Team

Our Team

Jim Crowley, CEO

As Industrial Defender’s CEO, Jim is passionate about the company’s mission and focus on protecting critical infrastructure. A seasoned technology executive with over 20 years in the information security space, Jim has helped build companies including Imperva, Threatstack, and SecurityMatters into high growth organizations. Jim started his career as an industrial sales specialist for A.W. Chesterton company, a supplier of specialty chemicals, seals, and pumps, managing a territory in Northern New England that included shipyards, pulp and paper, textiles, auto parts manufacturers and power plants.

Phil Dunbar, CTO

As CTO, Phil leads Industrial Defender’s technology development team, leveraging his experience in the industrial control systems industry to develop innovative solutions to ICS challenges. Prior to Industrial Defender, Phil served as Director of Software Development for SCADA and HMI systems at both GE and Intellution, founded ICT Software GmbH Munich and Androx Corporation, and spent his early career at Modicon, Schneider Electric, Analog Devices and Siemens.

George Kalavantis, COO

As chief operating officer at Industrial Defender, George is responsible for the operations of the company. He brings more than 27 years of operational experience to Industrial Defender. His experience and leadership have focused on the development and delivery of technology and compliance driven business services and solutions for critical infrastructure, the delivery of outstanding client service and operational profitability. As a former manager at National Grid US, George has operational experience as an asset owner and operations specialist.

TC Lau, VP of Customer Services

TC is responsible for customer deployment and customer support operations at Industrial Defender. TC brings extensive experience in leading and growing high tech businesses. Previously, TC held VP and Director level positions at Norkom Technologies, Progress Software, Systinet, Lockheed Martin, and Leidos. He was also a founder and served as Chairman, VP of Business Development, and VP of Operations at Context Integration, a nationwide business system integrator. TC holds an engineering degree from Massachusetts Institute of Technology.

Jeff Smigel, VP Engineering

Jeff is responsible for software engineering and quality assurance at Industrial Defender. Leading our high-caliber engineering teams, he ensures delivery of the innovative, quality products that our customers have come to expect. Jeff was an early contributor to the Industrial Defender solution and has provided continuity through Industrial Defender’s product history. Previously, Jeff has led engineering teams at Lockheed Martin, Leidos, and Capgemini.

Bill Pratt, VP of OEM & Channel Sales

Bill is responsible for developing and executing Industrial Defender’s channel partner strategy. Bill has over 20 years of experience in the energy sector.   He was a Director at National Grid for 15 years and since 2011 he has worked for several software companies selling into the utility space both directly and through large scale channels.  Bill holds a BA in Economics and East Asian Studies from Trinity College, Hartford CT and an MBA from Columbia University, NY.

Peter Lund, VP of Product Management

Peter has a strong technical and business background with over 15 years of experience working with and for IT and OT product companies.  Over the last five years, Peter was instrumental in bringing new features to the market for Industrial Defender.  In addition to his product management role, he utilizes a wide range of experience in application development, systems engineering and marketing. Prior to working with Industrial Defender, Peter held roles at Dell EMC, Schneider Electric and KVH Industries.

Erin Anderson, Director of Marketing

Erin passionately supports the mission to empower critical infrastructure organizations with stronger cybersecurity for their operational technology (OT) systems. In her role at Industrial Defender, she guides strategic initiatives to transform the company from an OT security pioneer into a market leader. Prior to joining Industrial Defender, she led marketing for the North American region at another OT security innovator, SecurityMatters, which was acquired by Forescout Technologies in 2018.

Take a guided tour of the product with one of our knowledgeable staff members.

  • Real-time cyberattack detection and alerting
  • Vulnerability management
  • Automated standards & compliance reporting

Speak with a Member of Our Team

Blog

Industrial Control Systems Cybersecurity Blog and News

A Guide to NIS Directive Compliance

Learn what the NIS Directive is, who it applies to, potential penalties for non-compliance and best practices for complying with the Directive.

NERC CIP Checklist for Identification and Categorization of BES Cyber Assets

NERC CIP 002-5.1a can be divided into three steps: identify systems, inventory assets, categorize risk. This can serve as a helpful model for approaching and maintaining compliance.

,

Webinar – Why Hasn’t SOAR Taken Off in OT?

Learn how to enable SOAR in your OT environment and gain access to contextual asset data in this webinar featuring Splunk.

Asset Visibility vs. Asset Management

Combining asset visibility and asset management results in robust asset awareness. Each is a distinct concept but relies upon the other to be effective.

How Contextual Asset Data Makes SOAR Possible in OT Environments

SOAR technologies are used to automate parts of the security investigation process, and access to the right contextual data is vital when using these tools in operational technology (OT) environments.

7 Questions to Ask When Choosing an OT Cybersecurity Solution

Matching individual needs with a specific OT cybersecurity solution is difficult. These seven questions will help inform the search for an OT cybersecurity solution.

How Quality Data Builds the Foundation for Machine Learning in Cybersecurity

Machine learning mimics the way humans make decisions using data and algorithms. Feeding the proper data to ML algorithms can help companies avoid falling victim to cyberattacks.

How to Ask Your CISO for OT Cybersecurity Budget

Tips for how operational technology (OT) engineers can engage with CISOs to make a strong case for their OT cybersecurity budget.

Defending the Industrial Internet of Things

The Industrial Internet of Things is creating a merging of OT and IT systems, leading to an increase in vulnerabilities and a greater need for asset monitoring and threat detection.