top of page

mié, 03 jul


Virtual Event

Anatomy of an Attack - From Encryption to Destruction

Registration is closed
See other events
Anatomy of an Attack - From Encryption to Destruction
Anatomy of an Attack - From Encryption to Destruction


03 jul 2024, 13:00 – 14:30 GMT-4

Virtual Event


In commercial buildings the application host are often the gateway to all the devices running the building’s HVAC, lighting, elevators, card access, and parking systems. These are also often times used by building operations staff to check personal email, social media and browse the web. Because of this the devices downstream are put at risk. In this episode will examine how one individual checking their personal email account caused damage to the literal heart of the building’s HVAC, the central plant equipment and controllers. This single mouse required just over three months work to recover from. The specificity of the attacks to the system indicated that this attack most likely came from someone that had knowledge of how building control systems are programmed and device interoperability. This is an indication that attackers could be coming from the building control system programming community. We will unpack the events in the sequence that they occurred along with the steps that were taken that may have inflamed the attackers rather than stop them. 

Speaker: Fred Gordy is the Director of Operational Technology Risk Assessment at Michael Baker International. He's a passionate Building/OT Cybersecurity Practitioner, Speaker, and Author in this field, who has been working in the protection of Smart Buildings and Facilities since before those terms existed.

Guest Host:  Steve Mustard is President and CEO of National Automation, Inc., and Past President of the International Society of Automation.  He has deep experience protecting the cyber security of industries including water & wastewater, oil & gas, transport, electricity and manufacturing.

Register Here:

Share This Event

bottom of page