Subject Matter Expert - BIZJOURNALS, 'Black & Vetch Publishes Field Study of Radiflow's iSID',
https://www.bizjournals.com/prnewswire/press_releases/2017/05/10/enUK201705101322 May
2017 ©

Cybersecruity OEM Field Evaluation Service


Author - 'Secure Utilities Start with Secure Networks', Black & Veatch, Web Portal /Home/Insights/ExpertPerspectives/Cybersecurity, February 2017 ©
https://www.bv.com/insights/expert-perspectives/cybersecurity#
Screen Shot 2017-03-11 at 5.02.35 PM

Screen Shot 2017-03-11 at 5.03.03 PM

Contributing Author - 'Strategic Directions: U.S. Smart City/Smart Utility Report - Grid Modernization - Maximizing Smart Grid Deployments Through Communications and Network Modernization', Black & Veatch, February 2017 ©
BV SDR 2017 Cover Page

BV SDR 2017 Page 48

BV SDR 2017 Page 49

BV SDR 2017 Page 50

BV SDR 2017 Page 51

Author - 'Converging Utility Data Networks with MPLS VPN’s’, UTC Journal, 4th Qtr, 2011©

UTC IP MPLS Cover

UTC IP MPLS Text pag1 1

UTC IP MPLS Text pag1 2

UTC IP MPLS Text pag1 3

UTC IP MPLS Text page 4


Author
‘Deploying Effective Port Security in Utility Networks’, UTC Journal, 4th Qtr 2012 ©

UTC Port Security Cover Page

UTC Port Security Page 1

UTC Port Security Page 2

UTC Port Security Page 3

UTC Port Security Page 4

UTC Port Security Page 5

UTC Port Security Page 6


Contributing Author
- ‘IP Transitions’ White Paper, MPLS and network modernization topics, Utilities Telecom Council, February, 2015 ©

UTC IP Transistions Cover

UTC IP Transistions Authors List

UTC IP Transistions MPLS Section Page 1

UTC IP Transistions MPLS Section Page 2

UTC IP Transistions MPLS Section Page 3

UTC IP Transistions MPLS Section Page 4


Contributing Author - 'Strategic Directions: U.S. Smart City/Smart Utility Report' - Looming Security Rules Raising Urgent Questions for Utilities', Black & Veatch, February 2016 ©

Smart City Strategic Directions 2016 Smart City

Looming Security Rules 2016 Strategic Directions Smart City Page 1

Looming Security Rules 2016 Strategic Directions Smart City Page 3

Quoted Industry Subject Matter Expert
- FINCHANNEL.com, Industry Disruptors, Cisco Systems ©

FINCHANNEL.com.Industry Disruptors Cisco Systems Quote 2015


Invited Panelist/Presenter
'Network Infrastructure, Kansas Legislative Systems Strategic Plan (e-Democracy Strategies)', United States House of Representatives Executive Staff briefing

KLISS Briefing to U.S. House Staff Cover 2008

KLISS Briefing to U.S. House Staff Participants 2008

This site uses no tracking mechanisms of any kind - your privacy matters!