{"id":50470,"date":"2022-05-25T09:13:37","date_gmt":"2022-05-25T01:13:37","guid":{"rendered":"https:\/\/version-2.com\/?p=50470"},"modified":"2022-06-08T17:40:22","modified_gmt":"2022-06-08T09:40:22","slug":"interview-with-scadafences-new-field-cto-paul-smith-2","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/05\/interview-with-scadafences-new-field-cto-paul-smith-2\/","title":{"rendered":"Interview With SCADAfence\u2019s New Field CTO, Paul Smith"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"50470\" class=\"elementor elementor-50470\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/blog.scadafence.com\/hubfs\/PaulSmithInterview.png?w=958&amp;ssl=1\" alt=\"\" height=\"379\" width=\"757\"><\/p>\n\n<p>OT and ICS Industry veteran <a href=\"https:\/\/www.linkedin.com\/in\/paul-smith-69012b23\/\" rel=\"noopener\" target=\"_blank\"><strong>Paul Smith<\/strong><\/a>, author of \u201c<a href=\"https:\/\/www.amazon.com\/Pentesting-Industrial-Control-Systems-compromising\/dp\/1800202385\/\" rel=\"noopener\" target=\"_blank\"><em>Pentesting Industrial Control Systems<\/em><\/a>\u201d has recently joined the <a href=\"https:\/\/www.scadafence.com\/\"><span>SCADAfence<\/span><\/a> team in the role of Field CTO. We interviewed Paul to get his thoughts on the current state of OT security, challenges that need to be addressed and his predictions for the future. <br><br>He was interviewed by content marketing manager, Joan Weiner Levin.<\/p>\n<div id=\"more-50328\" bis_skin_checked=\"1\"><\/div>\n<p><span style=\"color: #425b76;\"><strong><em>Joan Weiner Levin: Hi Paul. Welcome to SCADAfence! We\u2019re so excited to have you on board. Can you start by sharing a little bit about your background and why you are particularly interested in OT security.<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: I grew up in Calgary, Alberta, Canada. They call us \u2018little Texas\u2019 because the economy is so heavily influenced by oil and gas. After a number of years working in the oil and gas sector, it felt almost natural for my father and I to start our own consulting company. Leveraging his years of experience and my computer science background. We performed forensic audits inside of the measurement space in oil and gas, which is a very niche vertical where we had to solve many interesting technical problems. I had spent my entire career until then looking through data and how systems are interrelated inside oil and gas trying to find answers and solutions to \u201cRed Herring\u201d problems.<\/p>\n<p>During a project that my father and I were working on, I met Austin Scott who presently works at Dragos, Austin at that time was working on a compressor upgrade project and he invited me out to a \u201cCalSec\u201d Calgary Security meetup. I was hooked, I started investing time in understanding how people formulated careers in this space. I then was invited to attend a \u201cRed vs Blue\u201d event that the Department of Homeland security was hosting out of Idaho National labs. While attending this event I met some of the industry\u2019s finest people, I still stay in touch with a number of individuals. It was from this event that I was eventually offered a job to join Lockheed Martin.<\/p>\n<p><span style=\"font-size: 12px;\">&nbsp;<\/span>Shortly after this event I decided to attend a SANs conference in Orlando, it was really the only ICS related security course being offered. Justin Searle was the instructor and this is where I met Michael Assante and Rob Lee. Michael dropped in to give us a pep talk and welcome us to the industry as it was either the first class or second that had ever been presented. Rob Lee had just started Dragos at this time. When working at Lockheed Martin I had numerous discussions about buying two specific new startups in industry one being Dragos and the other was Indegy. Both companies were at a very early stage, Dragos hadn\u2019t even commercially released CyberLens yet. Friends of mine were visiting Israel and got very excited by technology they saw created by a Team 8 foundry company, the product was called ICS Ranger, and that company would go on to come out of stealth mode and brand themselves as Claroty, shortly after this I met with one of the Nozomi founders and became enamored by the possibilities of the product and in the end started working for them for a period of time as well.<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: What are some of your immediate goals in your new role as field CTO for SCADAfence? Like what do you hope to accomplish first?<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: <span style=\"font-weight: bold; font-size: 24px;\"><span style=\"font-size: 22px;\">The first thing is making sure the SCADAfence Platform is the best performing product in the market<\/span>. <\/span><\/p>\n<p style=\"font-weight: normal;\">We are now industry leaders, and I want to make sure that we always stay ahead of our competition.&nbsp;<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: Why did you choose to join SCADAfence? You\u2019re a celebrity in our field. You\u2019re a well published author. You\u2019re also very well known in the industry. Why did you decide to be a part of the leadership in SCADAfence?<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: I don\u2019t know if I would say celebrity, maybe been around the block once or twice as for SCADAfence, it is a lean team, it\u2019s got the right funding. I like working with a company when it\u2019s small, hungry, scrappy, and people are wearing multiple hats. It\u2019s on the cusp of blowing up to be big, and that\u2019s something really alluring to me. I like it because now I can come in and put an idea on the table and we bat it around as a team and then we shape it, hone it, and finally we implement and run with it. We are in a constant state of innovation while exceeding customers expectations.&nbsp;<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: How do you want to work with SCADAfence\u2019s customers? What is your ideal customer relationship?<\/em><\/strong>&nbsp;<\/span><\/p>\n<p>Paul Smith: I want to be a trusted advisor. I want our customers to know that they are first and foremost, we are addressing their concerns and features prior to chasing PR. I want SCADAfence to be the first thought in their heads. When they have a problem in their field or network, they can call us up. Queue up the shameful plug, but in all honesty<span style=\"font-size: 22px;\"><span style=\"font-weight: bold;\"> I want the customers to know that they can call either our<\/span><a href=\"https:\/\/l.scadafence.com\/services\" style=\"font-weight: bold;\"> <span style=\"color: #1155cc; text-decoration: underline;\">managed services<\/span><\/a><span style=\"font-weight: bold;\"> team or professional service team and will get the answers they seek. <\/span><\/span>Whether it is writing OT protocol rules, testing packet rules, writing yara rules, adding\/removing firewall rules, performing firewall swap outs or whatever it happens to be, I want people to start thinking of us as unbiased experts in this field, the trusted advisors of OT Cyber Security.<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: What are currently the biggest challenges in the world of OT Cyber security.&nbsp;<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: Number one is staff. It\u2019s always been staff. Companies can\u2019t find enough of the best, well-qualified people that they need to hire.&nbsp;<\/p>\n<p><span style=\"font-size: 12px;\">&nbsp;<\/span>Next, I\u2019d say it\u2019s human error. A lot of the OT security issues we see out there are operator error. Someone who is not properly educated on how to execute changes in an environment can accidentally take down an entire facility. We see this all the time.<\/p>\n<p>For the real cyber threats, if we look beyond human error and its operational impact, I would say it\u2019s nation state threats. The threats and attacks that are happening inside of Ukraine as a result of the Russian attacks right now are pretty insane and indicative of what can happen.<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: Let\u2019s talk for a minute about the current situation in Ukraine. There have been a number of reported attempted cyber attacks against electrical stations and attempts to damage Ukraine\u2019s fragile critical infrastructure. For those of us observing this from the west, from an OT perspective, what about this situation should alarm or concern us?&nbsp;<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: I\u2019ve had this conversation multiple times with people and they think Russia has all this old military hardware, these bombs and tanks and infantry and it\u2019s falling apart.<\/p>\n<p>But what you don\u2019t see is the cyber warfare going on in the back-end. The next world war isn\u2019t going to be fought with guns and traditional weaponry, it\u2019s going to be fought in cyberspace. You can cause a country to essentially implode just by knocking out their critical infrastructure.<span style=\"font-size: 12px;\">&nbsp;<\/span><\/p>\n<p>People have asked me, why isn\u2019t Russia just sending more people in on the ground. And I tell them, it\u2019s because you don\u2019t see what\u2019s happening on the back-end. That\u2019s a major part of the war. If you take down a city like New York, and they can\u2019t get power back up in under two weeks, you don\u2019t even have to shoot a single bullet. People will turn on each other, they\u2019ll figure out ways to survive at all costs. Remember no power means no pumps, no pumps no fresh water, and even worse\u2026 no Twitter! I\u2019ll say this, you take down critical infrastructure, you can take down a country.<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: Is this nightmare scenario preventable?<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: To a certain degree, yes. But the problem with technology, the beauty and the problem, is that it\u2019s always evolving. <span style=\"font-weight: bold; font-size: 22px;\">And we\u2019re always innovating. But the cost of innovation is security.<\/span> To be new and leading is great, but it doesn\u2019t always mean it\u2019s new, leading, and secure. Security is usually an afterthought.&nbsp;<\/p>\n<p>A lot of engineering companies are trying to change that and put security in the design, but you can\u2019t always do that. You don\u2019t know what you\u2019re securing, because if you\u2019re trying to engineer to be secure, then it is near impossible to innovate at the same time.<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: You mean security is an afterthought of design?<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: Yes. But from a technology perspective, I don\u2019t see this as a problem. Because if you try to put security into your engineering design, it will actually stifle innovation. For example, if an organization tried to create certain things to be completely secure, they would never be able to build them. Because they could have never innovated past the security boundaries that would have to be put into place. If you always put boundaries there, and say you can\u2019t go past these boundaries then you\u2019ll never innovate past the boundaries.<span style=\"font-size: 12px;\"><\/span><\/p>\n<p><span style=\"font-size: 22px;\"><strong>We haven\u2019t invented the next thing that you have to secure yet.<\/strong><\/span> If you don\u2019t innovate past that, then there\u2019s no chance of ever seeing what the next wave of security is going to have to be, and that\u2019s why I say it\u2019s a mixed bag. Can we secure things? Absolutely. But as we innovate we have this lag until we find the security gaps. So we invent a new thing, and then, there\u2019s the gaps. Now we have to invent something to secure that, because we\u2019ve never had to secure this before.<\/p>\n<p>A good example is self-driving cars with AI. There is this vision of what those self-driving cars need to be. But if someone puts some obstacle there, like a little orange dot, extended symbols on signage or something no one ever considered, it throws the whole self-driving car off course or can change a stop sign into a 45 m\/hr speed sign, this is called adversarial ML attacks. No one could have predicted this because the fundamental technology for ML vision models had never been invented before.<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: Let\u2019s talk about legacy equipment, the older technology that is still running in manufacturing plants and critical infrastructure facilities. Is there technology still in place that is just too old to be secure, or is the older technology more secure because we\u2019ve had more time to make it secure?<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: I talk a lot about this topic, because I say the people who could actually fix the older technology are no longer with us and that is a major risk. So it\u2019s so archaic, that it\u2019s secure by nature. But just don\u2019t look at it, don\u2019t touch it, because if it falls down, we\u2019ll never be able to fix it again. The old legacy stuff is hyper vulnerable. But more from an obsolescence perspective. Now if we talk moderate to old equipment, this is where you will find the highest most vulnerable assets. This technology was first\/second generation adoption of ethernet cards, moving away from serial communications. It has become a major issue in industry where companies feel that if it is producing, don\u2019t mess with it. The cost benefit analysis isn\u2019t there for them to justify implementing new technologies yet. This is why we haven\u2019t seen solutions such as GE predicts and Siemens Mindsphere eclipse the market, new technologies just come with price tags that executive teams feel aren\u2019t warranted.<br><br><\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: Why aren\u2019t more people choosing an OT cyber security career? <\/em><\/strong><\/span><strong><em><br><\/em><\/strong>Paul Smith: The reason people don\u2019t go into OT is because really OT security is two, maybe two-and-a-half different roles. Often, companies put up a job posting with a certain salary rate. My reaction is, \u201cwell, that\u2019s an interesting salary. The rate is lower than either an automation specialist or an IT specialist.\u201d So they\u2019re trying to pay someone who has to know both job roles less than either singular job.<\/p>\n<p>If you combine the salary for both, then you could have more interesting opportunities for people to grow into. Someone would say to themselves, I\u2019ve had to learn all the OT background, and now I have to learn all the IT cyber elements, like all the networking gear, all the endpoint technology, all the frameworks and security standards, and you only want to pay me same or even less than this other person, I\u2019m just gonna do that other job, because I\u2019ll get paid the exact same.<\/p>\n<p style=\"font-weight: bold;\"><em><span style=\"font-size: 12px;\">&nbsp;<\/span><\/em><span style=\"color: #000000; font-size: 22px;\">The market still hasn\u2019t adjusted salary rates for what it really means to do the job of OT cyber security.<\/span><\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: Let\u2019s talk about the relationship between IT and OT. How should those two sides be working together, and what are they currently missing in that relationship?<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: We\u2019ve been talking about IT-OT convergence for a long time. And I think the gaps are slowly fading. I always said that it\u2019s easier to take an automation person, and maybe it\u2019s biased because I come from that side, and teach them the security side. As opposed to taking an IT security individual and teaching the automation side, because the automation side is more finicky, it\u2019s not straightforward programming and implementation. Every decision being made inside the controllers can cause millions of dollars of impact.<\/p>\n<p>There has to be more open conversations. For more mature companies, I would say, take one of your automation guys and put him right in your SOC and have him talk directly with all the IT staff there. A lot of these products feeding up data into a SOC use language that the IT analysts don\u2019t fully understand. Whereas if you put an automation guy there, he will be able to translate it. One of the value points for all this technology is we need to change the language to make sure we can communicate both to an automation specialist and an IT security specialist. Because if we put both languages in a security alert, it\u2019s easier for them to communicate and talk to each other.<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: What is the role of governments in securing the OT? What is the ideal collaboration between the government and the private sector in securing public critical infrastructure?<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: When it comes to private companies securing public critical infrastructure, there should be a lot of vetting and a lot of oversight, especially as it relates to major city centers. So if we\u2019re discussing water treatment plants, or electrical facilities, if you\u2019re a third party vendor, you need to be subject to governance. Governments should have a big stick to use for enforcement because one bad incident can impact millions of lives.&nbsp;<span style=\"font-size: 12px;\"><\/span><\/p>\n<p>There needs to be a heavier influence of government mandates and sanctions on third parties. And I know for a company like SCADAfence as an Israel-based company, selling into critical infrastructure in North America, that would put a little bit of a hamper on some sales, but it would also force us to comply with standards. Then everyone would feel safe, and there would be full transparency. And then once you have that stamp of approval facilities would be more comfortable working with approved third party vendors.&nbsp;<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: What about governments encouraging private companies to do more for their OT security. Should the government be telling private manufacturers that they should do more to protect their OT?<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: Yes. I do feel that the government needs to have more say in the manufacturing of&nbsp; products that impact people on a whole. Pharmaceuticals are a great example. If you have a disruption in drug supply, how many people is that impacting? If a company manufactures insulin pens for diabetics and their production goes down because of an OT security incident, and people miss their shots, you\u2019re killing people because of that cyber incident. So anything that can critically impact people\u2019s lives needs to have a little bit more government oversight. I don\u2019t like a lot of government controls. But I do feel in the case where people\u2019s lives can be impacted, government enforcement for companies to maintain a dedicated level of security practice is necessary.<\/p>\n<p><span style=\"color: #425b76;\"><strong><em>JL: What is the future of OT security? What do the next three to five years look like?<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: Oh, yes, that crystal ball stuff. Where we are now is still pretty immature in terms of OT security. From an industrial OT security perspective there were companies that were ahead of their time, and they owned the market share and then they just stopped innovating, and they fell apart. But I think we\u2019re coming full circle.<\/p>\n<p>If you look at the way our technologies evolved, passive detection became super hot, super silver bullet, we\u2019re all in that market. Venture capital money was just being dumped into it. And now executives are concerned that they don\u2019t get full visibility that way. So we needed to add an active component, but everyone was staying away from active at that time. Now people are more open to active. Ten years ago, that\u2019s how companies were doing this, and they had a massive install base. And they lost market share to passive companies. Now passive companies are supplying an active component\/device as part of their product offering, which is where these other guys were 10 years ago. So it comes full circle.<\/p>\n<p>I think you\u2019re gonna see a lot of IT implementations like XDR, and SOAR. Customers are going to start utilizing and coordinating their various security tools. There is a shortage in experienced individuals and the only way to offset that is more intelligence and more automation. Also companies are going to be a lot more open to agents installed out there in their OT environment, telling them what they see so they can be more secure. Agents in OT doesn\u2019t sound very sexy to me, because it\u2019s been done forever ago, but it\u2019s how the industry is maturing and evolving. So that is what I see in the next 3ish years, I predict that in the next 5 years there will be an adoption of AI at the edge providing interesting ML model solutions. I don\u2019t want to give away too much of our secret sauce!&nbsp;<\/p>\n<p><span style=\"color: #425b76;\"><strong>JL:<\/strong> <strong><em>Finally, because we always need to know. Do you have any pets?<\/em><\/strong><\/span><\/p>\n<p>Paul Smith: I do. I have a very sweet German Shepherd. Her name is Bailey, like the Irish cream, we named her because she is the same color as Baileys.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5987d9c elementor-widget elementor-widget-shortcode\" data-id=\"5987d9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18130\" class=\"elementor elementor-18130\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About SCADAfence<\/strong><br \/>SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT\/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world\u2019s most complex OT networks, including Europe\u2019s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>OT and ICS Industry veteran Paul Smith, author of \u201cPent [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[417,488,61],"tags":[418,489],"class_list":["post-50470","post","type-post","status-publish","format-standard","hentry","category-scadafence","category-488","category-press-release","tag-scadafence","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Interview With SCADAfence\u2019s New Field CTO, Paul Smith - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.scadafence.com\/paul-smith-interview\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Interview With SCADAfence\u2019s New Field CTO, Paul Smith - Version 2\" \/>\n<meta property=\"og:description\" content=\"OT and ICS Industry veteran Paul Smith, author of \u201cPent [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.scadafence.com\/paul-smith-interview\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-25T01:13:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-08T09:40:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.scadafence.com\/hubfs\/PaulSmithInterview.png?w=958&amp;ssl=1\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/paul-smith-interview#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/interview-with-scadafences-new-field-cto-paul-smith-2\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Interview With SCADAfence\u2019s New Field CTO, Paul Smith\",\"datePublished\":\"2022-05-25T01:13:37+00:00\",\"dateModified\":\"2022-06-08T09:40:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/interview-with-scadafences-new-field-cto-paul-smith-2\\\/\"},\"wordCount\":3186,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/paul-smith-interview#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/PaulSmithInterview.png?w=958&amp;ssl=1\",\"keywords\":[\"SCADAfence\",\"2022\"],\"articleSection\":[\"SCADAfence\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/interview-with-scadafences-new-field-cto-paul-smith-2\\\/\",\"url\":\"https:\\\/\\\/blog.scadafence.com\\\/paul-smith-interview\",\"name\":\"Interview With SCADAfence\u2019s New Field CTO, Paul Smith - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/paul-smith-interview#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/paul-smith-interview#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/PaulSmithInterview.png?w=958&amp;ssl=1\",\"datePublished\":\"2022-05-25T01:13:37+00:00\",\"dateModified\":\"2022-06-08T09:40:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/paul-smith-interview#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.scadafence.com\\\/paul-smith-interview\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/paul-smith-interview#primaryimage\",\"url\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/PaulSmithInterview.png?w=958&amp;ssl=1\",\"contentUrl\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/PaulSmithInterview.png?w=958&amp;ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/paul-smith-interview#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interview With SCADAfence\u2019s New Field CTO, Paul Smith\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Interview With SCADAfence\u2019s New Field CTO, Paul Smith - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.scadafence.com\/paul-smith-interview","og_locale":"en_US","og_type":"article","og_title":"Interview With SCADAfence\u2019s New Field CTO, Paul Smith - Version 2","og_description":"OT and ICS Industry veteran Paul Smith, author of \u201cPent [&hellip;]","og_url":"https:\/\/blog.scadafence.com\/paul-smith-interview","og_site_name":"Version 2","article_published_time":"2022-05-25T01:13:37+00:00","article_modified_time":"2022-06-08T09:40:22+00:00","og_image":[{"url":"https:\/\/blog.scadafence.com\/hubfs\/PaulSmithInterview.png?w=958&amp;ssl=1","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.scadafence.com\/paul-smith-interview#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/05\/interview-with-scadafences-new-field-cto-paul-smith-2\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Interview With SCADAfence\u2019s New Field CTO, Paul Smith","datePublished":"2022-05-25T01:13:37+00:00","dateModified":"2022-06-08T09:40:22+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/05\/interview-with-scadafences-new-field-cto-paul-smith-2\/"},"wordCount":3186,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/blog.scadafence.com\/paul-smith-interview#primaryimage"},"thumbnailUrl":"https:\/\/blog.scadafence.com\/hubfs\/PaulSmithInterview.png?w=958&amp;ssl=1","keywords":["SCADAfence","2022"],"articleSection":["SCADAfence","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/05\/interview-with-scadafences-new-field-cto-paul-smith-2\/","url":"https:\/\/blog.scadafence.com\/paul-smith-interview","name":"Interview With SCADAfence\u2019s New Field CTO, Paul Smith - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.scadafence.com\/paul-smith-interview#primaryimage"},"image":{"@id":"https:\/\/blog.scadafence.com\/paul-smith-interview#primaryimage"},"thumbnailUrl":"https:\/\/blog.scadafence.com\/hubfs\/PaulSmithInterview.png?w=958&amp;ssl=1","datePublished":"2022-05-25T01:13:37+00:00","dateModified":"2022-06-08T09:40:22+00:00","breadcrumb":{"@id":"https:\/\/blog.scadafence.com\/paul-smith-interview#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.scadafence.com\/paul-smith-interview"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.scadafence.com\/paul-smith-interview#primaryimage","url":"https:\/\/blog.scadafence.com\/hubfs\/PaulSmithInterview.png?w=958&amp;ssl=1","contentUrl":"https:\/\/blog.scadafence.com\/hubfs\/PaulSmithInterview.png?w=958&amp;ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.scadafence.com\/paul-smith-interview#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Interview With SCADAfence\u2019s New Field CTO, Paul Smith"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-d82","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/50470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=50470"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/50470\/revisions"}],"predecessor-version":[{"id":50474,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/50470\/revisions\/50474"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=50470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=50470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=50470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}