Dom Storey is Principal OT security architect for Tenable Network Security. Based in the UK, Dominic articulates Tenable’s industrial security technical strategy across Europe, Middle East & Africa and advises on the design of security architectures for them.
Dom has a strong background in IT, with many years experience in enterprise networking, computer security, software development and systems integration.
He has 20+ years in the security business, and has a rare strength of being able to combine technical, sales and marketing facets together to articulate clearly his subject matter to an executive audience.
Dom came to Tenable by way of Cisco and Sourcefire, where he was lead architect at Cisco and technical co-founder for the Sourcefire EMEA operation. He joined Sourcefire in August 2003, coming from RSA Security, where he held the post of Director of Technology in both Europe and the US.
Dom trained as an applied physicist at the Atomic Energy Authority, United Kingdom, specializing in laser interferometry of plasma confinement systems for nuclear fusion. It was there he developed practical experience in control and data acquisition systems, which he uses when discussing critical infrastructure security.
Dom is a hardware hacker, astronomer and photographer and likes it best when he can combine all three hobbies on the same night!
Speech Topic & Synopses
Protecting the Plant in the Connected Age
Industrial control systems and process control networks are critical components of your business – as important, if not more so than your core databases and financial systems.
In the past organizations believed they were protected by not being connected – this is no longer the case.
Digitization has reached everywhere – even into the plant. Yet many organizations do not even know what are on these networks, how vulnerabile they are and what could happen if they are remotely accessed.
This presentation outlines the technical and organizational issues associated with effective cyber-risk management for plants in the digital age and outlines methods in which we can address the cyber-risk knowledge gap.