

(CS)²AI Online Library
Looking to view the past webinars? Become a (CS)²AI Member today for access to all past webinars.
*Continuing education credits for past webinars will be available shortly. Check back for updates.
We at (CS)²AI are all about helping people in and wanting to enter the in-demand field of control system cybersecurity develop their knowledge, skills and professional networks. With the support of our Strategic Alliance Partners and our members, we work to offer as many benefits as we can to this group.
Key to many of our members, of course, are our meetup events, but not everyone lives in an area with an established chapter, one with a group of dedicated leaders organizing and running these gatherings. So we established (CS)²AI Online Seminars, a series of live online discussions led by control system security practitioners and thought leaders.
Being online, these are available to our members all around the world. We keep our emphasis on the discussion that underlies everything (CS)²AI does, with brief introductions to the topic at hand and half or more of available time dedicated to our attendees’ questions and viewpoints. Participants have given us rave reviews, some stating this has been the first time they have ever had a chance to ask their question to a real subject matter expert.
While live is obviously best, we also record all of these so that even when someone can’t make it to a session they can at least watch it later. Members can access all the recordings in our library
Interested in being a speaker for one of our (CS)²AI Online Seminars? Click Here.
2023 (CS)²AI Online Library
Finding the proper focus for your OT security program
Professor Art Conklin is Program Coordinator for the Information Security Program in the Technology Division of the Cullen College of Engineering at the University of Houston and the Director of the Center for Information Security Research and Education.
Crying “Vulnerability”- Managing false positives while protecting the flock
Eric Byres, CTO and Board Member at aDolus Technology Inc and Derek Kruszewski, Senior Analyst at aDolus Technology Inc
Fellows Panel: S4 Takeaways and a Look Ahead at Our Industry
Patrick Miller, (CS)²AI Fellow, CEO of Ampere & Chris Blask, (CS)²AI Fellow, Vice President of Strategy at Cybeats
OT Facility Security: Thinking About The Big Picture
Steve Mustard, (CS)²AI Fellow, President & CEO of National Automation, and past president of the International Society of Automation & Guest Host Bryson Bort, (CS)²AI Fellow,
Fellow Seminar: Responding to, Adapting, and Defending Against Active Attacks on ICS Environments
Clint Bodungen is Co-Founder, CEO & Chairman of ThreatGEN, Author of Hacking Exposed: ICS, & Creator of Red vs. Blue Cybersecurity Game/Simulator
Tales From the Trenches – Why Organizations Struggle to get OT Visibility & Detection Right
Vivek Ponnada, Nozomi Networks
OT Monitoring Tools- A Case Study on How to Choose One
Raphael "Raph" Arakelian, Manager at PwC Canada - OT & IoT Security Team
Social Event: The Webb Space Telescope and the Power of Visibility
Nathalie N.-Q. Ouellette,
Deputy Director of the Observatoire du Mont-Mégantic at Université de Montréal and Webb Telescope Outreach Scientist
Anatomy of an Attack - From Encryption to Destruction
Fred Gordy, Director of Operational Technology Risk Assessment at Michael Baker International
How to Enable Frictionless User Access in OT and Critical Infrastructure Systems
Bill Moore, CEO and Founder of XONA
2022 (CS)²AI Online Library
(CS)²AI Online™ Symposium: Industrial Security Road Trip - Perspectives from around the world on the latest threats, challenges and solutions
Andrew Ginter, VP Industrial Security at Waterfall Security Systems,
Ed Amoroso, Founder and CEO of TAG InfoSphere
Chris Crawford, Transportation Industry Director at Waterfall Security Solutions
Tilo Kaschubek, Director Cloud Ecosystem & Regional Alliances - EMEA at AVEVA
Rees Machtemes, Director of Industrial Security at Waterfall Security Solutions
Nate Nelson, Co-Host The Industrial Security Podcast
(CS)²AI Online™ Symposium: See before it happens -The importance of visibility in OT cybersecurity
Nathalie N-Q. Oullette, Astrophysicist, Webb Telescope Outreach Scientist, & Deputy Director of the Observatoire du Mont-Mégantic at Université de Montréal
Galina Antova, Co-Founder & CBDO at Claroty
Walter Risi, Partner & Global OT Cybersecurity Lead at KPMG
Debbie Gordon, Founder & CEO of Cloud Range - Virtual Cyber Range Attack Simulation
Manuel E. Basurte, Head of Industrial Cybersecurity at Ternium
Jayne Goble, Director Cyber Security at KPMG UK
Patrick Wreglesworth, Head of Cyber Security at UK Northern Gas Networks
Marcus Linder, Senior Attackmaster at Cloud Range Cyber
13 Ways to Break a Firewall (sponsored by Waterfall Security Solutions)
Rees Machtemes, P. Eng.,
Director of Industrial Security, Waterfall Security Solutions
An Evidence-based Approach to Improving ICS Cybersecurity, (sponsored by TrendMicro)
William Malik, Vice President, Infrastructure Strategies at TrendMicro
Where to Start Building a Supply Chain Security Program (Sponsored by aDolus)
Eric Byres & Ron Brash
Communicating Cyber Risk to the C-Level in Financial Terms (sponsored by DeNexus)
Derek Harp, John Collins, Donovan Tindill, & Jeffrey Sirr
Life, Liberty, and the Pursuit of OT Cybersecurity in the Cloud, (sponsored by Nozomi Networks)
Danielle Jablanski and Vivek Ponnada
Datacenter OT Cybersecurity Trends
Jim Gilsinn
The Evolution of OT Security Management
Rick Kaun
Region Kickoff Event 2022 Annual Report Panel Discussion
Jaco Benadie,Eddy Lek, Patrick Billings, and Sharul Rashid
Cyber Security for Manufacturing: The OEM Leaders’ Perspective & SWOT Analysis
Bart de Wijs, Rob Garry & Megan Samford
Confluence Points & Future Gazing-Where is ICS Cybersec heading?
Chris Blask
New and Updated: Top 20 Cyber Attacks on Industrial Control Systems, Sponsored by Waterfall
Andrew Ginter
Managing Service Provider Fragmentation in Smart Buildings
Fred Gordy
Building the OT Cyber Security Workforce: What We Can Learn From Safety Culture
Steve Mustard
Protecting Mission Critical Facilities
Wanda Lenkewich
OT Vulnerability Management
John Cusimano
When Industrial Cybersecurity Changed Forever
Greg Hale, Andrew Ginter, Derek Harp
The Power of the OT Security Playbook
Chris Sistrunk
Secure Control Systems for Smart Manufacturing Symposium
Carlos Sanchez | Director - Operational Technology, Central US at Fortinet
Bill Moore | Founder and CEO at XONA
Robin Berthier | CEO and Co-Founder at Network Perception
Paul Brownlee | North American Lead, Operational Technology (OT) Cybersecurity at Accenture
A Follow-up to Supply Chain Symposium
Eric Byres, Allan Friedman, Erik Schweigert
Research, Regulators, and Recalls – What We Can Learn From the Medical Device Cybersecurity Community
Billy Rios
DoD Cyber FVEYS Nations Mission Assurance Table-Top Exercise
Daryl Haegley, Dr. Michael Chipley, and Dr. Leigh Armistead
Zero Trust for Operational Technologies (Sponsored by Fortinet)
William Noto and Carlos R Sanchez
Securing the Software Supply Chain: Forging an Unbreakable Chain
Eric Byres, Mark Weatherford, Jonathan Dambrot, Caleb Queern, Erick Schweiger, Rod Campbell, Allan Friedman, Brad Raiford
When Data Eats SCADA
Patrick Miller
Developing OT Incident Response Proactive and Reactive Programs
Bryan Singer
Lessons Learned from NERC CIP and What to Expect from the Changing Regulatory Landscape
Richard Springer
Control System Cyber Security for Energy - Part 2: Electric Sector Symposium
• Melissa Hathaway (President, Hathaway Global Strategies) - Keynote
• Marc Rogers (VP of Cybersecurity at Okta): Hands-on experience on exploit
• Ben Sooter (Principal Project Manager EPRI: Responding to High Impact Cyber Security events in Operations
• Branko Terzic (Former FERC Commissioner): Challenges for electric utilities
• Philip Huff (Univ. of Arkansas): Vulnerability Management for electric utilities
• Todd Chwialkowski (EDF-RE): Implementing Electronic Security Controls
• Robin Berthier (Network Perception): NERC CIP Firewall Change Review Workflow
• Saman Zonouz, Threats to Programmable Logic Controllers (PLCs)
Top 20 Secure PLC Coding Practices
Vivek Ponnada