emPOWERUP Virtual 2021 Agenda
First Look: GE Digital’s Operations Hub 2.0
Presenter: Greg Hazel, GrayMatter
Ops Hub 2.0 offers a slew of powerful capabilities including centralized visualizations, mobile device accessibility, data management and historical data analysis for HMI/SCADA and MES. GrayMatter’s session will highlight Ops Hub’s historical trend analysis options, drag-and-drop functionality, connectivity with OPC UA data sources, Microsoft SQL server integration and compliance with ISA 18.2 and ISA 101 for improved operator performance and safety.
In addition, Historian and Plant Applications users can learn how to browse a facility’s assets and build trend reports based on OEE screens that track equipment downtime, top downtime reasons and mean time between failure.
Connecting and Increasing Efficiencies
with IoT, Wireless and Cloud Solutions
Presenter: Kelli Settell, GrayMatter
Learn how you can implement Edge and wireless devices that are secure and quick to deploy with your existing equipment and controls. Enable your facility and update your machinery in a streamline approach to increase your uptime and efficiencies, head off any unplanned downtime, and improve machine insight.
The session will highlight Emerson’s Edge technology as a means of securely capturing existing critical data and wireless technology additions as needed to feed a cloud or on-premises SCADA system and analytics packages. We’ll also spend time discussing browser-based flow editing two quickly and efficiently connect industrial hardware devices, APIs and cloud web services such as Microsoft Azure that provide the secure backbone for powerful Advanced Industrial Analytics solutions.
deceptionGUARD: Deceiving Cyber Criminals
& Harvesting Intelligence to Protect Industrial Operations
Presenter: Scott Christensen, GrayMatter
GrayMatter’s cybersecurity director outlines GrayMatter’s new deception technology offering, deceptionGUARD.
We’re simplifying the process of deploying virtual decoys and sirens to stop cyber-attacks by diverting them to harmless, fake targets at your network’s perimeter. Learn about how virtual decoys and sirens mimic real industrial PLCs and network traffic and automatically trigger an alert when threats perform a network reconnaissance scan or attempt to gain access. Deception technology makes it easy to block traffic by geo-location, tailor protection specifically for an organization’s Operational Technology network and act early in the cyber kill chain.
Ready to start a project?
Looking to begin an advanced industrial analytics strategy, cybersecurity assessment, deception technology or to simply know where to start? We can help.