This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Home » Webinar Review: Critical Infrastructure: Protecting Various Sectors within One Business
In this webinar, Darin Dillon, business development manager at Convergint Technologies and Joe Olivarez Jr., vice president of enterprise security and crisis management at Baker Hughes Incorporated, talk about best practices the two companies developed together while working to protect various sectors within BHI, a supplier of oilfield services, products, technology and systems to the worldwide oil and natural gas industry. The BHI business intersects with four verticals within critical infrastructure: energy, chemical, nuclear and transportation. The end goal: a holistic security strategy that addressed the specific needs of each vertical sector and met government regulations.
Olivarez discusses the Homeland Security Act of 2002 and other recent government regulations that have fundamentally changed how critical infrastructure is secured and have influenced policy development throughout the world. He shares how BHI and Convergint work together to not only meet government regulations, but ensure the system delivers security commensurate to the company’s risk level. Olivarez explains BHI’s risk analysis process as well as the methodology and considerations for building its security plan.