Andrew Ginter demonstrates how Cyber-Informed Engineering protects consequence boundaries between IT and OT. He will share how deterministic, hardware-enforced protections eliminates pivoting attacks and strengthens safety and reliability.
Modern cyberattacks routinely bypass firewalls - thousands of ransomware incidents prove this. Consequence boundaries connect networks with vastly different risks: IT breaches cost money and require identity fraud insurance, while OT compromises risk mass casualties. Traditional cybersecurity standards overlook physical safeguards like mechanical pressure relief valves.
Cyber-Informed Engineering uses deterministic protections with predictable failure rates. Network engineering prevents attacks from moving across consequence boundaries using unidirectional gateways, hardware-enforced remote access and analog signals. These physically block malicious data flows - since all cyber sabotage requires information transfer, stopping information movement eliminates the threat.
The session will cover:
- What are consequence boundaries and why are deterministic, engineering-grade protections required?
- Key network engineering techniques and when each is most effective;
- How Cyber-Informed Engineering eliminates pivoting attacks and strengthens OT safety and reliability.
Here is the course outline:
Cyber-Informed Engineering: Protecting Critical Consequence Boundaries |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |
