<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(CS)2AI | Control System Cyber Security Association International]]></title><description><![CDATA[We are dedicated to the growth and expansion of local and global networking opportunities and professional development.]]></description><link>https://www.cs2ai.org/blog</link><generator>RSS for Node</generator><lastBuildDate>Tue, 10 Mar 2026 22:35:56 GMT</lastBuildDate><atom:link href="https://www.cs2ai.org/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Q&#38;A Follow-Up: (CS)²AI Fellow Fireside Chat: Building OT Capacity for IR and Pentesting]]></title><description><![CDATA[By Danielle Jablanski , Cybersecurity Consulting Program Lead at STV, &#38; a (CS)²AI Fellow October 20, 2025 	We hosted a (CS)²AI Fellow Fireside  Chat  on September 10, 2025 that focused on Building OT Capacity for IR and Pentesting  with (CS)²AI Fellows Chris Sistrunk , Technical Leader of Mandiant (Google Cloud Security)  and Danielle Jablanski , Cybersecurity Consulting Program Lead of STV . Here is a bit about the event: 	Operational Technology (OT) environments face unique challenges when...]]></description><link>https://www.cs2ai.org/post/q-a-follow-up-cs-ai-fellow-fireside-chat-building-ot-capacity-for-ir-and-pentesting-1</link><guid isPermaLink="false">68f680742aa3cc1b5967cc15</guid><category><![CDATA[(CS)²AI Original Content]]></category><category><![CDATA[(CS)²AI Online Event Wrap-up]]></category><pubDate>Mon, 20 Oct 2025 19:14:16 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/c20cb0_5c0f98aa1ab74f2e9f515d006bdcb3b6~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>(CS)²AI</dc:creator></item><item><title><![CDATA[Q&#38;A Follow-Up: (CS)²AI Fellow Fireside Chat: Building OT Capacity for IR and Pentesting]]></title><description><![CDATA[By Chris Sistrunk , Technical Leader of Mandiant, Google Cloud Security, &#38; (CS)²AI Fellow September 29, 2025 	We hosted a (CS)²AI Fellow Fireside  Chat on September 10, 2025 that focused on Building OT Capacity for IR and Pentesting  with (CS)²AI Fellows Chris Sistrunk , Technical Leader of Mandiant (Google Cloud Security)  and Danielle Jablanski , Cybersecurity Consulting Program Lead of STV . Here is a bit about the event: 	Operational Technology (OT) environments face unique challenges...]]></description><link>https://www.cs2ai.org/post/q-a-follow-up-cs-ai-fellow-fireside-chat-building-ot-capacity-for-ir-and-pentesting</link><guid isPermaLink="false">68db00d6a224de4e51da6b4c</guid><category><![CDATA[(CS)²AI Original Content]]></category><category><![CDATA[(CS)²AI Online Event Wrap-up]]></category><pubDate>Fri, 03 Oct 2025 17:59:57 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/c20cb0_bc85a4c325de42f89a17875bffa6ac65~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>(CS)²AI</dc:creator></item><item><title><![CDATA[CS2AI Cyber Security for the Electric Sector Symposium - Follow up]]></title><description><![CDATA[By: Chris Humphreys  Lead Cybersecurity Solutions Architect at Foxguard ,  (CS)²AI  Fellow This week, I had the honor of presenting at...]]></description><link>https://www.cs2ai.org/post/cs2ai-cyber-security-for-the-electric-sector-symposium-follow-up</link><guid isPermaLink="false">67d44b22811538725661dbbc</guid><category><![CDATA[(CS)²AI Online Event Wrap-up]]></category><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Fri, 14 Mar 2025 18:07:23 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_f94bd5c7ed57475dbb2bdcc9163107b5~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Trisha Harp</dc:creator></item><item><title><![CDATA[CS2AI ICS Cybersecurity Roundtable: Product Lifecycle, Security, &#38; Certification - Q&#38;A Follow Up]]></title><description><![CDATA[By: Steve Mustard , President &#38; CEI of National Automation, Inc. &#38;  (CS)²AI Fellow,  Khalid Ansari , Senior Engineer - Industrial Control...]]></description><link>https://www.cs2ai.org/post/cs2ai-ics-cybersecurity-roundtable-product-lifecycle-security-certification</link><guid isPermaLink="false">67d096696ee571608c17ae40</guid><category><![CDATA[(CS)²AI Online Event Wrap-up]]></category><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Tue, 11 Mar 2025 20:13:39 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/c20cb0_0598164f0ad040068da7ae80f42880de~mv2.png/v1/fit/w_1000,h_720,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>(CS)²AI</dc:creator></item><item><title><![CDATA[Safeguarding Device Manufacturing: Practical Protective Measures AgainstCounterfeit Components]]></title><description><![CDATA[By: Brent Huston , CEO, virtual CISO &#38; Security Evangelist MicroSolved, Inc. and (CS)²AI Fellow Introduction For industrial control...]]></description><link>https://www.cs2ai.org/post/safeguarding-device-manufacturing-practical-protective-measures-againstcounterfeit-components</link><guid isPermaLink="false">673f886da8704e4a15ad8a1a</guid><pubDate>Thu, 21 Nov 2024 19:37:41 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_f8e1e8cabf354ad0bf030807d9bc0e9c~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>(CS)²AI</dc:creator></item><item><title><![CDATA[How to Apply ISA/IEC62443 - A Practical Guide Q&#38;A Follow up]]></title><description><![CDATA[By Steve Mustard, PE, CAP, GICSP, President &#38; CEO of National Automation, and past president of the International Society of Automation,...]]></description><link>https://www.cs2ai.org/post/how-to-apply-isa-iec62443-a-practical-guide-q-a-follow-up</link><guid isPermaLink="false">663ac05ea8c76885a762a5a3</guid><category><![CDATA[(CS)²AI Original Content]]></category><category><![CDATA[(CS)²AI Online Event Wrap-up]]></category><pubDate>Wed, 08 May 2024 18:21:20 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_2c0dd6ef7a4541b1acd30d74f1b75420~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>(CS)²AI</dc:creator></item><item><title><![CDATA[Fortifying Industrial Operations: A Strategic Remediation Plan]]></title><description><![CDATA[By Jay Gignac, Head of Global Sales &#38; Marketing, Framatome Cybersecurity, Cyberwatch &#38; Foxguard February 29, 2024 Ensuring smooth...]]></description><link>https://www.cs2ai.org/post/fortifying-industrial-operations-a-strategic-remediation-plan</link><guid isPermaLink="false">65df7284bd790b2de1f6b097</guid><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Wed, 28 Feb 2024 17:54:42 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_bc1c2c6aac564ae4a6ba9769cb9fa5b3~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>(CS)²AI</dc:creator></item><item><title><![CDATA[Overcoming the challenging task of prioritizing your actions to reduce Cybersecurity Risks in OT Management]]></title><description><![CDATA[By Jay Gignac, Head of Global Sales &#38; Marketing, Framatome Cybersecurity, Cyberwatch &#38; Foxguard February 22, 2024 Maintaining an accurate...]]></description><link>https://www.cs2ai.org/post/overcoming-the-challenging-task-of-prioritizing-your-actions-to-reduce-cybersecurity-risks-in-ot-man</link><guid isPermaLink="false">65d7991bf10bcc5d3a046d9b</guid><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Thu, 22 Feb 2024 18:58:38 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_cc020b4199f341dcabca0ebeec591ab5~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>(CS)²AI</dc:creator></item><item><title><![CDATA[Understanding the intricate details and implications of Operational Technology (OT) Vulnerabilities]]></title><description><![CDATA[By Jay Gignac, Head of Global Sales &#38; Marketing, Framatome Cybersecurity, Cyberwatch &#38; Foxguard January 23, 2024 In the realm of...]]></description><link>https://www.cs2ai.org/post/understanding-the-intricate-details-and-implications-of-operational-technology-ot-vulnerabilities</link><guid isPermaLink="false">65afd92edb826c329a731218</guid><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Tue, 23 Jan 2024 15:38:23 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_ff06d4327f37476ca6668f4e9b54f7a2~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>(CS)²AI</dc:creator></item><item><title><![CDATA[The Critical Importance of Up-to-Date Asset Inventory for Enhanced Security in OT Environments]]></title><description><![CDATA[By Gregory Dupuis, Global Head of Marketing and EU Sales Team Leader at Framatome Cybersecurity (IBCY) January 11, 2024 In the...]]></description><link>https://www.cs2ai.org/post/the-critical-importance-of-up-to-date-asset-inventory-for-enhanced-security-in-ot-environments</link><guid isPermaLink="false">659feac152dbe4be36a0540d</guid><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Thu, 11 Jan 2024 14:36:48 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_8086c550ac9f4a94a90112595c5b9dd7~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>(CS)²AI</dc:creator></item><item><title><![CDATA[Raspberry Pi and OpenPLC How To and Use Cases]]></title><description><![CDATA[By Brent Huston, MicroSolved, Inc., (CS)²AI Fellow December 21, 2023 Introduction: OpenPLC is an open-source Programmable Logic...]]></description><link>https://www.cs2ai.org/post/raspberry-pi-and-openplc-how-to-and-use-cases</link><guid isPermaLink="false">658447afb79876b127fc5769</guid><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Thu, 21 Dec 2023 14:23:15 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_564c58f91fd4498894e4a7affc7ffa16~mv2.webp/v1/fit/w_296,h_254,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Brent Huston</dc:creator></item><item><title><![CDATA[Q&#38;A Follow-Up: Applying Network Segmentation to Secure OT Environments]]></title><description><![CDATA[By Dan Clark, Director of OT Cybersecurity Architecture for Verve Industrial Solutions July 11, 2023 We hosted a (CS)²AI Online™ Seminar...]]></description><link>https://www.cs2ai.org/post/q-a-follow-up-applying-network-segmentation-to-secure-ot-environments</link><guid isPermaLink="false">64ac6085f4dbe62b12df693d</guid><pubDate>Mon, 10 Jul 2023 20:42:52 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/1875d1_b46d8bf810c7403c9455610da8901b76~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>grahammarsden5</dc:creator></item><item><title><![CDATA[Getting started in OT Cybersecurity: Books, Podcasts, Certifications, Free &#38; Formal Training &#38; more]]></title><description><![CDATA[By Vivek Ponnada, Engineer, MBA, GICSP, Regional Sales Director at Nozomi Networks, (CS)²AI Fellow January 2, 2023 While attending...]]></description><link>https://www.cs2ai.org/post/getting-started-in-ot-cybersecurity-books-podcasts-certifications-free-formal-training-more</link><guid isPermaLink="false">63da7f961a404aaabbc1046b</guid><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Wed, 01 Feb 2023 15:44:33 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_084221b10a4e4c748ef4a855b4c69e8c~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Vivek Ponnada</dc:creator></item><item><title><![CDATA[Book: Industrial Cybersecurity: Case Studies and Best Practices by Steve Mustard, PE, CAP, GICSP]]></title><description><![CDATA[Industrial Cybersecurity Case Studies &#38; Best Practices summarizes all I have seen &#38; learned about industrial cybersecurity over 20 years.]]></description><link>https://www.cs2ai.org/post/book-industrial-cybersecurity-case-studies-and-best-practices-by-steve-mustard-pe-cap-gicsp</link><guid isPermaLink="false">6341f3211e9d6482911b7247</guid><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Thu, 13 Oct 2022 13:17:38 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_334b512bfee74a5e9ee2bd637c46404a~mv2.png/v1/fit/w_556,h_728,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Steve Mustard</dc:creator></item><item><title><![CDATA[Re-Sealing the Foundation of Commercial Construction]]></title><description><![CDATA[By Bayron Lopez, Director of Operational Technology at Kilroy Realty Corporation (CS)²AI Fellow September 22, 2022 With the growing...]]></description><link>https://www.cs2ai.org/post/re-sealing-the-foundation-of-commercial-construction</link><guid isPermaLink="false">632c674d4cd438cb5ac6eec1</guid><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Thu, 22 Sep 2022 13:52:05 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_0d20e2b750754a1782af930cd325131b~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Bayron Lopez</dc:creator></item><item><title><![CDATA[Operational Technology Cybersecurity – United and Strong ]]></title><description><![CDATA[By Jaco Benadie, Partner, Technology Consulting at Ernst &#38; Young Consulting (CS)²AI Fellow July 4, 2022 Operational Technology...]]></description><link>https://www.cs2ai.org/post/operational-technology-cybersecurity-united-and-strong</link><guid isPermaLink="false">62f2d39a29988f9f4a03c910</guid><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Tue, 09 Aug 2022 21:47:49 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_aa0506922fe843f5a91d020fe5fa6ddc~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Jaco Benadie</dc:creator></item><item><title><![CDATA[Building Control System WhisperGate Attack Post on LinkedIn ]]></title><description><![CDATA[By Fred Gordy Director of Cybersecurity at Intelligent Buildings, LLC, (CS)²AI Fellow March, 2022 Building Control System WhisperGate...]]></description><link>https://www.cs2ai.org/post/building-control-system-whispergate-attack-post-on-linkedin</link><guid isPermaLink="false">623ccc797187cee7f1e1f8f6</guid><category><![CDATA[(CS)²AI Original Content]]></category><pubDate>Thu, 24 Mar 2022 19:57:01 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_e5df28975b5c41eda65661b8eeda7f78~mv2.jpeg/v1/fit/w_845,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Fred Gordy: CS²AI Fellow</dc:creator></item><item><title><![CDATA[Q &#38; A Follow-Up - Cyber Security for Energy - Electric Sector Symposium January 19, 2022 (2 of 2)]]></title><description><![CDATA[By Robin Berthier, CEO &#38; Co-Founder at Network Perception February 9, 2022 We hosted a (CS)²AI Online™ symposium on January 19, 2022 that...]]></description><link>https://www.cs2ai.org/post/q-a-follow-up-cyber-security-for-energy-electric-sector-symposium-january-19-2022-2-of-2</link><guid isPermaLink="false">6203dd64189078c0e156ef2d</guid><category><![CDATA[(CS)²AI Online Event Wrap-up]]></category><pubDate>Wed, 09 Feb 2022 15:43:59 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_d33701790d02460386ff135f16afe686~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Robin Berthier</dc:creator></item><item><title><![CDATA[Q &#38; A Follow-Up - Cyber Security for Energy - Electric Sector Symposium January 19, 2022 (1of 2)]]></title><description><![CDATA[By Branko Terzic, Former FERC Commissioner February 1, 2022 We hosted a (CS)²AI Online™ symposium on January 19, 2022 that focused on...]]></description><link>https://www.cs2ai.org/post/q-a-follow-up-cyber-security-for-energy-electric-sector-symposium-january-19-2022</link><guid isPermaLink="false">61f95a72d580b424b126d006</guid><category><![CDATA[(CS)²AI Online Event Wrap-up]]></category><pubDate>Tue, 01 Feb 2022 16:46:12 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_f4d9030ae36a4c25a445ca961a3d11cb~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Branko Terzic</dc:creator></item><item><title><![CDATA[Q &#38; A Follow-Up- Control System Cyber Security 2021 Annual Report: The Future of Industrial Security]]></title><description><![CDATA[By Andrew Ginter, VP Industrial Security, Waterfall Security Solutions January 19, 2022 We hosted a (CS)²AI Online™ seminar on January...]]></description><link>https://www.cs2ai.org/post/q-a-follow-up-control-system-cyber-security-2021-annual-report-the-future-of-industrial-security</link><guid isPermaLink="false">61e733aee48d450017518d9b</guid><category><![CDATA[(CS)²AI Online Event Wrap-up]]></category><pubDate>Wed, 19 Jan 2022 13:59:28 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/6d64a8_56282a7b85f44242a2aa206e5ddc628b~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Andrew Ginter</dc:creator></item></channel></rss>