What makes Cybersecurity different for critical infrastructure?
In critical infrastructure, cybersecurity isn't about prevention because successful attacks are inevitable. The real goal is resilience when downtime is not an option.
#1about 2 minutes
Providing essential services for the city of Munich
Stadtwerke München (SWM) is responsible for a wide range of critical infrastructure, including energy, water, mobility, and telecommunications.
#2about 6 minutes
Why minimal downtime is non-negotiable for critical infrastructure
Unlike typical businesses, critical infrastructure like electricity cannot tolerate downtimes of days or even hours, making redundancy a core design principle.
#3about 6 minutes
Defending against professional and state-sponsored cyber units
Cyber threats have evolved from individual script kiddies to highly organized, well-funded military cyber units like Sandworm, changing the entire defensive landscape.
#4about 6 minutes
Managing the long lifecycle of operational technology equipment
Operational technology components have lifecycles of 15 to 40 years, creating a mix of modern and legacy systems that are difficult to secure.
#5about 10 minutes
Why even new OT equipment can be a security risk
Even recently installed OT hardware often lacks modern IT security features like TLS encryption or role-based access control due to long development cycles.
#6about 5 minutes
Navigating a fast-developing landscape of security regulations
Critical infrastructure operators must comply with a growing number of national and international standards like ISO 27000, NIS2, and the Cyber Resilience Act.
#7about 7 minutes
Building trusted partnerships with technology vendors
As system integrators, critical infrastructure providers rely on honest and transparent relationships with vendors to quickly resolve issues and ensure system reliability.
#8about 4 minutes
Using business continuity to prepare for inevitable attacks
Accepting that successful attacks will happen, the focus shifts to robust Business Continuity Management (BCM) to detect, isolate, and recover services.
#9about 15 minutes
Key industry debates on hardware regulation and reporting
The industry is actively debating whether authorities should regulate hardware for critical infrastructure and how to establish effective cyber attack reporting protocols.
#10about 10 minutes
Joining the team: Remote work and language policies
SWM offers flexible remote work options, typically three days from home, but requires a willingness to learn German as it is the primary company language.
#11about 11 minutes
How teams work with agile methods at SWM
Teams at SWM have the autonomy to choose their own work methodologies, often using agile, scrum, or kanban depending on the project's needs.
#12about 10 minutes
The unique culture and benefits of a public utility
Working at SWM provides a strong sense of purpose by serving the city, combined with benefits like job security, unlimited contracts, and pension schemes.
#13about 13 minutes
Fostering diversity and what to expect in hiring
SWM actively promotes a diverse and inclusive environment and looks for self-motivated team players in a straightforward, two-interview hiring process.
#14about 10 minutes
Keeping up with emerging trends in cybersecurity
Staying current involves a multi-path approach of industry networking, continuous learning, and hands-on personal projects, with Zero Trust and AI being key emerging technologies.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
03:43 MIN
Modern cybersecurity challenges for developers
Cyber Security: Small, and Large!
02:26 MIN
Why developers make basic cybersecurity mistakes
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
05:49 MIN
Cybersecurity is a foundational necessity not a passing trend
Decoding Trends: Strategies for Success in the Evolving Digital Domain
05:56 MIN
Understanding the complexity of modern cybersecurity threats
Cyber Sleuth: Finding Hidden Connections in Cyber Data
03:18 MIN
The role of security in specialized vehicle projects
Cyber Security: Small, and Large!
04:07 MIN
How data drives energy, security, and automation businesses
Unlocking Value from Data: The Key to Smarter Business Decisions-
03:36 MIN
The failure of traditional perimeter-based security models
Overcome your trust issues! In a world of fake data, Data Provenance FTW
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Chris Heilmann
Dev Digest 110 - XY marks the spotty securityThis time we give you a collection of links about the XZ backdoor, solve the last CODE100 puzzle, announce the next round of it, let you play with colours and explain why Lava lamps are great to keep the web secure.News and ArticlesThe big piece of n...
Chris Heilmann
Dev Digest 134 - Where pixels sing?News and ArticlesWeAreDevelopers LIVE Data and Security Day is on Wednesday, 25/09/2024. Learn about OPC UA Updates, Best Practices for Using GitHub Secrets, Passwordless Web 1.5, Emerging AI Security Risks, Data Privacy in LLMs and get a chance to t...
Dev Digest 105 - Security FirstLast Friday's Dev Digest was mostly about security and game topics, so let's take a look what you didn't get in your inbox. We also covered some brand new online courses to get started as a developer or refresh your knowledge. And we wrapped up CODE1...
From learning to earning
Jobs that call for the skills explored in this talk.