JP Haywood

Thumbnail for post.

As a Lead Security Consultant at Acumenis, JP actively supports organisations in identifying security risks and implementing controls and frameworks to enhance their security posture. This includes assisting organisations implement and test incident management procedures, as well as working with them when responding to real events.

JP’s experience includes working as an Information Security Manager at an Australian bank. During this time, JP achieved notable milestones, such as establishing an Information Security team and Security Operation Centre. JP’s professional qualifications include certifications in cyber operations, ethical hacking, incident response, and vulnerability management.

JP also actively engages with the Information Security community, contributing through organising local SecTalks chapter meetups, participates as a speaker at conferences, events, and podcasts, and is a mentor in the Australian Women in Security Network mentoring program.

Security Assurance In the Internet of Things

Overview

IoT, IIoT, embedded devices, and control systems face unique challenges as compared to traditional corporate ICT infrastructure. And while approaches to ICT security assurance has advanced over recent years, IoT is still rapidly growing. Building mature security strategies for IoT infrastructure presents many unique challenges for both vendors and organisations. This presentation will look at emerging standards, methodologies, and approaches to securing and testing IoT infrastructure.

Outline

This webinar will cover the following topics:

  • Setting the Stage for IoT Security  
  • Assurance Strategies  
  • Risk Management 
  • Security Program Development  
  • Security Architecture  
  • Open questions 

Network Security for IoT & IIoT Environments

Thumbnail for post.

Overview

In this course, Bruce will discuss cyber security references, standards and architectures regarding the network security of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT). Given the constraints of things, security often relies on the underlying security of the transport network, but this can be challenging with different network deployment models and different architectural approaches. This course will share ideas and suggestions for network operators to consider when securing networks that support things.

Outline

This course will cover the following topics:

  • Overview of Internet of things (IoT) & Industrial internet of things (IIoT) Architectures
  • Overview of Security Standards and References for Internet of things (IoT) Network Security
  • Different Network Deployment Models and security requirements

Course Materials

Bruce Large

Thumbnail for post.

Bruce is the Principal Operational Technology (OT) Cyber Security Architect at CyberCX and he has 14 years of experience working with IT and OT in network and system engineering roles. Bruce has worked in Electricity Generation, Railway, Aviation, Emergency Services and Consulting industries. ​

Bruce is a Foundation Chartered SABSA Architect (SCF), holds the GIAC Response and Industrial Defense (GRID) certificate and has attended Industrial Control Systems (ICS) Cyber Security training at QUT. He also graduated with a Bachelor of Engineering (Telecommunications) First Class Honours and a Master of Business (Applied Finance) with Distinction from QUT. ​

Richard Sims

Thumbnail for post.

Having worked in Information Technology for over a decade, Richard has provided security consulting services throughout Australia to state and local government agencies and to large enterprise organisations. He has been responsible for assessing and guiding remediation on critical infrastructure. He has extensive experience across many areas of Cyber Security, including delivering web, API and infrastructure penetration testing, cloud and on-premise security architecture reviews, security operation centre maturity gap analysis and process mapping, information security management system gap analysis, threat risk assessments for business process software and system architecture implementations, and business mapping and modelling of managed service providers.