top of page
Search
(CS)²AI
17 min read
How to Apply ISA/IEC62443 - A Practical Guide Q&A Follow up
By Steve Mustard, PE, CAP, GICSP, President & CEO of National Automation, and past president of the International Society of Automation,...
(CS)²AI
3 min read
Fortifying Industrial Operations: A Strategic Remediation Plan
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard February 29, 2024 Ensuring smooth...
(CS)²AI
2 min read
Overcoming the challenging task of prioritizing your actions to reduce Cybersecurity Risks in OT Management
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard February 22, 2024 Maintaining an accurate...
(CS)²AI
2 min read
Understanding the intricate details and implications of Operational Technology (OT) Vulnerabilities
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard January 23, 2024 In the realm of...
(CS)²AI
2 min read
The Critical Importance of Up-to-Date Asset Inventory for Enhanced Security in OT Environments
By Gregory Dupuis, Global Head of Marketing and EU Sales Team Leader at Framatome Cybersecurity (IBCY) January 11, 2024 In the...
Brent Huston
2 min read
Raspberry Pi and OpenPLC How To and Use Cases
By Brent Huston, MicroSolved, Inc., (CS)²AI Fellow December 21, 2023 Introduction: OpenPLC is an open-source Programmable Logic...
Vivek Ponnada
6 min read
Getting started in OT Cybersecurity: Books, Podcasts, Certifications, Free & Formal Training & more
By Vivek Ponnada, Engineer, MBA, GICSP, Regional Sales Director at Nozomi Networks, (CS)²AI Fellow January 2, 2023 While attending...
Steve Mustard
3 min read
Book: Industrial Cybersecurity: Case Studies and Best Practices by Steve Mustard, PE, CAP, GICSP
Industrial Cybersecurity Case Studies & Best Practices summarizes all I have seen & learned about industrial cybersecurity over 20 years.
Bayron Lopez
3 min read
Re-Sealing the Foundation of Commercial Construction
By Bayron Lopez, Director of Operational Technology at Kilroy Realty Corporation (CS)²AI Fellow September 22, 2022 With the growing...
Jaco Benadie
1 min read
Operational Technology Cybersecurity – United and Strong
By Jaco Benadie, Partner, Technology Consulting at Ernst & Young Consulting (CS)²AI Fellow July 4, 2022 Operational Technology...
Fred Gordy: CS²AI Fellow
1 min read
Building Control System WhisperGate Attack Post on LinkedIn
By Fred Gordy Director of Cybersecurity at Intelligent Buildings, LLC, (CS)²AI Fellow March, 2022 Building Control System WhisperGate...
Derek Harp, Chairman & Founder
1 min read
Control System Cyber Security Books I'm Currently Reading
By Derek Harp, (CS)²AI Founder, Chairman and Fellow November, 2021 During a recent presentation about the Key Findings of the...
Jim McGlone
2 min read
BOOK Synopsis: Security PHA Review for Consequence Based Cybersecurity- Jim McGlone & Edward Marszal
By Jim McGlone, Chief Marketing Officer at Kenexis Consulting Corporation Co-author of Security PHA Review We are looking forward to...
Derek Harp, Chairman & Founder
2 min read
How do We Knock Down OT Risk? Authors Unite at (CS)²AI Symposium Sept. 15, 2021
By Derek Harp, (CS)²AI Founder, Chairman and Fellow September, 2021 Of course, we all want to mitigate risk in our environments. It goes...
Jules Vos
9 min read
Q&A Follow Up with Jules Vos: Deciphering the Value of Zero Trust & CARTA in Operational Technology
By Jules Vos, Head OT cyber security services - NL at Applied Risk - Critical Infrastructure Made Secure August 2021 We hosted a (CS)²AI...
George Kalavantis
1 min read
How Do You Ask Your CISO for OT Cybersecurity Budget?
George Kalavantis, Industrial Defender COO August 23, 2021 Getting budget approval is clearly a challenge for many in our community....
Clint Bodungen
9 min read
OT Cyber Risk Management – You’re Doing It Wrong
The 3 Most Common Problems That Nearly ALL Cyber Risk Management Programs Have, and How to Solve Them Submitted by: Clint Bodungen...
Steve Mustard
3 min read
Colonial Pipeline Cyberattack
Submitted by: Steve Mustard President & CEO at National Automation, Inc. and (CS)²AI Fellow May 16, 2021 REGISTER HERE FOR OUR SPECIAL...
Fred Gordy: CS²AI Fellow
8 min read
ASSESSMENT FINDINGS: EXTERNAL THREATS AND INTERNAL SELF-INFLICTED WOUNDS
By Fred Gordy Director of Cybersecurity at Intelligent Buildings, LLC, (CS)²AI Fellow December, 2020 Threats to building control systems...
Michael Chipley: (CS)²AI Fellow
9 min read
Creating a DoD Cybersecurity Maturity Model Certification Compliant Risk Management Plan
In response to continued data breaches and exploits of the Defense Industrial Base and other DoD contractors/vendors such as A&E, . . .
bottom of page