|Wm. Arthur Conklin, PhD, CEO

Experienced Information Systems Security professional, software development,systems science and information security. GICSP, GCFA, CISSP, CSSLP, CRISC, CASP, CSDP, DFCP. Specialties: Information systems security management, network and systems security, intrusion detection and intrusion detection monitoring, penetration testing, Incident Response, security policy and procedures, risk/threat assessments, Security training/awareness, user interface design and evaluation, FISMA, Secure code design/software engineering, Cyberphysical systems security, security metrics.
Square pegs and round holes: Forcing IT on methods is not a good fit
Cybersecurity is the field of securing our digital assets, usually thought of as IT assets. In today’s world, we haveÊ wide range of digital in our IT enterprises, but we have even more data in our non-IT systems. There is a whole host of other connected systems from plant operations to medical equipment to transportation systems and more. Commonly grouped under a set of operational technology (OT) vice IT components, security is just as important in this environment as it is in IT systems, but it is done differently. How are these environments different than standard business IT system environments and what does this mean with respect to security?
Schedule of Events