Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityThe Security Benchmark ReportSecurity Leadership and Management

Security 500 Thought Leader Profiles

Leo Simonovich: Thriving in a Digitized Environment

SEC-1120-SEC-500-Profile-8-Slide8
November 5, 2020

In the energy sector, the stakes are high when it comes to cybersecurity. Unlike other fields where malware could cause havoc and delay services, attacks within the energy sector could potentially cut off electricity to millions of customers in the United States and around the world. Leo Simonovich, VP and Global Head of Industrial Cyber and Digital Security at Siemens Energy, is focused on ensuring that doesn’t happen. Simonovich is responsible for setting the business’ global strategy, with a focus on cybersecurity in the oil and gas and power sectors. Prior to joining Siemens in 2015, he led the cyber risk analytics practice area at Booz Allen Hamilton.

“Siemens is known as a 170-year-old engineering company,” Simonovich explains. “But we’ve become one of the largest industrial software companies. And by necessity, we’ve also become a security company.” Since Siemens assets were hit with Stuxnet in 2010, it’s been on a journey to secure its system and 400-plus factories around the world. “Ultimately, we took that knowledge to our customers. Today, we are recognized as a leader in industrial cybersecurity.”

Simonovich has created a global team of professionals who have a variety of perspectives, skill sets and backgrounds, including data scientists, artificial intelligence (AI) experts and individuals with mechanical and control systems backgrounds. “We need professionals that not only understand networks, but who also understand access control,” says Simonovich. This diverse team of experts is necessary to tackle one of the main challenges with securing the energy sector: it is an old and outdated system that wasn’t designed with the type of security required to combat vulnerabilities that live in today’s digital environment.

“Attacks on power plants, refineries and substations has led to a real confidence gap among the leaders that operate that machinery and energy assets. They don’t know how vulnerable they are,” says Simonovich. “They don’t know how to address the problem because of the complexity of the challenge. The readiness gap between energy companies and attackers is growing.” In this new, digital energy ecosystem, “the physical and the digital worlds are interconnected,” he says. “You have to understand both worlds and have to look at them together to detect anomalies. The challenge is that the physical world data and digital data was never meant to be looked at together.”

As of press time, Siemens Energy just launched a new A.I.-based cybersecurity service solution, Monitoring Detection and Response (MDR), powered by Eos.ii, to protect energy assets in a growing digital ecosystem. The service is tailored to providing resources to small and medium-size energy companies to help protect them from cyberattacks. The goal is that all industrial operators can access the technologies, tools and expertise required to secure the electric grid, oil and gas assets and critical infrastructure from rising threats.

At its most basic level, Siemens Energy’s MDR service addresses a challenge that utilities and energy companies will continue to face as their assets become increasingly connected, and thus, more vulnerable to cyberattacks. Companies across the world are incapable of defending against what they can’t see. “Visibility ensures that cybersecurity teams can see what’s happening across every digitally connected node; and context provides cybersecurity professionals with an understanding of normal operating environments so we can better detect anomalies. We address visibility differently,” says Simonovich.

Earlier this year, The New York Power Authority (NYPA) and Siemens Energy announced a collaboration to develop an industrial cybersecurity Center of Excellence. The Center will focus on detecting and defending against cyberattacks on critical infrastructure owned and operated by NYPA. “Part of the collaboration includes workforce development to train industrial cyber professionals, which is lacking in the U.S.,” Simonovich explains. “Industrial cybersecurity requires a unique blend of, skills in the clinical world and the digital world so we need to find and train a new pipeline of individuals. That’s very hard to learn in a classroom environment. You need to do it on the job when you’re working with real-world assets.”

Siemens, as a company, has been on the leading edge of the industry’s evolving view of cybersecurity. A good example is the Charter of Trust – which was signed in 2018 at the Munich Security Conference – where Siemens partnered with insurance companies, technology providers and utilities, to create a collective effort to address industrial cybersecurity and to build the foundation of trust for an increasingly digital world.

“It is my responsibility to carry out this vision for Siemens Energy and change how customers think about security,” Simonvich says. “Ultimately, we want to put security at the core of our customers’ business model. And the premise is very simple.”

The work that Simonovich has done to date at Siemens has been supported by the C-suite. He sees that support as key to Siemens Energy’s customers being cybersecure today, and in the future. “Leadership begins at the top,” he says. “It’s important that Boards, CEOs and CIOs recognize that operational technology is a core risk that needs to be tackled.”

In his free time, Simonovich spends time with his wife and three young boys, enjoying outdoor activities and volunteering in his community.

KEYWORDS: cyber security cybersecurity malware ransomware security thought leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Jeff Karpovich: Keeping Students Safe in a Caring Environment

    See More
  • Andrew Baer: Embracing Diversity in a Global Environment

    Andrew Baer: Embracing Diversity in a Global Environment

    See More
  • remote work

    What you cannot see you cannot secure: Shining a light on cybersecurity threats in a work-from-home environment

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing