talk-data.com talk-data.com

Filter by Source

Select conferences and events

People (266 results)

See all 266 →

Activities & events

Title & Speakers Event
Jonas Hübotter – PhD student @ ETH Zürich

Abstract: TBD. Talk on test-time training and reinforcement learning by Jonas Hübotter (ETH Zürich). Approximately 45 minutes.

test-time training reinforcement learning machine learning
#28 AI Series: ETH Zürich - J. Hübotter
Django User Group Berlin 2025-10-02 · 17:00

We'll be hosted again by the lovely folks at MPB, the second-hand market for camera and video equipment, running good ol' Django. Be sure to chat to them while you sample some snacks and drinks.

Our speaker for the October edition is Alissa Gerhard, a Senior DevOps Engineer at Jonas und der Wolf and System Engineer Freelancer! She's introducing a tool they developed: "django-mediastorage: A New Framework for Easily Authenticating File Access through Reverse Proxy Servers"

As always, please make use of the lightning talks and talk about anything you like: a problem that you'd like help with, a thing you've built, or a hobby you like. Doesn't have to be Django, doesn't even have to be tech!

18:30 Doors open 19:00 Main talk 19:30 Lightning talks 19:45 Get eatin'

This event is governed by the Berlin code of conduct. We want this to be a safe space for all. Any questions and concerns can always be directed towards the organizers Maik Sprenger ([email protected]) and Lara Krämer ([email protected]) before, at and after the event. If you have accessibility requirements, please reach out to us - we're happy to accommodate you!

Django User Group Berlin
Tarah Lewis – Global Security Architect @ Google Cloud , Chris Morales – CISO @ Netenrich , Jonas Kelley – Americas Channels Director, Security @ Google Cloud

Transitioning from their existing threat intelligence providers to Google Threat Intelligence is a priority for many organizations, especially those leveraging VirusTotal and Mandiant offerings. Join Jonas Kelley, Google Security Sales Leader, as he moderates a conversation with Tarah Lewis, Google Security Architect, and Chris Morales, Netenrich CISO. Discover how to assess your readiness, overcome common migration challenges, and transition quickly and seamlessly to enhance your security posture with Google’s comprehensive threat intelligence.

Google Cloud Next '25

Digitale Nachweise und Identitäten werden in der EU bereits Ende diesen Jahres verfügbar und stellen einen zentralen Eckpfeiler europäischer Technologieentwicklung dar. Im Webinar werden wir ihre Funktionsweise und rechtliche Rahmenbedingungen erläutern und auch der Frage nachgehen, warum deren Entwicklung angestoßen wurde, und welche vielfältigen Konsequenzen und Perspektiven dies für natürliche wie juristische Personen in der EU mit sich bringen wird. Das Webinar ist als Einführung in den Themenkreis konzipiert.

Weiterführende Informationen: Artikel: „Digitale Nachweise und Identitäten: Revolution oder Bürokratiehilfe für Unternehmen?“ https://digitalzentrum-berlin.de/digitale-nachweise-und-identitaeten-relevant-fuer-unternehmen Wegweiser digitale Identitäten und Nachweise: https://zenodo.org/records/14215460

Unsere Experten im Webinar:

  • Benjamin Burde: Als Experter und Berater zu Digitalen Identitäten wird Benjamin die EU-Perspektive beleuchten und die zugrunde liegenden Konzepte digitaler Identitäten und Nachweise erläutern.
  • André Röder: Als Mitbegründer und Geschäftsführer der KAPRION Technologies GmbH konzentriert sich André auf Automatisierung, sichere digitale Identitäten und dezentrale IT-Ökosysteme. Er verfügt über langjährige Erfahrung in Halbleitertechnologie, elektronischem Ticketing und selbstverwalteten digitalen Identitäten.
  • Jonas Hammer: Als Wirtschaftsjurist und Vorstand der IDunion SCE wird er über die Entwicklung und Integration digitaler Identitäten innerhalb der EU sprechen und zukünftige Perspektiven aufzeigen.
Digitale Identitäten und Nachweise in der EU: Eine Einführung

Kicking off the year with our first meetup, we are continuing the tradition of showcasing real-world serverless ML projects built by KTH students!

From forecasting cross-border energy flows to predicting transit delays with live weather data, these projects highlight how fully serverless ML systems can tackle real-world challenges.

Agenda:

17:30 - 18:00: Doors open 18:00 - 18:20: Welcome - Intro 18:20 - 18:35: E-FlowCast – Forecasting Cross-Border Energy with Serverless ML 18:35 - 18:50: Real-time weather-based transit delay forecasting 18:50 - 19:20: Pizza & Beers 19:20 - 19:35: The Ultimate 1Million Movies Dataset 19:35 - 19:55: JobsAI 19:55 - 20:30: Networking

Introduction Fabian Schmidt, PhD Student, KTH

Fabian is working on the ALEC2 project under the supervision of Professor Vladimir Vlassov and Associate Professor Amir Hossein Payberah at KTH Royal Institute of Technology.

Presentations:

E-FlowCast – Forecasting Cross-Border Energy with Serverless ML Rosamelia Carioni - KTH Student Eric Banzuzi - KTH Student

How do you build a serverless ML system that predicts real-time electricity flows? The energy grid is one of the world's most complex and volatile systems. Prices fluctuate, demand spikes and renewable sources make forecasting difficult. To stay ahead, traders, operators, and policymakers need reliable predictions. E-FlowCast is a serverless ML system designed to address one area of this challenge, providing real-time electricity flow predictions for the next 24 hours.

Speakers Bio: Rosamelia is a final-year master’s student in Machine Learning at KTH. She has a BSc in Data Science and AI from Maastricht University. Through research and internships, she has worked on predicting donor churn, building an NLP-to-SQL chatbot to improve data accessibility, developing an energy-weather visualization tool for real-time trading insights, and enhancing gunshot detection for wildlife conservation.

Eric is a final-year master's student in Machine Learning at KTH, with interests and skills in ML, data engineering, and software development. Prior to KTH, he completed a BSc in Data Science and AI at Maastricht University in 2023.

Real-time weather-based transit delay forecasting Paul Hübner - KTH Student Jonas Müller - KTH Student

When snow falls, there are often drastic consequences for the public. Public transportation of all types experiences sudden large delays, leading to people being stuck waiting at stops and missing transfers. By taking local weather forecasts into account, such travel delays could be predicted in real-time. Based on historical and live transit delay data from Gävleborg County as well as Open-Meteo forecasts, we present a real-time serverless delay forecasting dashboard powered by machine learning.

Speakers Bio: Paul studied Computer Science & Engineering at TU Delft, specializing in the Machine Learning and Data Science track. He is pursuing further studies in Software Engineering of Distributed Systems at KTH.

Jonas is pursuing a Master’s in Software Engineering of Distributed Systems at KTH, where he is currently researching conflict-free replicated data types in the context of edge computing for his thesis.

The Ultimate 1Million Movies Dataset Martín Bravo - KTH Student

This serverless ML system predicts IMDb ratings using a dynamic Kaggle dataset. It features four automated pipelines: historical data backfilling, daily feature updates, model training, and inference for new movies. A user-friendly interface allows users to explore movies, view predicted ratings, and compare them with actual IMDb scores.

Speaker Bio: Martín is a Computer Science and Engineering student from Chile, currently an exchange student at KTH Royal Institute of Technology in Stockholm. He has worked with the National Center for Artificial Intelligence and SoyMomo in Chile and is currently interning at Hopsworks as a Machine Learning Engineer, focusing on LLMs and ML pipelines.

JobsAI Kolumbus Lindh - KTH Student

Finding the right job among thousands of listings can be overwhelming. JobsAI streamlines this process using vector embeddings and similarity search to match users’ resumes with the most relevant job postings. By leveraging Natural Language Processing (NLP) and machine learning, the platform eliminates inefficiencies associated with traditional job search methods. JobsAI retrieves job listings via Arbetsförmedlingen’s JobStream API and processes user-uploaded resumes to calculate compatibility scores.

Speaker Bio: Kolumbus is a master's student in Industrial Engineering and Management at KTH, specializing in Machine Learning. With a background in AI consulting and software development, he enjoys finding practical ways to integrate AI into businesses.

About the event

Date: February 27th, 17:30 - 20:30 Location: Hopsworks Office (Åsögatan 119, Plan 2, 116 24 Stockholm) The venue hosting us is the Hopsworks Office. As the office is sometimes difficult to locate we have made this map for everyone to follow. Directions: 2-minute walk from Medborgarplatsen. Tickets: Sign up required. Anyone who is not on the list will not get in. The event is free of charge. Capacity: Space is limited to 60 participants. If you are signed up but unable to attend, please change your RSVP by February 26th. Food and drinks: Food and drinks will be provided. Questions: Please contact the meetup organizers.

Code of Conduct The NumFOCUS Code of Conduct applies to this event; please familiarize yourself with it before attending. If you have any questions or concerns regarding the Code of Conduct, please contact the organizers.

Serverless ML in Action: Real-World Projects from KTH

This is 100% non-profit. The 15€ sign up fee for everyone is only to minimize last-minute cancellations. The total sum goes to a bar-tap that everyone can use to order drinks until the amount is used up. ‼️NO REFUNDS‼️

‼️Please don't just show up without RSVPing here and paying the 15€. We have a separate room that has limited capacity and a specific drinks agreement with the bar - so splitting up the bill won't become a mess.‼️

Small update on how your money get's used from May 2024 onwards: As of this month, meetup.com has started charging me 34€ instead of 16€ per month. I've decided to distribute this fee evenly among all us participants every month. Example: In the last 12 meetups, the average number of attendees was 17. With 17 attendees I would effectively collect 230€ (after fees). I would now substract 34€ leaving us with 196€ that go to the bar. 15% get's tipped to the wait staff, in this case 30€, leaving us with 166€ effectively to order drinks. Hope everyone is cool with this system. :)

Website: https://www.pberg-engineers.me

WhatsApp groups:

Please come and join us on WhatsApp!

- "PBerg Engineers - NEWS" - Only organizers can post announcements or polls -> https://chat.whatsapp.com/EqMJMmlCZO6LOOfAoG4yTj

- "PBerg Engineers - DISCUSS" - Everyone can post -> https://chat.whatsapp.com/LPuo76J83gF6IZMLUcM4u2

Please join those groups now if you're interested. :)

All skill/education-levels welcome! :)

Lightning Talks: 1. Hacking Professional MIDI Keyboards for Fun & Profit – Daniel 2. Using Langfuse as a Prompt CRM – Jonas

We'll also have a brief "Jobs: Lost & Found section".

Location:

From the street you will have to enter the right hand Cafe Chagall (yes, there are 2). Then, you go upstairs and our private room is in the far end corner of the building.

We are a relaxed, non-formal meetup of like-minded software engineers who want to always keep learning and want to meet in physical reality over a drink or two.

Prenzlauer Berg, Berlin is home to some of the most talented software engineers in the world, and every month, they come together for an exciting knowledge sharing meetup. This meetup is a chance for attendees to learn from each other, share their experiences, and gain new insights into the world of software engineering.

The atmosphere is friendly and welcoming, and the discussions are always engaging and thought-provoking. Whether you're a seasoned veteran or just starting out in your career, you'll find something valuable at this meetup. Don't miss out on your chance to connect with like-minded professionals and advance your knowledge of software engineering. Sign up for the next event now!

Website: https://www.pberg-engineers.me

WhatsApp groups:

Please come and join us on WhatsApp!

- "PBerg Engineers - NEWS" - Only organizers can post announcements or polls -> https://chat.whatsapp.com/EqMJMmlCZO6LOOfAoG4yTj

- "PBerg Engineers - DISCUSS" - Everyone can post -> https://chat.whatsapp.com/LPuo76J83gF6IZMLUcM4u2

Please join those groups now if you're interested. :)

PBerg engineers - monthly meetup
Jonas Soenen – machine learning engineer @ Dataroots

Send us a text Welcome to the cozy corner of the tech world where ones and zeros mingle with casual chit-chat. DataTopics Unplugged is your go-to spot for relaxed discussions around tech, news, data, and society. This week, we’re joined by Jonas Soenen, a machine learning engineer at Dataroots, to break down the latest AI shakeups—from DeepSeek R1 challenging OpenAI to new AI automation tools that might just change how we use the internet. Let’s dive in: DeepSeek R1: Open-source revolution or just open weights? – A new AI model making waves with transparency and cost efficiency. But is OpenAI really at risk? Reinforcement learning, no tricks needed – How DeepSeek R1 trains without complex search trees or hidden techniques—and why that’s a big deal. Web LM Arena’s leaderboard – How DeepSeek R1 ranks against OpenAI, Anthropic, and other top models in real-world coding tasks. Kimi – Another promising open-weight model challenging the AI giants. Could this be the real alternative to GPT-4? Open-source AI and industry reactions – Why are companies like OpenAI hesitant to embrace open-source AI, and will DeepSeek’s approach change the game? ByteDance’s surprise AI play – The TikTok parent company is quietly building its own powerful AI models—should OpenAI and Google be worried? OpenAI’s Stargate project – A massive $500B AI infrastructure initiative—how does this impact AI accessibility and competition? OpenAI’s Operator: Your new AI assistant? – A browser-based agent that can shop for you, browse the web, and click buttons—but how secure is it? Midscene & UI-TARS Desktop – AI-powered automation tools that might soon replace traditional workflows. Nightshade – A new method for artists to poison AI training data, protecting their work from unauthorized AI-generated copies. Nepenthes – A tool designed to fight back against LLM text scrapers—could this help protect data from being swallowed into future AI models? AI in music: Paul McCartney vs. AI-generated songs – The legendary Beatle wants stronger copyright protections, but is AI creativity a threat or a tool? 📢 Note: Recent press coverage has clarified key details. Training infrastructure and cost figures mentioned were for DeepSeek V3—DeepSeek R1’s actual training costs have not been officially disclosed.

AI/ML LLM
DataTopics: All Things Data, AI & Tech
Gergely Orosz – host , Jonas Tyroller – Indie game developer @ Independent (Thronefall)

Supported by Our Partners • Formation — Level up your career and compensation with Formation.  • WorkOS — The modern identity platform for B2B SaaS • Vanta — Automate compliance and simplify security with Vanta. — In today’s episode of The Pragmatic Engineer, I’m joined by Jonas Tyroller, one of the developers behind Thronefall, a minimalist indie strategy game that blends tower defense and kingdom-building, now available on Steam. Jonas takes us through the journey of creating Thronefall from start to finish, offering insights into the world of indie game development. We explore: • Why indie developers often skip traditional testing and how they find bugs • The developer workflow using Unity, C# and Blender • The two types of prototypes game developers build  • Why Jonas spent months building game prototypes in 1-2 days • How Jonas uses ChatGPT to build games • Jonas’s tips on making games that sell • And more! — Timestamps (00:00) Intro (02:07) Building in Unity (04:05) What the shader tool is used for  (08:44) How a Unity build is structured (11:01) How game developers write and debug code  (16:21) Jonas’s Unity workflow (18:13) Importing assets from Blender (21:06) The size of Thronefall and how it can be so small (24:04) Jonas’s thoughts on code review (26:42) Why practices like code review and source control might not be relevant for all contexts (30:40) How Jonas and Paul ensure the game is fun  (32:25) How Jonas and Paul used beta testing feedback to improve their game (35:14) The mini-games in Thronefall and why they are so difficult (38:14) The struggle to find the right level of difficulty for the game (41:43) Porting to Nintendo Switch (45:11) The prototypes Jonas and Paul made to get to Thronefall (46:59) The challenge of finding something you want to build that will sell (47:20) Jonas’s ideation process and how they figure out what to build  (49:35) How Thronefall evolved from a mini-game prototype (51:50) How long you spend on prototyping  (52:30) A lesson in failing fast (53:50) The gameplay prototype vs. the art prototype (55:53) How Jonas and Paul distribute work  (57:35) Next steps after having the play prototype and art prototype (59:36) How a launch on Steam works  (1:01:18) Why pathfinding was the most challenging part of building Thronefall (1:08:40) Gen AI tools for building indie games  (1:09:50) How Jonas uses ChatGPT for editing code and as a translator  (1:13:25) The pros and cons of being an indie developer  (1:15:32) Jonas’s advice for software engineers looking to get into indie game development (1:19:32) What to look for in a game design school (1:22:46) How luck figures into success and Jonas’s tips for building a game that sells (1:26:32) Rapid fire round — The Pragmatic Engineer deepdives relevant for this episode: • Game development basics https://newsletter.pragmaticengineer.com/p/game-development-basics  • Building a simple game using Unity https://newsletter.pragmaticengineer.com/p/building-a-simple-game — See the transcript and other references from the episode at ⁠⁠https://newsletter.pragmaticengineer.com/podcast⁠⁠ — Production and marketing by ⁠⁠⁠⁠⁠⁠⁠⁠https://penname.co/⁠⁠⁠⁠⁠⁠⁠⁠. For inquiries about sponsoring the podcast, email [email protected].

Get full access to The Pragmatic Engineer at newsletter.pragmaticengineer.com/subscribe

AI/ML GenAI Git LLM Marketing SaaS Cyber Security
The Pragmatic Engineer

This is 100% non-profit. The 15€ sign up fee for everyone is only to minimize last-minute cancellations. The total sum goes to a bar-tap that everyone can use to order drinks until the amount is used up. ‼️NO REFUNDS‼️

‼️Please don't just show up without RSVPing here and paying the 15€. We have a separate room that has limited capacity and a specific drinks agreement with the bar - so splitting up the bill won't become a mess.‼️

Small update on how your money get's used from May 2024 onwards: As of this month, meetup.com has started charging me 34€ instead of 16€ per month. I've decided to distribute this fee evenly among all us participants every month. Example: In the last 12 meetups, the average number of attendees was 17. With 17 attendees I would effectively collect 230€ (after fees). I would now substract 34€ leaving us with 196€ that go to the bar. 15% get's tipped to the wait staff, in this case 30€, leaving us with 166€ effectively to order drinks. Hope everyone is cool with this system. :)

Website: https://www.pberg-engineers.me

WhatsApp groups:

Please come and join us on WhatsApp!

- "PBerg Engineers - NEWS" - Only organizers can post announcements or polls -> https://chat.whatsapp.com/EqMJMmlCZO6LOOfAoG4yTj

- "PBerg Engineers - DISCUSS" - Everyone can post -> https://chat.whatsapp.com/LPuo76J83gF6IZMLUcM4u2

Please join those groups now if you're interested. :)

All skill/education-levels welcome! :)

Lightning Talks: 1. MTTR (Monitoring and High Availability for Services for a Conference) - Christian 2. Locking Strategies in Multithreaded and Distributed Applications - Lev 3. Inspiration for your First Few 3D Printing Projects - Jonas

We'll also have a brief "Jobs: Lost & Found section".

Location:

From the street you will have to enter the right hand Cafe Chagall (yes, there are 2). Then, you go upstairs and our private room is in the far end corner of the building.

We are a relaxed, non-formal meetup of like-minded software engineers who want to always keep learning and want to meet in physical reality over a drink or two.

Prenzlauer Berg, Berlin is home to some of the most talented software engineers in the world, and every month, they come together for an exciting knowledge sharing meetup. This meetup is a chance for attendees to learn from each other, share their experiences, and gain new insights into the world of software engineering.

The atmosphere is friendly and welcoming, and the discussions are always engaging and thought-provoking. Whether you're a seasoned veteran or just starting out in your career, you'll find something valuable at this meetup. Don't miss out on your chance to connect with like-minded professionals and advance your knowledge of software engineering. Sign up for the next event now!

Website: https://www.pberg-engineers.me

WhatsApp groups:

Please come and join us on WhatsApp!

- "PBerg Engineers - NEWS" - Only organizers can post announcements or polls -> https://chat.whatsapp.com/EqMJMmlCZO6LOOfAoG4yTj

- "PBerg Engineers - DISCUSS" - Everyone can post -> https://chat.whatsapp.com/LPuo76J83gF6IZMLUcM4u2

Please join those groups now if you're interested. :)

PBerg engineers - monthly meetup
Yosef Beck – VP, Cyber Security @ CRH , Jonas Rendahl – CISO @ Aurobay

Acquire valuable insights from cybersecurity leaders who serve asset owner operations in the manufacturing sector and ask them your questions!

John Terrill – CISO @ Phosphorus Cybersecurity

A conversation with millions of researched Cyber-Physical Systems… With billions of IoT and OT devices powering manufacturing and industrial operations today, the xTended Internet of Things (xIoT) now surpasses traditional endpoints by an order of magnitude. Despite their critical roles, many of these IoT and OT Cyber-Physical Systems (CPS) remain overlooked and unsecured—operating with default or weak credentials, outdated firmware, insecure configurations, and an end-of-life state. This creates a vast and vulnerable attack surface that threat actors increasingly target to disrupt operations, exfiltrate data, or stage sophisticated ransomware attacks. Attendees will leave with a deeper understanding of the scope and state of this attack surface, the critical role IoT and OT security plays in protecting the modern industrial landscape, and actionable steps that can be taken to strengthen their xIoT security posture.

IoT Cyber Security
Hamish Wishart – Senior Consultant Cyber Security @ KPMG

In the increasingly vulnerable cybersecurity landscape, the manufacturing sector stands as a key target for security incidents. Upholding NIS2 compliance is not just a necessity— it's a strategic advantage. This talk offers exclusive insights into driving NIS2 compliance in a multi-national manufacturing environment where organizations must manage facilities in multiple EU Member States.

Cyber Security
Aamir Lakhani – Global Security Strategist and Researcher @ Fortinet

Attacks on operational technology (OT) — the systems controlling industrial equipment, processes, and events —have leaped from Hollywood screens into reality. What once seemed like special-effects fiction in disaster movies about nuclear meltdowns, power grid collapses, and poisoned water systems is now a genuine threat. OT and manufacturing attacks are not new, but their impact on modern life is more significant than ever.

Due to the speaker becoming unavailable, the webinar “(CS)²AI Online™ Seminar: Ditching Misconceptions: Embracing Proactive OT Discovery and Remediation to Reduce Business Risk” at: Wed, Dec 11, 2024 1:00 PM EST - Wed, Dec 11, 2024 2:30 PM EST has been cancelled.

Since our recent Symposium on ICS/OT Cybersecurity for the Manufacturing Sector was extremely well received, we will be airing a recording of that 4.5 hour event on this Wednesday. We do hope that you will take advantage of this opportunity before the recording goes into the members-only vault. Register here:https://attendee.gotowebinar.com/register/4714096074753788000?source=12112024meetupevent

The manufacturing sector is the backbone of economies worldwide, providing jobs, innovation, and essential goods. However, as technology advances, so do the threats that can disrupt this vital industry. To address these challenges and develop proactive strategies, we invite you to this (CS)²AI Online™ Symposium on Securing the Manufacturing Sector.

Event Agenda

1:00 PM Eastern Session 1: Securing the Core: NIS2 Compliance for Multi-National Manufacturing Organizations Featuring Hamish Wishart (Senior Consultant Cyber Security at KPMG) In the increasingly vulnerable cybersecurity landscape, the manufacturing sector stands as a key target for security incidents. Upholding NIS2 compliance is not just a necessity— it's a strategic advantage. This talk offers exclusive insights into driving NIS2 compliance in a multi-national manufacturing environment where organizations must manage facilities in multiple EU Member States. You will learn tailored collaboration strategies with site personnel for comprehensive risk ownership and effective incident detection and response. We will delve into 'quick wins' for immediate security boosts and outline a strategic long-term roadmap. This session aims to equip attendees with the tools needed to bolster OT security and transform what we see as the common pain points into areas of strength.

2:10 PM Eastern Session 2: Asset Owners Panel Discussion Featuring

  • Yosef Beck (VP, Cyber Security at CRH)
  • Jonas Rendahl (CISO at Aurobay)

Acquire valuable insights from cybersecurity leaders who serve asset owner operations in the manufacturing sector and ask them your questions! 3:10 PM Eastern Session 3: Tales from the Crypt Featuring Aamir Lakhani (Global Security Strategist and Researcher at Fortinet) Attacks on operational technology (OT) — the systems controlling industrial equipment, processes, and events —have leaped from Hollywood screens into reality. What once seemed like special-effects fiction in disaster movies about nuclear meltdowns, power grid collapses, and poisoned water systems is now a genuine threat. OT and manufacturing attacks are not new, but their impact on modern life is more significant than ever.

4:10 PM Eastern Session 4: A Random Walk Through a ~~Million~~ Billion IoT/OT Things A conversation with millions of researched Cyber-Physical Systems… Featuring John Terrill (CISO at Phosphorus Cybersecurity) With billions of IoT and OT devices powering manufacturing and industrial operations today, the xTended Internet of Things (xIoT) now surpasses traditional endpoints by an order of magnitude. Despite their critical roles, many of these IoT and OT Cyber-Physical Systems (CPS) remain overlooked and unsecured—operating with default or weak credentials, outdated firmware, insecure configurations, and an end-of-life state. This creates a vast and vulnerable attack surface that threat actors increasingly target to disrupt operations, exfiltrate data, or stage sophisticated ransomware attacks. In this session, we’ll take a comprehensive journey through the world of IoT and OT/ICS devices, uncovering what we’ve learned over the years about the vulnerabilities and risks associated with the immense benefits of connected devices. From outdated security hygiene to device-specific weaknesses across diverse environments, we’ll explore key insights and real-world examples that highlight the unique challenges of securing these systems. The session will also delve into the anatomy of OT and OT-adjacent IoT cyberattacks, detailing how attackers exploit these devices to achieve malicious goals. A live hacking demonstration will showcase the methods used to compromise common, yet mission-critical, devices — emphasizing the importance of proactive security measures to disappoint bad actors. Attendees will leave with a deeper understanding of the scope and state of this attack surface, the critical role IoT and OT security plays in protecting the modern industrial landscape, and actionable steps that can be taken to strengthen their xIoT security posture.

------------------------------------------------------------------------------------------

Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! https://www.cs2ai.org/plans-pricing

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™: Proactive OT Discovery and Remediation to Reduce Business Risk

Due to the speaker becoming unavailable, the webinar “(CS)²AI Online™ Seminar: Ditching Misconceptions: Embracing Proactive OT Discovery and Remediation to Reduce Business Risk” at: Wed, Dec 11, 2024 1:00 PM EST - Wed, Dec 11, 2024 2:30 PM EST has been cancelled.

Since our recent Symposium on ICS/OT Cybersecurity for the Manufacturing Sector was extremely well received, we will be airing a recording of that 4.5 hour event on this Wednesday. We do hope that you will take advantage of this opportunity before the recording goes into the members-only vault. Register here:https://attendee.gotowebinar.com/register/4714096074753788000?source=12112024meetupevent

The manufacturing sector is the backbone of economies worldwide, providing jobs, innovation, and essential goods. However, as technology advances, so do the threats that can disrupt this vital industry. To address these challenges and develop proactive strategies, we invite you to this (CS)²AI Online™ Symposium on Securing the Manufacturing Sector.

Event Agenda

1:00 PM Eastern Session 1: Securing the Core: NIS2 Compliance for Multi-National Manufacturing Organizations Featuring Hamish Wishart (Senior Consultant Cyber Security at KPMG) In the increasingly vulnerable cybersecurity landscape, the manufacturing sector stands as a key target for security incidents. Upholding NIS2 compliance is not just a necessity— it's a strategic advantage. This talk offers exclusive insights into driving NIS2 compliance in a multi-national manufacturing environment where organizations must manage facilities in multiple EU Member States. You will learn tailored collaboration strategies with site personnel for comprehensive risk ownership and effective incident detection and response. We will delve into 'quick wins' for immediate security boosts and outline a strategic long-term roadmap. This session aims to equip attendees with the tools needed to bolster OT security and transform what we see as the common pain points into areas of strength.

2:10 PM Eastern Session 2: Asset Owners Panel Discussion Featuring

  • Yosef Beck (VP, Cyber Security at CRH)
  • Jonas Rendahl (CISO at Aurobay)

Acquire valuable insights from cybersecurity leaders who serve asset owner operations in the manufacturing sector and ask them your questions! 3:10 PM Eastern Session 3: Tales from the Crypt Featuring Aamir Lakhani (Global Security Strategist and Researcher at Fortinet) Attacks on operational technology (OT) — the systems controlling industrial equipment, processes, and events —have leaped from Hollywood screens into reality. What once seemed like special-effects fiction in disaster movies about nuclear meltdowns, power grid collapses, and poisoned water systems is now a genuine threat. OT and manufacturing attacks are not new, but their impact on modern life is more significant than ever.

4:10 PM Eastern Session 4: A Random Walk Through a ~~Million~~ Billion IoT/OT Things A conversation with millions of researched Cyber-Physical Systems… Featuring John Terrill (CISO at Phosphorus Cybersecurity) With billions of IoT and OT devices powering manufacturing and industrial operations today, the xTended Internet of Things (xIoT) now surpasses traditional endpoints by an order of magnitude. Despite their critical roles, many of these IoT and OT Cyber-Physical Systems (CPS) remain overlooked and unsecured—operating with default or weak credentials, outdated firmware, insecure configurations, and an end-of-life state. This creates a vast and vulnerable attack surface that threat actors increasingly target to disrupt operations, exfiltrate data, or stage sophisticated ransomware attacks. In this session, we’ll take a comprehensive journey through the world of IoT and OT/ICS devices, uncovering what we’ve learned over the years about the vulnerabilities and risks associated with the immense benefits of connected devices. From outdated security hygiene to device-specific weaknesses across diverse environments, we’ll explore key insights and real-world examples that highlight the unique challenges of securing these systems. The session will also delve into the anatomy of OT and OT-adjacent IoT cyberattacks, detailing how attackers exploit these devices to achieve malicious goals. A live hacking demonstration will showcase the methods used to compromise common, yet mission-critical, devices — emphasizing the importance of proactive security measures to disappoint bad actors. Attendees will leave with a deeper understanding of the scope and state of this attack surface, the critical role IoT and OT security plays in protecting the modern industrial landscape, and actionable steps that can be taken to strengthen their xIoT security posture.

------------------------------------------------------------------------------------------

Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! https://www.cs2ai.org/plans-pricing

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™: Proactive OT Discovery and Remediation to Reduce Business Risk

Due to the speaker becoming unavailable, the webinar “(CS)²AI Online™ Seminar: Ditching Misconceptions: Embracing Proactive OT Discovery and Remediation to Reduce Business Risk” at: Wed, Dec 11, 2024 1:00 PM EST - Wed, Dec 11, 2024 2:30 PM EST has been cancelled.

Since our recent Symposium on ICS/OT Cybersecurity for the Manufacturing Sector was extremely well received, we will be airing a recording of that 4.5 hour event on this Wednesday. We do hope that you will take advantage of this opportunity before the recording goes into the members-only vault. Register here:https://attendee.gotowebinar.com/register/4714096074753788000?source=12112024meetupevent

The manufacturing sector is the backbone of economies worldwide, providing jobs, innovation, and essential goods. However, as technology advances, so do the threats that can disrupt this vital industry. To address these challenges and develop proactive strategies, we invite you to this (CS)²AI Online™ Symposium on Securing the Manufacturing Sector.

Event Agenda

1:00 PM Eastern Session 1: Securing the Core: NIS2 Compliance for Multi-National Manufacturing Organizations Featuring Hamish Wishart (Senior Consultant Cyber Security at KPMG) In the increasingly vulnerable cybersecurity landscape, the manufacturing sector stands as a key target for security incidents. Upholding NIS2 compliance is not just a necessity— it's a strategic advantage. This talk offers exclusive insights into driving NIS2 compliance in a multi-national manufacturing environment where organizations must manage facilities in multiple EU Member States. You will learn tailored collaboration strategies with site personnel for comprehensive risk ownership and effective incident detection and response. We will delve into 'quick wins' for immediate security boosts and outline a strategic long-term roadmap. This session aims to equip attendees with the tools needed to bolster OT security and transform what we see as the common pain points into areas of strength.

2:10 PM Eastern Session 2: Asset Owners Panel Discussion Featuring

  • Yosef Beck (VP, Cyber Security at CRH)
  • Jonas Rendahl (CISO at Aurobay)

Acquire valuable insights from cybersecurity leaders who serve asset owner operations in the manufacturing sector and ask them your questions! 3:10 PM Eastern Session 3: Tales from the Crypt Featuring Aamir Lakhani (Global Security Strategist and Researcher at Fortinet) Attacks on operational technology (OT) — the systems controlling industrial equipment, processes, and events —have leaped from Hollywood screens into reality. What once seemed like special-effects fiction in disaster movies about nuclear meltdowns, power grid collapses, and poisoned water systems is now a genuine threat. OT and manufacturing attacks are not new, but their impact on modern life is more significant than ever.

4:10 PM Eastern Session 4: A Random Walk Through a ~~Million~~ Billion IoT/OT Things A conversation with millions of researched Cyber-Physical Systems… Featuring John Terrill (CISO at Phosphorus Cybersecurity) With billions of IoT and OT devices powering manufacturing and industrial operations today, the xTended Internet of Things (xIoT) now surpasses traditional endpoints by an order of magnitude. Despite their critical roles, many of these IoT and OT Cyber-Physical Systems (CPS) remain overlooked and unsecured—operating with default or weak credentials, outdated firmware, insecure configurations, and an end-of-life state. This creates a vast and vulnerable attack surface that threat actors increasingly target to disrupt operations, exfiltrate data, or stage sophisticated ransomware attacks. In this session, we’ll take a comprehensive journey through the world of IoT and OT/ICS devices, uncovering what we’ve learned over the years about the vulnerabilities and risks associated with the immense benefits of connected devices. From outdated security hygiene to device-specific weaknesses across diverse environments, we’ll explore key insights and real-world examples that highlight the unique challenges of securing these systems. The session will also delve into the anatomy of OT and OT-adjacent IoT cyberattacks, detailing how attackers exploit these devices to achieve malicious goals. A live hacking demonstration will showcase the methods used to compromise common, yet mission-critical, devices — emphasizing the importance of proactive security measures to disappoint bad actors. Attendees will leave with a deeper understanding of the scope and state of this attack surface, the critical role IoT and OT security plays in protecting the modern industrial landscape, and actionable steps that can be taken to strengthen their xIoT security posture.

------------------------------------------------------------------------------------------

Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! https://www.cs2ai.org/plans-pricing

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™: Proactive OT Discovery and Remediation to Reduce Business Risk
John Terrill – CISO @ Phosphorus Cybersecurity

With billions of IoT and OT devices powering manufacturing and industrial operations today, the xTended Internet of Things (xIoT) now surpasses traditional endpoints by an order of magnitude. Despite their critical roles, many of these IoT and OT Cyber-Physical Systems (CPS) remain overlooked and unsecured—operating with default or weak credentials, outdated firmware, insecure configurations, and an end-of-life state. This creates a vast and vulnerable attack surface that threat actors increasingly target to disrupt operations, exfiltrate data, or stage sophisticated ransomware attacks. The session will also delve into the anatomy of OT and OT-adjacent IoT cyberattacks, detailing how attackers exploit these devices to achieve malicious goals. A live hacking demonstration will showcase the methods used to compromise common, yet mission-critical, devices — emphasizing the importance of proactive security measures to disappoint bad actors. Attendees will leave with a deeper understanding of the scope and state of this attack surface, the critical role IoT and OT security plays in protecting the modern industrial landscape, and actionable steps that can be taken to strengthen their xIoT security posture.

IoT ot cps xiot hacking demonstration
Tales from the Crypt 2024-12-11 · 15:10
Aamir Lakhani – Global Security Strategist and Researcher @ Fortinet

Attacks on operational technology (OT) — the systems controlling industrial equipment, processes, and events — have leaped from Hollywood screens into reality. What once seemed like special-effects fiction in disaster movies about nuclear meltdowns, power grid collapses, and poisoned water systems is now a genuine threat. OT and manufacturing attacks are not new, but their impact on modern life is more significant than ever.

ot security ics cybersecurity
Yosef Beck – VP, Cyber Security @ CRH , Jonas Rendahl – CISO @ Aurobay

Acquire valuable insights from cybersecurity leaders who serve asset owner operations in the manufacturing sector and ask them your questions!

cybersecurity ot/ics manufacturing
Hamish Wishart – Senior Consultant Cyber Security @ KPMG

In the increasingly vulnerable cybersecurity landscape, the manufacturing sector stands as a key target for security incidents. Upholding NIS2 compliance is not just a necessity— it's a strategic advantage. This talk offers exclusive insights into driving NIS2 compliance in a multi-national manufacturing environment where organizations must manage facilities in multiple EU Member States. You will learn tailored collaboration strategies with site personnel for comprehensive risk ownership and effective incident detection and response. We will delve into 'quick wins' for immediate security boosts and outline a strategic long-term roadmap. This session aims to equip attendees with the tools needed to bolster OT security and transform what we see as the common pain points into areas of strength.

nis2 ot security risk management incident detection and response