Speaker

Ahmik Hindman

Ahmik Hindman

Sr. Network & Security Solution Consultant

Seattle, Washington, United States

Actions

Ahmik Hindman, a seasoned expert with over 29 years of experience in the industry, demonstrates unwavering commitment to driving enterprise-wide success through proactive change management and strategic initiatives. As a Senior Network & Solution Consultant at Rockwell Automation, he specializes in industrial automation control systems (IACS), with a focused expertise in networks and cybersecurity. His leadership is further exemplified by his role as Chair of the Idaho State University ESTEC Industrial Cybersecurity Engineering Technology Advisory Committee, where he contributes to advancing industrial cybersecurity—a domain critical to modern infrastructure. Confident in his ability to deliver exceptional results, Ahmik Hindman is poised to bring excellence to any organization he engages with.

As a resourceful and technically sophisticated professional, Ahmik has excelled in various facets of the industry, encompassing industrial software programming, control systems industrial hardware, IoT integration, virtualization, IACS network design, and IACS security. His abilities as an articulate communicator and skilled negotiator have enabled him to secure new business opportunities and design cost-effective technical solutions that foster growth and innovation.

Ahmik has been instrumental in driving IT/OT management initiatives that transform organizations and enhance productivity, particularly in underperforming areas. His approach to IT/OT leadership seamlessly blends technical expertise with strategic insight, ensuring alignment with corporate goals. With a credible history of strategic thinking and business acumen, he has contributed to measurable improvements in operations across diverse corporate structures. His strategies reflect an adherence to industry trends and best practices, making him a recognized leader in implementing transformative change.

Ahmik is also highly sought after as a consultant and speaker due to his domain expertise in industrial cybersecurity and networking. He has assisted customers in the following areas:
- Secure Remote Access to OT environments
- iDMZ (Industrial Demilitarized Zone) design
- ICS/OT networking best practices
- Role-Based Access Control (RBAC) for OT with Single Sign-On (SSO) to multiple identity providers
- Zero Trust principles for ICS/OT environments
- ICS/OT system hardening and attack surface reduction
- Intrusion Detection for OT through OT-specific Network Detection and Host Detection Intrusion Systems (NDIS and HDIS)
- Incident response for OT environments

Beyond his professional achievements, Ahmik's academic credentials include a Bachelor of Science in Electrical Engineering and an MBA with a focus on Information Technology. His dedication to lifelong learning is evident through an array of certifications, including CISSP, CCSP, CCNA, Security+, Fortinet Certified Associate, and four ISA/IEC 62443 Cybersecurity certifications. These qualifications underscore his commitment to professional growth and expertise in cybersecurity and network solutions.

Adding to his technical prowess, Ahmik possesses intangible qualities such as an engaging and collaborative management style and exceptional foresight in navigating operational risks. These attributes enable him to drive sustainable growth and innovation in today's fast-paced technological landscape. His ability to balance technical mastery with visionary leadership positions him as a standout professional in his field.

Area of Expertise

  • Manufacturing & Industrial Materials

Topics

  • IACS Cybersecurity IACS controls IACS Networks

Patch Management for OT

Struggling to wrap your arms around deploying a patch management strategy in OT and don’t know where to start. Attend this session to learn how about tools that are available to assist in your efforts, discover automated tools for inventory to vulnerability correlation and review patch management prioritization methodologies based upon industry standards and Guidelines.

You Too Can Secure OT

Are you tired of hearing how ICS is “insecure by default”, but if you just buy this widget all your problems will go away? This session will enable traditional IT security people to get started securing their OT systems. This session briefly highlight the differences between OT and IT systems and then dive into a structured approach for managing OT security risk.

This session was delivered at RSA 2023 this year. Here is a more detailed abstract. Many IT security leadership roles have expanded their scope to secure OT systems. Despite the popular opinion that ICS is “insecure by design”, this has not been true for over a decade. Security misconfiguration of OT systems remains an issue. In this session, we will discuss how to get started securing your OT environment and what security capabilities exist in OT technology today.
To secure the ICS/OT space we must first understand the installed base. The extended lifecycle of most ICS, proprietary networks, and islands of automation make it challenging for OT automated inventory tools alone to provide an accurate installed base, down to the firmware version and rev of various controllers; thus, requiring a combination of OT automated inventory and a manual installed based evaluation.
With this updated installed base, an automatic correlation to the latest vulnerability and lifecycle status of the asset must be performed. This in combination with a high-level risk assessment (one of the first stages of an IEC 62443 risk assessment), should be used to drive the decision making for risk mitigation controls.
After a ICS/OT risk assessment has been performed, then controls can be selected using a Defense in Depth Strategy that includes but not limited to OT/IT segmentation via an iDMZ, logical segmentation with smaller subnets and VLAN’s, monitoring with an OT specific Network Intrusion Detection Systems (IDS) with direct connections to Intrusion Prevention Systems (IPS’s), Role Based Access Control (RBAC), 802.1x for Network Access Control (NAC), vendor agnostic “in motion“ secure protocols (CIP Security, IPsec, OPC-UA), ICS/OT device hardening, common time base with millisecond accurate time synchronization, elimination of traditional compute resources through zero-clients and endpoint protection.
The next phase in protection is preparation for incident response. OT specific business continuity and disaster recovery plays a key role in incident response; being able to quickly recover with the latest SCADA program, PLC program and VM. Ensuring time ICS synchronization and log immutability is also required for facilitating an accurate forensic response. Secure remote access for internal and external resources is a necessity for standard business operations and disaster recovery support.
In this session we will go through these phases and get into the details of how these controls can be used in conjunction to secure Industrial Control Systems.

Ahmik Hindman

Sr. Network & Security Solution Consultant

Seattle, Washington, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top