top of page

(CS)²AI Online Library

Looking to view the past webinars? Become a (CS)²AI Member today for access to all past webinars.
*Continuing education credits for past webinars will be available shortly. Check back for updates.

We at (CS)²AI are all about helping people in and wanting to enter the in-demand field of control system cybersecurity develop their knowledge, skills and professional networks. With the support of our Strategic Alliance Partners and our members, we work to offer as many benefits as we can to this group.

Key to many of our members, of course, are our meetup events, but not everyone lives in an area with an established chapter, one with a group of dedicated leaders organizing and running these gatherings. So we established (CS)²AI Online Seminars, a series of live online discussions led by control system security practitioners and thought leaders.

Being online, these are available to our members all around the world. We keep our emphasis on the discussion that underlies everything (CS)²AI does, with brief introductions to the topic at hand and half or more of available time dedicated to our attendees’ questions and viewpoints. Participants have given us rave reviews, some stating this has been the first time they have ever had a chance to ask their question to a real subject matter expert. 

While live is obviously best, we also record all of these so that even when someone can’t make it to a session they can at least watch it later. Members can access all the recordings in our library

Interested in being a speaker for one of our (CS)²AI Online Seminars? Click Here.

2023 (CS)²AI Online Library

Finding the proper focus for your OT security program

Professor Art Conklin is Program Coordinator for the Information Security Program in the Technology Division of the Cullen College of Engineering at the University of Houston and the Director of the Center for Information Security Research and Education.

Crying “Vulnerability”- Managing false positives while protecting the flock

Eric Byres, CTO and Board Member at aDolus Technology Inc and Derek Kruszewski, Senior Analyst at aDolus Technology Inc

Fellows Panel: S4 Takeaways and a Look Ahead at Our Industry

Patrick Miller, (CS)²AI Fellow, CEO of Ampere & Chris Blask, (CS)²AI Fellow, Vice President of Strategy at Cybeats

OT Facility Security: Thinking About The Big Picture

Steve Mustard, (CS)²AI Fellow, President & CEO of National Automation, and past president of the International Society of Automation & Guest Host Bryson Bort, (CS)²AI Fellow,

Fellow Seminar: Responding to, Adapting, and Defending Against Active Attacks on ICS Environments

Clint Bodungen is Co-Founder, CEO & Chairman of ThreatGEN, Author of Hacking Exposed: ICS, & Creator of Red vs. Blue Cybersecurity Game/Simulator

Tales From the Trenches – Why Organizations Struggle to get OT Visibility & Detection Right

Vivek Ponnada, Nozomi Networks

OT Monitoring Tools- A Case Study on How to Choose One

Raphael "Raph" Arakelian, Manager at PwC Canada - OT & IoT Security Team

Social Event: The Webb Space Telescope and the Power of Visibility

Nathalie N.-Q. Ouellette,
Deputy Director of the Observatoire du Mont-Mégantic at Université de Montréal and Webb Telescope Outreach Scientist

Anatomy of an Attack - From Encryption to Destruction

Fred Gordy, Director of Operational Technology Risk Assessment at Michael Baker International

How to Enable Frictionless User Access in OT and Critical Infrastructure Systems

Bill Moore, CEO and Founder of XONA

2022 (CS)²AI Online Library

(CS)²AI Online™ Symposium: Industrial Security Road Trip - Perspectives from around the world on the latest threats, challenges and solutions

Andrew Ginter, VP Industrial Security at Waterfall Security Systems,

Ed Amoroso, Founder and CEO of TAG InfoSphere

Chris Crawford, Transportation Industry Director at Waterfall Security Solutions

Tilo Kaschubek, Director Cloud Ecosystem & Regional Alliances - EMEA at AVEVA

Rees Machtemes, Director of Industrial Security at Waterfall Security Solutions

Nate Nelson, Co-Host The Industrial Security Podcast

(CS)²AI Online™ Symposium: See before it happens -The importance of visibility in OT cybersecurity

Nathalie N-Q. Oullette, Astrophysicist, Webb Telescope Outreach Scientist, & Deputy Director of the Observatoire du Mont-Mégantic at Université de Montréal

Galina Antova, Co-Founder & CBDO at Claroty

Walter Risi, Partner & Global OT Cybersecurity Lead at KPMG

Debbie Gordon, Founder & CEO of Cloud Range - Virtual Cyber Range Attack Simulation

Manuel E. Basurte, Head of Industrial Cybersecurity at Ternium

Jayne Goble, Director Cyber Security at KPMG UK

Patrick Wreglesworth, Head of Cyber Security at UK Northern Gas Networks

Marcus Linder, Senior Attackmaster at Cloud Range Cyber

13 Ways to Break a Firewall (sponsored by Waterfall Security Solutions)

Rees Machtemes, P. Eng.,
Director of Industrial Security, Waterfall Security Solutions

An Evidence-based Approach to Improving ICS Cybersecurity, (sponsored by TrendMicro)

William Malik, Vice President, Infrastructure Strategies at TrendMicro

Where to Start Building a Supply Chain Security Program (Sponsored by aDolus)

Eric Byres & Ron Brash

Communicating Cyber Risk to the C-Level in Financial Terms (sponsored by DeNexus)

Derek Harp, John Collins, Donovan Tindill, & Jeffrey Sirr

Life, Liberty, and the Pursuit of OT Cybersecurity in the Cloud, (sponsored by Nozomi Networks)

Danielle Jablanski and Vivek Ponnada

Datacenter OT Cybersecurity Trends

Jim Gilsinn

The Evolution of OT Security Management

Rick Kaun

Region Kickoff Event 2022 Annual Report Panel Discussion

Jaco Benadie,Eddy Lek, Patrick Billings, and Sharul Rashid

Cyber Security for Manufacturing: The OEM Leaders’ Perspective & SWOT Analysis

Bart de Wijs, Rob Garry & Megan Samford

Confluence Points & Future Gazing-Where is ICS Cybersec heading?

Chris Blask

New and Updated: Top 20 Cyber Attacks on Industrial Control Systems, Sponsored by Waterfall

Andrew Ginter

Managing Service Provider Fragmentation in Smart Buildings

Fred Gordy

Building the OT Cyber Security Workforce: What We Can Learn From Safety Culture

Steve Mustard

Protecting Mission Critical Facilities

Wanda Lenkewich

OT Vulnerability Management

John Cusimano

When Industrial Cybersecurity Changed Forever

Greg Hale, Andrew Ginter, Derek Harp

The Power of the OT Security Playbook

Chris Sistrunk

Secure Control Systems for Smart Manufacturing Symposium

Carlos Sanchez | Director - Operational Technology, Central US at Fortinet
Bill Moore | Founder and CEO at XONA
Robin Berthier | CEO and Co-Founder at Network Perception
Paul Brownlee | North American Lead, Operational Technology (OT) Cybersecurity at Accenture

A Follow-up to Supply Chain Symposium

Eric Byres, Allan Friedman, Erik Schweigert

Research, Regulators, and Recalls – What We Can Learn From the Medical Device Cybersecurity Community

Billy Rios

DoD Cyber FVEYS Nations Mission Assurance Table-Top Exercise

Daryl Haegley, Dr. Michael Chipley, and Dr. Leigh Armistead

Zero Trust for Operational Technologies (Sponsored by Fortinet)

William Noto and Carlos R Sanchez

Securing the Software Supply Chain: Forging an Unbreakable Chain

Eric Byres, Mark Weatherford, Jonathan Dambrot, Caleb Queern, Erick Schweiger, Rod Campbell, Allan Friedman, Brad Raiford

When Data Eats SCADA

Patrick Miller

Developing OT Incident Response Proactive and Reactive Programs

Bryan Singer

Lessons Learned from NERC CIP and What to Expect from the Changing Regulatory Landscape

Richard Springer

Control System Cyber Security for Energy - Part 2: Electric Sector Symposium

• Melissa Hathaway (President, Hathaway Global Strategies) - Keynote
• Marc Rogers (VP of Cybersecurity at Okta): Hands-on experience on exploit
• Ben Sooter (Principal Project Manager EPRI: Responding to High Impact Cyber Security events in Operations
• Branko Terzic (Former FERC Commissioner): Challenges for electric utilities
• Philip Huff (Univ. of Arkansas): Vulnerability Management for electric utilities
• Todd Chwialkowski (EDF-RE): Implementing Electronic Security Controls
• Robin Berthier (Network Perception): NERC CIP Firewall Change Review Workflow
• Saman Zonouz, Threats to Programmable Logic Controllers (PLCs)

Top 20 Secure PLC Coding Practices

Vivek Ponnada