|Paul W. Brager Jr., Technical Product Security
Mr. Paul W. Brager, Jr has been a contributing member of the cyber security community for over twenty-three (23) years, with expert level knowledge of security architecture and defense-in-depth design, critical infrastructure/industrial cyber, IoT, and IIoT. He has extensive cyber experience in the oil and gas, manufacturing, power utility, chemical, banking and telecommunications sector. In his current capacity as a Technical Product Security Leader, Digital Technology with Baker Hughes, a GE Company, Paul works closely with oil and gas, energy, and internal clients to integrate cyber security capabilities and strategies into their critical manufacturing and operating infrastructure lifecycles. His efforts enable customers and internal clients to weave defense-in-depth cyber strategies into the overall design of products and solutions, thereby contributing to the oil and gas industry’s ability to have a more defensible posture against some of the world’s most complex adversaries. Paul holds a Bachelor of Science degree from Texas A&M University in Political Science, with a minor in Business, a Master’s of Science in Administration of Justice and Security (Criminal Justice/Cyber fusion) from the University of Phoenix, and is an Alpha Phi Sigma (National Criminal Justice Honor Society) inductee since 2009. Mr. Brager is CISSP, GICSP and CISM certified, in addition to serving as an adjunct professor with the University of Phoenix, teaching cyber security courses within the IS&T program, and providing course module support to a number of education bodies, and other related endeavors. He is currently involved as a non-voting board member of ISSA (South Houston Chapter), ISA-99 Working Committee member, ICSJWG committee member and contributor, ISA, InfraGard (O&G and Power Utility SIGs), OWASP, ISACA, ISC2, NSBE and various other focus groups and cyber-focused organizations.
Defending Critical Infrastruture: Know Thy Enemy
As a matter of national security, defending America’s critical infrastructure is of paramount concern. Years of neglect and indifference, coupled with rapid expansion of internet connectivity and capability have exponentially expanded the threat landscape for ICS, and left organizations struggling to secure infrastructure once generally subject to physical attacks and misconfiguration. Nation state actors from the prime four: Iran, North Korea, Russia, and China – have launched campaigns and efforts to map with the intent to destabilize America’s critical infrastructure. To defend against these efforts, we have to understand the methods used to infilitrate and gather reconnaissance, and ultimately disrupt our critical infrastructure.
Schedule of Events