Afzal Shabaz Mohammed, Head of Command & Control Team
· Our Contributors

Afzal Shabaz Mohammed, Head of Command & Control Team

Afzal Mohammed joined Siemens LLC in October 2010 and is Head of the MindSphere and Command & Control team for Expo 2020 at Siemens, since 2018. Until December 2017, he was Head of Business Development & Strategy of the Building Technologies Divisions for the Lower Gulf region, with a key role to drive strategy. Mohammed […]

Read more
Oliver Kraft, Executive Vice President
· Our Contributors

Oliver Kraft, Executive Vice President

Oliver Kraft is the Executive Vice President, Expo 2020 for Siemens LLC in Dubai, leading Expo-related project and account management activities since 2017. From 2014 until 2017, Oliver Kraft was Senior Vice President of Operational Excellence in Corporate Technology at Siemens AG, providing guidance on Manufacturing Optimization, Product Lifecycle Management, and Innovation Excellence, as well […]

Read more
The latest trends in IIoT micro-segmentation in the Smart Buildings
· Smart Buildings

The latest trends in IIoT micro-segmentation in the Smart Buildings

Find out how Penn State securely connected and isolated their building controls across 640 buildings in record time, using IIoT micro-segmentation. Download this case study sponsored by Tempered Networks.  Tom Walker, system design specialist, leads the FAS group which is responsible for maintaining the high availability, integrity, and confidentiality of building systems supporting nearly 150,000 students and University employees. […]

Read more
How to Regulate Cybersecurity of the Internet of Things
· Cybersecurity

How to Regulate Cybersecurity of the Internet of Things

I had the honor of speaking on IoT security policy at the annual CyberNextDC conference organized by the Cybersecurity Coalition.  As the number of connected devices grows and these devices are increasingly used to perpetrate “botnets”, global policymakers are under pressure to regulate the cybersecurity of the Internet of Things (IoT).  Below are just a […]

Read more
Protecting Smart Buildings from Cyber Attacks
· Cybersecurity

Protecting Smart Buildings from Cyber Attacks

It was an attack on a hospital like no other, reported the news in February 2016. The Hollywood Presbyterian Medical Center had been hacked. Its services were crippled. As emergency patients were diverted to other area hospitals, hospital administrators received an ominous message. Pay a ransom to get your hospital systems back. The hospital ultimately […]

Read more
[White paper] A new approach to cyber defense automation
· Cybersecurity

[White paper] A new approach to cyber defense automation

Cyber-attacks are a daily occurrence. While the largest attacks make intermittent headlines, the attacks as a whole are unrelenting. Day after day, hour after hour, our computer and network infrastructure, both enterprise and personal, are probed, scanned and attacked in attempts to penetrate and gain a foothold from which subsequent attacks can be staged.  The […]

Read more
Raphaël Gindrat, Co-Founder
· Our Contributors

Raphaël Gindrat, Co-Founder

Raphaël Gindrat is a cofounder of Bestmile and as CEO he is the executive leader of the company’s business and technical teams. He is a pioneer in the world of autonomous mobility, having led a project with Swiss Federal Institute of Technology (EPFL) in Lausanne with cofounder Anne Mellano to test and operate some of […]

Read more
Connected Data Will Help Shape Smart Manufacturing of the Future
· Connected Industry

Connected Data Will Help Shape Smart Manufacturing of the Future

Connected devices and the subsequent birth of the Internet of Things (IoT) have provided businesses a veritable treasure trove of data to mine, understand, and reapply to their own processes. And thus, the Industrial Internet of Things (IIoT) was born. Most enterprises today have only scratched the surface of what their connected device data can […]

Read more
Simple NIST cybersecurity Compliance for Manufacturing
· Cybersecurity

Simple NIST cybersecurity Compliance for Manufacturing

As industrial technology advances, manufacturers are increasingly using cloud, data analytics and mobile to improve their connectivity and infrastructure. This means a larger attack surface which creates a rich target for threats that cause physical damage, facility downtime, and breaches of customer data and intellectual property. To help manufacturing organizations reduce cybersecurity risk, NIST published […]

Read more
Golidlocks problem of mobile device security in organizations
· Cybersecurity

Golidlocks problem of mobile device security in organizations

Usability vs. Security The “Goldilocks and the three bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for organizations. The theme is trade-offs between usability of the device and security for confidential organizational […]

Read more
Chris Churilo, Director of Product Marketing
· Our Contributors

Chris Churilo, Director of Product Marketing

Chris Churilo is responsible for Product Marketing at InfluxData. Prior to joining InfluxData, she defined and designed a SaaS monitoring solution at Centroid, and prior to that she was the VP of product management at iPass and was the LOB for several cloud services that required her to track the business and operational metrics and […]

Read more
Alan Mihalic, Founder & President
· Our Contributors

Alan Mihalic, Founder & President

A senior Cyber Security Advisor and Risk professional with demonstrated expertise and success in cyber security, ICS security, cyber practice development,risk management, security architecture methodologies and principles supporting strategic enterprise security initiatives. Alan is currently President at the IoT Security Institute. Alan has a solid background in defining strategic IT security architectural road-maps and solutions […]

Read more