Weekly newsletter of Dr. Ir Johannes (JD) Drooghaag — Issue #10

Dr. ir Johannes Drooghaag
5 min readDec 6, 2021

All eyes on AWS re:Invent

Is Industrial Cloud feasible?

There is an old but valid rule in manufacturing and industrial automation that says “do not try to solve factory challenges with office solutions”. Although rule stands until today, we still need to keep an open mind for digital transformation and the opportunities industrial cloud might offer.

Is industrial cloud feasible?johannesdrooghaag.com

It has been a while since I heard “don’t try to solve factory challenges with office solutions” the first time. Several decades to be precise, but it is still a valid rule and every now and then I hear myself saying it to some of the cloud advocates who haven’t quite understood industrial environments yet. …

Is industrial cloud feasible? Read More »

The post Is industrial cloud feasible? appeared first on Dr. ir Johannes Drooghaag.

USE CASE Industrial Machine Learning and Cloud in Manufacturingjohannesdrooghaag.com

One of my favorite projects is also a wonderful use case to analyze if Industrial Cloud is feasible. With my background in the automotive industry and industrial automation, it should be no surprise that this relates to car part manufacturing. After joining AWS re:invent as analyst where I focused on Industrial Machine Learning and Cloud …

USE CASE Industrial Machine Learning and Cloud in Manufacturing Read More »

The post USE CASE Industrial Machine Learning and Cloud in Manufacturing appeared first on Dr. ir Johannes Drooghaag.

TRAINING: Back to the Future Cyber Security for Manufacturing & Industryjohannesdrooghaag.com

Manufacturing and Infrastructure are driven by long-term investments and matching depreciation of technology and equipment. Industrial Equipment which is older than the specialists operating them is not uncommon. At the same time, cyberthreats are evolving in unprecedented pace. Impact and complexity of cyberthreats continues to grow and this trend will not change. When we realize …

TRAINING: Back to the Future Cyber Security for Manufacturing & Industry Read More »

The post TRAINING: Back to the Future Cyber Security for Manufacturing & Industry appeared first on Dr. ir Johannes Drooghaag.

KEYNOTE: Back to the Future Cyber Security — An action plan to ensure Cyber Security for our existing Manufacturing facilities and infrastructurejohannesdrooghaag.com

Around 80% of our global manufacturing capacity and infrastructure was not build in this century and that is a good thing. Long term investments mean commitment and a perspective of growth and stability. And it can also become a bad thing when we fail to ensure Cyber Security for the Industrial Control Systems. The challenges …

KEYNOTE: Back to the Future Cyber Security — An action plan to ensure Cyber Security for our existing Manufacturing facilities and infrastructure Read More »

The post KEYNOTE: Back to the Future Cyber Security — An action plan to ensure Cyber Security for our existing Manufacturing facilities and infrastructure appeared first on Dr. ir Johannes Drooghaag.

Leadership Circle

A cyber incident will happen. Plan and prepare accordingly!leadership-circle.net

A cyber incident will happen. Plan and prepare accordingly! There are two phases in a cyber incident that influence the duration and impact. First there is of course the type of attack and how sophisticated it is. Although we must do everything possible to prevent a cyber incident, it is hardly possible to guarantee that …

A cyber incident will happen. Plan and prepare accordingly! Read More »

The post A cyber incident will happen. Plan and prepare accordingly! appeared first on Leadership Circle.

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill.leadership-circle.net

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. It is time we develop that soft-skill! For many years the focus of cybersecurity initiatives has mainly been on technology, which is of course important but does not cover the entire bandwidth of challenges and …

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. Read More »

The post After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. appeared first on Leadership Circle.

Patching, segmentation, and identity/access control are by far the most effective and simplest of all cyber security measures.leadership-circle.net

Three basic elements of cybersecurity, which are also known as the foundation or cornerstones of cybersecurity, are by far the most effective and simple measures to protect organizations and infrastructure against cyber threats. Without these basic elements, the implementation of more advanced concepts like ZERO trust are not possible, and in fact, don’t make any …

Patching, segmentation, and identity/access control are by far the most effective and simplest of all cyber security measures. Read More »

The post Patching, segmentation, and identity/access control are by far the most effective and simplest of all cyber security measures. appeared first on Leadership Circle.

--

--

Dr. ir Johannes Drooghaag

Dad, consultant, coach, speaker, author. Mainly Cyber Security, leadership, responsible tech and organizational change. https://johannesdrooghaag.com