Huub Koninkx

Huub Koninkx

Senior Consultant Cyber Security at Highberg

About Huub

Huub is an Architect and Information Consultant at Highberg. He addresses complex issues related to the (re)design of information and application landscapes, their underlying infrastructure, and interfaces.

With his business administration background, he specializes in translating new developments and client requirements into suitable ICT-based solutions and approaches. Based on business processes, he can analyze, reason, and negotiate, always maintaining a practical, results-oriented approach.

He is an expert in information provisioning to support business processes and prefers to work within an architectural framework. He develops architectures, creates blueprints, or bases his work on his own reference framework when necessary.

Additionally, he frequently handles program requirements and package selection. He has done this both in restructuring situations, such as mergers and centralization, and in environments with interdependent solutions involving multiple parties, including chain partners and suppliers.

Last 10 years Huub has expanded his knowledge and experience as an expert on architecture and cybersecurity for ICS/SCADA, Operational Technology (OT) and digital asset management. Huub works in the (semi)public sector, including municipalities, Rijkswaterstaat, Water authorities, central government. As a result, he is very familiar with best practices, applicable frameworks (standards iec62443, CSIR), and developments such as cybersecurity, digitalisation & asset management, municipalities as government service desks, the digitization of work processes, document management, and chain informatization.

Want to know more? Connect with Huub on LinkedIn.

Department & Services:

Written by Huub

See all
Article
2 min read
March 26, 2024
Cybersecurity threats industrial automation (ICS/SCADA)

The world of Industrial Automation (IA) is increasingly facing cybersecurity threats. Not only foreign nuclear power plants have already been hacked, but also the first objects of our vital infrastructure. VKA has therefore developed a multidisciplinary approach to take IA to the desired higher level.

Article
3 min read
March 22, 2024
Stop muddling through and start working under architecture

Last year showed how vulnerable our infrastructure sometimes is as a result of cyber attacks. For example, PETYA caused non-functioning cranes at Maersk's container terminal, and non-functioning sorting machines at TNT. Also recently, some banks have proved inaccessible due to a DDos attack. Until now, mostly technical and related organizational measures have been taken to deal with such cybersecurity threats. However, it is slowly dawning on us that reactive measures will not be sufficient in the future if we want to guarantee the continuity of such infrastructure. So how do we really get our Operational Technology (OT/ICS/SCADA) properly secured?

Article
5 min read
March 22, 2024
IT and OT converging, how do we keep a grip on this (r) evolution?

IT and I(I)OT are converging, developments are accelerating, now what, evolution or revolution? Actually, there are 3 major developments happening simultaneously in the world of operational technology (OT). First, the number of business and management processes that require both office automation (IT) and OT to be available is growing; with or without interfaces between them. Applications are growing, but information security is not automatically growing with them. This makes a second development even more important, that of growing external threats, with most in the news ransomware, such as previously at Maersk, recently at the Gelderland security region. Last but not least, there is a new player in this domain, dubbed by someone the "IoT virus. It often starts with 'sensors,' but eventually it involves large data streams, which need to be controlled. Lots of potential but immature in terms of security, thus vulnerable. What should enterprise management do with this? Adapt quickly to these new developments, at the risk of making mistakes because of this speed? Opt for evolution or revolution? Our answer is 'both', but according to a controlled change approach, in which IT and OT are aligned, with a stepped Architecture process and appropriate Communication at each stakeholder level.