Steve Mustard is an industrial automation consultant with extensive technical and management experience across multiple sectors. He is a licensed Professional Engineer (PE), ISA Certified Automation Professional® (CAP®), UK registered Chartered Engineer (CEng), European registered Engineer (Eur Ing), GIAC Global Industrial Cyber Security Professional (GICSP), and Certified Mission Critical Professional (CMCP).
Backed by 30 years of engineering experience, Mustard specializes in the development and management of real-time embedded equipment and automation systems and cybersecurity risk management related to those systems. He serves as president of National Automation, Inc. Mustard is a board member of the Mission Critical Global Alliance (MCGA), and a member of the Water Environment Federation (WEF) Safety and Security Committee. He was the 2021 President of the International Society of Automation (ISA).
Mustard writes and presents on a wide array of technical topics and is the author of “Industrial Cybersecurity, Case Studies and Best Practices” and ‘Mission Critical Operations Primer”, both published by ISA. He has also contributed to other technical books, including the Water Environment Federation’s “Design of Water Resource Recovery Facilities, Manual of Practice No.8, Sixth Edition” and IEEE’s “Digital Twin Book”.
Mustard’s previous and current client list includes: the UK Ministry of Defence; NATO; major utilities, such as Anglian Water Services and Sydney Water Corporation; major oil and gas companies, such as bp, BG Group and Shell; Fortune 500 companies, such as Quintiles Laboratories; and other leading organizations.
PUBLICATIONS, CONFERENCES, AND SPEAKING ENGAGEMENTS
• 2022 -Information Technology in Water and Wastewater Utilities, MOP 33, Water Environment Federation (ISBN TBC) – contributing reviewer
• 2022 – Industrial Cybersecurity, Case Studies and Best Practices, ISA, (ISBN TBC)
• 2022 – The Digital Twin Book, IEEE, (ISBN TBC) – contributing author
• 2022 – Improving Project Documentation and Change Management, ISA Intech, April 2022 (co-author with Vilas Desai)
• 2022 – What you may not know about Soft PLCs, ISA Intech, February 2022 (co-author with Pascal Girerd)
• 2021 – Protecting Our Nation’s Critical Water Systems, Rural Water Magazine, Vol. 42, No. 3, September 2021
• 2021 - Safety, Health and Security in Wastewater Systems, MOP 1, 6th Edition, Water Environment Federation (ISBN TBC) – contributing reviewer
• 2018 – Mission Critical Operations Primer, ISA, (ISBN 978-1-945541-71-1)
• 2017 – Design of Water Resource Recovery Facilities, MOP 8, Water Environment Federation (ISBN 978-1-26003-118-8) – contributing author
• 2017 - Will blockchain technology disrupt the ICS world?, ISA Intech, November/December 2017
• 2017 – Cybersecurity, protecting operational technology, ISA Intech, January/February 2017
• 2016 –Testimony to the President’s Commission on Enhancing Cybersecurity, University of Houston, July 2016
• 2016 – From Manual to Automated, Water Environment & Technology, May 2016
• 2016 – Automation and cybersecurity at the Workforce Development Institute, ISA InTech, March/April 2016
• 2015 – When failure is not an option, ISA Flash, No 58, September 2015
• 2015 – Mission Critical Operations: When failure is not an option, ISA Intech, May-June 2015
• 2014 - NIST Cybersecurity Framework Aims to Improve Critical Infrastructure, Power Magazine, February 2014
• 2009 – The Growth of Wireless Technologies in Process Industries, Water Efficiency magazine, November/December 2009
• 2009 – Using Technology to Improve Asset Management Processes, Water Efficiency magazine, September/October 2009
• 2009 – SCADA and Live Pattern Matching, Water Efficiency magazine, July/August 2009
• 2007 - The business benefits of integrating SCADA and GIS, Distributech conference, San Diego, USA
• 2007 – Communications conundrum, IET Computing & Control Engineering magazine, April/May 2007
• 2006 - The application of SCADA techniques to deliver vehicle performance information in a reliable and cost-effective manner, IEE Automotive Electronics Conference, London, UK
• 2006 – Security of Distributed Control Systems, IET Computing & Control Engineering magazine
• 2005 - Pattern matching of live data to implement proactive network management, Computing and Control in the Water Industry (CCWI) conference, Exeter, UK
• 2005 – The use of SCADA techniques to improve Overall Equipment Effectiveness, IMechE Reliability, Maintenance and Condition Monitoring, London, UK
• 2004 - Technological solutions and innovation, Water UK Traffic Management Conference, London, UK
• 2004 - How technology developments can help the water industry, Institute of Water Officers forum, Birmingham, UK
• 2004 - The application of SCADA techniques to deliver vehicle performance information in a reliable and cost-effective manner, ERA Vehicle Electronic Systems conference, Birmingham, UK
• 2003 - Considerations for future RTU platforms, IEE Computing and Control in the Water Industry, Cambridge, UK
• 2003 - Using real-time data in managing business - experiences from other industries, SCADA systems in Energy conference
• 2003 - Integrating supervisory control and IT, European SCADA conference, London, UK
• 2002 – The demise of a serial story, TCP/IP based multi medium telemetry communications, JRC Utilities Communications Conference, Coventry, UK. Joint paper with Gordon Fyfe of Transco and Dirk Schladebach of Gilat
• 2001 – Networking helps cut losses, Water & Waste Treatment magazine
• 2001 – Anglian Water Leakage Reduction, UK Water Projects 2001
• 2001 – Anglian Water and LogicaCMG reduce leakage, Computing and Control in the Water Industry 2001, Leicester, UK. Joint paper with Simon Harrison of Anglian Water.
• 2000 – Matching Communications With Business Strategy in the Utilities Sector, Mobile Communications for Telemetry and Work Management conference, London, UK.
• 1989 - LINKS89 Conference - Presentation on final year project to delegates involved in higher education and research in European institutions, University of Lisbon, Portugal.
Most industrial control systems lack security by design. OT environments are especially difficult to defend against cyberattacks due to the vulnerability and fragility of systems in place, and the common use of implicit trust models. Mix in the increased connectivity between industrial and corporate networks and the remote access requirements for employees and third-party suppliers, and you have changed risk equation. Listen in as our panel addresses the cybersecurity essentials for the people, process and technology behind the movement toward Industry 5.0.