This peer-to-peer networking session will cover best practices for working with young facility professionals
Learn the best practices for hybrid workplaces and remote workforces in our two education sessions.
In addition to being easily found now with IoT/device search engines, common best practices that IT has used for years are not utilized in the OT (operating technology) world. Audits of systems in the United States and Canada — including commercial real estate, healthcare facilities, government buildings, retail facilities, public venues, and military bases — show in almost every case that the organizations have virtually the same vulnerabilities and bad practices. Here are some examples:
In more cases than not, audits find all those problems with building control systems, and more.
Fred Gordy (firstname.lastname@example.org) is director of cyber security, building and facility control systems for Intelligent Buildings LLC. His portfolio includes projects on military bases, Internet data centers, national retail chains, an international media company, REITs, and research labs.
Can Hackers Target Your Building Automation System?
Steps To Protect Your BAS from Cyberattacks
Why Control Systems Are Vulnerable To Cyber Attacks