About
Andrew Ginter is the VP Industrial Security at Waterfall Security Solutions, a co-host of…
Articles by Andrew
Activity
-
The word “secure” in the widely used secure remote access (SRA) name is a misnomer – security is a spectrum not a pair of discrete states. Nothing…
The word “secure” in the widely used secure remote access (SRA) name is a misnomer – security is a spectrum not a pair of discrete states. Nothing…
Posted by Andrew Ginter
-
Join Jørgen E. Hartig of SecuriOT ApS and Andrew Ginter for next week's webinar, “Analyzing Recent NIS2 Regulations". ➡️…
Join Jørgen E. Hartig of SecuriOT ApS and Andrew Ginter for next week's webinar, “Analyzing Recent NIS2 Regulations". ➡️…
Liked by Andrew Ginter
Experience
Education
Licenses & Certifications
-
Information Technology Certified Professional (ITCP)
International Professional Practice Partnership (IP3)
Issued -
Certified Information Systems Security Professional (CISSP)
International Information Systems Security Certification Consortium (ISC)2
Issued -
Information Systems Professional (ISP)
Canadian Information Processing Society (CIPS)
Issued
Volunteer Experience
-
Steering Committee Member
Level Zero OT Cyber Security Conference
- Present 1 year 3 months
Science and Technology
Provide program guidance
Publications
-
Secure Operations Technology
Abterra Technologies Inc.
See publicationIT-SEC protects the information. SEC-OT protects physical, industrial operations from information, more specifically from attacks embedded in information. When the consequences of compromise are unacceptable – unscheduled downtime, impaired product quality and damaged equipment – software-based IT-SEC defences are not enough. Secure Operations Technology (SEC-OT) is a perspective, a methodology, and a set of best practices used at secure industrial sites. SEC-OT demands cyber-physical…
IT-SEC protects the information. SEC-OT protects physical, industrial operations from information, more specifically from attacks embedded in information. When the consequences of compromise are unacceptable – unscheduled downtime, impaired product quality and damaged equipment – software-based IT-SEC defences are not enough. Secure Operations Technology (SEC-OT) is a perspective, a methodology, and a set of best practices used at secure industrial sites. SEC-OT demands cyber-physical protections - because all software can be compromised. SEC-OT strictly controls the flow of information – because all information can encode attacks. SEC-OT uses a wide range of attack capabilities to determine the strength of security postures - because nothing is secure. This book documents the Secure Operations Technology approach, including physical offline and online protections against cyber attacks and a set of twenty standard cyber-attack patterns to use in risk assessments.
-
The Top 20 Cyberattacks on Industrial Control Systems
Waterfall Security Solutions
See publicationThis paper proposes that cyber risk be communicated as a Design Basis Threat (DBT) line drawn through a representative “Top 20” set of cyber attacks spread across a spectrum of attack sophistication. These Top 20 attacks have been selected to represent cyber threats to industrial sites across a wide range of circumstances, consequences and sophistication. Many industrial cyber risk practitioners will find the list useful as-is, while expert practitioners may choose to adapt the list to their…
This paper proposes that cyber risk be communicated as a Design Basis Threat (DBT) line drawn through a representative “Top 20” set of cyber attacks spread across a spectrum of attack sophistication. These Top 20 attacks have been selected to represent cyber threats to industrial sites across a wide range of circumstances, consequences and sophistication. Many industrial cyber risk practitioners will find the list useful as-is, while expert practitioners may choose to adapt the list to their more detailed understanding of their own sites’ circumstances.
-
SCADA Security - What's broken and how to fix it
Abterra Technologies Inc.
See publicationModern attacks routinely breach SCADA networks that are defended to IT standards. This is unacceptable. Defense in depth has failed us. In "SCADA Security" Ginter describes this failure and describes an alternative. Strong SCADA security is possible, practical, and cheaper than failed, IT-centric, defense-in-depth. While nothing can be completely secure, we decide how high to set the bar for our attackers. For important SCADA systems, effective attacks should always be ruinously expensive and…
Modern attacks routinely breach SCADA networks that are defended to IT standards. This is unacceptable. Defense in depth has failed us. In "SCADA Security" Ginter describes this failure and describes an alternative. Strong SCADA security is possible, practical, and cheaper than failed, IT-centric, defense-in-depth. While nothing can be completely secure, we decide how high to set the bar for our attackers. For important SCADA systems, effective attacks should always be ruinously expensive and difficult. We can and should defend our SCADA systems so thoroughly that even our most resourceful enemies tear their hair out and curse the names of our SCADA systems' designers.
-
Industrial Internet Consortium Security Framework
Industrial Internet Consortium
See publicationIIC members have developed a common security framework and an approach to assess cybersecurity in Industrial Internet of Things systems. A true collaborative project in every sense of the word, The Industrial Internet Security Framework (IISF) is the most in-depth cross-industry-focused security framework comprising expert vision, experience and security best practices. It reflects thousands of hours of knowledge and experiences from security experts, collected, researched and evaluated for the…
IIC members have developed a common security framework and an approach to assess cybersecurity in Industrial Internet of Things systems. A true collaborative project in every sense of the word, The Industrial Internet Security Framework (IISF) is the most in-depth cross-industry-focused security framework comprising expert vision, experience and security best practices. It reflects thousands of hours of knowledge and experiences from security experts, collected, researched and evaluated for the benefit of all IIoT system deployments.
Languages
-
English
Native or bilingual proficiency
-
German
Limited working proficiency
More activity by Andrew
-
In a recent webinar I was asked... "How common is it for, utility-scale solar or wind systems to be exposed to the internet? Isn’t Internet…
In a recent webinar I was asked... "How common is it for, utility-scale solar or wind systems to be exposed to the internet? Isn’t Internet…
Liked by Andrew Ginter
-
All members of the European Union (EU) are issuing new regulations to comply with the NIS2 directive, and some of the new rules are rather confusing.…
All members of the European Union (EU) are issuing new regulations to comply with the NIS2 directive, and some of the new rules are rather confusing.…
Posted by Andrew Ginter
-
2024’s cyber attacks with physical consequences continue to disproportionately impact the transportation and discrete manufacturing industries…
2024’s cyber attacks with physical consequences continue to disproportionately impact the transportation and discrete manufacturing industries…
Shared by Andrew Ginter
-
📣 OT Security Job Alert 🚨 The Google Data Center team has 2 OT Security jobs open. 1️⃣ Technical Program Manager, Operational Technology Cyber…
📣 OT Security Job Alert 🚨 The Google Data Center team has 2 OT Security jobs open. 1️⃣ Technical Program Manager, Operational Technology Cyber…
Liked by Andrew Ginter
-
Very much enjoyed attending the Dragos, Inc. OT Thought Leadership Event. It was great reconnecting with familiar faces: asset owners, operators, and…
Very much enjoyed attending the Dragos, Inc. OT Thought Leadership Event. It was great reconnecting with familiar faces: asset owners, operators, and…
Liked by Andrew Ginter
-
Lessons Learned From Incident Response | Industrial Security Podcast How did they get in? How did we find them when they got in? What can we do in…
Lessons Learned From Incident Response | Industrial Security Podcast How did they get in? How did we find them when they got in? What can we do in…
Shared by Andrew Ginter
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Andrew Ginter in Canada
4 others named Andrew Ginter in Canada are on LinkedIn
See others named Andrew Ginter