How to Apply ISA/IEC62443 - A Practical Guide Q&A Follow up
NEWSLETTER
(CS)²AI Blog
News articles submitted by (CS)²AI Fellows, Global Advisory Board and the (CS)²AI Team.
Fortifying Industrial Operations: A Strategic Remediation Plan
Overcoming the challenging task of prioritizing your actions to reduce Cybersecurity Risks in OT Management
Understanding the intricate details and implications of Operational Technology (OT) Vulnerabilities
The Critical Importance of Up-to-Date Asset Inventory for Enhanced Security in OT Environments
Raspberry Pi and OpenPLC How To and Use Cases
Q&A Follow-Up: Applying Network Segmentation to Secure OT Environments
Getting started in OT Cybersecurity: Books, Podcasts, Certifications, Free & Formal Training & more
Book: Industrial Cybersecurity: Case Studies and Best Practices by Steve Mustard, PE, CAP, GICSP
Re-Sealing the Foundation of Commercial Construction
Operational Technology Cybersecurity – United and Strong
Building Control System WhisperGate Attack Post on LinkedIn
Q & A Follow-Up - Cyber Security for Energy - Electric Sector Symposium January 19, 2022 (2 of 2)
Q & A Follow-Up - Cyber Security for Energy - Electric Sector Symposium January 19, 2022 (1of 2)
Q & A Follow-Up- Control System Cyber Security 2021 Annual Report: The Future of Industrial Security
Control System Cyber Security Books I'm Currently Reading
Q&A Follow-Up with Rick Kaun: Navigating the New TSA Directive for Pipelines
BOOK Synopsis: Security PHA Review for Consequence Based Cybersecurity- Jim McGlone & Edward Marszal
How do We Knock Down OT Risk? Authors Unite at (CS)²AI Symposium Sept. 15, 2021
Q&A Follow-Up with Mark Bristow: Developing & Leading a Top ICS Incident Response Team
Q&A Follow Up with Jules Vos: Deciphering the Value of Zero Trust & CARTA in Operational Technology
Q&A Follow-Up with Peter Lund & Chris Duffey: Why Hasn’t SOAR Taken Off in ICS?
How Do You Ask Your CISO for OT Cybersecurity Budget?
After six years we have definitely reached an exciting stage for (CS)²AI!
OT Cyber Risk Management – You’re Doing It Wrong
Free Admission to Virtual Official Cyber Security Summit Featuring FBI, NSA, Google, Verizon & More
Colonial Pipeline Cyberattack
Announcing the (CS)²AI-KPMG 2021 Control System Cyber Security Survey & Report
Making the National Cyber Director Operational With a National Cyber Defense Center
Host, Dave Whitehead delves into the future of electric power in his Podcast: Schweitzer Drive
The United States has a major hole in its cyber defense. Here’s how to fix it.
Podcast host Dave Whitehead talks with SEL power systems experts about issues with Texas power grid
The ICS Village and partners present Hack the Capitol 4.0.
Facility Cybersecurity Framework (FCF) offers self-assessment tools for hardening your facilities
Chairman's 2021 New Years Letter
Voluntary, Risk-based Standards Help Facility Owners and Operators Better Manage Cybersecurity Risks
ASSESSMENT FINDINGS: EXTERNAL THREATS AND INTERNAL SELF-INFLICTED WOUNDS
Spies with Russia’s Foreign Intelligence Service Believed To Have Hacked Top US Cybersecurity Firm
The Institute for Critical Infrastructure Technology (ICIT) Provides Research, Advisory, & Education
Ransomware Attacks Have Surged Drastically During Remote Working
CEOs Will Be Personally Liable for Cyber-Physical Security Incidents by 2024
Discussion of the importance of protecting our operational technology from cyber-attacks
The Final Cyber Essentials Toolkit has arrived: Chapter 6: Your Crisis Response.
NSA Warns of Russian Hackers, Urges Patching of Defense Systems
(CS)2AI-KPMG Control System Cyber Security Report (2020) - Part 1: Introduction
Creating a DoD Cybersecurity Maturity Model Certification Compliant Risk Management Plan
New Flaws in Top Antivirus Software Could Make Computers More Vulnerable
U.S. DOE Provides $65M for ‘Connected Communities’ of Buildings Powered to Transform Electric System
Your iPhone is tracking everywhere you go: Here's how to find the setting
Senate Democrat raises concerns around Universal Health Services breach