
DON'T MISS OUT:10% OFF all membership levels through December
Use Code: DEC10 at checkout. Go to Plans & Pricing

(CS)²AI Online Library
Looking to view the past webinars? Become a (CS)²AI Member today for access to all past webinars.
We at (CS)²AI are all about helping people in and wanting to enter the in-demand field of control system cybersecurity develop their knowledge, skills and professional networks. With the support of our Strategic Alliance Partners and our members, we work to offer as many benefits as we can to this group.
Key to many of our members, of course, are our meetup events, but not everyone lives in an area with an established chapter, one with a group of dedicated leaders organizing and running these gatherings. So we established (CS)²AI Online Seminars, a series of live online discussions led by control system security practitioners and thought leaders.
Being online, these are available to our members all around the world. We keep our emphasis on the discussion that underlies everything (CS)²AI does, with brief introductions to the topic at hand and half or more of available time dedicated to our attendees’ questions and viewpoints. Participants have given us rave reviews, some stating this has been the first time they have ever had a chance to ask their question to a real subject matter expert.
While live is obviously best, we also record all of these so that even when someone can’t make it to a session they can at least watch it later. Members can access all the recordings in our library
Interested in being a speaker for one of our (CS)²AI Online Seminars? Click Here.
2023 (CS)²AI Online Library
Author Spotlight™ - An Interview with the Author of Engineering-Grade OT Security
Andrew Ginter, VP Industrial Security, Waterfall Security Solutions
Symposium: Ransomware - Targeting the OT Enterprise
Billy Rios (QED Secure Solutions)
Roya Gordon (Hexagon Asset Lifecycle Intelligence)
Rees Machtemes (Waterfall Security Solutions)
Chris Rouland (Phosphorus)
Mark Weatherford (National Cybersecurity Center)
Satnam Narang (Tenable)
Tom VanNorman (GRIMM)
Omar Sikander (SecurityGate)
Nate Toll (Google Cloud/Mandiant)
Pablo Almada (KPMG)
Anish Mitra (KPMG)
Ronald Heil (KPMG)
Seminar & Solutions Showcase™: OT Data Diodes - Technical Deep Dive and Demo
Colin Dunn, Founder / CEO, Fend
Nick Norwood, Hardware Engineer, Fend
Remote Operations and Reduced Attack Surface? The Best of Both Worlds
Ron Fabela, Field CTO, Xona Systems
Smart Cybersecurity for Safe and Available Manufacturing
Samir Mokthar: Solutions Architect - OT Cybersecurity EMEA| Fortinet
Gaining Visibility (and follow-on Segmentation) from your Hardest-to-Crack OT Environments
Brian Brammeier: CEO & CISO of Opscura. He is responsible for the worldwide development and growth of Opscura’s ICS product portfolio and business. Brian is an experienced business operator, crisis IT and cybersecurity professional.
Gerard Vidal: Co-Founder & CTO of Opscura. He leads their team of ICS security and technology experts in applying scientific discoveries and technological advancements to its ICS cybersecurity product portfolio. An accredited expert in ISO SC27/WG2, he contributes to the ISO standardization process for new security mechanisms such as lightweight cryptography, blockchain, quantum cryptography, and more.
Symposium: Cyber Security for the Manufacturing Sector
Cyber-Ready Industrial Manufacturing: What’s the Risk? with:
Rod Locke, Senior Director of Product Management - OT at Fortinet
Mark Cristiano, Global Commercial Director, Global Cybersecurity Services, Rockwell Automation
Michael Hinz, Manager WIO, Perimeter & Cloud Security, ZF Group
Network Engineering for Operational Safety with:
Andrew Ginter, VP Industrial Security at Waterfall Security Solutions
Cyber Risk Mitigation in a Small Manufacturing Environment via Security Segmentation with:
John Hoyt, Lead Cyber Physical Systems Engineer at MITRE
Aslam Sherule, Lead Cyber-Physical Systems Engineer at MITRE
Panel Discussions with:
Reynaldo Gonzalez, Principal Cybersecurity Architect, Cummins
Vivek Ponnada, Technical Solutions Director at Nozomi Networks
Daniel Crespo, Senior OT/ICS Cybersecurity Lead at Newell Brands
ICS Advisory Project
Vulnerability Patch Management Preparation for Manufacturing Security
Dan Ricci, Senior Information Security Officer at Frequentis Defense, Inc
Transportation Series Finale with Head of the TSA - David Pekoske
David Pekoske - TSA Administrator
Gary Kessler, Maritime Cysecurity Consultant
Jonathan Pollet, Founder & Exec. Dir. of Red Tiger Security
Olivier de Visscher, Head of Railway Industrial Cybersecurity Expleo Group.
The Threat Report - OT Cyber Incidents with Physical Consequences
Rees Machtemes, Director of Industrial Security
at Waterfall Security Solutions
A Deep Dive into Risks Posed by Insecure-by-Design Control System Software in Critical Infrastructure
Brian Foster Lead OT Security Architect at Southern California Edison (SCE)
How to Best Combine Human Expertise and Technology to Strengthen OT Cybersecurity
Robin Berthier, CEO and Co-Founder, Network Perception
Ian Frist, Cybersecurity Compliance Program Dir., Corning Inc.
Vulnerabilities and Hacking Techniques in Transportation ICS and IoT
Jonathan Pollet, Founder and CEO of Red Tiger Security
Turning Rusty Swords into Ploughs - retasking OT Cybersystems for Pipelines
James Cabe, Senior Director of Alliances and Strategic Sales at ZPE Systems
Securing the Highway-Unveiling Cybersecurity Challenges in Fleet Operations and Trucking Infrastructure
Ben Gardiner, Senior Cybersecurity Research Engineer at the National Motor Freight Traffic Association, Inc .
Transportation Supply Chain Tales and Fails. Can there be a happy ending?
Jo Dalton is an Associate Partner at Pen Test Partners
Geopolitical Issues of GPS/AIS Spoofing and Jamming
Gary Kessler, Ph.D., CISSP is a retired professor of cybersecurity. Co-author of "Maritime Cybersecurity: A Guide for Leaders and Managers," he is currently the president and janitor of Gary Kessler Associates (providing maritime cybersecurity research, consulting, and training services).
Applying Network Segmentation to Secure OT Environments
John Livingston, CEO of Verve
Dan Clark, Director of OT Cybersecurity Architecture at Verve
Cybersecurity Meets Quality and Safety
Charlie Givens, (CS)²AI Fellow and Cybersecurity Project Manager at Bechtel National, Inc.
Katie Pehrson, (CS)²AI Fellow and ICS Cybersecurity Laboratory Technical Director at Bechtel Corporation
Setting up one of the World's First OT SOCs in Rail Environments
Omar Sherin, Partner at Ernst & Young (EY) Digital Solutions and Cyber Security
Convergence of Physical Security and Cybersecurity in an Airport Environment
Shawn Goudge, Aviation Security Specialist and Regulatory Specialist - Formerly with Transport Canada AVSEC, Former Regional Manager AVSEC Africa and Middle East with IATA.
(CS)²AI Members-Only Event: Optimizing Your Use of LinkedIn
Linkedin expert Colleen McKenna
Risk Assessment Considerations Using the ISA/IEC 62443-3-2 Risk Assessment Process
Jim Gilsinn, Technical Leader at Dragos
Symposium: Planes, Trains & Automobiles, and Boats Too!
Michael Clifford - Principal Researcher, Connected Car Security at Toyota InfoTech Labs
Omar Sherin - Partner and Cyber Security Dir.(OT) at Ernst & Young - MENA Region
Miki Shifman - Co-Founder & CTO at Cylus
Shawn Goudge - Sr. Security Specialist at The Calgary Airport Authority
Barbara Grofe - Prin. Security Architect, Security and Space Range Designer , Researcher & Quantum Enthusiast. Chief Research Fellow at the Institute for Cyber and Space Research
Jonathan Pollet - Founder & CEO of Red Tiger Security
Gary Kessler - Adv. Board Member at Cydome, Sr. Fellow at Atlantic Council, Prin. Consultant at Fathom5, Gary Kessler Associates
James Cabe - Co-Founder of Sensability.io and Director of Architecture Global Alliances at ZPE Systems
Deceive by Design: How to protect critical infrastructure with deception technology
Kevin Mayoros, Consulting Security Engineer - Enhanced Technologies, Fortinet
Moshe Ben Simon, Vice President of Product Management, Fortinet
Anatomy of an Attack - From Encryption to Destruction
Fred Gordy, Director of Operational Technology Risk Assessment at Michael Baker International
Finding the proper focus for your OT security program
Professor Art Conklin is Program Coordinator for the Information Security Program in the Technology Division of the Cullen College of Engineering at the University of Houston and the Director of the Center for Information Security Research and Education.
Crying “Vulnerability”- Managing false positives while protecting the flock
Eric Byres, CTO and Board Member at aDolus Technology Inc and Derek Kruszewski, Senior Analyst at aDolus Technology Inc
Fellows Panel: S4 Takeaways and a Look Ahead at Our Industry
Patrick Miller, (CS)²AI Fellow, CEO of Ampere &
Chris Blask, (CS)²AI Fellow, Vice President of Strategy at Cybeats
OT Facility Security: Thinking About The Big Picture
Steve Mustard, (CS)²AI Fellow, President & CEO of National Automation, and past president of the International Society of Automation &
Guest Host Bryson Bort, (CS)²AI Fellow,
Fellow Seminar: Responding to, Adapting, and Defending Against Active Attacks on ICS Environments
Clint Bodungen is Co-Founder, CEO & Chairman of ThreatGEN, Author of Hacking Exposed: ICS, & Creator of Red vs. Blue Cybersecurity Game/Simulator
Tales From the Trenches – Why Organizations Struggle to get OT Visibility & Detection Right
Vivek Ponnada, Nozomi Networks
OT Monitoring Tools- A Case Study on How to Choose One
Raphael "Raph" Arakelian, Manager at PwC Canada - OT & IoT Security Team
Social Event: The Webb Space Telescope and the Power of Visibility
Nathalie N.-Q. Ouellette, Deputy Director of the Observatoire du Mont-Mégantic at Université de Montréal and Webb Telescope Outreach Scientist
How to Enable Frictionless User Access in OT and Critical Infrastructure Systems
Bill Moore, CEO and Founder of XONA
2022 (CS)²AI Online Library
(CS)²AI Online™ Symposium: Industrial Security Road Trip - Perspectives from around the world on the latest threats, challenges and solutions
Andrew Ginter, VP Industrial Security at Waterfall Security Systems,
Ed Amoroso, Founder and CEO of TAG InfoSphere
Chris Crawford, Transportation Industry Director at Waterfall Security Solutions
Tilo Kaschubek, Director Cloud Ecosystem & Regional Alliances - EMEA at AVEVA
Rees Machtemes, Director of Industrial Security at Waterfall Security Solutions
Nate Nelson, Co-Host The Industrial Security Podcast
(CS)²AI Online™ Symposium: See before it happens -The importance of visibility in OT cybersecurity
Nathalie N-Q. Oullette, Astrophysicist, Webb Telescope Outreach Scientist, & Deputy Director of the Observatoire du Mont-Mégantic at Université de Montréal
Galina Antova, Co-Founder & CBDO at Claroty
Walter Risi, Partner & Global OT Cybersecurity Lead at KPMG
Debbie Gordon, Founder & CEO of Cloud Range - Virtual Cyber Range Attack Simulation
Manuel E. Basurte, Head of Industrial Cybersecurity at Ternium
Jayne Goble, Director Cyber Security at KPMG UK
Patrick Wreglesworth, Head of Cyber Security at UK Northern Gas Networks
Marcus Linder, Senior Attackmaster at Cloud Range Cyber
13 Ways to Break a Firewall (sponsored by Waterfall Security Solutions)
Rees Machtemes, P. Eng.,
Director of Industrial Security, Waterfall Security Solutions
An Evidence-based Approach to Improving ICS Cybersecurity, (sponsored by TrendMicro)
William Malik, Vice President, Infrastructure Strategies at TrendMicro
Where to Start Building a Supply Chain Security Program (Sponsored by aDolus)
Eric Byres & Ron Brash
Communicating Cyber Risk to the C-Level in Financial Terms (sponsored by DeNexus)
Derek Harp, John Collins, Donovan Tindill, & Jeffrey Sirr
Life, Liberty, and the Pursuit of OT Cybersecurity in the Cloud, (sponsored by Nozomi Networks)
Danielle Jablanski and Vivek Ponnada
Datacenter OT Cybersecurity Trends
Jim Gilsinn
The Evolution of OT Security Management
Rick Kaun
Region Kickoff Event 2022 Annual Report Panel Discussion
Jaco Benadie,Eddy Lek, Patrick Billings, and Sharul Rashid
Cyber Security for Manufacturing: The OEM Leaders’ Perspective & SWOT Analysis
Bart de Wijs, Rob Garry & Megan Samford
Confluence Points & Future Gazing-Where is ICS Cybersec heading?
Chris Blask
New and Updated: Top 20 Cyber Attacks on Industrial Control Systems, Sponsored by Waterfall
Andrew Ginter
Managing Service Provider Fragmentation in Smart Buildings
Fred Gordy
Building the OT Cyber Security Workforce: What We Can Learn From Safety Culture
Steve Mustard
Protecting Mission Critical Facilities
Wanda Lenkewich
OT Vulnerability Management
John Cusimano
When Industrial Cybersecurity Changed Forever
Greg Hale, Andrew Ginter, Derek Harp
The Power of the OT Security Playbook
Chris Sistrunk
Secure Control Systems for Smart Manufacturing Symposium
Carlos Sanchez | Director - Operational Technology, Central US at Fortinet
Bill Moore | Founder and CEO at XONA
Robin Berthier | CEO and Co-Founder at Network Perception
Paul Brownlee | North American Lead, Operational Technology (OT) Cybersecurity at Accenture
A Follow-up to Supply Chain Symposium
Eric Byres, Allan Friedman, Erik Schweigert
Research, Regulators, and Recalls – What We Can Learn From the Medical Device Cybersecurity Community
Billy Rios
DoD Cyber FVEYS Nations Mission Assurance Table-Top Exercise
Daryl Haegley, Dr. Michael Chipley, and Dr. Leigh Armistead
Zero Trust for Operational Technologies (Sponsored by Fortinet)
William Noto and Carlos R Sanchez
Securing the Software Supply Chain: Forging an Unbreakable Chain
Eric Byres, Mark Weatherford, Jonathan Dambrot, Caleb Queern, Erick Schweiger, Rod Campbell, Allan Friedman, Brad Raiford
When Data Eats SCADA
Patrick Miller
Developing OT Incident Response Proactive and Reactive Programs
Bryan Singer
Lessons Learned from NERC CIP and What to Expect from the Changing Regulatory Landscape
Richard Springer
Control System Cyber Security for Energy - Part 2: Electric Sector Symposium
• Melissa Hathaway (President, Hathaway Global Strategies) - Keynote
• Marc Rogers (VP of Cybersecurity at Okta): Hands-on experience on exploit
• Ben Sooter (Principal Project Manager EPRI: Responding to High Impact Cyber Security events in Operations
• Branko Terzic (Former FERC Commissioner): Challenges for electric utilities
• Philip Huff (Univ. of Arkansas): Vulnerability Management for electric utilities
• Todd Chwialkowski (EDF-RE): Implementing Electronic Security Controls
• Robin Berthier (Network Perception): NERC CIP Firewall Change Review Workflow
• Saman Zonouz, Threats to Programmable Logic Controllers (PLCs)
Top 20 Secure PLC Coding Practices
Vivek Ponnada
2021 (CS)²AI Online Library
Critical Infrastructure Protection: Challenges & Solutions
Chuck Brooks, Robin Berthier, Marcus Sachs, and Brad Raiford
Addressing Threats to Smart Factories
William (Bill) Malik
Navigating Vulnerability Disclosures in an ICS Environment, a BADALLOC Case Study
Rob Garry, Zach Tanko, Colin Sullivan
Robots, Rails, Bytes and Risk - A Modern ICS Success Story
Brent Huston
Building Cyber Competency in Control System Engineers
Charlie Givens and Katie Pehrson
Navigating the New TSA Directive for Pipelines
Rick Kahn
IoT Skimmer: Energy Market Manipulation through High-Wattage IoT Botnets
Raheem Beyah & Tohid Shekari
OT Cyber Risk Management: You’re Doing it Wrong - The 3 Most Common Cyber Risk Management Problems
Clint Bodungen
Why Hasn’t SOAR Taken Off in ICS? (sponsored by Industrial Defender)
Peter Lund and Chris Duffey
Stop Tomorrow's Crisis Today - Developing and Leading a Top ICS Incident Response Team
Mark Bristow
Scanners, Tunnels, and Sims, Oh My! Control Things
Justin Searle
How Operational Technology Systems Impact Commercial Real Estate
Bayron Lopez
Translating Maturity Level Assessment Into the OT/ICS Environment
Jim Gilsinn
ICS Cyber Security - Build It In or Bolt it On? with lab (Bedrock Automation)
Albert Rooyakkers
Unmanned Aerial Systems - Risks, Uses and Defenses
Harry Wingo
Debrief on the Colonial Pipeline Ransomware Incident
Mark Weatherford, Lior Frenkel, Clint Bodungen & Ernest Wohnig
Securing OT in the Face of IIoT and 5G
Simon Bryden, Joe Robertson, Antoine d'Haussy, Aasef Iqbal
Managing OT Cyber Risk
Andrew Ginter
How Converging IT,OT, & IIOT Differences Affect Ops and Security
Art Conklin, PhD.
How to Design Remote Access into Industrial Environments the Right Way
Pascal Ackerman and Clint Bodungen
Physical Cybersecurity – When Everything is on the Line
Colin Dunn, Albert Lee, Jeff Kahn, Michael Arceneaux
ICS SecOps: Active Defense with Effective Incident Response
Can Kurnaz
The Current ICS/IoT Threat Landscape
Bryson Bort
Keeping the Lights On! Protecting the Power Grid
Rob Garry
Case Study on Attack Detection & Response in a Power Grid Blackstart Scenario
Tim Yardley
Mission Kill: Process Targeting in ICS Attacks
Joe Slowik
2020 (CS)²AI Online Library
Top 5 Use Cases for Endpoint Protection
in Operational Technology
Michelle Balderson and Tsailing Merrem
OPERATION: Poisoning the Supply Chain (on a Budget)
Monta Elkins
OPERATION: Operator Jail Breakout
Dieter Sarrazyn and Frank Lycops
Under Pressure: Establishing Secure Remote Access into ICS/OT Networks
Dharminder Debisarun, George Cordeiro, and Lieuwe Jan Koning
Defense Perspectives on Emerging Cyber Threats to Critical Infrastructure
Daryl Haegley, Harry Wingo, Nina Kollars
Lures, Obfuscation & Worming: Analyzing Successful Android Malware Campaigns
Marita Fowler
Techniques for Assessing and Manipulating Embedded Devices
Michael Schroeder
Evolving ICS Cyber Attack Surfaces
John Cusimano / Del Rodillas / Igor Volovich
Hardening Your Supply Chain with the NIST/NICE Framework
Rob Chubbuck
Cyber Security in Health Care Symposium
Christian “quaddi” Dameff MD, Vidya Murthy, David Nathans, Veronica Schmitt, Billy Rios, Marie Elisabeth Gaup Moe, Jay Radcliffe
Top 3 Things to Know for Tuning ICS Security Alerts
Chris Sistrunk
Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
Shlomi Oberman, Moshe Kol and Ariel Schön
Control System Security Incident Handling in the Fog of War
Mark Bristow, Jeff Hussey, Jake King, & Brent Gage
Applied Deception in the Era of IT/OT Convergence
Mike Rebultan
Saved By Ransomware
Brent Huston
Top 5 Takeaways on IEC 62443-3-3
Thomas Balint, Stefan Woronka, and Dharminder Debisarun
“Shall we play a game?” – Improving ICS Cybersecurity with Immersive Gamification & Simulation
Clint Bodungen
2019 (CS)²AI Online Library
The Gold Standard for ICS-OT Monitoring
Andrew Ginter
The Certified Mission Critical Operations-Professional
Steve Mustard
Secure Operations Technology
Andrew Ginter
ICS Security & Patch Management
Larry Grate, Jim Gilsinn & Paul Rostick
The Triton attack and Safety & Protection systems
Bryan Singer, Marina Krotofil, Oleg Kolesnikov and Andy Bochman
ICS in the Cloud
Chris Blask
ICS Security Event Retrospective: The SANS ICS Security Summit
Andy Bochman, Jon Taylor, and Don Weber
Keeping Things from Blowing Up: Consequence-Based Cybersecurity
Jim McGlone
Key Findings from the 2019 CS2AI-KMPG Survey Report
Derek Harp & Bengt Gregory-Brown
Demystifying ICS Cyber Risk
Mike Radigan
2018 (CS)²AI Online Library
INTRODUCTION TO CYBER SECURITY FOR CONTROL SYSTEMS COURSE
Introduction to Control Systems
Dr. Michael Chipley, Larry Grate, and Billy Rios
Industry Regulations and Standards – Now and Emerging
Chris Humphreys, Bradford Hegrat, and Ernie Hayden
Managing the Sustainable ICS Security Program
Marco Ayala, Karonn Blue, and Jay Williams
Future Gazing: AI, Automation & Autonomy
Taylor Williams, Jason Christopher, and Doug Wylie
Inside the Control System – Components, Processes, and Automation
Bryan Singer and Emmett Moore
What is Unique About a Control Systems Network?
Stuart Phillips and Kevin van der Veen
The Control Systems Ecosystem – Suppliers
Cherise Esparze-Gutierrez, Graham Speake, and Rob Garry
The Control Systems Ecosystem – Asset Owners
Steve Mustard and Paul Piotrowski
Keys to an Effective Control System Security Program
Mille Gandelsman, Ernest Wohnig, Robert Bevis, and Karl Perman
The Control Systems Security Workforce Challenges
Rebekah Mohr, Samara Moore, and Andy Bochman
Control Systems Security – What is the Offense Doing?
Matthew Luallen, Clint Bodungen, and Jim Gilsinn
Controls Systems Security – How do we Best Defend Them?
Barak Perelman, Ayman Al-Issa, and Paul Forney