Andrew Ginter

Andrew Ginter

Calgary, Alberta, Canada
9K followers 500+ connections

About

Andrew Ginter is the VP Industrial Security at Waterfall Security Solutions, a co-host of…

Articles by Andrew

See all articles

Activity

Join now to see all activity

Experience & Education

  • Waterfall Security Solutions

View Andrew’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

  • Information Technology Certified Professional (ITCP)

    International Professional Practice Partnership (IP3)

    Issued
  • Certified Information Systems Security Professional (CISSP)

    International Information Systems Security Certification Consortium (ISC)2

    Issued
  • Information Systems Professional (ISP)

    Canadian Information Processing Society (CIPS)

    Issued

Publications

  • Secure Operations Technology

    Abterra Technologies Inc.

    IT-SEC protects the information. SEC-OT protects physical, industrial operations from information, more specifically from attacks embedded in information. When the consequences of compromise are unacceptable – unscheduled downtime, impaired product quality and damaged equipment – software-based IT-SEC defences are not enough. Secure Operations Technology (SEC-OT) is a perspective, a methodology, and a set of best practices used at secure industrial sites. SEC-OT demands cyber-physical…

    IT-SEC protects the information. SEC-OT protects physical, industrial operations from information, more specifically from attacks embedded in information. When the consequences of compromise are unacceptable – unscheduled downtime, impaired product quality and damaged equipment – software-based IT-SEC defences are not enough. Secure Operations Technology (SEC-OT) is a perspective, a methodology, and a set of best practices used at secure industrial sites. SEC-OT demands cyber-physical protections - because all software can be compromised. SEC-OT strictly controls the flow of information – because all information can encode attacks. SEC-OT uses a wide range of attack capabilities to determine the strength of security postures - because nothing is secure. This book documents the Secure Operations Technology approach, including physical offline and online protections against cyber attacks and a set of twenty standard cyber-attack patterns to use in risk assessments.

    See publication
  • The Top 20 Cyberattacks on Industrial Control Systems

    Waterfall Security Solutions

    This paper proposes that cyber risk be communicated as a Design Basis Threat (DBT) line drawn through a representative “Top 20” set of cyber attacks spread across a spectrum of attack sophistication. These Top 20 attacks have been selected to represent cyber threats to industrial sites across a wide range of circumstances, consequences and sophistication. Many industrial cyber risk practitioners will find the list useful as-is, while expert practitioners may choose to adapt the list to their…

    This paper proposes that cyber risk be communicated as a Design Basis Threat (DBT) line drawn through a representative “Top 20” set of cyber attacks spread across a spectrum of attack sophistication. These Top 20 attacks have been selected to represent cyber threats to industrial sites across a wide range of circumstances, consequences and sophistication. Many industrial cyber risk practitioners will find the list useful as-is, while expert practitioners may choose to adapt the list to their more detailed understanding of their own sites’ circumstances.

    See publication
  • SCADA Security - What's broken and how to fix it

    Abterra Technologies Inc.

    Modern attacks routinely breach SCADA networks that are defended to IT standards. This is unacceptable. Defense in depth has failed us. In "SCADA Security" Ginter describes this failure and describes an alternative. Strong SCADA security is possible, practical, and cheaper than failed, IT-centric, defense-in-depth. While nothing can be completely secure, we decide how high to set the bar for our attackers. For important SCADA systems, effective attacks should always be ruinously expensive and…

    Modern attacks routinely breach SCADA networks that are defended to IT standards. This is unacceptable. Defense in depth has failed us. In "SCADA Security" Ginter describes this failure and describes an alternative. Strong SCADA security is possible, practical, and cheaper than failed, IT-centric, defense-in-depth. While nothing can be completely secure, we decide how high to set the bar for our attackers. For important SCADA systems, effective attacks should always be ruinously expensive and difficult. We can and should defend our SCADA systems so thoroughly that even our most resourceful enemies tear their hair out and curse the names of our SCADA systems' designers.

    See publication
  • Industrial Internet Consortium Security Framework

    Industrial Internet Consortium

    IIC members have developed a common security framework and an approach to assess cybersecurity in Industrial Internet of Things systems. A true collaborative project in every sense of the word, The Industrial Internet Security Framework (IISF) is the most in-depth cross-industry-focused security framework comprising expert vision, experience and security best practices. It reflects thousands of hours of knowledge and experiences from security experts, collected, researched and evaluated for the…

    IIC members have developed a common security framework and an approach to assess cybersecurity in Industrial Internet of Things systems. A true collaborative project in every sense of the word, The Industrial Internet Security Framework (IISF) is the most in-depth cross-industry-focused security framework comprising expert vision, experience and security best practices. It reflects thousands of hours of knowledge and experiences from security experts, collected, researched and evaluated for the benefit of all IIoT system deployments.

    See publication

Languages

  • English

    Native or bilingual proficiency

  • German

    Limited working proficiency

More activity by Andrew

View Andrew’s full profile

  • See who you know in common
  • Get introduced
  • Contact Andrew directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Andrew Ginter