IAES: Guarding the University of Arizona's Heartbeat – The Watchful Eye on Critical Infrastructure

Presented at CactusCon 12 (2024), Feb. 17, 2024, 10:30 a.m. (60 minutes).

Dive into the cutting-edge world of passive network monitoring with the Industrial Asymmetric Environment Surveillance (IAES) research project, a beacon at The University of Arizona in the vast sea of digital threats. As the digital age advances, the demand for vigilant systems grows, systems that detect even the faintest hints of compromise, misconfiguration, or misuse in vital network infrastructures. Our initial focus is the power generation environment. Discover how IAES expertly navigates through network control data across a myriad of hardware and software landscapes. Uncover the strategies IAES employs to safeguard the University of Arizona's core services, ensuring that the rhythm of daily operations remains undisturbed. Join us as we delve into the intricacies of identifying, mitigating, and staying a step ahead in the dynamic world of digital security.

Presenters:

  • Michael Galde - University of Arizona, Assistant Professor
    Michael Galde is a career-track assistant professor of practice for the cyber operations program at the College of Applied Science and Technology (CAST) at the University of Arizona. Before being appointed as a full-time faculty in 2020, Michael worked in industrial control systems research at the Nebraska Applied Research Institute (NARI) in Omaha, Nebraska as a cybersecurity engineer II. As a contractor, Michael previously worked as an intelligence analyst with the Defense Intelligence Agency (DIA), where he developed digital tools and procedures in the agency’s prisoner of war / missing in action (POW/MIA) mission. Michael earned a Master of Science in Cybersecurity at the University of Nebraska in 2019 and a Bachelor of Science in Political Science in 2013. Michael’s research areas of interest include developing automated recovery of industrial control systems, increasing Industrial network visibility to aid intrusion detection systems, and cyber security implementations.

Links:

Similar Presentations: