By Joe Cummins, CTO of CYBERNETIQ In Canada, and around the world, the intersection between OT, IT, and (I)IOT has continued to converge across multiple merged and with it has come the exploding evolution of the business layers and policy enforcement, organizations have been unable to meet the demands that are placed to create safe, secure, and resilient networks. With the erosion of the Enterprise network’s proximity to the ICS world, the conventional wisdom on the architecture and design has been fraught with challenges. As a result the corporations' inability to ensure that business functions and supporting rationale and alignment with operational goals that require a deep understanding of the networks that they’re charged with protecting, and find unique ways to manage the finite resources. Through repeatable threat modeling of Enterprise, ICS, and IOT networks, organizations can not only visualize the underlying network security deployment from the ground up, but also recoup much of the investments from the technology by cross-mapping and overlaying each dataset to enrich the full picture of the corporate environment. This method gives way to further align the operations “stack” of people, process, and technology from a grassroots level. From the link level to gateway and beyond, organizations need to see the entire environment, overlay the security dimensions and build solid architecture models to better address the critical risks within the organization. In this session, we will use real-world examples of organizations that operated within the Canadian ecosystem. We will share what is occurring at a “wire” level, and how this affects the gaps and overlaps of the security program. Dissect the existing traffic to spot malware proliferation, DNS queries, and other security issues that may go unnoticed.