Wherever an IP packet flows, there too is a cybersecurity consideration.
Where do IP packets flow in modern critical infrastructure?

EVERYWHERE



Presenter, LinkedIn Live Event
Co-creator and presenter for live cybersecurity discussion, 'Cybersecurity Resilience: Strategies for Water and Grid Infrastructure'. Discussion focused on steps to establishing long-term cyber posture enhancement through established frameworks and latest thinking regarding the importance of People and Process - Recorded November 2023

Committee Leader and Contributor NERC CIP 013 Supply Chain Risk Management - Vendor Incident Response Guide. Coordinate a team of electric industry contributors. Goal is to revise existing guidance documentation in support of energy entities supporting the U.S. Bulk Electric System (BES) - estimated completion, Published December 2023

Author
IEEE Monthly Bulletin, 'Ransomware: A Change Would Do Us Good'. Short article promoting a change in approach to over-reliance on cybersecurity hygiene approaches for cyber attack defense. The article suggests that overall network architecture, people and process aspects are equally important and should be emphasized in Cyber Attack For Ransom (CAFR) event response planning - Published November 2022

Subject Matter Expert, Interview with Recommendations, Authority Magazine, Medium.com Webzine – 'Ransomware Attacks - 5 Things You Need To Do To Protect Yourself Or Your Business' – published, 1st Qtr 2022

Contributing Author 'Digitization at the Heart of Cybersecurity, Asset Management'. Black & Veatch Insights Group Electric Report - Published March 2022

Co-Author, Customer Information Handling Cybersecurity Briefing Document Develop and produce a briefing document for a large technology consulting organization helping define operations tools that protect client program and project information during pursuit and execution. Protections address best-practice approaches for general information sharing access controls; Microsoft SharePoint use; Cloud-based project tool information processing - Published December, 2020

Contributing Author
'Utilities Must Constantly Be On Offense in Cat-and-Mouse Game Against Hackers'. Discusses how utilities must not play an offensive role in cyber event interactions but rather be constantly vigilant, fluent in their understanding of OT operations and infrastructure, Black & Veatch Insights Group Strategic Directions Report, Utilities - Published June 2020

Subject Matter Expert, Interview with Recommendations, Black & Veatch, 'Utility Networks_ The First Line of Defense' Recorded, March 2019

Contributing Author 'NERC CIP Low-Impact Compliance Drives Opportunity to Improve Operational Technology Security', Black & Veatch Insights Group Strategic Directions, Utilities - Published February 2019

Official Reviewer – National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE) SP 1800-2 - Identity and Access Management Practice Guide for Electric Utilities, WERB Draft - Published February 2016

Co-Author 'Do You Want to Play a Game?', refined case-study examination for a hybrid live-fire cybersecurity exercise performed in cooperation with multi-state electric utility cooperative in 2017, presented at DistribuTech, San Antonio, TX - Published 2018

Contributing Author ‘2017 Strategic Directions: U.S. Smart City/Smart Utility Report - Maximizing Smart Grid Deployments Through Communications and Network Infrastructure', Black & Veatch Insights Group Strategic Directions, Published February 2017

Contributing Author ‘U.S. Smart City/Smart Utility Report - Looming Security Rules Raising Urgent Questions for Utilities', Black & Veatch 2016 Insights Group Strategic Directions - Published February 2016

Contributing Author ‘IP Transitions’ White Paper, MPLS and network modernization topics, Utilities Telecom Council, Published February, 2015

Author‘Network Virtualization in a Physical World’ - Utility Sector White Paper - Published 4th Qtr 2013 (Unpublished)

Author‘Deploying Effective Port Security in Utility Networks’, UTC Journal - Published 4th Qtr 2012

Author'Converging Utility Data Networks with MPLS VPN’s’, UTC Journal - Published 4th Qtr, 2011

Author and Presenter'Network Migration Architectures and Strategies', State of Kansas Technology Advisory Board (ITAB), Topeka, KS, - 2010