Support
Our team

The team leading the way in critical infrastructure cybersecurity.

Jay Williams

CEO

As CEO of Industrial Defender, Williams is positioning the company as an integral enabler of the OT cybersecurity transformation and scaling it through the next phase of global growth. He is a highly regarded cybersecurity executive with 30 years’ experience in OT/ICS environments and 25 years’ executive leadership experience. His background spans roles creating and leading OT cybersecurity divisions at Ernst & Young, Veracity Networks, Parsons Corporation and Siemens. He is also an associate of the ICS Village and member of the Cybersecurity Advisory Council for the Syracuse City School District, teaching the next generation of students the core concepts to understand, assess and protect information security systems.

George Kalavantis

COO

As chief operating officer at Industrial Defender, George is responsible for the operations of the company. He brings more than 27 years of operational experience to Industrial Defender. His experience and leadership have focused on the development and delivery of technology and compliance driven business services and solutions for critical infrastructure, the delivery of outstanding client service and operational profitability. As a former manager at National Grid US, George has operational experience as an asset owner and operations specialist.

Aaron Crow

CTO

Aaron has over 25 years’ experience working in IT and cybersecurity, with more than 15 of those focused on critical infrastructure and power utilities. While working at Ernst & Young, he worked hands-on to secure industrial environments at energy and utility organizations, building out multiple, large scale OT cybersecurity programs that reached across hundreds of sites, multiple states and different entities. Aaron brings valuable industry knowledge from his time as an asset owner and as a consultant advising and guiding large multiyear programs.

Gabe Authier

CPO

Gabe Authier has over 20 years of experience creating customer-centric software solutions in both the IT and operational technology spaces. As CPO at Industrial Defender, he guides the innovation behind cybersecurity and compliance products that protect critical infrastructure from cyberattacks. He holds certifications in both Agile practices and Pragmatic Marketing methodology and received a BS in Systems Engineering from University of Arizona and Executive MBA from the University of Oregon.

Alex Bagwell

CRO

Alex brings over a decade of expertise selling SaaS and on-prem solutions to cyber and physical security teams across OT/ICS, IoT and IT environments. As Industrial Defender’s Chief Revenue Officer, he is responsible for growing and scaling the global sales, channel and sales operations functions. In his past executive sales roles, Alex was responsible for GTM strategy focused on revenue growth and managing a global security sales team.

Greg Valentine

SVP Solutions Engineering

Greg has over 30 years of experience in the high software industry. The past 15 of which has been focused on cyber security. Greg currently holds two certifications including an ISC2 – CISSP, and GIAC – GRID. Greg is responsible for building technical solutions for Industrial Defender so that our clients receive the most effective, and most efficient implementations of the Industrial Defender software. Prior to working at Industrial Defender, Greg held cybersecurity roles at Lockheed Martin, Capgemini, and Winternals Software (a sister company to Sysinternals, now owned by Microsoft).

TC Lau

VP of Customer Services

TC is responsible for customer deployment and customer support operations at Industrial Defender. TC brings extensive experience in leading and growing high tech businesses. Previously, TC held VP and Director level positions at Norkom Technologies, Progress Software, Systinet, Lockheed Martin, and Leidos. He was also a founder and served as Chairman, VP of Business Development, and VP of Operations at Context Integration, a nationwide business system integrator. TC holds an engineering degree from Massachusetts Institute of Technology.

Jeff Smigel

VP Engineering

Jeff is responsible for software engineering and quality assurance at Industrial Defender. Leading our high-caliber engineering teams, he ensures delivery of the innovative, quality products that our customers have come to expect. Jeff was an early contributor to the Industrial Defender solution and has provided continuity through Industrial Defender’s product history. Previously, Jeff has led engineering teams at Lockheed Martin, Leidos, and Capgemini.

Ray Lapena

VP Marketing

Ray oversees global marketing, communications, brand and content at Industrial Defender. He brings over a decade of cybersecurity marketing experience spanning IT and OT. From heavy duty gas turbines to control systems, asset performance monitoring to security software and services, Ray has led marketing initiatives across several facets of security and industrial operations and is passionate about helping customers find the right solutions for their desired outcomes.

Let's meet

Contact Us

Fill out a quick form and we’ll be in touch to help answer all your questions.

Contact Us
Let’s get to know each other

Careers

Ready to work in one of the fastest growing sectors of the cybersecurity market?

View Careers

What’s happening at Industrial Defender

Podcast: Episode #16 - Duane Laflotte: Simulating Real-World Attacks on OT with Red Teaming
Read More
Podcast: Episode #15 - Bryson Bort: Contextualizing Cyber Risks To Prioritize Security Efforts
Read More
Podcast: Episode #14 - Emilio Salabarria: Building Organizational Resilience through Cyber Assessments
Read More
Podcast: Episode #13 - Dan Gunter - How our Growing Ability to Process Data Affects Cybersecurity
Read More
Podcast: Episode #12 - Slade Griffin: Securing the Industrial World
Read More
Podcast: Episode #11 - Kurt Sanger
Read More
Podcast: Episode #10 - Tony Sager: Practicality Over Perfection and Simplifying Security Standards
Read More
Podcast: Episode #9 - Keeping People Safe is the Heart of Cybersecurity – A Conversation with Vice Admiral TJ White
Read More
Podcast: Episode #8 - Debbie Gordon: Practicing Cyber Safety Through Simulated Environments
Read More
Podcast: Episode #7 - Patrick Miller: Discussing the New INSM Requirements for NERC-CIP
Read More
Podcast: Episode #6 - Sean Plankey: Protecting Critical Systems Within the IT/OT Convergence
Read More
Podcast: Episode #5 - Lucian Niemeyer: Making Cyber Safety A Part Of Culture
Read More
FERC and NERC Look to Strengthen CIP Standards for Bulk Electric Systems
Read More
Podcast: Episode #4 - A Roundtable Discussion with Industrial Defender Leaders
Read More
Podcast: Episode #3 – Greg Valentine: You’re Compliant. Now Prove it.
Read More
Podcast: Episode #2 - Dennis Murphy: The Challenges With IT and OT Convergence
Read More
Podcast: Episode #1 - Welcome to PrOTect OT Cybersecurity Podcast
Read More
$858 Billion Defense Bill: The Critical Infrastructure & Industrial Cybersecurity Considerations
Read More
Hacked for the Holidays: Securing OT Infrastructure Against a Season of Increased Risk
Read More
Solving Cybersecurity Challenges in the Oil and Gas Industry
Read More
SIEM and Data Lakes in OT: New Challenges Bring New Choices
Read More
Modernizing Maritime OT Cybersecurity: Unique Obstacles and Opportunities
Read More
Don’t Give Compliance a Bad Name
Read More
A Guide to Configuration and Change Management in OT
Read More
A Breakdown of TSA’s Security Directive 1580-21-01A to Enhance Railroad Cybersecurity
Read More
One Destination, Multiple Paths: The 4 Data Collection Methods Needed for True OT Asset Management
Read More
What Is Shadow OT and Why Is It Important?
Read More
OT Asset Management Means Going Beyond OT Asset Visibility
Read More
3 Key Takeaways from Our 2022 State of OT Cybersecurity Research
Read More
TSA Issues Revised Security Directive Requirements for US Pipelines
Read More
China Is Targeting America’s Critical Infrastructure. Here’s What You Can Do About It.
Read More
How Quality Data Builds the Foundation for Machine Learning in Cybersecurity
Read More
How to Overcome Vulnerability & Patch Management Challenges in Your OT Environment
Read More
FBI’s Internet Crime Report Discloses 3,700+ Ransomware Attacks in 2021
Read More
Massive DDoS Attack Hits Israel
Read More
Cyber Incident Reporting for Critical Infrastructure Act Signed Into Law
Read More
Biden Administration Announces Plan for Electric System Cybersecurity
Read More
NIST Releases Draft of Cybersecurity Framework Profile for Ransomware Risk Management
Read More
An Overview of the Proposed Revisions to NERC CIP-004 and CIP-011
Read More
Meat Packing Giant JBS Hit with Cyberattack
Read More
DHS Issues Pipeline Cybersecurity Directive
Read More
An Overview of CISA’s ICSA-21-056-03 Advisory for Rockwell Automation Logix Controllers
Read More
Biden Extends Huawei Ban and Issues New Guidance on Improving Cybersecurity
Read More
Florida Water Treatment Plant Hit With Cyber Attack
Read More
How to Create an EDR/MDR Alternative for OT Systems
Read More
Managing Cybersecurity for Renewable Energy Resources
Read More
Summary of NERC CIP Requirements
Read More
Using the NIST CSF Security Controls to Prevent and Recover from Ransomware
Read More
What Is NERC CIP: The Ultimate Guide
Read More
7 Questions to Ask When Choosing an OT Cybersecurity Solution
Read More
OT Cybersecurity: The Ultimate Guide
Read More
Satellite Cybersecurity Act of 2022 Highlights Growing Importance of Satellite Networks in Critical Infrastructure
Read More
How to Centralize OT Security Data in a SIEM
Read More
What Impact Will the Proposed SEC Cybersecurity Rules Have on Public Companies?
Read More
OT Vulnerability Management: A Deep Dive
Read More
Asset Visibility vs. Asset Management
Read More
Understanding the Importance of Operational Technology Security in the Maritime Industry
Read More
NERC CIP Checklist for Identification and Categorization of BES Cyber Assets
Read More
Defending the Industrial Internet of Things
Read More
NERC CIP-007 R2: Why Is Patch Management So Hard & What Can We Do About It
Read More
Russia Has 400,000 Software Developers – What Does That Mean for the West?
Read More
Why Do Ransomware Gangs Target Private Equity Portfolio Companies?
Read More
Colonial Testimony Highlights Importance of Asset Awareness
Read More
A Risk-Based Approach to Cybersecurity Without Cyber Hygiene Is a Fool’s Errand
Read More
Addressing Pipeline Cybersecurity Regulations: Lessons from NERC CIP
Read More
Why Passive Network Monitoring Isn’t Truly “Passive”
Read More
Creating a Threat-Informed Defense with the MITRE ATT&CK for ICS Matrix
Read More
How a Security by Design Approach Might Have Stopped the Florida Water Facility HMI Attack
Read More
What Does the SolarWinds’ Sunburst Backdoor Mean for ICS?
Read More
A Guide to Preventative and Detective Controls for NERC CIP-013 Compliance
Read More
CodeMeter Vulns: Why Complete Software Inventory Data Is Critical for ICS
Read More
Establishing OT Cybersecurity Fundamentals with the CIS Controls
Read More
Making Smarter Risk Management Decisions with OT Endpoint Data
Read More
CVE-2020-1350 "Wormable" Flaw in Microsoft Windows Server Could Cause Major Issues for ICS/OT World
Read More
CVE-2021-44228 - Industrial Defender update on log4j
Read More
Video: Monitoring Building Management Systems with Industrial Defender and Splunk
Read More
Feature Focus: Building Management System (BMS) Security and Risk Monitoring
Read More
4 Benefits of Implementing a Cybersecurity Solution for Building Management Systems
Read More
Feature Focus: Asset Risk Scoring Methodology & Netflow Application
Read More
Video: Deploying Industrial Defender Agents on ICS and SCADA Systems (Part 2)
Read More
Video: How To Monitor High-Value OT Assets in Microsoft Power BI
Read More
Video: Deploying Industrial Defender Agents on ICS and SCADA Systems (Part 1)
Read More
Podcast: CTO Phil Dunbar Talks About the Return of Industrial Defender on the Waterfall ICS Security Podcast
Read More
Operationalizing Cyber Programs for Industrial Control Systems - 5 Real World Use Cases
Read More
Video: Integrating 3rd Party Monitoring Tools with Industrial Defender
Read More
Video: Scanless Vulnerability Monitoring for ICS Environments
Read More
Video: OT SOC Enablement with Splunk
Read More
Critical Infrastructure targeted by Russian Government Cyber Activity
Read More
CISA, DOE, NSA and FBI Release Joint Cybersecurity Advisory on APT Cyber Tools Targeting ICS/SCADA Devices
Read More
White House Urges Private Companies to Strengthen Cybersecurity, Citing Intelligence on Escalating Cyberthreats
Read More
Combining Splunk with Industrial Defender Will Provide You with the Most Comprehensive View into Your NIST CSF Risk Exposure
Read More
How to Ask Your CISO for OT Cybersecurity Budget
Read More
PHMSA Fines Colonial Pipeline Almost $1 Million, Citing Failure to Adequately Plan for Manual Restart
Read More
MITRE ATT&CK for ICS Matrix: What It Is and How Its Used
Read More
A Guide to NEI 08-09 Compliance for Nuclear Power Operators
Read More
Shields Up: 6 Actions to Fortify Your OT Security
Read More
A Guide to NIS Directive Compliance
Read More
3 Tips for Rail Operators to Get Started with ICS Cybersecurity
Read More
How to Approach IoT Cybersecurity for Smart Buildings
Read More
What Does the National Maritime Cybersecurity Plan Mean for the MTS?
Read More
Webinar: NIS2 Compliance for OT Operators - What You Should Be Doing Today
Event Details
Infosecurity Europe
Event Details
The Future of Asset Management in Operational Technology
Industrial Defender Launches Phoenix: A Quick-Start OT Visibility & Security Solution for Small to Medium Sized Operations
Industrial Defender Launches 7.5 Platform: A Unified Source for Operational Asset Data
Industrial Defender Partners with Nozomi Networks to Extend Endpoint Security Capabilities in Industrial Environments
Industrial Defender Appoints Gabe Authier as Chief Product Officer
Industrial Defender Appoints Aaron Crow as Chief Technology Officer
Industrial Defender Releases Inaugural State of OT Cybersecurity Research Survey Report
Industrial Defender Appoints Jay Williams as Chief Executive Officer
Rising threats spark US scramble for cyber workers
Forbes Expert Panel - 13 Tech Areas, Functions And Laws Facing New Or Potential Government Oversight
Colonial Pipeline was cyber wake-up call; Ukraine war is escalator
Industrial Defender Unveils New OT Vulnerability Management Solution, Immunity by ID™
Industrial Defender and GrayMatter Team Up to Equip Energy and Water Companies with Holistic Cybersecurity Defenses
Oil and gas industry scrutinized for weak cyber defenses
Need for critical infrastructure sector to shore up cyber defenses, amid geopolitical tensions
Industrial Defender Opens European Office in the Netherlands to Meet Increasing Global Demand for OT Cybersecurity
4 Tips to Secure the OT Cybersecurity Budget You Require
Why Cyber Due Diligence Is Essential to the M&A Process
Security leaders on how to cope with stress of Log4j
Industrial Defender Wins Gold Award for Best ICS/SCADA Security Product in the 2022 Cybersecurity Excellence Awards
Industrial Defender 7.4 Centralizes Data Collection, Offers Customized Risk Calculations to Secure OT Environments
Watch: Industrial Defender Featured in Congressional Transportation Committee Hearing
Industrial Defender and BridgeWare Partner to Bring Operational Technology Cybersecurity to Korea
Video: Digital Anarchist Interviews CEO Jim Crowley On National Security Directive
Podcast: CS2AI Becoming an Effective Leader in Technology Control Systems
Industrial Defender Delivers Industry-First OT Machine Learning Engine Using Both Network and Endpoint Data
Industrial Defender and Fetch Automation Partner to Deliver Operational Technology Cybersecurity and Compliance Solutions for Australia
Executive Q&A: Cyberattack Warnings and Trends
The Need to Protect Digital Infrastructure Highlights This ETF
Don't Let Cybercriminals Ruin your Merger or Acquisition–Follow This Expert's Advice
Russia, China, Cyber War, and Letters of Marque and Reprisal
Industrial Defender Partners with Diverse Solutions Engineering to Bridge the Gap Between Cybersecurity and Safety for Oil, Gas and Petrochemical Organizations
Industrial Defender CEO Jim Crowley Quoted on ToolboxTech.com
Industrial Defender Named Hot Company in OT Vulnerability Management by Cyber Defense Magazine in the Global InfoSec Awards
Industrial Defender ASM for Splunk App Delivers Deeper Contextual Data for Faster Response to Security Events
Industrial Defender Wins Gold Award for Best ICS/SCADA Security Product in the 2021 Cybersecurity Excellence Awards
Industrial Defender and aeCyberSolutions Join Forces to Elevate OT Cybersecurity Assessments for Energy and Maritime Companies
Rand McNally Selects Industrial Defender to Secure Its Industrial Internet of Things
Industrial Defender and Technomak Partner to Secure Critical Infrastructure in the Middle East
Industrial Defender Launches CopilOT Service™ to Address Cybersecurity Talent Shortage for Critical Infrastructure Companies
Industrial Defender Establishes IT-OT Integration Lab to Virtually Research, Develop and Evaluate ICS Cybersecurity Technologies
Industrial Defender and aDolus Partner to Secure ICS Supply Chain with Independent File Validation
Industrial Defender and FoxGuard Solutions Team Up to Transform Patch and Vulnerability Management for OT Security Teams
Industrial Defender and Waterfall Security Solutions Partner to Safely Transmit Cybersecurity Data in Operational Technology Environments
Industrial Defender Strengthens OT Asset Anomaly Detection Platform and Assisted Passive Network Monitoring Engine to Automate Risk Quantification and Reporting
Teleo Capital Completes Acquisition of Industrial Defender from CapGemini America
Webinar: NIS2 Compliance for OT Operators - What You Should Be Doing Today
Watch Webinar
Webinar: Preparing for NERC-CIP's INSM Requirements
Watch Webinar
Breaking Down TSA’s Revised Security Directive: What Pipeline Operators Need to Know
Watch Webinar
Webinar: Shadow OT — Keeping the World’s Lights on With the OT Security Add-on for Splunk
Watch Webinar
Webinar: Managing OT Data
Watch Webinar
Webinar: Prepare and Prevent: Using the AESCSF to Prepare for the SLACIP Bill 2022
Watch Webinar
Webinar: Why Do Ransomware Gangs Target Private Equity Portfolio Companies?
Watch Webinar
Webinar: Predicting ICS and OT Cybersecurity Trends in 2022 & Beyond
Watch Webinar
OT Security 101 Training: How to Get Started
Watch Webinar
Webinar: Why Hasn't SOAR Taken Off in OT?
Watch Webinar
Webinar: How to Navigate Operational Technology (OT) Cybersecurity in Port Environments
Watch Webinar
Webinar - Breaking Down TSA’s Cybersecurity Requirements for Pipeline Operators: What to Do Now
Watch Webinar
Webinar - Squashing Spreadsheets: How to Orchestrate OEM Patch & Vulnerability Management
Watch Webinar
Webinar: What’s Hiding in Your Software? How SBOMs Reduce Supply Chain Risk
Watch Webinar
Webinar: Are You Using MITRE ATT&CK for ICS Correctly?
Watch Webinar
Webinar: How to Build a Cybersecurity Strategy for Your Building Management System
Watch Webinar