Virtual Meetups Library

Looking to view the past webinars? Become a (CS)²AI Member today for access to all past webinars.
*Continuing education credits for past webinars will be available shortly. Check back for updates.

We at (CS)²AI are all about helping people in and wanting to enter the in-demand field of control system cybersecurity develop their knowledge, skills and professional networks. With the support of our Strategic Alliance Partners and our members, we work to offer as many benefits as we can to this group.

Key to many of our members, of course, are our meetup events, but not everyone lives in an area with an established chapter, one with a group of dedicated leaders organizing and running these gatherings. So we established the (CS)²AI Virtual Meetups, a series of live online discussions led by ICS security practitioners and thought leaders.

Being online, these are available to our members all around the world. We keep our emphasis on the discussion that underlies everything (CS)²AI does, with brief introductions to the topic at hand and half or more of available time dedicated to our attendees’ questions and viewpoints. Participants have given us rave reviews, some stating this has been the first time they have ever had a chance to ask their question to a real subject matter expert. 

While live is obviously best, we also record all of these so that even when someone can’t make it to a session they can at least watch it later. Members can access all the recordings in our library

Interested in being a speaker for one of our Virtual Meetup Sessions? Click Here.

2020 VMS Library

Control System Security Incident Handling in the Fog of War

Mark Bristow, Jeff Hussey, Jake King, & Brent Gage

September 24, 2020

Applied Deception in the Era of IT/OT Convergence

Mike Rebultan

August 27, 2020

Saved By Ransomware

Brent Huston

August 20, 2020

Top 5 Takeaways on IEC 62443-3-3

Thomas Balint, Stefan Woronka, and Dharminder Debisarun

July 23, 2020

Top 5 Use Cases for Endpoint Protection
in Operational Technology

Michelle Balderson and Tsailing Merrem

July 16, 2020

OPERATION: Poisoning the Supply Chain (on a Budget)

Monta Elkins

June 25, 2020

OPERATION: Poisoning the Supply Chain (on a Budget)

Monta Elkins

June 25, 2020

OPERATION: Operator Jail Breakout

Dieter Sarrazyn and Frank Lycops

May 28, 2020

Under Pressure: Establishing Secure Remote Access into ICS/OT Networks

Dharminder Debisarun, George Cordeiro, and Lieuwe Jan Koning

May 14, 2020

Defense Perspectives on Emerging Cyber Threats to Critical Infrastructure

Daryl Haegley, Harry Wingo, Nina Kollars

April 30, 2020

Lures, Obfuscation & Worming: Analyzing Successful Android Malware Campaigns

Marita Fowler

April 23, 2020

Techniques for Assessing and Manipulating Embedded Devices

Michael Schroeder

March 26, 2020

Evolving ICS Cyber Attack Surfaces

John Cusimano / Del Rodillas / Igor Volovich

February 27, 2020

“Shall we play a game?” – Improving ICS Cybersecurity with Immersive Gamification & Simulation

Clint Bodungen

January 30, 2020

2019 VMS Library

Key Findings from the 2019 CS2AI-KMPG Survey Report

Derek Harp & Bengt Gregory-Brown

December 12, 2019

The Gold Standard for ICS-OT Monitoring

Andrew Ginter

November 16, 2019

The Certified Mission Critical Operations-Professional

Steve Mustard

October 31, 2019

Secure Operations Technology

Andrew Ginter

October 3, 2019

ICS Security & Patch Management

Larry Grate, Jim Gilsinn & Paul Rostick

September 26, 2019

The Triton attack and Safety & Protection systems

Bryan Singer, Marina Krotofil, Oleg Kolesnikov and Andy Bochman

June 27, 2019

ICS in the Cloud

Chris Blask

April 25, 2019

ICS Security Event Retrospective: The SANS ICS Security Summit

Andy Bochman, Jon Taylor, and Don Weber

March 28, 2019

Keeping Things from Blowing Up: Consequence-Based Cybersecurity

Jim McGlone

March 28, 2019

Demystifying ICS Cyber Risk

Mike Radigan

February 28, 2019

2018 VMS Library

Future Gazing: AI, Automation & Autonomy

Taylor Williams, Jason Christopher, and Doug Wylie

December 20, 2018

Managing the Sustainable ICS Security Program

Marco Ayala, Karonn Blue, and Jay Williams

November 29, 2018

Industry Regulations and Standards – Now and Emerging

Chris Humphreys, Bradford Hegrat, and Ernie Hayden

October 25, 2018

Controls Systems Security – How do we Best Defend Them?

Barak Perelman, Ayman Al-Issa, and Paul Forney

September 27, 2018

Control Systems Security – What is the Offense Doing?

Matthew Luallen, Clint Bodungen, and Jim Gilsinn

August 30, 2018

The Control Systems Security Workforce Challenges

Rebekah Mohr, Samara Moore, and Andy Bochman

July 26, 2018

Keys to an Effective Control System Security Program

Mille Gandelsman, Ernest Wohnig, Robert Bevis, and Karl Perman

June 28, 2018

The Control Systems Ecosystem – Asset Owners

Steve Mustard and Paul Piotrowski

May 31, 2018

The Control Systems Ecosystem – Suppliers

Cherise Esparze-Gutierrez, Graham Speake, and Rob Garry

April 26, 2018

What is Unique About a Control Systems Network?

Stuart Phillips and Kevin van der Veen

March 29, 2018

Inside the Control System – Components, Processes, and Automation

Bryan Singer and Emmett Moore

February 22, 2018

Introduction to Control Systems

Dr. Michael Chipley, Larry Grate, and Billy Rios

January 25, 2018