Sensors Converge presentation on process sensor cybersecurity considerations
On May 7, 2026, I will be presenting at Sensors Converge in Santa Clara, California: “Process Sensor Monitoring for Cybersecurity, Reliability, and Safety”.
The presentation will address:
- Why process sensors (Level 0 devices) are inherently cyber vulnerable, yet remain largely unrecognized by cybersecurity organizations;
- How process sensor incidents, both malicious and unintentional, have caused catastrophic and fatal cyber/operational events across multiple sectors but were not identified as being cyber-related;
- How monitoring process sensors at the physics level can materially improve reliability, safety, and cybersecurity;
- What a process sensor cybersecurity program should include and what organizations should be involved; and
- The implications of non-cybersecure process sensors on U.S. and EU cybersecurity requirements.
Get your subscription to Control's tri-weekly newsletter.
Nation-state actors, including Russia, China and Iran, understand Level 0 cyber deficiencies. In contrast, most cyber defenders do not. This gap helps explain why process sensor cybersecurity remains largely absent from OT security forums and RSA Conference discussions. It may also explain why government OT cybersecurity advisories don’t include insecure Level 0 devices, even though process sensors provide the trusted input to controllers and SCADA/DCS systems.
About the Author
Joe Weiss
Cybersecurity Contributor
Joe Weiss P.E., CISM, is managing partner of Applied Control Solutions, LLC, in Cupertino, CA. Formerly of KEMA and EPRI, Joe is an international authority on cybersecurity. You can contact him at [email protected]

Leaders relevant to this article:
