top of page

Search


OT Cyber Risk Management – You’re Doing It Wrong
The 3 Most Common Problems That Nearly ALL Cyber Risk Management Programs Have, and How to Solve Them Submitted by: Clint Bodungen...

Clint Bodungen
9 min read


Colonial Pipeline Cyberattack
Submitted by: Steve Mustard President & CEO at National Automation, Inc. and (CS)²AI Fellow May 16, 2021 REGISTER HERE FOR OUR SPECIAL...

Steve Mustard
3 min read


ASSESSMENT FINDINGS: EXTERNAL THREATS AND INTERNAL SELF-INFLICTED WOUNDS
By Fred Gordy Director of Cybersecurity at Intelligent Buildings, LLC, (CS)²AI Fellow December, 2020 Threats to building control systems...

Fred Gordy: CS²AI Fellow
8 min read


Creating a DoD Cybersecurity Maturity Model Certification Compliant Risk Management Plan
In response to continued data breaches and exploits of the Defense Industrial Base and other DoD contractors/vendors such as A&E, . . .

Michael Chipley: (CS)²AI Fellow
9 min read


The Time Has Come to Automate Supply Chain Security
Maintaining visibility into the inventory of assets, supplies, and products entering and leaving industrial operations has been a key to . .

Chris Blask: (CS)²AI Fellow
3 min read


In the Crosshairs: Building Control Systems by (CS)²AI Fellow, Fred Gordy
Building automation systems have historically been installed with convenience in mind. Isn’t that why facility managers started using a brow
fredgordy
8 min read


Mentoring in the CyberPatriot Program By Andrew Hall
We asked Andrew Hall to submit this article on his experience with The Cyber Patriot Program.

Trisha Harp
3 min read


5 Things the Hoodie & the Hard Hat Need to Know About Each Other: Eddie Habibi & Jason Haward-Grau
A key challenge to improving industrial cybersecurity is the different worlds IT and operations practitioners come from – specifically, the

Trisha Harp
4 min read


Enabling Telework during COVID19 By Larry Grate
The need for business to become more efficient by leveraging the data available in their manufacturing networks . . .

Trisha Harp
2 min read


The Good, The Bad & The Ugly Of IT-OT Convergence
Facility managers, technology leaders and others witnessing the blend of IT (information technology) and OT (operational technology). . .

Trisha Harp
4 min read


ICS Cyber Awareness is a Critical Factor
Educating ICS cyber security shall be high on the priority list of top-floor executives. This article explains how to do this.

Trisha Harp
3 min read


The Safety & Security Mindset
To better understand the relationship of safety implications of OT (Operational Technology) security, we must first explore the differences

Trisha Harp
3 min read
bottom of page

