(CS)²AI Online Library

Looking to view the past webinars? Become a (CS)²AI Member today for access to all past webinars.
*Continuing education credits for past webinars will be available shortly. Check back for updates.

We at (CS)²AI are all about helping people in and wanting to enter the in-demand field of control system cybersecurity develop their knowledge, skills and professional networks. With the support of our Strategic Alliance Partners and our members, we work to offer as many benefits as we can to this group.
 

Key to many of our members, of course, are our meetup events, but not everyone lives in an area with an established chapter, one with a group of dedicated leaders organizing and running these gatherings. So we established the (CS)²AI Virtual Meetups, a series of live online discussions led by ICS security practitioners and thought leaders.
 

Being online, these are available to our members all around the world. We keep our emphasis on the discussion that underlies everything (CS)²AI does, with brief introductions to the topic at hand and half or more of available time dedicated to our attendees’ questions and viewpoints. Participants have given us rave reviews, some stating this has been the first time they have ever had a chance to ask their question to a real subject matter expert. 
 

While live is obviously best, we also record all of these so that even when someone can’t make it to a session they can at least watch it later. Members can access all the recordings in our library

Interested in being a speaker for one of our Virtual Meetup Sessions? Click Here.

2020 (CS)²AI Online Library

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

Shlomi Oberman, Moshe Kol and Ariel Schön

October 15, 2020

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
Control System Security Incident Handling in the Fog of War

Mark Bristow, Jeff Hussey, Jake King, & Brent Gage

September 24, 2020

Global Membership Required

Control System Security Incident Handling in the Fog of War
Applied Deception in the Era of IT/OT Convergence

Mike Rebultan

August 27, 2020

Global Membership Required

Applied Deception in the Era of IT/OT Convergence
Saved By Ransomware

Brent Huston

August 20, 2020

Global Membership Required

Saved By Ransomware
Top 5 Takeaways on IEC 62443-3-3

Thomas Balint, Stefan Woronka, and Dharminder Debisarun

July 23, 2020

Global Membership Required

Top 5 Takeaways on IEC 62443-3-3
Top 5 Use Cases for Endpoint Protection
in Operational Technology

Michelle Balderson and Tsailing Merrem

July 16, 2020

Global Membership Required

Top 5 Use Cases for Endpoint Protection
in Operational Technology
OPERATION: Poisoning the Supply Chain (on a Budget)

Monta Elkins

June 25, 2020

Global Membership Required

OPERATION: Poisoning the Supply Chain (on a Budget)
OPERATION: Poisoning the Supply Chain (on a Budget)

Monta Elkins

June 25, 2020

Global Membership Required

OPERATION: Poisoning the Supply Chain (on a Budget)
OPERATION: Operator Jail Breakout

Dieter Sarrazyn and Frank Lycops

May 28, 2020

Global Membership Required

OPERATION: Operator Jail Breakout
Under Pressure: Establishing Secure Remote Access into ICS/OT Networks

Dharminder Debisarun, George Cordeiro, and Lieuwe Jan Koning

May 14, 2020

Global Membership Required

Under Pressure: Establishing Secure Remote Access into ICS/OT Networks
Defense Perspectives on Emerging Cyber Threats to Critical Infrastructure

Daryl Haegley, Harry Wingo, Nina Kollars

April 30, 2020

Global Membership Required

Defense Perspectives on Emerging Cyber Threats to Critical Infrastructure
Lures, Obfuscation & Worming: Analyzing Successful Android Malware Campaigns

Marita Fowler

April 23, 2020

Global Membership Required

Lures, Obfuscation & Worming: Analyzing Successful Android Malware Campaigns
Techniques for Assessing and Manipulating Embedded Devices

Michael Schroeder

March 26, 2020

Global Membership Required

Techniques for Assessing and Manipulating Embedded Devices
Evolving ICS Cyber Attack Surfaces

John Cusimano / Del Rodillas / Igor Volovich

February 27, 2020

Global Membership Required

Evolving ICS Cyber Attack Surfaces
“Shall we play a game?” – Improving ICS Cybersecurity with Immersive Gamification & Simulation

Clint Bodungen

January 30, 2020

Global Membership Required

“Shall we play a game?” – Improving ICS Cybersecurity with Immersive Gamification & Simulation

2019 (CS)²AI Online Library

Key Findings from the 2019 CS2AI-KMPG Survey Report

Derek Harp & Bengt Gregory-Brown

December 12, 2019

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
The Gold Standard for ICS-OT Monitoring

Andrew Ginter

November 16, 2019

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
The Certified Mission Critical Operations-Professional

Steve Mustard

October 31, 2019

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
Secure Operations Technology

Andrew Ginter

October 3, 2019

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
ICS Security & Patch Management

Larry Grate, Jim Gilsinn & Paul Rostick

September 26, 2019

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
The Triton attack and Safety & Protection systems

Bryan Singer, Marina Krotofil, Oleg Kolesnikov and Andy Bochman

June 27, 2019

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
ICS in the Cloud

Chris Blask

April 25, 2019

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
ICS Security Event Retrospective: The SANS ICS Security Summit

Andy Bochman, Jon Taylor, and Don Weber

March 28, 2019

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
Keeping Things from Blowing Up: Consequence-Based Cybersecurity

Jim McGlone

March 28, 2019

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20
Demystifying ICS Cyber Risk

Mike Radigan

February 28, 2019

Global Membership Required

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

2018 (CS)²AI Online Library

Future Gazing: AI, Automation & Autonomy

Taylor Williams, Jason Christopher, and Doug Wylie

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

December 20, 2018

Global Membership Required

Managing the Sustainable ICS Security Program

Marco Ayala, Karonn Blue, and Jay Williams

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

November 29, 2018

Global Membership Required

Industry Regulations and Standards – Now and Emerging

Chris Humphreys, Bradford Hegrat, and Ernie Hayden

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

October 25, 2018

Global Membership Required

Controls Systems Security – How do we Best Defend Them?

Barak Perelman, Ayman Al-Issa, and Paul Forney

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

September 27, 2018

Global Membership Required

Control Systems Security – What is the Offense Doing?

Matthew Luallen, Clint Bodungen, and Jim Gilsinn

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

August 30, 2018

Global Membership Required

The Control Systems Security Workforce Challenges

Rebekah Mohr, Samara Moore, and Andy Bochman

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

July 26, 2018

Global Membership Required

Keys to an Effective Control System Security Program

Mille Gandelsman, Ernest Wohnig, Robert Bevis, and Karl Perman

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

June 28, 2018

Global Membership Required

The Control Systems Ecosystem – Asset Owners

Steve Mustard and Paul Piotrowski

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

May 31, 2018

Global Membership Required

The Control Systems Ecosystem – Suppliers

Cherise Esparze-Gutierrez, Graham Speake, and Rob Garry

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

April 26, 2018

Global Membership Required

What is Unique About a Control Systems Network?

Stuart Phillips and Kevin van der Veen

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

March 29, 2018

Global Membership Required

Inside the Control System – Components, Processes, and Automation

Bryan Singer and Emmett Moore

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

February 22, 2018

Global Membership Required

Introduction to Control Systems

Dr. Michael Chipley, Larry Grate, and Billy Rios

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

January 25, 2018

Global Membership Required