Watch IBM Cyber Beat Live - What if hackers took over our power grid?

(23 views)

 

 IBM Cyber Beat Live Website click here: Live Chat


The debate on the probability of hackers commandeering our power grid is alive and well, especially given the recent cyber attacks on Ukrainian and Israeli power grids. Although some experts argue that squirrels are more likely to cause a blackout than cyber crime, government experts say that “the nation’s critical infrastructure experienced a 20 percent increase in cyber incidents in the fiscal year 2015.” Plus, Ted Koppel paints a pretty dire and believable picture of what would happen if hackers gained control of our power grid.

Regardless of your opinion on this subject, join us here for our live discussion on February 16 at 1:00 PM ET as experts discuss the ramifications if cyber criminals attacked our power grid.

See the complete list of questions for our panel, and take a look at a variety of external resources.

 


Host

bobstasio200x_4Bob Stasio is a senior product manager of cyber analysis with IBM i2 Safer Planet. He brings nearly 14 years of expertise fighting top-tier malicious actors in the intelligence community, the US military, the National Security Agency (NSA) and the commercial sector. Stasio also served on the initial staff of US Cyber Command. During the troop surge of 2007, his intelligence unit supported the detainment of more than 450 high-value targets.

 

 

 

Guests

mannyMobolaji "Manny" Moyosore, head of security design, threat and vulnerability management, Tesoro Companies. An information security professional with 14 years of IT experience and over a decade of information security experience that cuts across multiple continents and industry verticals. Moyosore provides thought leadership, strategic direction, subject-matter expertise and innovative ideas on most effective ways of supporting and defending organizational crown jewels against unauthorized access, disclosure, destruction and alteration. His experience and skills span the full breadth of the information security domain, primarily focusing on information risk management, threat modeling, security architecture, vulnerability management, security policies and standards, and controls gap analysis.

photo-riley-michaelMichael Riley, reporter at Bloomberg News covers cyber security for Bloomberg News, Bloomberg Television and BloombergBusinessweek magazine. Among his groundbreaking work, Riley wrote the first profile of PLA Hacking Unit 61398 seven months before Mandiant's APT1 report; he broke the story of the massive JPMorgan Chase breach in the summer of 2014; and he co-authored the first account of the destruction of Sands Corp computers by Iranian hackers, a report later confirmed by Director of National Intelligence James Clapper in congressional testimony. Riley was named 2014 Business Journalist of the Year by Talking Biz News. He has won national journalism awards from many distinguished organizations, including the Overseas Press Club, the American Bar Association, Columbia University, and the Society of American Business Editors and Writers. Riley is the author of a 2012 investigative series on cyber-espionage, including a profile of the Shanghai-based Comment Group. Before coming to Bloomberg in 2010, he was a national reporter for the Denver Post for eight years, winning many journalism awards including the American Bar Association's Silver Gavel award, Columbia University's Paul Tobenkin Award and the Society of American Business Editors and Writers 'Best in Business' award.

Author

Hakin9 TEAM
Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023