Skip to content
Manufacturing

Protecting Critical Consequence Boundaries


Course
Upgrade subscription below

Andrew Ginter demonstrates how Cyber-Informed Engineering protects consequence boundaries between IT and OT. He will share how deterministic, hardware-enforced protections eliminates pivoting attacks and strengthens safety and reliability.

Modern cyberattacks routinely bypass firewalls - thousands of ransomware incidents prove this. Consequence boundaries connect networks with vastly different risks: IT breaches cost money and require identity fraud insurance, while OT compromises risk mass casualties. Traditional cybersecurity standards overlook physical safeguards like mechanical pressure relief valves.

Cyber-Informed Engineering uses deterministic protections with predictable failure rates. Network engineering prevents attacks from moving across consequence boundaries using unidirectional gateways, hardware-enforced remote access and analog signals. These physically block malicious data flows - since all cyber sabotage requires information transfer, stopping information movement eliminates the threat.

The session will cover:

  • What are consequence boundaries and why are deterministic, engineering-grade protections required?
  • Key network engineering techniques and when each is most effective;
  • How Cyber-Informed Engineering eliminates pivoting attacks and strengthens OT safety and reliability.
 

 

Here is the course outline:

Cyber-Informed Engineering: Protecting Critical Consequence Boundaries

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button