top of page
![](https://static.wixstatic.com/media/6d64a8_83d7bb6ae88b4b73afd7ec8b86157812~mv2.png/v1/fill/w_1440,h_700,al_c,q_90,enc_avif,quality_auto/6d64a8_83d7bb6ae88b4b73afd7ec8b86157812~mv2.png)
(CS)²AI Online™ Recast: Navigating Vulnerability Disclosures in an ICS Environment, a BADALLOC Case Study
With the increasing connectivity of industrial systems comes the benefits of productivity , operational efficiency and process control. This connectivity also creates potential opportunity for cyber criminals to gain access to critical infrastructure systems and industrial control systems (ICS).
![(CS)²AI Online™ Recast: Navigating Vulnerability Disclosures in an ICS Environment, a BADALLOC Case Study](https://static.wixstatic.com/media/6d64a8_9536b4c61af74229a72d6cf493fb295c~mv2.jpg/v1/fill/w_980,h_764,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/6d64a8_9536b4c61af74229a72d6cf493fb295c~mv2.jpg)
![(CS)²AI Online™ Recast: Navigating Vulnerability Disclosures in an ICS Environment, a BADALLOC Case Study](https://static.wixstatic.com/media/6d64a8_9536b4c61af74229a72d6cf493fb295c~mv2.jpg/v1/fill/w_980,h_764,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/6d64a8_9536b4c61af74229a72d6cf493fb295c~mv2.jpg)
If you are a paid member of (CS)²AI, please be sure to login to the site prior to buying your ticket. Your membership level discount will automatically appear below. If you would like to become a member, click here.
bottom of page