Since 2017, the SANS ICS/OT Cybersecurity Survey has been a foundational benchmark for critical infrastructure asset owners and operators. On this webcast, SANS Certified Instructor Jason Christopher explores the growing trends in cyber threats, vulnerabilities, and risks across industrial environments, including actionable recommendations for how organizations can improve their security posture. As global incidents—and regulations—continue to focus on ICS/OT cybersecurity, it is vital that actionable information and benchmarks are provided to defenders working in this challenging field as they evaluate their ongoing efforts in 2024.
SPEAKER:
Jason Christopher
VP of Cybersecurity and Digital Transformation for Research & Innovation, Energy Impact Partners (EIP)
Over the past 20 years, Jason D. Christopher has worked across multiple industries in unique roles ranging from engineering to incident response and national security. Most notably, Jason was the federal technical lead for the NERC CIPv5 while at the Federal Energy Regulatory Commission, where he was involved in several rulemakings and policy statements. Jason was also the program lead for the U.S. Department of Energy Cybersecurity Capability Maturity Model (C2M2). He has served as a C-level executive, security researcher, and incident responder across his career. He previously held the role of Director of Cyber Risk for Dragos, Inc. Today, Jason is the Vice President of Cybersecurity and Digital Transformation for Research & Innovation at Energy Impact Partners (EIP). Jason has been invited to speak before the U.S. Congress on several occasions.
SPEAKER:
Vince Stoffer
Senior Director of Product Management, Corelight
Vince Stoffer is Senior Director of Product Management at Corelight and previously held security engineering and network management positions at Lawrence Berkeley National Laboratory and before that served as a network security engineer at Reed College. Vince holds the CISSP, GCIH and GCIA certifications.
Corelight provides security teams with network evidence so they can protect the world's most critical organizations and companies.