top of page
NEWSLETTER
(CS)²AI Blog
News articles submitted by (CS)²AI Fellows, Global Advisory Board and the (CS)²AI Team.
(CS)²AI
Nov 21, 20245 min read
Safeguarding Device Manufacturing: Practical Protective Measures AgainstCounterfeit Components
By: Brent Huston , CEO, virtual CISO & Security Evangelist MicroSolved, Inc. and (CS)²AI Fellow Introduction For industrial control...
(CS)²AI
May 8, 202417 min read
How to Apply ISA/IEC62443 - A Practical Guide Q&A Follow up
By Steve Mustard, PE, CAP, GICSP, President & CEO of National Automation, and past president of the International Society of Automation,...
(CS)²AI
Feb 28, 20243 min read
Fortifying Industrial Operations: A Strategic Remediation Plan
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard February 29, 2024 Ensuring smooth...
(CS)²AI
Feb 22, 20242 min read
Overcoming the challenging task of prioritizing your actions to reduce Cybersecurity Risks in OT Management
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard February 22, 2024 Maintaining an accurate...
(CS)²AI
Jan 23, 20242 min read
Understanding the intricate details and implications of Operational Technology (OT) Vulnerabilities
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard January 23, 2024 In the realm of...
(CS)²AI
Jan 11, 20242 min read
The Critical Importance of Up-to-Date Asset Inventory for Enhanced Security in OT Environments
By Gregory Dupuis, Global Head of Marketing and EU Sales Team Leader at Framatome Cybersecurity (IBCY) January 11, 2024 In the...
Brent Huston
Dec 21, 20232 min read
Raspberry Pi and OpenPLC How To and Use Cases
By Brent Huston, MicroSolved, Inc., (CS)²AI Fellow December 21, 2023 Introduction: OpenPLC is an open-source Programmable Logic...
grahammarsden5
Jul 10, 202313 min read
Q&A Follow-Up: Applying Network Segmentation to Secure OT Environments
By Dan Clark, Director of OT Cybersecurity Architecture for Verve Industrial Solutions July 11, 2023 We hosted a (CS)²AI Online™ Seminar...
Vivek Ponnada
Feb 1, 20236 min read
Getting started in OT Cybersecurity: Books, Podcasts, Certifications, Free & Formal Training & more
By Vivek Ponnada, Engineer, MBA, GICSP, Regional Sales Director at Nozomi Networks, (CS)²AI Fellow January 2, 2023 While attending...
Steve Mustard
Oct 13, 20223 min read
Book: Industrial Cybersecurity: Case Studies and Best Practices by Steve Mustard, PE, CAP, GICSP
Industrial Cybersecurity Case Studies & Best Practices summarizes all I have seen & learned about industrial cybersecurity over 20 years.
Bayron Lopez
Sep 22, 20223 min read
Re-Sealing the Foundation of Commercial Construction
By Bayron Lopez, Director of Operational Technology at Kilroy Realty Corporation (CS)²AI Fellow September 22, 2022 With the growing...
Jaco Benadie
Aug 9, 20221 min read
Operational Technology Cybersecurity – United and Strong
By Jaco Benadie, Partner, Technology Consulting at Ernst & Young Consulting (CS)²AI Fellow July 4, 2022 Operational Technology...
Fred Gordy: CS²AI Fellow
Mar 24, 20221 min read
Building Control System WhisperGate Attack Post on LinkedIn
By Fred Gordy Director of Cybersecurity at Intelligent Buildings, LLC, (CS)²AI Fellow March, 2022 Building Control System WhisperGate...
Robin Berthier
Feb 9, 20223 min read
Q & A Follow-Up - Cyber Security for Energy - Electric Sector Symposium January 19, 2022 (2 of 2)
By Robin Berthier, CEO & Co-Founder at Network Perception February 9, 2022 We hosted a (CS)²AI Online™ symposium on January 19, 2022 that...
Branko Terzic
Feb 1, 20224 min read
Q & A Follow-Up - Cyber Security for Energy - Electric Sector Symposium January 19, 2022 (1of 2)
By Branko Terzic, Former FERC Commissioner February 1, 2022 We hosted a (CS)²AI Online™ symposium on January 19, 2022 that focused on...
Andrew Ginter
Jan 19, 20227 min read
Q & A Follow-Up- Control System Cyber Security 2021 Annual Report: The Future of Industrial Security
By Andrew Ginter, VP Industrial Security, Waterfall Security Solutions January 19, 2022 We hosted a (CS)²AI Online™ seminar on January...
Derek Harp, Chairman & Founder
Nov 9, 20211 min read
Control System Cyber Security Books I'm Currently Reading
By Derek Harp, (CS)²AI Founder, Chairman and Fellow November, 2021 During a recent presentation about the Key Findings of the...
Rick Kaun
Oct 12, 202111 min read
Q&A Follow-Up with Rick Kaun: Navigating the New TSA Directive for Pipelines
By Rick Kaun, VP Solutions at Verve Industrial Protection October, 2021 We hosted a (CS)²AI Online™ seminar on September 22, 2021 that...
Jim McGlone
Sep 14, 20212 min read
BOOK Synopsis: Security PHA Review for Consequence Based Cybersecurity- Jim McGlone & Edward Marszal
By Jim McGlone, Chief Marketing Officer at Kenexis Consulting Corporation Co-author of Security PHA Review We are looking forward to...
Derek Harp, Chairman & Founder
Sep 8, 20212 min read
How do We Knock Down OT Risk? Authors Unite at (CS)²AI Symposium Sept. 15, 2021
By Derek Harp, (CS)²AI Founder, Chairman and Fellow September, 2021 Of course, we all want to mitigate risk in our environments. It goes...
Mark Bristow
Sep 2, 20217 min read
Q&A Follow-Up with Mark Bristow: Developing & Leading a Top ICS Incident Response Team
By Mark Bristow, Branch Chief, Cyber Defense Coordination (CDC) at Cybersecurity and Infrastructure Security Agency (CISA), (CS)²AI...
Jules Vos
Sep 1, 20219 min read
Q&A Follow Up with Jules Vos: Deciphering the Value of Zero Trust & CARTA in Operational Technology
By Jules Vos, Head OT cyber security services - NL at Applied Risk - Critical Infrastructure Made Secure August 2021 We hosted a (CS)²AI...
(CS)²AI
Aug 31, 20217 min read
Q&A Follow-Up with Peter Lund & Chris Duffey: Why Hasn’t SOAR Taken Off in ICS?
By Peter Lund, Vice President Of Product Management at Industrial Defender and Chris Duffey, OT/ICS Specialist at Splunk We hosted a...
George Kalavantis
Aug 23, 20211 min read
How Do You Ask Your CISO for OT Cybersecurity Budget?
George Kalavantis, Industrial Defender COO August 23, 2021 Getting budget approval is clearly a challenge for many in our community....
Derek Harp, Chairman & Founder
Aug 17, 20211 min read
After six years we have definitely reached an exciting stage for (CS)²AI!
By Derek Harp, (CS)²AI Founder, Chairman and Fellow April, 2021 Dear Members, After six years we have definitely reached an exciting...
Clint Bodungen
Aug 11, 20219 min read
OT Cyber Risk Management – You’re Doing It Wrong
The 3 Most Common Problems That Nearly ALL Cyber Risk Management Programs Have, and How to Solve Them Submitted by: Clint Bodungen...
(CS)²AI
May 25, 20212 min read
Free Admission to Virtual Official Cyber Security Summit Featuring FBI, NSA, Google, Verizon & More
Earn 8 CPE Credits (CS)²AI is proud to continue to partner with the Official Cyber Security Summit throughout its Official 2021 Virtual...
Steve Mustard
May 16, 20213 min read
Colonial Pipeline Cyberattack
Submitted by: Steve Mustard President & CEO at National Automation, Inc. and (CS)²AI Fellow May 16, 2021 REGISTER HERE FOR OUR SPECIAL...
Derek Harp, Chairman & Founder
Apr 16, 20213 min read
Announcing the (CS)²AI-KPMG 2021 Control System Cyber Security Survey & Report
By Derek Harp, (CS)²AI Founder, Chairman and Fellow April, 2021 I am proud to announce today that the work to produce the 2021...
Daryl Haegley: (CS)²AI Fellow
Apr 15, 202112 min read
Making the National Cyber Director Operational With a National Cyber Defense Center
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source: ...
Daryl Haegley: (CS)²AI Fellow
Apr 15, 20211 min read
Host, Dave Whitehead delves into the future of electric power in his Podcast: Schweitzer Drive
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source: ...
Daryl Haegley: (CS)²AI Fellow
Apr 15, 20213 min read
The United States has a major hole in its cyber defense. Here’s how to fix it.
In recognition of the danger posed by foreign cyberattacks against the U.S. military, economy, infrastructure and political system, I direct
Daryl Haegley: (CS)²AI Fellow
Apr 13, 20211 min read
Podcast host Dave Whitehead talks with SEL power systems experts about issues with Texas power grid
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source: ...
Daryl Haegley: (CS)²AI Fellow
Apr 13, 20211 min read
The ICS Village and partners present Hack the Capitol 4.0.
The ICS Village, in partnership with the R Street Institute, the Cyber Bytes Foundation, and the National Security Institute, presents Hack
Daryl Haegley: (CS)²AI Fellow
Apr 13, 20211 min read
Facility Cybersecurity Framework (FCF) offers self-assessment tools for hardening your facilities
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Discover Tools: ...
Derek Harp, Chairman & Founder
Jan 11, 20214 min read
Chairman's 2021 New Years Letter
By Derek Harp, (CS)²AI Founder, Chairman and Fellow January, 2021 Happy New Year Colleagues, It is hard to believe 2020 has finally come...
Daryl Haegley: (CS)²AI Fellow
Dec 15, 20201 min read
Voluntary, Risk-based Standards Help Facility Owners and Operators Better Manage Cybersecurity Risks
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source:...
Fred Gordy: CS²AI Fellow
Dec 15, 20208 min read
ASSESSMENT FINDINGS: EXTERNAL THREATS AND INTERNAL SELF-INFLICTED WOUNDS
By Fred Gordy Director of Cybersecurity at Intelligent Buildings, LLC, (CS)²AI Fellow December, 2020 Threats to building control systems...
Daryl Haegley: (CS)²AI Fellow
Dec 15, 20204 min read
Spies with Russia’s Foreign Intelligence Service Believed To Have Hacked Top US Cybersecurity Firm
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source:...
Daryl Haegley: (CS)²AI Fellow
Dec 15, 20201 min read
The Institute for Critical Infrastructure Technology (ICIT) Provides Research, Advisory, & Education
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source:...
Daryl Haegley: (CS)²AI Fellow
Dec 15, 20202 min read
Ransomware Attacks Have Surged Drastically During Remote Working
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source:...
Daryl Haegley: (CS)²AI Fellow
Dec 15, 20204 min read
CEOs Will Be Personally Liable for Cyber-Physical Security Incidents by 2024
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source:...
Daryl Haegley: (CS)²AI Fellow
Dec 15, 20201 min read
Discussion of the importance of protecting our operational technology from cyber-attacks
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source:...
Daryl Haegley: (CS)²AI Fellow
Dec 15, 20201 min read
The Final Cyber Essentials Toolkit has arrived: Chapter 6: Your Crisis Response.
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source:...
Daryl Haegley: (CS)²AI Fellow
Dec 15, 20201 min read
NSA Warns of Russian Hackers, Urges Patching of Defense Systems
Submitted by: Daryl Haegley Director, Mission Assurance & Cyber Deterrence at the DOD and (CS)²AI Fellow Original Source:...
Derek Harp, Chairman & Founder
Nov 6, 20202 min read
(CS)2AI-KPMG Control System Cyber Security Report (2020) - Part 1: Introduction
On behalf of a tireless (CS)2AI annual report steering committee, I am proud to announce the availability of the very first (CS)2AI-KPMG...
Michael Chipley: (CS)²AI Fellow
Oct 20, 20209 min read
Creating a DoD Cybersecurity Maturity Model Certification Compliant Risk Management Plan
In response to continued data breaches and exploits of the Defense Industrial Base and other DoD contractors/vendors such as A&E, . . .
Daryl Haegley: (CS)²AI Fellow
Oct 20, 20201 min read
New Flaws in Top Antivirus Software Could Make Computers More Vulnerable
“Chief among the flaws is the ability to delete files from arbitrary locations, allowing the attacker to delete any file in the system . . .
Daryl Haegley: (CS)²AI Fellow
Oct 20, 20202 min read
U.S. DOE Provides $65M for ‘Connected Communities’ of Buildings Powered to Transform Electric System
The DOE announced up to $65 million through its Connected Communities funding opportunity to expand DOE’s network of grid-interactive...
Daryl Haegley: (CS)²AI Fellow
Oct 20, 20202 min read
Your iPhone is tracking everywhere you go: Here's how to find the setting
At this point, digital privacy is long gone. There’s always another device, feature or service tracking what we say, what we look at online
bottom of page