The PI System gathers data from many disparate sources and provides a safe harbor for real time and historical information between the IT and OT networks. In this role, the PI System is a single, defensible point of service for providing data across network boundaries to the IT network. As a critical junction, PI security is an indispensable aspect of system reliability. As a complex system, protecting the PI System against malicious activities and incidental misconfiguration can be a demanding job. Industry standards, support KBs, and system utilities are available to assist, but it can be a challenge to collect, analyze and correlate this information effectively. In this talk we will explore the best practices to guard a modern PI System and how to get there. We will discuss the PI Security Audit Tools as a method to acquire actionable information about a PI System that can be implemented based on your operational reality.
Harry Paul is the Cyber Security Advisor for Customer Services and Support (CSS) at OSIsoft. He works closely with the organizations within CSS to advance the security of OSIsoft’s operations, products and services. Prior to his time with the Cyber Security Advisory Team, he worked in Technical Support as an escalation engineer for OSIsoft's web applications. Harry has a B.S. in Mechanical Engineering and an M.S. in Computational and Engineering Mechanics from Lehigh University.