Skip to main content
The Institution of Engineering and Technology iet.tv
Site name
  • Videos
  • Channels
  • Events
  • Series

Access and Account

Access your personal account

Log in to see your favourites, lists and progress.

IET Login

Access via institution

Not currently connected to any institutions

Connect via

This video isn’t available to you right now

Login to check your access and watch the full session

Login
  1. Videos
  2. Video

Keynote address: From Strategy to Confrontation – thinking how your attacker thinks

  • WhatsApp
  • Facebook
  • Email
  • LinkedIn
  • Bluesky
CPD This content can contribute towards your Continuing Professional Development (CPD) as part of the IET's CPD Monitoring scheme.
Event
  • Session
  • Wednesday, 15 June 2016
  • 09:15 - 09:15
  • Duration: 40 mins
  • Publication date: 04 Jul 2016
  • Location: NA, America Square Conference Centre, London, United Kingdom
  • Part of event Cyber Security in Modern Power Systems

About the session

A smarter national grid infrastructure with greater connectivity ultimately becomes more susceptible to cyber-threats and cyber-attacks.

Cyber threats exploit the complex connectivity of critical network systems, resulting in a detrimental impact to our infrastructure, significant disruption and reputational harm.

Cyber-attacks on the grid can also affect a company’s bottom line, driving up costs and impacting revenue, as well as harming an organisation’s ability to innovate to gain and retain customers.

The risk of cyber- attacks to vital infrastructure is no longer a new threat and this event will offer an overview on operational and technical strategies for large and complex networks, current think and guidance on network protection and will explore procedural management to secure the network and keep the lights on.

Keywords:
  • SCADA
  • cyber security
  • smart meter

Channels

Power

Power

IT

IT

Speaker

  • MW

    Mike Westmacott

    Thales Cyber and Consulting Services, Cyber Security Practice Technical Lead

    Mike works in the technical domain of the cyber security practice and operates broadly on the same basis as an attacker. He has conducted hundreds of penetration tests and audits against a wide variety of systems and targets, combined with activities such as secure code review, reverse engineering and wireless assessment. This experience has given Mike a deep understanding of both how security is developed within a system and also how vulnerabilities can be exploited. Mike is a CREST Registered Tester, CREST Certified Network Intrusion Analyst (CCNIA) and has performed breach assessments in a wide variety of different industry sectors including finance, eCommerce, EU and UK government, and aerospace.Embedded and mobile systems are Mike’s primary interest area, and he has developed significant expertise in the reverse engineering of Android and iOS applications and is extending those skills into the automotive, rail, and energy arenas. He supports and is engaged in activities to develop technologies for the assessment of complex and CoTS (Commerical off the shelf) embedded systems regardless of their purpose.Technological advances are having an impact on the ability for police forces to analyse evidential items such as computers in a timely fashion and Mike foresees future environments and homes where crime investigators will be presented with an even larger number of devices that can provide information that needs to be forensically secured and analysed.Mike founded a volunteer group in BCS (The Chartered Institute for IT) to introduce IT practitioners to the information security industry and has presented at a government select committee and taken part in numerous senior panels at industry and government events. He has also written articles for well-known industry publications including Energy Focus, ITnow, Computer Weekly and InfoSecurity Magazine.Prior to working in information security Mike worked as an application support analyst on a financial trading platform and later an enterprise succession planning system. Before this Mike gained his PhD in Computer Vision at the University of Southampton through a thesis that examined signal processing and the use of term frequency indexing techniques for rapid database retrieval.
cloud computing computer crime security of data software reliability
The Institution of Engineering and Technology iet.tv

Address: Futures Place, Kings Way, Stevenage, SG1 2UA

Telephone: +44 (0)33 049 9123

Email:  iet.tv@theiet.org

© 2026 The Institution of Engineering and Technology.

The Institution of Engineering and Technology is registered as a Charity in England & Wales (no 211014) and Scotland (no SC038698). Futures Place, Kings Way, Stevenage, Hertfordshire, SG1 2UA, United Kingdom

  • LinkedIn
  • Instagram
  • YouTube
Privacy statement Cookie Preferences Accessibility About us theiet.org Help

Powered by Cadmore Media

Embed Code

<script type="text/javascript" src="https://play.cadmore.media/js/EMBED.js"></script> <div class="cmpl_iframe_div"> <iframe src="https://play.cadmore.media/Player/6b58e564-c0d6-4b15-9b9c-79cd80b0ef7c" scrolling="no" allowtransparency="true" allowautoplay="true" frameborder="0" allow="encrypted-media;autoplay;fullscreen" class="cmpl_iframe" allowfullscreen="" style="overflow: hidden;border: 0px; margin: 0px; height: 100%; width:100%;"></iframe> </div>

Are you sure you want to reset your password?

If so, you will be redirected to the Authentication Service

Title

Prompt