
Ron Martin
- ICAM-Critical Infrastructure
- Capitol Technology University, USA
Dr. Ron Martin is a Professor of Practice at Capitol Technology University, specializing in the functional areas of Critical Infrastructure, Industrial Control System Security, Identity, Credential, and Access Management.
Dr. Martin maintains professional relationships with a diverse mix of businesses. He serves on the board of directors for many profit and nonprofit organizations, such as the International Foundation for Protection Officers (IFPO), and the Institute of Electrical and Electronics Engineers (IEEE) P2887 – Zero Trust Security Working Group (ZTSWG) as Vice Chair. He is a voting member of the U.S. Technical Advisory Group to the International Standards Organization (ISO), which works to develop and articulate the U.S. position by ensuring public and private sector stakeholder involvement. He is also a member of the Cloud Security Alliance Zero-Trust/ Software Defined Perimeter Expert’s Working Group and the Security Industry Association Standards Committee.
Dr. Martin retired from the U.S. Army in 1999. While on active duty, he served as Military Comptroller, Provost Marshal, Security Manager, and a Doctrine Literature Writer and Instructor. He retired from his service with the U.S. Government in 2011. During his Federal Service, he served with the Department of Commerce and the Department of Health and Human Services as Program Director for the development and implementation of their Identity, Credentialing and Access Management (ICAM) Programs. In between his tours of Federal Service, he also served as a civilian police officer in the Commonwealth of Virginia for five years. Dr. Martin was a member of the Federal Identity, Credentialing, and Access Management (FICAM) Roadmap Development Team, providing FICAM Subject Matter Expertise, advice, and assistance to Federal agencies and organizations engaged in Identity Credentialing activities. Dr. Martin is a former member of ASIS International’s Commission on Standards & Guidelines Commission. Recently, he has been designated by the U.S. Department of State as a Fulbright Specialist.
Sessions
-
IT OT Threats
IT-OT convergence in critical infrastructure has increased the risk of cyberattacks. Malicious actors can exploit vulnerabilities in IT systems to compromise operational technology (OT), leading to disruptions, damage, and even safety hazards. To mitigate these threats, organizations must implement robust cybersecurity measures, including network segmentation, access controls, and incident response plans. Fostering collaboration between IT and OT teams is essential for effective risk management.
-
Cybersecurity and AI – Best Practice and Minimum Standards
The threat of cyber-attacks by state actors and hacktivists, such as criminals and malicious rogue players, grows ever higher to cause disruption to our infrastructures, how do we assess and prioritise these risks and threats to better build cyber resilience? What role can AI play, and as a potential threat in itself, how do we regulate AI to build trust in its development and use? How can we report incidents for the benefit of everyone to better understand these threats?