talk-data.com talk-data.com

Filter by Source

Select conferences and events

People (168 results)

See all 168 →
Showing 15 results

Activities & events

Title & Speakers Event
Andrew Ginter – VP Industrial Security @ Waterfall Security Solutions

In this webinar, we explore common OT cyber risk fallacies and powerful new approaches to physical & analog / 'unhackable' mitigations for OT cyber risk, including: Security PHA Review (SPR), Consequence-Driven Cyber-Informed Engineering (CCE), Secure Operations Technology (SEC-OT), and manual fall-backs. We finish by looking at organizational resistance to robust security measures, such as confusing detection with prevention, statistics with prediction, and 'reverse lottery' ROI. The session discusses how the risk landscape is evolving and how the world's most secure industrial sites manage OT cyber risk.

security pha review (spr) consequence-driven cyber-informed engineering (cce) secure operations technology (sec-ot)
(CS)²AI Online™ Replay: Managing OT Cyber Risk
Andrew Ginter – VP Industrial Security @ Waterfall Security Solutions

There is no consensus as to how to manage OT cyber risk, so when serious incidents occur, it is vitally important that we have a defensible rationale in place for our choices. But - what does a defensible OT security program look like?\n\nIn this webinar, we start with common OT cyber risk fallacies, such as insurance does not keep the lights on and cyber catastrophes are not like hurricanes. We explore powerful new approaches to physical & analog / \"unhackable\" mitigations for OT cyber risk, including: Security PHA Review (SPR), Consequence-Driven Cyber-Informed Engineering (CCE), Secure Operations Technology (SEC-OT), and manual fall-backs. We finish by looking at organizational resistance to robust security measures, such as confusing detection with prevention, statistics with prediction, and \"reverse lottery\" ROI.\nSo while the risk landscape continues to worsen, simple and powerful approaches to managing OT cyber risk are emerging. Join us to explore approaches to security that the world's most secure industrial sites already use routinely.

security pha review (spr) consequence-driven cyber-informed engineering (cce) secure operations technology (sec-ot) manual fall-backs
(CS)²AI Online™ Replay: Managing OT Cyber Risk

Reserve a seat for this replay event now at: https://attendee.gotowebinar.com/register/617005683244194396?source=06122024Meetupevent

There is no consensus as to how to manage OT cyber risk, so when serious incidents occur, it is vitally important that we have a defensible rationale in place for our choices. But - what does a defensible OT security program look like?

In this webinar, we start with common OT cyber risk fallacies, such as insurance does not keep the lights on and cyber catastrophes are not like hurricanes. We explore powerful new approaches to physical & analog / "unhackable" mitigations for OT cyber risk, including: Security PHA Review (SPR), Consequence-Driven Cyber-Informed Engineering (CCE), Secure Operations Technology (SEC-OT), and manual fall-backs. We finish by looking at organizational resistance to robust security measures, such as confusing detection with prevention, statistics with prediction, and "reverse lottery" ROI. So while the risk landscape continues to worsen, simple and powerful approaches to managing OT cyber risk are emerging. Join us to explore approaches to security that the world's most secure industrial sites already use routinely.

Speaker: Andrew Ginter is the VP Industrial Security at Waterfall Security Solutions. Before Waterfall, he spent 30 years leading the development of control system products, IT/OT middleware products and the world's first industrial SIEM. Andrew is the author of two books: SCADA Security - What's broken and how to fix it, and Secure Operations Technology. He is a co-author of the Industrial Internet Security Framework, co-host of the Industrial Security Podcast, a lecturer at the Industrial Security Institute and a frequent contributor to industrial security standards and best-practice guidance.

------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Join now! https://www.cs2ai.org/plans-pricing

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Replay: Managing OT Cyber Risk

Reserve a seat for this replay event now at: https://attendee.gotowebinar.com/register/617005683244194396?source=06122024Meetupevent

There is no consensus as to how to manage OT cyber risk, so when serious incidents occur, it is vitally important that we have a defensible rationale in place for our choices. But - what does a defensible OT security program look like?

In this webinar, we start with common OT cyber risk fallacies, such as insurance does not keep the lights on and cyber catastrophes are not like hurricanes. We explore powerful new approaches to physical & analog / "unhackable" mitigations for OT cyber risk, including: Security PHA Review (SPR), Consequence-Driven Cyber-Informed Engineering (CCE), Secure Operations Technology (SEC-OT), and manual fall-backs. We finish by looking at organizational resistance to robust security measures, such as confusing detection with prevention, statistics with prediction, and "reverse lottery" ROI. So while the risk landscape continues to worsen, simple and powerful approaches to managing OT cyber risk are emerging. Join us to explore approaches to security that the world's most secure industrial sites already use routinely.

Speaker: Andrew Ginter is the VP Industrial Security at Waterfall Security Solutions. Before Waterfall, he spent 30 years leading the development of control system products, IT/OT middleware products and the world's first industrial SIEM. Andrew is the author of two books: SCADA Security - What's broken and how to fix it, and Secure Operations Technology. He is a co-author of the Industrial Internet Security Framework, co-host of the Industrial Security Podcast, a lecturer at the Industrial Security Institute and a frequent contributor to industrial security standards and best-practice guidance.

------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Join now! https://www.cs2ai.org/plans-pricing

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Replay: Managing OT Cyber Risk

Reserve a seat for this replay event now at: https://attendee.gotowebinar.com/register/617005683244194396?source=06122024Meetupevent

There is no consensus as to how to manage OT cyber risk, so when serious incidents occur, it is vitally important that we have a defensible rationale in place for our choices. But - what does a defensible OT security program look like?

In this webinar, we start with common OT cyber risk fallacies, such as insurance does not keep the lights on and cyber catastrophes are not like hurricanes. We explore powerful new approaches to physical & analog / "unhackable" mitigations for OT cyber risk, including: Security PHA Review (SPR), Consequence-Driven Cyber-Informed Engineering (CCE), Secure Operations Technology (SEC-OT), and manual fall-backs. We finish by looking at organizational resistance to robust security measures, such as confusing detection with prevention, statistics with prediction, and "reverse lottery" ROI. So while the risk landscape continues to worsen, simple and powerful approaches to managing OT cyber risk are emerging. Join us to explore approaches to security that the world's most secure industrial sites already use routinely.

Speaker: Andrew Ginter is the VP Industrial Security at Waterfall Security Solutions. Before Waterfall, he spent 30 years leading the development of control system products, IT/OT middleware products and the world's first industrial SIEM. Andrew is the author of two books: SCADA Security - What's broken and how to fix it, and Secure Operations Technology. He is a co-author of the Industrial Internet Security Framework, co-host of the Industrial Security Podcast, a lecturer at the Industrial Security Institute and a frequent contributor to industrial security standards and best-practice guidance.

------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Join now! https://www.cs2ai.org/plans-pricing

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Replay: Managing OT Cyber Risk

Please note that meetup RSVPs do not reach our event platform. Registration is required at: https://attendee.gotowebinar.com/register/3787151688578125143?source=112923meetupevent

Engineering-Grade OT Security - an interview with the author In his new book Engineering-Grade OT Security: A manager's guide, Andrew Ginter explores the question how much is enough? How much engineering? How much security? For which kinds of systems? And most importantly, why?

By analogy, consider - what load should a pedestrian bridge be designed for? Assume barriers, so vehicles cannot enter the bridge. Engineers calculate the weight of 2 meters of water across the entire width and length of the bridge - people are mostly water after all. Most people are under 2 meters tall, so this weight and distribution of water is a shoulder-to-shoulder, worst-case pedestrian load. Engineers then multiply the result by 10 and design to that load. These are people crossing the bridge after all. Failure of the bridge under load is unacceptable.

When cyber compromise of industrial automation puts worker safety, public safety or national security at risk, we need the same kind of decision making. Our physical and cyber designs must stand up to a specified threat load, until at least the next opportunity to upgrade those systems, with a large margin for error, because failure is unacceptable.

And when there are no such safety risks or risks to the nation, answering how much is enough? becomes much simpler. You are invited to join us as Derek chats with Andrew about the ideas and approaches in the new book. We look at how much is enough in small shoe factories, in high-speed rail switching systems, and in everything in between.

Interviewer: Derek Harp, Founder & Chairman of (CS)2AI Interviewee: Andrew Ginter, VP Industrial Security, Waterfall Security Solutions This event is sponsored by Waterfall Security Solutions

Please note that meetup RSVPs do not reach our event platform. Registration is required at: https://attendee.gotowebinar.com/register/3787151688578125143?source=112923meetupevent

--------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ - An Interview with the Author of Engineering-Grade OT Security

Please note that meetup RSVPs do not reach our event platform. Registration is required at: https://attendee.gotowebinar.com/register/3787151688578125143?source=112923meetupevent

Engineering-Grade OT Security - an interview with the author In his new book Engineering-Grade OT Security: A manager's guide, Andrew Ginter explores the question how much is enough? How much engineering? How much security? For which kinds of systems? And most importantly, why?

By analogy, consider - what load should a pedestrian bridge be designed for? Assume barriers, so vehicles cannot enter the bridge. Engineers calculate the weight of 2 meters of water across the entire width and length of the bridge - people are mostly water after all. Most people are under 2 meters tall, so this weight and distribution of water is a shoulder-to-shoulder, worst-case pedestrian load. Engineers then multiply the result by 10 and design to that load. These are people crossing the bridge after all. Failure of the bridge under load is unacceptable.

When cyber compromise of industrial automation puts worker safety, public safety or national security at risk, we need the same kind of decision making. Our physical and cyber designs must stand up to a specified threat load, until at least the next opportunity to upgrade those systems, with a large margin for error, because failure is unacceptable.

And when there are no such safety risks or risks to the nation, answering how much is enough? becomes much simpler. You are invited to join us as Derek chats with Andrew about the ideas and approaches in the new book. We look at how much is enough in small shoe factories, in high-speed rail switching systems, and in everything in between.

Interviewer: Derek Harp, Founder & Chairman of (CS)2AI Interviewee: Andrew Ginter, VP Industrial Security, Waterfall Security Solutions This event is sponsored by Waterfall Security Solutions

Please note that meetup RSVPs do not reach our event platform. Registration is required at: https://attendee.gotowebinar.com/register/3787151688578125143?source=112923meetupevent

--------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ - An Interview with the Author of Engineering-Grade OT Security

Please note that meetup RSVPs do not reach our event platform. Registration is required at: https://attendee.gotowebinar.com/register/3787151688578125143?source=112923meetupevent

Engineering-Grade OT Security - an interview with the author In his new book Engineering-Grade OT Security: A manager's guide, Andrew Ginter explores the question how much is enough? How much engineering? How much security? For which kinds of systems? And most importantly, why?

By analogy, consider - what load should a pedestrian bridge be designed for? Assume barriers, so vehicles cannot enter the bridge. Engineers calculate the weight of 2 meters of water across the entire width and length of the bridge - people are mostly water after all. Most people are under 2 meters tall, so this weight and distribution of water is a shoulder-to-shoulder, worst-case pedestrian load. Engineers then multiply the result by 10 and design to that load. These are people crossing the bridge after all. Failure of the bridge under load is unacceptable.

When cyber compromise of industrial automation puts worker safety, public safety or national security at risk, we need the same kind of decision making. Our physical and cyber designs must stand up to a specified threat load, until at least the next opportunity to upgrade those systems, with a large margin for error, because failure is unacceptable.

And when there are no such safety risks or risks to the nation, answering how much is enough? becomes much simpler. You are invited to join us as Derek chats with Andrew about the ideas and approaches in the new book. We look at how much is enough in small shoe factories, in high-speed rail switching systems, and in everything in between.

Interviewer: Derek Harp, Founder & Chairman of (CS)2AI Interviewee: Andrew Ginter, VP Industrial Security, Waterfall Security Solutions This event is sponsored by Waterfall Security Solutions

Please note that meetup RSVPs do not reach our event platform. Registration is required at: https://attendee.gotowebinar.com/register/3787151688578125143?source=112923meetupevent

--------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ - An Interview with the Author of Engineering-Grade OT Security

Please note that meetup RSVPs do not reach our event platform. Registration is required at: https://attendee.gotowebinar.com/register/3787151688578125143?source=112923meetupevent

Engineering-Grade OT Security - an interview with the author In his new book Engineering-Grade OT Security: A manager's guide, Andrew Ginter explores the question how much is enough? How much engineering? How much security? For which kinds of systems? And most importantly, why?

By analogy, consider - what load should a pedestrian bridge be designed for? Assume barriers, so vehicles cannot enter the bridge. Engineers calculate the weight of 2 meters of water across the entire width and length of the bridge - people are mostly water after all. Most people are under 2 meters tall, so this weight and distribution of water is a shoulder-to-shoulder, worst-case pedestrian load. Engineers then multiply the result by 10 and design to that load. These are people crossing the bridge after all. Failure of the bridge under load is unacceptable.

When cyber compromise of industrial automation puts worker safety, public safety or national security at risk, we need the same kind of decision making. Our physical and cyber designs must stand up to a specified threat load, until at least the next opportunity to upgrade those systems, with a large margin for error, because failure is unacceptable.

And when there are no such safety risks or risks to the nation, answering how much is enough? becomes much simpler. You are invited to join us as Derek chats with Andrew about the ideas and approaches in the new book. We look at how much is enough in small shoe factories, in high-speed rail switching systems, and in everything in between.

Interviewer: Derek Harp, Founder & Chairman of (CS)2AI Interviewee: Andrew Ginter, VP Industrial Security, Waterfall Security Solutions This event is sponsored by Waterfall Security Solutions

Please note that meetup RSVPs do not reach our event platform. Registration is required at: https://attendee.gotowebinar.com/register/3787151688578125143?source=112923meetupevent

--------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ - An Interview with the Author of Engineering-Grade OT Security

Please note that meetup RSVPs do not reach our event platform. Registration is required at: https://attendee.gotowebinar.com/register/3787151688578125143?source=112923meetupevent

Engineering-Grade OT Security - an interview with the author In his new book Engineering-Grade OT Security: A manager's guide, Andrew Ginter explores the question how much is enough? How much engineering? How much security? For which kinds of systems? And most importantly, why?

By analogy, consider - what load should a pedestrian bridge be designed for? Assume barriers, so vehicles cannot enter the bridge. Engineers calculate the weight of 2 meters of water across the entire width and length of the bridge - people are mostly water after all. Most people are under 2 meters tall, so this weight and distribution of water is a shoulder-to-shoulder, worst-case pedestrian load. Engineers then multiply the result by 10 and design to that load. These are people crossing the bridge after all. Failure of the bridge under load is unacceptable.

When cyber compromise of industrial automation puts worker safety, public safety or national security at risk, we need the same kind of decision making. Our physical and cyber designs must stand up to a specified threat load, until at least the next opportunity to upgrade those systems, with a large margin for error, because failure is unacceptable.

And when there are no such safety risks or risks to the nation, answering how much is enough? becomes much simpler. You are invited to join us as Derek chats with Andrew about the ideas and approaches in the new book. We look at how much is enough in small shoe factories, in high-speed rail switching systems, and in everything in between.

Interviewer: Derek Harp, Founder & Chairman of (CS)2AI Interviewee: Andrew Ginter, VP Industrial Security, Waterfall Security Solutions This event is sponsored by Waterfall Security Solutions

Please note that meetup RSVPs do not reach our event platform. Registration is required at: https://attendee.gotowebinar.com/register/3787151688578125143?source=112923meetupevent

--------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ - An Interview with the Author of Engineering-Grade OT Security

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/3345028165673092191?source=09272023meetupevnt

Join Us for a Transformative Symposium on Securing the Manufacturing Sector!

The manufacturing sector is the backbone of economies worldwide, providing jobs, innovation, and essential goods. However, as technology advances, so do the threats that can disrupt this vital industry. To address these challenges and develop proactive strategies, we invite you to this (CS)²AI Online™ Symposium on Securing the Manufacturing Sector.

Speakers/Panelists include:

Network Engineering for Operational Safety with: Cyber-Ready Industrial Manufacturing: What’s the Risk? with: Rod Locke, Senior Director of Product Management - OT at Fortinet Mark Cristiano, Global Commercial Director, Global Cybersecurity Services, Rockwell Automation Michael Hinz, Manager WIO, Perimeter & Cloud Security, ZF Group Andrew Ginter, VP Industrial Security at Waterfall Security Solutions

Cyber Risk Mitigation in a Small Manufacturing Environment via Security Segmentation with: John Hoyt, Lead Cyber Physical Systems Engineer at MITRE Aslam Sherule, Lead Cyber-Physical Systems Engineer at MITRE

Panel Discussions with: Reynaldo Gonzalez, Principal Cybersecurity Architect, Cummins Vivek Ponnada, Technical Solutions Director at Nozomi Networks Daniel Crespo, Senior OT/ICS Cybersecurity Lead at Newell Brands

ICS Advisory Project Vulnerability Patch Management Preparation for Manufacturing Security Dan Ricci, Senior Information Security Officer at Frequentis Defense, Inc

This event is sponsored by Fortinet, Xona, and GBQ Partners

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/3345028165673092191?source=09272023meetupevnt

---------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Symposium: Cyber Security for the Manufacturing Sector

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/3345028165673092191?source=09272023meetupevnt

Join Us for a Transformative Symposium on Securing the Manufacturing Sector!

The manufacturing sector is the backbone of economies worldwide, providing jobs, innovation, and essential goods. However, as technology advances, so do the threats that can disrupt this vital industry. To address these challenges and develop proactive strategies, we invite you to this (CS)²AI Online™ Symposium on Securing the Manufacturing Sector.

Speakers/Panelists include:

Network Engineering for Operational Safety with: Cyber-Ready Industrial Manufacturing: What’s the Risk? with: Rod Locke, Senior Director of Product Management - OT at Fortinet Mark Cristiano, Global Commercial Director, Global Cybersecurity Services, Rockwell Automation Michael Hinz, Manager WIO, Perimeter & Cloud Security, ZF Group Andrew Ginter, VP Industrial Security at Waterfall Security Solutions

Cyber Risk Mitigation in a Small Manufacturing Environment via Security Segmentation with: John Hoyt, Lead Cyber Physical Systems Engineer at MITRE Aslam Sherule, Lead Cyber-Physical Systems Engineer at MITRE

Panel Discussions with: Reynaldo Gonzalez, Principal Cybersecurity Architect, Cummins Vivek Ponnada, Technical Solutions Director at Nozomi Networks Daniel Crespo, Senior OT/ICS Cybersecurity Lead at Newell Brands

ICS Advisory Project Vulnerability Patch Management Preparation for Manufacturing Security Dan Ricci, Senior Information Security Officer at Frequentis Defense, Inc

This event is sponsored by Fortinet, Xona, and GBQ Partners

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/3345028165673092191?source=09272023meetupevnt

---------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Symposium: Cyber Security for the Manufacturing Sector

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/3345028165673092191?source=09272023meetupevnt

Join Us for a Transformative Symposium on Securing the Manufacturing Sector!

The manufacturing sector is the backbone of economies worldwide, providing jobs, innovation, and essential goods. However, as technology advances, so do the threats that can disrupt this vital industry. To address these challenges and develop proactive strategies, we invite you to this (CS)²AI Online™ Symposium on Securing the Manufacturing Sector.

Speakers/Panelists include:

Network Engineering for Operational Safety with: Cyber-Ready Industrial Manufacturing: What’s the Risk? with: Rod Locke, Senior Director of Product Management - OT at Fortinet Mark Cristiano, Global Commercial Director, Global Cybersecurity Services, Rockwell Automation Michael Hinz, Manager WIO, Perimeter & Cloud Security, ZF Group Andrew Ginter, VP Industrial Security at Waterfall Security Solutions

Cyber Risk Mitigation in a Small Manufacturing Environment via Security Segmentation with: John Hoyt, Lead Cyber Physical Systems Engineer at MITRE Aslam Sherule, Lead Cyber-Physical Systems Engineer at MITRE

Panel Discussions with: Reynaldo Gonzalez, Principal Cybersecurity Architect, Cummins Vivek Ponnada, Technical Solutions Director at Nozomi Networks Daniel Crespo, Senior OT/ICS Cybersecurity Lead at Newell Brands

ICS Advisory Project Vulnerability Patch Management Preparation for Manufacturing Security Dan Ricci, Senior Information Security Officer at Frequentis Defense, Inc

This event is sponsored by Fortinet, Xona, and GBQ Partners

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/3345028165673092191?source=09272023meetupevnt

---------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Symposium: Cyber Security for the Manufacturing Sector

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/3345028165673092191?source=09272023meetupevnt

Join Us for a Transformative Symposium on Securing the Manufacturing Sector!

The manufacturing sector is the backbone of economies worldwide, providing jobs, innovation, and essential goods. However, as technology advances, so do the threats that can disrupt this vital industry. To address these challenges and develop proactive strategies, we invite you to this (CS)²AI Online™ Symposium on Securing the Manufacturing Sector.

Speakers/Panelists include:

Network Engineering for Operational Safety with: Cyber-Ready Industrial Manufacturing: What’s the Risk? with: Rod Locke, Senior Director of Product Management - OT at Fortinet Mark Cristiano, Global Commercial Director, Global Cybersecurity Services, Rockwell Automation Michael Hinz, Manager WIO, Perimeter & Cloud Security, ZF Group Andrew Ginter, VP Industrial Security at Waterfall Security Solutions

Cyber Risk Mitigation in a Small Manufacturing Environment via Security Segmentation with: John Hoyt, Lead Cyber Physical Systems Engineer at MITRE Aslam Sherule, Lead Cyber-Physical Systems Engineer at MITRE

Panel Discussions with: Reynaldo Gonzalez, Principal Cybersecurity Architect, Cummins Vivek Ponnada, Technical Solutions Director at Nozomi Networks Daniel Crespo, Senior OT/ICS Cybersecurity Lead at Newell Brands

ICS Advisory Project Vulnerability Patch Management Preparation for Manufacturing Security Dan Ricci, Senior Information Security Officer at Frequentis Defense, Inc

This event is sponsored by Fortinet, Xona, and GBQ Partners

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/3345028165673092191?source=09272023meetupevnt

---------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Symposium: Cyber Security for the Manufacturing Sector

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/3345028165673092191?source=09272023meetupevnt

Join Us for a Transformative Symposium on Securing the Manufacturing Sector!

The manufacturing sector is the backbone of economies worldwide, providing jobs, innovation, and essential goods. However, as technology advances, so do the threats that can disrupt this vital industry. To address these challenges and develop proactive strategies, we invite you to this (CS)²AI Online™ Symposium on Securing the Manufacturing Sector.

Speakers/Panelists include:

Network Engineering for Operational Safety with: Cyber-Ready Industrial Manufacturing: What’s the Risk? with: Rod Locke, Senior Director of Product Management - OT at Fortinet Mark Cristiano, Global Commercial Director, Global Cybersecurity Services, Rockwell Automation Michael Hinz, Manager WIO, Perimeter & Cloud Security, ZF Group Andrew Ginter, VP Industrial Security at Waterfall Security Solutions

Cyber Risk Mitigation in a Small Manufacturing Environment via Security Segmentation with: John Hoyt, Lead Cyber Physical Systems Engineer at MITRE Aslam Sherule, Lead Cyber-Physical Systems Engineer at MITRE

Panel Discussions with: Reynaldo Gonzalez, Principal Cybersecurity Architect, Cummins Vivek Ponnada, Technical Solutions Director at Nozomi Networks Daniel Crespo, Senior OT/ICS Cybersecurity Lead at Newell Brands

ICS Advisory Project Vulnerability Patch Management Preparation for Manufacturing Security Dan Ricci, Senior Information Security Officer at Frequentis Defense, Inc

This event is sponsored by Fortinet, Xona, and GBQ Partners

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/3345028165673092191?source=09272023meetupevnt

---------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Symposium: Cyber Security for the Manufacturing Sector
Showing 15 results