Critical Infrastructure and SCADA Systems

By Tom Parker

Tom is recognized throughout the security industry for his research in multiple areas including adversary profiling and software vulnerability research & analysis. Tom has published more than four books on the topic of information security including Cyber Adversary Characterization: Auditing the Hacker Mind and is a contributor to the popular Stealing the Network series. Tom is a frequent speaker at conferences including a past speaker at Blackhat. Tom often lends his time to guest lecturing at Universities, involvement in community research initiatives, and is often called to provide his expert opinion to mass media organizations, including BBC News, CNN, Reuters News, Wired and Business Week.

The Cipher Brief’s Luke Penn-Hall spoke to Tom Parker, Chief Technology Officer for FusionX, at the annual Black Hat cybersecurity conference that took place in early August. Parker shared his view of the threat landscape to Supervisory Control and Data Acqusition (SCADA) systems and other critical industrial infrastructure.

The Cipher Brief: What would you say are the greatest threats to SCADA systems right now? How are these threats changing moving forward?

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+

Categorized as:CyberTagged with:

Related Articles

Search

Close