talk-data.com
People (54 results)
See all 54 →Companies (7 results)
See all 7 →Activities & events
| Title & Speakers | Event |
|---|---|
|
it's the 1st PBIMCR of 2026 to start our 10th anniversary celebrations... When: Thursday 29th of January 2026 Time: arrive for 530pm with talks starting from 6pm start prompt Location: TBC - set as Robert Walters Manchester office but may change in early January. Session will not be streamed over MS Teams but uploaded to our YouTube channel in early Feb Complimentary drinks & pizza provided by our hosts & sponsors Robert Walters January's PBIMCR will feature ..... Speaker Details - Talk 1: Shubhangi Goyal Title: Customer-First Analytics: Power BI Dashboard for Impact DescriptionBuilding a dashboard is easy. Building one that truly serves your customer — that's where the real work (and value) begins. In this session, we’ll walk through how to build a Power BI dashboard from scratch with a customer-first mindset. From defining the right problem to designing with empathy, this session will cover: -Understanding your audience’s pain points and priorities -Translating business questions into measurable KPIs -Structuring your data model for flexibility and performance -Designing intuitive visuals and layout for usability -Gathering feedback and driving dashboard adoption If you are looking to level up your Power BI game, you’ll leave with practical tools, techniques, and frameworks to turn your dashboards into decision-driving assets. Talk 2: Mihaly Kavasi Talk Title: Master the Human & AI-Friendly Semantic Layer Transform your organization's data strategy by mastering the essential bridge between IT and Business. This session reveals how to build semantic layers that empower both human users and AI assistants (including Copilot) to extract maximum value from your data assets. What you'll master: • Implement optimal responsibility division between IT/BI teams and business users for scalable self-service • Design semantic layer structures that balance usability, performance, and AI compatibility • Optimize naming conventions and metadata specifically for Copilot and AI assistant readability • Leverage advanced model features (field parameters, perspectives, calculation groups) that accelerate report creation • Apply performance optimization techniques that deliver instant insights even with billions of rows • Master code-first semantic layer design using TMDL and modern development workflows • Train AI Coding Agents to efficiently implement these improvements You'll build semantic layers that slash report development time by 60%, eliminate IT bottlenecks, and position your organization for success in the AI-augmented analytics era. Takeaways: Semantic layer design checklist, naming convention guide, Copilot optimization templates Topics Covered: Power BI, Microsoft Fabric, Azure Analysis Services, AI Coding Agents |
PBIMCR presents Mastering Human & AI Semantic Layer & Customer-First Analytics'
|
|
Geneva - 3rd Fabric/Power BI User Group gathering in Romandie [IN-PERSON]
2026-01-29 · 17:30
[Attention: In-person registration is mandatory using this link] Dear Data Wizards, After a successful first meetup in Geneva in March 2025, we’re already looking ahead to 2026 and are delighted to invite you to our next session on 29 January! We’re currently working on the agenda and will update you as soon as the content is finalized. In the meantime, save the date; It’s the perfect opportunity to meet, connect, and dive into discussions about Microsoft Fabric, Power BI, and more. 📍 Venue: Impact Hub Geneva (Rue Fendt 1, 1201 Genève). 🚉 Just minutes from the train station – easy to reach even from out of town. Spaces are limited, so be sure to reserve your spot now using this link Interested in sharing your insights on Microsoft Fabric or Power BI? We’d love to have you as a speaker in our next Geneva or Lausanne meetup. Reach out to discuss -> anastasia.salari@mdw-group.com Looking forward to seeing you there! |
Geneva - 3rd Fabric/Power BI User Group gathering in Romandie [IN-PERSON]
|
|
TidyTuesday
2026-01-27 · 23:00
Join R-Ladies Ottawa for a casual evening of programming on Tuesday, January 27th. We'll be participating in TidyTuesday, a weekly data visualization challenge organized by the R for Data Science community. What is TidyTuesday? Every week, a new dataset is posted online on the TidyTuesday GitHub repo, and folks from around the world create data visualizations using the dataset. It's an opportunity to put your programming skills into practice using real-world data in a way that's fun! It's also a great way for everyone to learn from each other, by sharing their visualizations and code. What will the dataset be? Even we don't know that (yet)! We'll have to wait until the day before the event to know what data we'll be working with. If you're interested in seeing some past datasets, take a look at the examples below, or visit the TidyTuesday GitHub repo to see all of the datasets dating back to 2018. Examples from past TidyTuesdays:
Do I have to use R? No! You can use any programming language or visualization software that you want. In fact, Python users from around the globe participate in "TyDyTuesday" on a weekly basis. Who is this event for? No previous programming experience is required to participate, and we'll have experienced programmers in the room who can help you get started (or unstuck), if needed. ...But if you want to get the most out of the event, a good way to prepare is to watch the recording of the introduction to data visualization workshop we hosted back in 2024. :) What should I bring?
How will this event work?
What else do I need to know? This event (like all R-Ladies events) is totally FREE to attend. The event will take place at Bayview Yards, which is located just a few steps away from the Bayview O-Train station. There is also a free parking lot available for those who are driving. You can find us in the "Training Room", which is on the second floor of the Bayview Yards building. This is an in-person event with limited space! Please only RSVP if you are able to attend in-person! ***Please note that the mission of R-Ladies is to increase gender diversity in the R community. This event is intended to provide a safe space for women and gender minorities. We ask for male allies to be invited by and accompanied by a woman or gender minority.*** We’re grateful to be part of the Bayview Meetups initiative and extend our thanks to Bayview Yards for generously providing the venue space. |
TidyTuesday
|
|
Robotics beginner class with MicroPython
2026-01-27 · 17:00
Make A Robot with MicroPython In this hands-on session, you’ll learn the fundamentals of robotics using MicroPython and an ESP32 microcontroller. We’ll guide you through building a simple robot that can light up LEDs and move a handmade part. The workshop covers wiring, coding, and basic motion control principles, which you can later expand to include sensors or APIs. Important We will provide all required components for in-person participants. Remote participants will receive a shopping list of components and setup instructions in advance. Agenda: 18:00-18:30 - Registration, food 18:30-20:00 - Workshop 20:00-21:00 - Networking GitHub Repo https://github.com/pyladiesams/robotics-with-micropython-jan2026 Stream https://www.youtube.com/live/6u5wlQamD9E Speaker Josefine Quack Josefine is an experienced Forward Deployed Robotics Engineer at Monumental, where she hacks and plays with robots all day. As a result those robots have already built over 30 houses. Please don't leave any chocolate around her unattended. 📧 Contact Are you interested in speaking at one of our events? Do you have a good idea for a Meetup topic? Get in touch with us at [email protected]. 💬 Find us on the PyLadies Global workspace:
|
Robotics beginner class with MicroPython
|
|
Linux Repair Café
2026-01-24 · 13:00
Give your still good laptop a second life instead of ditching it because Windows 11 says it is no good... Or you heard Linux is cool. If you have a backup of your data, that is great, else indicate that you do not, so we can help you. Geef je laptop die het nog prima doet een tweede kans in plaats van hem af te schrijven omdat Window 11 dat zegt... Of omdat je hoorde dat Linux gaaf is. Als je al een backup van je data hebt gemaakt is dat perfect. Of verwacht je dat wij dat doen? In dat geval graag aangeven hoe vol je harde schijf nu is... |
Linux Repair Café
|
|
HPC @ SURF
2026-01-19 · 15:30
Every 2 months, we'll visit a company or institute that will host the event and provide talks. This time, we’re visiting SURF. You may know SURF as the organization behind the Snellius supercomputer, but its role is much broader. SURF is the IT cooperative for education and research in the Netherlands, offering advanced services for computing, storage, networking, and much more. If you want to get a sense of their work, check out the SURF tag on Tweakers or visit their website at surf.nl. The talks are the following:
For those who visited the previous meetup at Stream HPC, you already know what to expect: deep dives into technical subjects, snacks and drinks, and enough time to socialize. Important Would you like to join the Data Center tour at SURF before the event? Please register below. Please note that the registration closes on 14.01.26 at 17:00. The Data Center tour will start at 15:30 sharp. [registration link] |
HPC @ SURF
|
|
IN-PERSON: A Practical Introduction to Vector Search in SQL Server 2025
2026-01-14 · 23:20
NESQL thanks our annual sponsor, Centric Consulting, for their support The January meeting is sponsored by Blue Bridge People A Practical Introduction to Vector Search in SQL Server 2025 Speaker: Andy Yun Are you uncertain if SQL Server 2025 Vector Search has useful applications? Concerned that it is just more AI hype? Then join me in this session, where I’ll break down how Vector Search works, where it fits into the AI landscape, and how you can use it today—on-prem and without changing your core architecture. We’ll cover: * The foundations of vector embeddings and similarity search * How SQL Server implements Vector Search, including indexing and querying * Code demos and practical use case exploration You’ll leave armed with the knowledge to look beyond the hype and understand how Vector Search can work for you. |
IN-PERSON: A Practical Introduction to Vector Search in SQL Server 2025
|
|
Data on Fire: A Hands-On Intro to Spark in Fabric
2026-01-06 · 22:00
The January Ohio North Database Training user group meeting will be held on January 6th, 2025 at 5:00PM. This will be a HYBRID event and we will be joined online by Jason Romans. You're welcome to come meet in-person at our meeting location, the offices of Improving at 6000 Freedom Square Dr, Unit 110, Independence, OH 44131 Teams Link if anyone needs it after RSVP-ing for in person. If you would like to subscribe to our email list outside of Meetup, we have changed platforms recently and you will need to register here in Kit instead to receive emails. Agenda: 5:00 PM EST: Online and in-person meeting begins with a social hour. This is an unstructured hour where you can join us to catch up and meet other group members before the session starts. There will be food brought in for in-person attendees. 6:00 PM EST: Updates and announcements, followed by our feature presentation. See below for presentation details. 7:30 PM EST: Optionally after the main presentations, the in-person crowd may go out for snacks and drinks at a local establishment. We hope to see you there! Session Abstract Data on Fire: A Hands-On Intro to Spark in Fabric Curious about Apache Spark but not sure where to start? This hands-on session introduces you to Spark in Microsoft Fabric Notebooks—a powerful and accessible way to process and analyze big data using familiar tools in the Microsoft ecosystem. We’ll break down key Spark concepts like distributed computing, DataFrames, and lazy evaluation, then show how they come to life inside Fabric’s notebook experience. You’ll see practical demos that cover loading, transforming, and analyzing large datasets—while leveraging Fabric’s modern data stack, including OneLake, Dataflows, and Pipelines. You’ll also learn how to choose between Spark and pure Python notebooks in Fabric, based on execution needs, data integration, and use case fit. Whether you're a SQL pro, BI developer, or data engineer, this session will give you the tools and confidence to start using Spark in your own projects—no cluster management required. *Please note, that we will be using Microsoft Teams for the online portion of this meeting. You may want to join a few minutes early to ensure you do not have any issues. If you are attending in person, there are large TVs at the office, and you do not need to bring a laptop or use Teams. |
Data on Fire: A Hands-On Intro to Spark in Fabric
|
|
(CS)²AI Online™ Replay: When Data Eats SCADA
2025-12-31 · 18:00
Industry 4.0 and digital transformation is causing a shift in the risk model for industrial security as the data produced by operations becomes as valuable (or more valuable) than the actual operations. An example could be an electric utility that discounts the cost of electricity as incentive to get permission to use some (or all) of the operations and usage data. The value of the electrons is essentially fixed where the value of the operational data is virtually unlimited. This creates an opportunity for additional profit potential for creation and sale of data products in addition to the electric power to the customer. As the organizational profit center shifts to include operational assets as well as operational data and its path outside of the operational environment, so does the risk. In this presentation, learn how to secure your modern/future industrial organization from the industrial process to the operational data products and beyond. https://events.zoom.us/ev/Asd2TohPY74emdRXtPuQzLN0JeMyrWj_ld4Hw2lMIbp0tp1Ik0mB~ArF0cPouLtJ73Dx-SRMl7Z7Dc3p8D8z719jw2yo-chkrKGWTF-nlzQ_QRLdSx2-ULCRhi59ML14ywNKoqk72zKamBA ----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing) All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/) Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved) *Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support. |
(CS)²AI Online™ Replay: When Data Eats SCADA
|
|
(CS)²AI Online™ Replay: When Data Eats SCADA
2025-12-31 · 18:00
Industry 4.0 and digital transformation is causing a shift in the risk model for industrial security as the data produced by operations becomes as valuable (or more valuable) than the actual operations. An example could be an electric utility that discounts the cost of electricity as incentive to get permission to use some (or all) of the operations and usage data. The value of the electrons is essentially fixed where the value of the operational data is virtually unlimited. This creates an opportunity for additional profit potential for creation and sale of data products in addition to the electric power to the customer. As the organizational profit center shifts to include operational assets as well as operational data and its path outside of the operational environment, so does the risk. In this presentation, learn how to secure your modern/future industrial organization from the industrial process to the operational data products and beyond. https://events.zoom.us/ev/Asd2TohPY74emdRXtPuQzLN0JeMyrWj_ld4Hw2lMIbp0tp1Ik0mB~ArF0cPouLtJ73Dx-SRMl7Z7Dc3p8D8z719jw2yo-chkrKGWTF-nlzQ_QRLdSx2-ULCRhi59ML14ywNKoqk72zKamBA ----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing) All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/) Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved) *Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support. |
(CS)²AI Online™ Replay: When Data Eats SCADA
|
|
(CS)²AI Online™ Replay: When Data Eats SCADA
2025-12-31 · 18:00
Industry 4.0 and digital transformation is causing a shift in the risk model for industrial security as the data produced by operations becomes as valuable (or more valuable) than the actual operations. An example could be an electric utility that discounts the cost of electricity as incentive to get permission to use some (or all) of the operations and usage data. The value of the electrons is essentially fixed where the value of the operational data is virtually unlimited. This creates an opportunity for additional profit potential for creation and sale of data products in addition to the electric power to the customer. As the organizational profit center shifts to include operational assets as well as operational data and its path outside of the operational environment, so does the risk. In this presentation, learn how to secure your modern/future industrial organization from the industrial process to the operational data products and beyond. https://events.zoom.us/ev/Asd2TohPY74emdRXtPuQzLN0JeMyrWj_ld4Hw2lMIbp0tp1Ik0mB~ArF0cPouLtJ73Dx-SRMl7Z7Dc3p8D8z719jw2yo-chkrKGWTF-nlzQ_QRLdSx2-ULCRhi59ML14ywNKoqk72zKamBA ----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing) All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/) Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved) *Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support. |
(CS)²AI Online™ Replay: When Data Eats SCADA
|
|
(CS)²AI Online™ Replay: When Data Eats SCADA
2025-12-31 · 18:00
Industry 4.0 and digital transformation is causing a shift in the risk model for industrial security as the data produced by operations becomes as valuable (or more valuable) than the actual operations. An example could be an electric utility that discounts the cost of electricity as incentive to get permission to use some (or all) of the operations and usage data. The value of the electrons is essentially fixed where the value of the operational data is virtually unlimited. This creates an opportunity for additional profit potential for creation and sale of data products in addition to the electric power to the customer. As the organizational profit center shifts to include operational assets as well as operational data and its path outside of the operational environment, so does the risk. In this presentation, learn how to secure your modern/future industrial organization from the industrial process to the operational data products and beyond. https://events.zoom.us/ev/Asd2TohPY74emdRXtPuQzLN0JeMyrWj_ld4Hw2lMIbp0tp1Ik0mB~ArF0cPouLtJ73Dx-SRMl7Z7Dc3p8D8z719jw2yo-chkrKGWTF-nlzQ_QRLdSx2-ULCRhi59ML14ywNKoqk72zKamBA ----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing) All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/) Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved) *Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support. |
(CS)²AI Online™ Replay: When Data Eats SCADA
|
|
(CS)²AI Online™ Replay: When Data Eats SCADA
2025-12-31 · 18:00
Industry 4.0 and digital transformation is causing a shift in the risk model for industrial security as the data produced by operations becomes as valuable (or more valuable) than the actual operations. An example could be an electric utility that discounts the cost of electricity as incentive to get permission to use some (or all) of the operations and usage data. The value of the electrons is essentially fixed where the value of the operational data is virtually unlimited. This creates an opportunity for additional profit potential for creation and sale of data products in addition to the electric power to the customer. As the organizational profit center shifts to include operational assets as well as operational data and its path outside of the operational environment, so does the risk. In this presentation, learn how to secure your modern/future industrial organization from the industrial process to the operational data products and beyond. https://events.zoom.us/ev/Asd2TohPY74emdRXtPuQzLN0JeMyrWj_ld4Hw2lMIbp0tp1Ik0mB~ArF0cPouLtJ73Dx-SRMl7Z7Dc3p8D8z719jw2yo-chkrKGWTF-nlzQ_QRLdSx2-ULCRhi59ML14ywNKoqk72zKamBA ----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing) All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/) Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved) *Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support. |
(CS)²AI Online™ Replay: When Data Eats SCADA
|
|
39C3 day4: Power Cycles (CCC 2025) - watch remote video streams
2025-12-30 · 10:00
For Randomdata members only: We will watch the CCC livestream, eat some pizza, drink some clubmare. You can join us if you like to watch some streams of CCC together. Schedule info: https://events.ccc.de/congress/2025/hub/en/schedule?mode=calendar&kind=official&set=d4#now |
39C3 day4: Power Cycles (CCC 2025) - watch remote video streams
|
|
39C3 day3: Power Cycles (CCC 2025) - watch remote video streams
2025-12-29 · 10:00
For Randomdata members only: We will watch the CCC livestream, eat some pizza, drink some clubmare. You can join us if you like to watch some streams of CCC together. Schedule info: https://events.ccc.de/congress/2025/hub/en/schedule?mode=calendar&kind=official&set=d3#now |
39C3 day3: Power Cycles (CCC 2025) - watch remote video streams
|
|
Linux Repair Café
2025-12-27 · 13:00
Give your still good laptop a second life instead of ditching it because Windows 11 says it is no good... Or you heard Linux is cool. If you have a backup of your data, that is great, else indicate that you do not, so we can help you. Geef je laptop die het nog prima doet een tweede kans in plaats van hem af te schrijven omdat Window 11 dat zegt... Of omdat je hoorde dat Linux gaaf is. Als je al een backup van je data hebt gemaakt is dat perfect. Of verwacht je dat wij dat doen? In dat geval graag aangeven hoe vol je harde schijf nu is... |
Linux Repair Café
|
|
Replay: Navigating Vulnerability Disclosures in an ICS Environment
2025-12-24 · 18:00
(CS)²AI Online™ Replay: Navigating Vulnerability Disclosures in an ICS Environment, a BADALLOC Case StudyBased on a real world event, this forum will share their personal thoughts and experiences when a supplier discovered and disclosed a vulnerability within an operating system (RTOS). We will explore the evaluation from initial RTOS risk rating to OEM evaluation techniques and messaging of recommendation to end ICS users. We will review evaluation of a vulnerability with no known exploits and discuss how tomorrow's threat landscape is going to require deep and detailed forensics, with a strong vendor/OEM partnership to provide guidance to end-users. With the increasing connectivity of industrial systems comes the benefits of productivity, operational efficiency and process control. This connectivity also creates potential opportunity for cyber criminals to gain access to critical infrastructure systems and industrial control systems (ICS). Safeguards against this increasing threat landscape include people, process and technical controls to mitigate and balance the risk against reliability, availability and maintainability of the asset. A key tenant to this equation is vulnerability / incident response for the ICS environment where “patching” is not as common as IT systems and at times, not an immediate option for technical or procedural reasons. https://events.zoom.us/ev/AiYL8nPFWAyGFPmRIEBepzX0mD2dud_FOhrL-h3VZ0mG0HLszmH1~ArNZkPZ5tMKgvN3JjD2HXXkwSiilttf42NDZO2nuvJ_fATA_2uUgXA_BpVp9I0HiC9uJyBo3OmN3Gqc3i1j1dfwCSw ----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing) All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/) Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved) *Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support. |
Replay: Navigating Vulnerability Disclosures in an ICS Environment
|
|
Replay: Navigating Vulnerability Disclosures in an ICS Environment
2025-12-24 · 18:00
(CS)²AI Online™ Replay: Navigating Vulnerability Disclosures in an ICS Environment, a BADALLOC Case StudyBased on a real world event, this forum will share their personal thoughts and experiences when a supplier discovered and disclosed a vulnerability within an operating system (RTOS). We will explore the evaluation from initial RTOS risk rating to OEM evaluation techniques and messaging of recommendation to end ICS users. We will review evaluation of a vulnerability with no known exploits and discuss how tomorrow's threat landscape is going to require deep and detailed forensics, with a strong vendor/OEM partnership to provide guidance to end-users. With the increasing connectivity of industrial systems comes the benefits of productivity, operational efficiency and process control. This connectivity also creates potential opportunity for cyber criminals to gain access to critical infrastructure systems and industrial control systems (ICS). Safeguards against this increasing threat landscape include people, process and technical controls to mitigate and balance the risk against reliability, availability and maintainability of the asset. A key tenant to this equation is vulnerability / incident response for the ICS environment where “patching” is not as common as IT systems and at times, not an immediate option for technical or procedural reasons. https://events.zoom.us/ev/AiYL8nPFWAyGFPmRIEBepzX0mD2dud_FOhrL-h3VZ0mG0HLszmH1~ArNZkPZ5tMKgvN3JjD2HXXkwSiilttf42NDZO2nuvJ_fATA_2uUgXA_BpVp9I0HiC9uJyBo3OmN3Gqc3i1j1dfwCSw ----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing) All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/) Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved) *Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support. |
Replay: Navigating Vulnerability Disclosures in an ICS Environment
|
|
Replay: Navigating Vulnerability Disclosures in an ICS Environment
2025-12-24 · 18:00
(CS)²AI Online™ Replay: Navigating Vulnerability Disclosures in an ICS Environment, a BADALLOC Case StudyBased on a real world event, this forum will share their personal thoughts and experiences when a supplier discovered and disclosed a vulnerability within an operating system (RTOS). We will explore the evaluation from initial RTOS risk rating to OEM evaluation techniques and messaging of recommendation to end ICS users. We will review evaluation of a vulnerability with no known exploits and discuss how tomorrow's threat landscape is going to require deep and detailed forensics, with a strong vendor/OEM partnership to provide guidance to end-users. With the increasing connectivity of industrial systems comes the benefits of productivity, operational efficiency and process control. This connectivity also creates potential opportunity for cyber criminals to gain access to critical infrastructure systems and industrial control systems (ICS). Safeguards against this increasing threat landscape include people, process and technical controls to mitigate and balance the risk against reliability, availability and maintainability of the asset. A key tenant to this equation is vulnerability / incident response for the ICS environment where “patching” is not as common as IT systems and at times, not an immediate option for technical or procedural reasons. https://events.zoom.us/ev/AiYL8nPFWAyGFPmRIEBepzX0mD2dud_FOhrL-h3VZ0mG0HLszmH1~ArNZkPZ5tMKgvN3JjD2HXXkwSiilttf42NDZO2nuvJ_fATA_2uUgXA_BpVp9I0HiC9uJyBo3OmN3Gqc3i1j1dfwCSw ----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing) All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/) Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved) *Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support. |
Replay: Navigating Vulnerability Disclosures in an ICS Environment
|
|
Replay: Navigating Vulnerability Disclosures in an ICS Environment
2025-12-24 · 18:00
(CS)²AI Online™ Replay: Navigating Vulnerability Disclosures in an ICS Environment, a BADALLOC Case StudyBased on a real world event, this forum will share their personal thoughts and experiences when a supplier discovered and disclosed a vulnerability within an operating system (RTOS). We will explore the evaluation from initial RTOS risk rating to OEM evaluation techniques and messaging of recommendation to end ICS users. We will review evaluation of a vulnerability with no known exploits and discuss how tomorrow's threat landscape is going to require deep and detailed forensics, with a strong vendor/OEM partnership to provide guidance to end-users. With the increasing connectivity of industrial systems comes the benefits of productivity, operational efficiency and process control. This connectivity also creates potential opportunity for cyber criminals to gain access to critical infrastructure systems and industrial control systems (ICS). Safeguards against this increasing threat landscape include people, process and technical controls to mitigate and balance the risk against reliability, availability and maintainability of the asset. A key tenant to this equation is vulnerability / incident response for the ICS environment where “patching” is not as common as IT systems and at times, not an immediate option for technical or procedural reasons. https://events.zoom.us/ev/AiYL8nPFWAyGFPmRIEBepzX0mD2dud_FOhrL-h3VZ0mG0HLszmH1~ArNZkPZ5tMKgvN3JjD2HXXkwSiilttf42NDZO2nuvJ_fATA_2uUgXA_BpVp9I0HiC9uJyBo3OmN3Gqc3i1j1dfwCSw ----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing) All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/) Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved) *Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support. |
Replay: Navigating Vulnerability Disclosures in an ICS Environment
|