Jeffrey S. Cornelius
Executive Vice President, ICS Solutions
Jeff Cornelius joined Darktrace in February of 2015 as EVP of ICS Solutions and oversees the global, strategic direction of Darktrace’s Industrial Immune System solution tailored specifically for Critical Infrastructure Protection. Prior to joining, Darktrace, Jeff held a number of Executive Commercial positions delivering subject matter expertise in security, compliance and governance sectors. Jeff previously taught at the University of Texas and New Mexico State University where he held adjunct positions in Experimental Psychology (Social, Cognition, Perception) and Experimental Statistics.
Building an Industrial Immune System: AI and the Future of ICS Security
Cyber security is an almost impossible problem to solve. This is particularly true in industrial environments, which have long faced some of the most advanced attackers, from espionage in the energy sector to state-sponsored threats. As IT and OT environments converge and the growth of the industrial IoT continues to broaden attack surfaces, perimeter defenses and airgapping simply aren’t enough anymore.
Such highly bespoke environments mean that security teams have long been resigned to lengthy, costly deployments too inefficient to keep up with system updates and expansion. Old, even proprietary, standards, unpatched operating systems, and a reliance on rules-based security approaches abound, and the complexity of these ICS/SCADA networks means they are all too often neglected by today’s security providers.
While total prevention of compromise is untenable, AI technologies enable organizations to detect and autonomously respond to emerging threats, irrespective of whether the suspicious behavior originated on the corporate network or ICS. Many of the world’s leading energy and manufacturing companies are already relying on immune system technology to identify the earliest indicators of cyber-attacks across their network environments and mitigate threats before damage is done.
In this session, learn:
How AI is enabling early threat detection and automating response
Why 100% network visibility allows you to preempt emerging situations, in real time, across both IT and OT environments
How smart prioritization and visualization of threats allows for better resource allocation and lower risk
Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers