top of page

Search

CS2AI Cyber Security for the Electric Sector Symposium - Follow up
By: Chris Humphreys Lead Cybersecurity Solutions Architect at Foxguard , (CS)²AI Fellow This week, I had the honor of presenting at...
Trisha Harp
3 min read

CS2AI ICS Cybersecurity Roundtable: Product Lifecycle, Security, & Certification - Q&A Follow Up
By: Steve Mustard , President & CEI of National Automation, Inc. & (CS)²AI Fellow, Khalid Ansari , Senior Engineer - Industrial Control...
(CS)²AI
9 min read


How to Apply ISA/IEC62443 - A Practical Guide Q&A Follow up
By Steve Mustard, PE, CAP, GICSP, President & CEO of National Automation, and past president of the International Society of Automation,...
(CS)²AI
17 min read

Fortifying Industrial Operations: A Strategic Remediation Plan
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard February 29, 2024 Ensuring smooth...
(CS)²AI
3 min read

Overcoming the challenging task of prioritizing your actions to reduce Cybersecurity Risks in OT Management
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard February 22, 2024 Maintaining an accurate...
(CS)²AI
2 min read

Understanding the intricate details and implications of Operational Technology (OT) Vulnerabilities
By Jay Gignac, Head of Global Sales & Marketing, Framatome Cybersecurity, Cyberwatch & Foxguard January 23, 2024 In the realm of...
(CS)²AI
2 min read

The Critical Importance of Up-to-Date Asset Inventory for Enhanced Security in OT Environments
By Gregory Dupuis, Global Head of Marketing and EU Sales Team Leader at Framatome Cybersecurity (IBCY) January 11, 2024 In the...
(CS)²AI
2 min read


Raspberry Pi and OpenPLC How To and Use Cases
By Brent Huston, MicroSolved, Inc., (CS)²AI Fellow December 21, 2023 Introduction: OpenPLC is an open-source Programmable Logic...
Brent Huston
2 min read

Getting started in OT Cybersecurity: Books, Podcasts, Certifications, Free & Formal Training & more
By Vivek Ponnada, Engineer, MBA, GICSP, Regional Sales Director at Nozomi Networks, (CS)²AI Fellow January 2, 2023 While attending...
Vivek Ponnada
6 min read

Book: Industrial Cybersecurity: Case Studies and Best Practices by Steve Mustard, PE, CAP, GICSP
Industrial Cybersecurity Case Studies & Best Practices summarizes all I have seen & learned about industrial cybersecurity over 20 years.
Steve Mustard
3 min read


Re-Sealing the Foundation of Commercial Construction
By Bayron Lopez, Director of Operational Technology at Kilroy Realty Corporation (CS)²AI Fellow September 22, 2022 With the growing...
Bayron Lopez
3 min read

Operational Technology Cybersecurity – United and Strong
By Jaco Benadie, Partner, Technology Consulting at Ernst & Young Consulting (CS)²AI Fellow July 4, 2022 Operational Technology...
Jaco Benadie
1 min read


Building Control System WhisperGate Attack Post on LinkedIn
By Fred Gordy Director of Cybersecurity at Intelligent Buildings, LLC, (CS)²AI Fellow March, 2022 Building Control System WhisperGate...
Fred Gordy: CS²AI Fellow
1 min read

Control System Cyber Security Books I'm Currently Reading
By Derek Harp, (CS)²AI Founder, Chairman and Fellow November, 2021 During a recent presentation about the Key Findings of the...
Derek Harp, Chairman & Founder
1 min read

BOOK Synopsis: Security PHA Review for Consequence Based Cybersecurity- Jim McGlone & Edward Marszal
By Jim McGlone, Chief Marketing Officer at Kenexis Consulting Corporation Co-author of Security PHA Review We are looking forward to...
Jim McGlone
2 min read


How do We Knock Down OT Risk? Authors Unite at (CS)²AI Symposium Sept. 15, 2021
By Derek Harp, (CS)²AI Founder, Chairman and Fellow September, 2021 Of course, we all want to mitigate risk in our environments. It goes...
Derek Harp, Chairman & Founder
2 min read

Q&A Follow Up with Jules Vos: Deciphering the Value of Zero Trust & CARTA in Operational Technology
By Jules Vos, Head OT cyber security services - NL at Applied Risk - Critical Infrastructure Made Secure August 2021 We hosted a (CS)²AI...
Jules Vos
9 min read

How Do You Ask Your CISO for OT Cybersecurity Budget?
George Kalavantis, Industrial Defender COO August 23, 2021 Getting budget approval is clearly a challenge for many in our community....
George Kalavantis
1 min read


OT Cyber Risk Management – You’re Doing It Wrong
The 3 Most Common Problems That Nearly ALL Cyber Risk Management Programs Have, and How to Solve Them Submitted by: Clint Bodungen...
Clint Bodungen
9 min read


Colonial Pipeline Cyberattack
Submitted by: Steve Mustard President & CEO at National Automation, Inc. and (CS)²AI Fellow May 16, 2021 REGISTER HERE FOR OUR SPECIAL...
Steve Mustard
3 min read
bottom of page