Anil Gosine
Anil Gosine has over 18 years of construction management, operations and engineering experience within the Industrial Sector with a primary focus on electrical, Instrumentation and automation process and systems in the U.S., Canada, and Central America. He has been heavily involved in the utility industry for over 11 years engineering, implementing and project managing a wide range of projects, utilizing a wide array of products and control system technologies within this industry segment. Anil is an active member of several professional organizations and independently participates in industry forums and technical committees for infrastructure development, industrial automation design and implementation, data analytics, and cyber-security processes. Anil is the global program manager for global industrial projects with MG Strategy+ and leads the Strategic Efficiency Consortium Security Workgroup with specific focus on cybersecurity metrics, threats, vulnerabilities, and mitigation strategies for ICS and security intelligence and analysis.
Articles
Standardizing the delivery, performance of system integrators
Automation system integrators contractors can provide a central point of coordination and responsibility for all aspects of an automation project.
Water and wastewater utilities leverage IIoT for energy management
Industrial Internet of Things (IIoT) technologies and strategies help water and wastewater utilities advance energy efficiency goals. See applications: 7 IIoT benefits below.
Utility sector strengthens security posture with rise of IIoT
Cybersecurity: Improving evaluation and certification methods, security audits, and testing provide a foundation for evaluating Industrial Internet of Things (IIoT) devices.
Key security components and strategies for industrial control systems
Back to Basics: Industrial control systems (ICSs) are becoming a more frequent target for cybersecurity attacks, and companies working in vital industries need to take steps to prevent or reduce the risk for a catastrophic event. See five drivers of and eight ways to support ICS cybersecurity.