(CS)²AI Online Library

Looking to view the past webinars? Become a (CS)²AI Member today for access to all past webinars.
*Continuing education credits for past webinars will be available shortly. Check back for updates.

We at (CS)²AI are all about helping people in and wanting to enter the in-demand field of control system cybersecurity develop their knowledge, skills and professional networks. With the support of our Strategic Alliance Partners and our members, we work to offer as many benefits as we can to this group.
 

Key to many of our members, of course, are our meetup events, but not everyone lives in an area with an established chapter, one with a group of dedicated leaders organizing and running these gatherings. So we established (CS)²AI Online Seminars, a series of live online discussions led by control system security practitioners and thought leaders.
 

Being online, these are available to our members all around the world. We keep our emphasis on the discussion that underlies everything (CS)²AI does, with brief introductions to the topic at hand and half or more of available time dedicated to our attendees’ questions and viewpoints. Participants have given us rave reviews, some stating this has been the first time they have ever had a chance to ask their question to a real subject matter expert. 
 

While live is obviously best, we also record all of these so that even when someone can’t make it to a session they can at least watch it later. Members can access all the recordings in our library

Interested in being a speaker for one of our (CS)²AI Online Seminars? Click Here.

2021 (CS)²AI Online Library

ICS Cyber Security - Build It In or Bolt it On? with lab (Bedrock Automation)
ICS Cyber Security - Build It In or Bolt it On? with lab (Bedrock Automation)

Albert Rooyakkers

June 9, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

Unmanned Aerial Systems - Risks, Uses and Defenses
Unmanned Aerial Systems - Risks, Uses and Defenses

Harry Wingo

May 26, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

Debrief on the Colonial Pipeline Ransomware Incident
Debrief on the Colonial Pipeline Ransomware Incident

Mark Weatherford, Lior Frenkel, Clint Bodungen & Ernest Wohnig

May 20, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

Securing OT in the Face of IIoT and 5G
Securing OT in the Face of IIoT and 5G

Simon Bryden, Joe Robertson, Antoine d'Haussy, Aasef Iqbal

May 12, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

Managing OT Cyber Risk
Managing OT Cyber Risk

Andrew Ginter

May 5, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

How to Design Remote Access into Industrial Environments the Right Way
How to Design Remote Access into Industrial Environments the Right Way

Pascal Ackerman and Clint Bodungen

April 7, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

How Converging IT,OT, & IIOT Differences Affect Ops and Security
How Converging IT,OT, & IIOT Differences Affect Ops and Security

Art Conklin, PhD.

April 21, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

Physical Cybersecurity – When Everything is on the Line
Physical Cybersecurity – When Everything is on the Line

Colin Dunn, Albert Lee, Jeff Kahn, Michael Arceneaux

March 31, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

ICS SecOps: Active Defense with Effective Incident Response
ICS SecOps: Active Defense with Effective Incident Response

Can Kurnaz

March 10, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

The Current ICS/IoT Threat Landscape
The Current ICS/IoT Threat Landscape

Bryson Bort

February, 17, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

Keeping the Lights On! Protecting the Power Grid
Keeping the Lights On! Protecting the Power Grid

Rob Garry

February 2, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

Case Study on Attack Detection & Response in a Power Grid Blackstart Scenario
Case Study on Attack Detection & Response in a Power Grid Blackstart Scenario

Tim Yardley

January 28, 2021

Image-empty-state_edited.jpg

Global Membership Required

Already a member? Click here.

2020 (CS)²AI Online Library

Rob Chubbuck
Hardening Your Supply Chain with the NIST/NICE Framework

Rob Chubbuck

December 17, 2020

Hardening Your Supply Chain with the NIST/NICE Framework

Global Membership Required

Christian “quaddi” Dameff MD, Vidya Murthy, David Nathans, Veronica Schmitt, Billy Rios, Marie Elisabeth Gaup Moe, Jay Radcliffe
Part 3 - Cyber Security in Health Care Symposium

Christian “quaddi” Dameff MD, Vidya Murthy, David Nathans, Veronica Schmitt, Billy Rios, Marie Elisabeth Gaup Moe, Jay Radcliffe

November 19, 2020

Part 3 - Cyber Security in Health Care Symposium

Global Membership Required

Christian “quaddi” Dameff MD, Vidya Murthy, David Nathans, Veronica Schmitt, Billy Rios, Marie Elisabeth Gaup Moe, Jay Radcliffe
Part 2 - Cyber Security in Health Care Symposium

Christian “quaddi” Dameff MD, Vidya Murthy, David Nathans, Veronica Schmitt, Billy Rios, Marie Elisabeth Gaup Moe, Jay Radcliffe

November 19, 2020

Part 2 - Cyber Security in Health Care Symposium

Global Membership Required

Christian “quaddi” Dameff MD, Vidya Murthy, David Nathans, Veronica Schmitt, Billy Rios, Marie Elisabeth Gaup Moe, Jay Radcliffe
Part 1 - Cyber Security in Health Care Symposium

Christian “quaddi” Dameff MD, Vidya Murthy, David Nathans, Veronica Schmitt, Billy Rios, Marie Elisabeth Gaup Moe, Jay Radcliffe

November 19, 2020

Part 1 - Cyber Security in Health Care Symposium

Global Membership Required

Chris Sistrunk
Top 3 Things to Know for Tuning ICS Security Alerts

Chris Sistrunk

November 12, 2020

Top 3 Things to Know for Tuning ICS Security Alerts

Global Membership Required

Shlomi Oberman, Moshe Kol and Ariel Schön
Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

Shlomi Oberman, Moshe Kol and Ariel Schön

October 15, 2020

Hacking the Supply Chain- the Ubiquitous Vulnerabilities of Ripple 20

Global Membership Required

Mark Bristow, Jeff Hussey, Jake King, & Brent Gage
Control System Security Incident Handling in the Fog of War

Mark Bristow, Jeff Hussey, Jake King, & Brent Gage

September 24, 2020

Control System Security Incident Handling in the Fog of War

Global Membership Required

Mike Rebultan
Applied Deception in the Era of IT/OT Convergence

Mike Rebultan

August 27, 2020

Applied Deception in the Era of IT/OT Convergence

Global Membership Required

Brent Huston
Saved By Ransomware

Brent Huston

August 20, 2020

Saved By Ransomware

Global Membership Required

Thomas Balint, Stefan Woronka, and Dharminder Debisarun
Top 5 Takeaways on IEC 62443-3-3

Thomas Balint, Stefan Woronka, and Dharminder Debisarun

July 23, 2020

Top 5 Takeaways on IEC 62443-3-3

Global Membership Required

Michelle Balderson and Tsailing Merrem
Top 5 Use Cases for Endpoint Protection
in Operational Technology

Michelle Balderson and Tsailing Merrem

July 16, 2020

Top 5 Use Cases for Endpoint Protection
in Operational Technology

Global Membership Required

Monta Elkins
OPERATION: Poisoning the Supply Chain (on a Budget)

Monta Elkins

June 25, 2020

OPERATION: Poisoning the Supply Chain (on a Budget)

Global Membership Required

Dieter Sarrazyn and  Frank Lycops
OPERATION: Operator Jail Breakout

Dieter Sarrazyn and Frank Lycops

May 28, 2020

OPERATION: Operator Jail Breakout

Global Membership Required

Dharminder Debisarun, George Cordeiro, and Lieuwe Jan Koning
Under Pressure: Establishing Secure Remote Access into ICS/OT Networks

Dharminder Debisarun, George Cordeiro, and Lieuwe Jan Koning

May 14, 2020

Under Pressure: Establishing Secure Remote Access into ICS/OT Networks

Global Membership Required

Daryl Haegley, Harry Wingo, Nina Kollars
Defense Perspectives on Emerging Cyber Threats to Critical Infrastructure

Daryl Haegley, Harry Wingo, Nina Kollars

April 30, 2020

Defense Perspectives on Emerging Cyber Threats to Critical Infrastructure

Global Membership Required

Marita Fowler
Lures, Obfuscation & Worming: Analyzing Successful Android Malware Campaigns

Marita Fowler

April 23, 2020

Lures, Obfuscation & Worming: Analyzing Successful Android Malware Campaigns

Global Membership Required

Michael Schroeder
Techniques for Assessing and Manipulating Embedded Devices

Michael Schroeder

March 26, 2020

Techniques for Assessing and Manipulating Embedded Devices

Global Membership Required

John Cusimano / Del Rodillas / Igor Volovich
Evolving ICS Cyber Attack Surfaces

John Cusimano / Del Rodillas / Igor Volovich

February 27, 2020

Evolving ICS Cyber Attack Surfaces

Global Membership Required

Clint Bodungen
“Shall we play a game?” – Improving ICS Cybersecurity with Immersive Gamification & Simulation

Clint Bodungen

January 30, 2020

“Shall we play a game?” – Improving ICS Cybersecurity with Immersive Gamification & Simulation

Global Membership Required

2019 (CS)²AI Online Library

Key Findings from the 2019 CS2AI-KMPG Survey Report

Derek Harp & Bengt Gregory-Brown

December 12, 2019

Global Membership Required

Hardening Your Supply Chain with the NIST/NICE Framework
The Gold Standard for ICS-OT Monitoring

Andrew Ginter

November 16, 2019

Global Membership Required

Hardening Your Supply Chain with the NIST/NICE Framework
The Certified Mission Critical Operations-Professional

Steve Mustard

October 31, 2019

Global Membership Required

Hardening Your Supply Chain with the NIST/NICE Framework
Secure Operations Technology

Andrew Ginter

October 3, 2019

Global Membership Required

Hardening Your Supply Chain with the NIST/NICE Framework
ICS Security & Patch Management

Larry Grate, Jim Gilsinn & Paul Rostick

September 26, 2019

Global Membership Required

Hardening Your Supply Chain with the NIST/NICE Framework
The Triton attack and Safety & Protection systems

Bryan Singer, Marina Krotofil, Oleg Kolesnikov and Andy Bochman

June 27, 2019

Global Membership Required

Hardening Your Supply Chain with the NIST/NICE Framework
ICS in the Cloud

Chris Blask

April 25, 2019

Global Membership Required

Hardening Your Supply Chain with the NIST/NICE Framework
ICS Security Event Retrospective: The SANS ICS Security Summit

Andy Bochman, Jon Taylor, and Don Weber

March 28, 2019

Global Membership Required

Hardening Your Supply Chain with the NIST/NICE Framework
Keeping Things from Blowing Up: Consequence-Based Cybersecurity

Jim McGlone

March 28, 2019

Global Membership Required

Hardening Your Supply Chain with the NIST/NICE Framework
Demystifying ICS Cyber Risk

Mike Radigan

February 28, 2019

Global Membership Required

Hardening Your Supply Chain with the NIST/NICE Framework

2018 (CS)²AI Online Library

Future Gazing: AI, Automation & Autonomy

Taylor Williams, Jason Christopher, and Doug Wylie

Hardening Your Supply Chain with the NIST/NICE Framework

December 20, 2018

Global Membership Required

Managing the Sustainable ICS Security Program

Marco Ayala, Karonn Blue, and Jay Williams

Hardening Your Supply Chain with the NIST/NICE Framework

November 29, 2018

Global Membership Required

Industry Regulations and Standards – Now and Emerging

Chris Humphreys, Bradford Hegrat, and Ernie Hayden

Hardening Your Supply Chain with the NIST/NICE Framework

October 25, 2018

Global Membership Required

Controls Systems Security – How do we Best Defend Them?

Barak Perelman, Ayman Al-Issa, and Paul Forney

Hardening Your Supply Chain with the NIST/NICE Framework

September 27, 2018

Global Membership Required

Control Systems Security – What is the Offense Doing?

Matthew Luallen, Clint Bodungen, and Jim Gilsinn

Hardening Your Supply Chain with the NIST/NICE Framework

August 30, 2018

Global Membership Required

The Control Systems Security Workforce Challenges

Rebekah Mohr, Samara Moore, and Andy Bochman

Hardening Your Supply Chain with the NIST/NICE Framework

July 26, 2018

Global Membership Required

Keys to an Effective Control System Security Program

Mille Gandelsman, Ernest Wohnig, Robert Bevis, and Karl Perman

Hardening Your Supply Chain with the NIST/NICE Framework

June 28, 2018

Global Membership Required

The Control Systems Ecosystem – Asset Owners

Steve Mustard and Paul Piotrowski

Hardening Your Supply Chain with the NIST/NICE Framework

May 31, 2018

Global Membership Required

The Control Systems Ecosystem – Suppliers

Cherise Esparze-Gutierrez, Graham Speake, and Rob Garry

Hardening Your Supply Chain with the NIST/NICE Framework

April 26, 2018

Global Membership Required

What is Unique About a Control Systems Network?

Stuart Phillips and Kevin van der Veen

Hardening Your Supply Chain with the NIST/NICE Framework

March 29, 2018

Global Membership Required

Inside the Control System – Components, Processes, and Automation

Bryan Singer and Emmett Moore

Hardening Your Supply Chain with the NIST/NICE Framework

February 22, 2018

Global Membership Required

Introduction to Control Systems

Dr. Michael Chipley, Larry Grate, and Billy Rios

Hardening Your Supply Chain with the NIST/NICE Framework

January 25, 2018

Global Membership Required