top of page

Search

(CS)²AI
5 min read
Safeguarding Device Manufacturing: Practical Protective Measures AgainstCounterfeit Components
By: Brent Huston , CEO, virtual CISO & Security Evangelist MicroSolved, Inc. and (CS)²AI Fellow Introduction For industrial control...


(CS)²AI
17 min read
How to Apply ISA/IEC62443 - A Practical Guide Q&A Follow up
By Steve Mustard, PE, CAP, GICSP, President & CEO of National Automation, and past president of the International Society of Automation,...

(CS)²AI
3 min read
Fortifying Industrial Operations: A Strategic Remediation Plan
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard February 29, 2024 Ensuring smooth...

(CS)²AI
2 min read
Overcoming the challenging task of prioritizing your actions to reduce Cybersecurity Risks in OT Management
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard February 22, 2024 Maintaining an accurate...

(CS)²AI
2 min read
Understanding the intricate details and implications of Operational Technology (OT) Vulnerabilities
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard January 23, 2024 In the realm of...

(CS)²AI
2 min read
The Critical Importance of Up-to-Date Asset Inventory for Enhanced Security in OT Environments
By Gregory Dupuis, Global Head of Marketing and EU Sales Team Leader at Framatome Cybersecurity (IBCY) January 11, 2024 In the...


Brent Huston
2 min read
Raspberry Pi and OpenPLC How To and Use Cases
By Brent Huston, MicroSolved, Inc., (CS)²AI Fellow December 21, 2023 Introduction: OpenPLC is an open-source Programmable Logic...

grahammarsden5
13 min read
Q&A Follow-Up: Applying Network Segmentation to Secure OT Environments
By Dan Clark, Director of OT Cybersecurity Architecture for Verve Industrial Solutions July 11, 2023 We hosted a (CS)²AI Online™ Seminar...

Vivek Ponnada
6 min read
Getting started in OT Cybersecurity: Books, Podcasts, Certifications, Free & Formal Training & more
By Vivek Ponnada, Engineer, MBA, GICSP, Regional Sales Director at Nozomi Networks, (CS)²AI Fellow January 2, 2023 While attending...

Steve Mustard
3 min read
Book: Industrial Cybersecurity: Case Studies and Best Practices by Steve Mustard, PE, CAP, GICSP
Industrial Cybersecurity Case Studies & Best Practices summarizes all I have seen & learned about industrial cybersecurity over 20 years.


Bayron Lopez
3 min read
Re-Sealing the Foundation of Commercial Construction
By Bayron Lopez, Director of Operational Technology at Kilroy Realty Corporation (CS)²AI Fellow September 22, 2022 With the growing...

Jaco Benadie
1 min read
Operational Technology Cybersecurity – United and Strong
By Jaco Benadie, Partner, Technology Consulting at Ernst & Young Consulting (CS)²AI Fellow July 4, 2022 Operational Technology...


Fred Gordy: CS²AI Fellow
1 min read
Building Control System WhisperGate Attack Post on LinkedIn
By Fred Gordy Director of Cybersecurity at Intelligent Buildings, LLC, (CS)²AI Fellow March, 2022 Building Control System WhisperGate...

Robin Berthier
3 min read
Q & A Follow-Up - Cyber Security for Energy - Electric Sector Symposium January 19, 2022 (2 of 2)
By Robin Berthier, CEO & Co-Founder at Network Perception February 9, 2022 We hosted a (CS)²AI Online™ symposium on January 19, 2022 that...

Branko Terzic
4 min read
Q & A Follow-Up - Cyber Security for Energy - Electric Sector Symposium January 19, 2022 (1of 2)
By Branko Terzic, Former FERC Commissioner February 1, 2022 We hosted a (CS)²AI Online™ symposium on January 19, 2022 that focused on...

Andrew Ginter
7 min read
Q & A Follow-Up- Control System Cyber Security 2021 Annual Report: The Future of Industrial Security
By Andrew Ginter, VP Industrial Security, Waterfall Security Solutions January 19, 2022 We hosted a (CS)²AI Online™ seminar on January...

Derek Harp, Chairman & Founder
1 min read
Control System Cyber Security Books I'm Currently Reading
By Derek Harp, (CS)²AI Founder, Chairman and Fellow November, 2021 During a recent presentation about the Key Findings of the...

Rick Kaun
11 min read
Q&A Follow-Up with Rick Kaun: Navigating the New TSA Directive for Pipelines
By Rick Kaun, VP Solutions at Verve Industrial Protection October, 2021 We hosted a (CS)²AI Online™ seminar on September 22, 2021 that...

Jim McGlone
2 min read
BOOK Synopsis: Security PHA Review for Consequence Based Cybersecurity- Jim McGlone & Edward Marszal
By Jim McGlone, Chief Marketing Officer at Kenexis Consulting Corporation Co-author of Security PHA Review We are looking forward to...


Derek Harp, Chairman & Founder
2 min read
How do We Knock Down OT Risk? Authors Unite at (CS)²AI Symposium Sept. 15, 2021
By Derek Harp, (CS)²AI Founder, Chairman and Fellow September, 2021 Of course, we all want to mitigate risk in our environments. It goes...
bottom of page