ICS Cybersecurity Training
ICS-specific cyber training remains a strategic gap for the United States, while the critical dependence on ICS to underpin success in our strategic initiatives grows. We will examine the current state of training, ongoing initiatives to close this gap, and the continued need for growth in this area.
VP, Global Training & Field Enablement, Fortinet
Rob is a graduate of the Telfer Executive MBA program (University of Ottawa) and has more than 20 years of experience in the high tech sector. The majority of Rob's career has been spent with some of the most innovative companies in the cyber security industry including Fortinet, Trend Micro, Entrust and others. In his current role as Vice President with Fortinet, Rob is responsible for a variety of global programs to ensure that customers, partners and employees have the tools, education and support they need to be effective in their jobs. As an advocate for training and education Rob has been involved in a variety of education initiatives and has played key roles in the development of some of the largest personnel certification programs in the cyber security field. This includes vendor specific programs such as the Fortinet Network Security Expert program which has issued more than ½ million certifications to cyber security professional globally, and vendor neutral programs such as the well-known CompTIA Security+.
As an educator at heart, Rob understands the need for strong linkages between business, government and academia. This is demonstrated through volunteer work and ongoing development of strategic partnerships. Examples include the “National Academic Challenge” - a program spearheaded by Rob with the Canadian Standards Association and academic institutions across Canada, and a volunteer research project co-lead by Rob for the Canadian Department of Foreign Affairs and International Trade on the promotion of Canadian education in foreign markets.
Moderator: Nicholas Andersen
Principal Deputy Assistant Secretary for Cybersecurity, Energy Security, and Emergency Response, U.S. Department of Energy (DOE)
Prior to joining the Department of Energy, Nick Andersen served in the White House Office of Management and Budget (OMB) as the Federal Cybersecurity Lead and Senior Cybersecurity Advisor to the Federal Chief Information Officer, where he led the OMB Cyber Team and was responsible for government-wide cybersecurity policy development and compliance of shared federal security services.
Andersen previously served as Chief Information Security Officer for the State of Vermont, where he was appointed to lead State efforts pertaining to the security and protection of data, security compliance activities, risk reduction, security operations, and threat intelligence.
Prior to this, Andersen was a senior executive and senior intelligence officer serving as the Chief Information Officer for Navy Intelligence and was the Head of the Office of Intelligence, Surveillance, and Reconnaissance Systems and Technologies at the U.S. Coast Guard. He has served on active duty with the U.S. Marine Corps, managing intelligence mission systems in Iraq, Europe, and Africa; and has led cybersecurity and technology programs worldwide with several leading and emerging companies.
Andersen holds a Bachelor of Science in Information Technology Management and a Master of Science in Information Security and Assurance. He has received awards from the U.S. Navy, U.S. Marine Corps, U.S. Coast Guard, and Intelligence Community.
Associate Laboratory Director – National and Homeland Security, Idaho National Laboratory
A Cyber Range is a controlled virtual training environment to prepare IT security teams for potential cyber-attacks. In partnership with Cyber Range Solutions Inc. (CRS), our range features Cyberbit, which is the most widely deployed cyber security training and simulation platform. Training through the Cyberbit Range will prepare your security team for an attack, and provide a hyper-realistic virtual SOC environment where your security or leadership team can train to respond to real-world, simulated cyber-attacks.