talk-data.com talk-data.com

Filter by Source

Select conferences and events

People (111 results)

See all 111 →
Showing 15 results

Activities & events

Title & Speakers Event

💧 (CS)²AI Author Spotlight™

Featuring Steve Mustard \| A Guide to Cybersecurity for Water and Wastewater Utilities

Cyber threats to water and wastewater systems are growing in frequency and sophistication. How can utilities better prepare, protect, and respond?

Join us for a timely (CS)²AI Author Spotlight™ featuring cybersecurity veteran and published author Steve Mustard, as he discusses his book, A Guide to Cybersecurity for Water and Wastewater Utilities. In this session, Steve will explore the unique vulnerabilities facing the water sector and provide practical strategies to strengthen defenses across operational and IT systems.

💡 What You’ll Gain:

  • An overview of cybersecurity risks specific to water and wastewater infrastructure
  • Real-world examples of cyber incidents impacting utilities
  • Strategic and tactical guidance tailored for utility operators, engineers, and leaders
  • A live Q&A session with the author

Whether you're directly involved in water utility operations or support critical infrastructure more broadly, this spotlight offers critical insights into safeguarding essential services.

🔐 Protecting public health starts with securing our systems—join us to learn how.

REGISTER NOW for the event!

----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)

All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)

Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)

*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.

(CS)²AI Author Spotlight™: Featuring Steve Mustard

💧 (CS)²AI Author Spotlight™

Featuring Steve Mustard \| A Guide to Cybersecurity for Water and Wastewater Utilities

Cyber threats to water and wastewater systems are growing in frequency and sophistication. How can utilities better prepare, protect, and respond?

Join us for a timely (CS)²AI Author Spotlight™ featuring cybersecurity veteran and published author Steve Mustard, as he discusses his book, A Guide to Cybersecurity for Water and Wastewater Utilities. In this session, Steve will explore the unique vulnerabilities facing the water sector and provide practical strategies to strengthen defenses across operational and IT systems.

💡 What You’ll Gain:

  • An overview of cybersecurity risks specific to water and wastewater infrastructure
  • Real-world examples of cyber incidents impacting utilities
  • Strategic and tactical guidance tailored for utility operators, engineers, and leaders
  • A live Q&A session with the author

Whether you're directly involved in water utility operations or support critical infrastructure more broadly, this spotlight offers critical insights into safeguarding essential services.

🔐 Protecting public health starts with securing our systems—join us to learn how.

REGISTER NOW for the event!

----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)

All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)

Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)

*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.

(CS)²AI Author Spotlight™: Featuring Steve Mustard

💧 (CS)²AI Author Spotlight™

Featuring Steve Mustard \| A Guide to Cybersecurity for Water and Wastewater Utilities

Cyber threats to water and wastewater systems are growing in frequency and sophistication. How can utilities better prepare, protect, and respond?

Join us for a timely (CS)²AI Author Spotlight™ featuring cybersecurity veteran and published author Steve Mustard, as he discusses his book, A Guide to Cybersecurity for Water and Wastewater Utilities. In this session, Steve will explore the unique vulnerabilities facing the water sector and provide practical strategies to strengthen defenses across operational and IT systems.

💡 What You’ll Gain:

  • An overview of cybersecurity risks specific to water and wastewater infrastructure
  • Real-world examples of cyber incidents impacting utilities
  • Strategic and tactical guidance tailored for utility operators, engineers, and leaders
  • A live Q&A session with the author

Whether you're directly involved in water utility operations or support critical infrastructure more broadly, this spotlight offers critical insights into safeguarding essential services.

🔐 Protecting public health starts with securing our systems—join us to learn how.

REGISTER NOW for the event!

----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)

All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)

Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)

*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.

(CS)²AI Author Spotlight™: Featuring Steve Mustard

💧 (CS)²AI Author Spotlight™

Featuring Steve Mustard \| A Guide to Cybersecurity for Water and Wastewater Utilities

Cyber threats to water and wastewater systems are growing in frequency and sophistication. How can utilities better prepare, protect, and respond?

Join us for a timely (CS)²AI Author Spotlight™ featuring cybersecurity veteran and published author Steve Mustard, as he discusses his book, A Guide to Cybersecurity for Water and Wastewater Utilities. In this session, Steve will explore the unique vulnerabilities facing the water sector and provide practical strategies to strengthen defenses across operational and IT systems.

💡 What You’ll Gain:

  • An overview of cybersecurity risks specific to water and wastewater infrastructure
  • Real-world examples of cyber incidents impacting utilities
  • Strategic and tactical guidance tailored for utility operators, engineers, and leaders
  • A live Q&A session with the author

Whether you're directly involved in water utility operations or support critical infrastructure more broadly, this spotlight offers critical insights into safeguarding essential services.

🔐 Protecting public health starts with securing our systems—join us to learn how.

REGISTER NOW for the event!

----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)

All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)

Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)

*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.

(CS)²AI Author Spotlight™: Featuring Steve Mustard

💧 (CS)²AI Author Spotlight™

Featuring Steve Mustard \| A Guide to Cybersecurity for Water and Wastewater Utilities

Cyber threats to water and wastewater systems are growing in frequency and sophistication. How can utilities better prepare, protect, and respond?

Join us for a timely (CS)²AI Author Spotlight™ featuring cybersecurity veteran and published author Steve Mustard, as he discusses his book, A Guide to Cybersecurity for Water and Wastewater Utilities. In this session, Steve will explore the unique vulnerabilities facing the water sector and provide practical strategies to strengthen defenses across operational and IT systems.

💡 What You’ll Gain:

  • An overview of cybersecurity risks specific to water and wastewater infrastructure
  • Real-world examples of cyber incidents impacting utilities
  • Strategic and tactical guidance tailored for utility operators, engineers, and leaders
  • A live Q&A session with the author

Whether you're directly involved in water utility operations or support critical infrastructure more broadly, this spotlight offers critical insights into safeguarding essential services.

🔐 Protecting public health starts with securing our systems—join us to learn how.

REGISTER NOW for the event!

----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)

All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)

Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)

*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.

(CS)²AI Author Spotlight™: Featuring Steve Mustard
Steve Mustard – President and CEO @ National Automation, Inc. , Fred Gordy – Director of Operational Technology Risk Assessment @ Michael Baker International

An episode exploring how one individual's personal email activity led to damage to the building's HVAC central plant equipment and controllers, the sequence of events, and recovery steps; insights into attacker motivation and building control system programming knowledge.

(CS)²AI Online™ Replay: Anatomy of an Attack - From Encryption to Destruction
Steve Mustard – President and CEO @ National Automation, Inc. , Fred Gordy – Director of Operational Technology Risk Assessment @ Michael Baker International

This episode examines how a user checking personal email on an application host in a commercial building could compromise the building’s HVAC, central plant equipment and controllers. It discusses how downstream devices are at risk and how attackers with knowledge of building control systems may exploit interoperability. The talk walks through the events in order and the remediation steps, and what actions may have inflamed attackers rather than stopped them.

building automation industrial control systems operational technology cybersecurity
(CS)²AI Online™ Replay: Anatomy of an Attack - From Encryption to Destruction

https://attendee.gotowebinar.com/register/8970899318364889180?source=07032024Meetupevnt

In commercial buildings the application host are often the gateway to all the devices running the building’s HVAC, lighting, elevators, card access, and parking systems. These are also often times used by building operations staff to check personal email, social media and browse the web. Because of this the devices downstream are put at risk. In this episode will examine how one individual checking their personal email account caused damage to the literal heart of the building’s HVAC, the central plant equipment and controllers. This single mouse required just over three months work to recover from. The specificity of the attacks to the system indicated that this attack most likely came from someone that had knowledge of how building control systems are programmed and device interoperability. This is an indication that attackers could be coming from the building control system programming community. We will unpack the events in the sequence that they occurred along with the steps that were taken that may have inflamed the attackers rather than stop them. Speaker: Fred Gordy is the Director of Operational Technology Risk Assessment at Michael Baker International. He's a passionate Building/OT Cybersecurity Practitioner, Speaker, and Author in this field, who has been working in the protection of Smart Buildings and Facilities since before those terms existed. https://www.linkedin.com/in/fredgordy/details/experience/ Guest Host: Steve Mustard is President and CEO of National Automation, Inc., and Past President of the International Society of Automation. He has deep experience protecting the cyber security of industries including water & wastewater, oil & gas, transport, electricity and manufacturing.

Register for this replay event now: https://attendee.gotowebinar.com/register/8970899318364889180?source=07032024Meetupevnt

------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Join now! https://www.cs2ai.org/plans-pricing

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Replay: Anatomy of an Attack - From Encryption to Destruction

https://attendee.gotowebinar.com/register/8970899318364889180?source=07032024Meetupevnt

In commercial buildings the application host are often the gateway to all the devices running the building’s HVAC, lighting, elevators, card access, and parking systems. These are also often times used by building operations staff to check personal email, social media and browse the web. Because of this the devices downstream are put at risk. In this episode will examine how one individual checking their personal email account caused damage to the literal heart of the building’s HVAC, the central plant equipment and controllers. This single mouse required just over three months work to recover from. The specificity of the attacks to the system indicated that this attack most likely came from someone that had knowledge of how building control systems are programmed and device interoperability. This is an indication that attackers could be coming from the building control system programming community. We will unpack the events in the sequence that they occurred along with the steps that were taken that may have inflamed the attackers rather than stop them. Speaker: Fred Gordy is the Director of Operational Technology Risk Assessment at Michael Baker International. He's a passionate Building/OT Cybersecurity Practitioner, Speaker, and Author in this field, who has been working in the protection of Smart Buildings and Facilities since before those terms existed. https://www.linkedin.com/in/fredgordy/details/experience/ Guest Host: Steve Mustard is President and CEO of National Automation, Inc., and Past President of the International Society of Automation. He has deep experience protecting the cyber security of industries including water & wastewater, oil & gas, transport, electricity and manufacturing.

Register for this replay event now: https://attendee.gotowebinar.com/register/8970899318364889180?source=07032024Meetupevnt

------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Join now! https://www.cs2ai.org/plans-pricing

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Replay: Anatomy of an Attack - From Encryption to Destruction

https://attendee.gotowebinar.com/register/8970899318364889180?source=07032024Meetupevnt

In commercial buildings the application host are often the gateway to all the devices running the building’s HVAC, lighting, elevators, card access, and parking systems. These are also often times used by building operations staff to check personal email, social media and browse the web. Because of this the devices downstream are put at risk. In this episode will examine how one individual checking their personal email account caused damage to the literal heart of the building’s HVAC, the central plant equipment and controllers. This single mouse required just over three months work to recover from. The specificity of the attacks to the system indicated that this attack most likely came from someone that had knowledge of how building control systems are programmed and device interoperability. This is an indication that attackers could be coming from the building control system programming community. We will unpack the events in the sequence that they occurred along with the steps that were taken that may have inflamed the attackers rather than stop them. Speaker: Fred Gordy is the Director of Operational Technology Risk Assessment at Michael Baker International. He's a passionate Building/OT Cybersecurity Practitioner, Speaker, and Author in this field, who has been working in the protection of Smart Buildings and Facilities since before those terms existed. https://www.linkedin.com/in/fredgordy/details/experience/ Guest Host: Steve Mustard is President and CEO of National Automation, Inc., and Past President of the International Society of Automation. He has deep experience protecting the cyber security of industries including water & wastewater, oil & gas, transport, electricity and manufacturing.

Register for this replay event now: https://attendee.gotowebinar.com/register/8970899318364889180?source=07032024Meetupevnt

------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Join now! https://www.cs2ai.org/plans-pricing

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Replay: Anatomy of an Attack - From Encryption to Destruction

Join us for a discussion of how to apply 62443 with one of the key figures in its creation. Register now at: https://attendee.gotowebinar.com/register/3039123143420891479?source=01312024MeetupEvt

ISA/IEC62443 is the consensus-based international standard covering industrial automation and control system security. The standard has been under development by the International Society of Automation since 2002, and is constantly evolving. While the reference number is well known in control systems security circles, detailed knowledge varies, including what it covers, what it proscribes, and, perhaps most importantly, how to implement it. In this presentation, Steve Mustard will give an overview of ISA/IEC62443, help navigate through the documents, discuss where to use it and how to implement and validate it. This presentation will be of interest to control system product vendors seeking to demonstrate security by design, asset owners seeking to secure their control system environments, and integrators/consultants looking to manage projects involving control systems security. Speaker: Steve Mustard, President & CEO at National Automation and CS2AI Senior Fellow, Inc. Licensed Professional Engineer (Texas, Kansas) and UK Chartered Engineer with technical development and management experience in process automation and business process re-engineering across multiple sectors.

Fellow of Institution of Engineering and Technology and former Chairman of Americas Regional Board, former Chairman of Control & Automation Technical & Professional Network, former Council member. Senior Member of ISA, Certified Automation Professional (CAP) and former board member of Automation Federation. GIAC Global Industrial Cyber Security Professional (GICSP). GSX Certified Mission Critical Professional (CMCP), and former Chair of Automation Federation's Cyber-security committee. Member of ISA99 committee.

Register now at: https://attendee.gotowebinar.com/register/3039123143420891479?source=01312024MeetupEvt

-------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Seminar: How to Apply 62443 – A Practical Guide

Join us for a discussion of how to apply 62443 with one of the key figures in its creation. Register now at: https://attendee.gotowebinar.com/register/3039123143420891479?source=01312024MeetupEvt

ISA/IEC62443 is the consensus-based international standard covering industrial automation and control system security. The standard has been under development by the International Society of Automation since 2002, and is constantly evolving. While the reference number is well known in control systems security circles, detailed knowledge varies, including what it covers, what it proscribes, and, perhaps most importantly, how to implement it. In this presentation, Steve Mustard will give an overview of ISA/IEC62443, help navigate through the documents, discuss where to use it and how to implement and validate it. This presentation will be of interest to control system product vendors seeking to demonstrate security by design, asset owners seeking to secure their control system environments, and integrators/consultants looking to manage projects involving control systems security. Speaker: Steve Mustard, President & CEO at National Automation and CS2AI Senior Fellow, Inc. Licensed Professional Engineer (Texas, Kansas) and UK Chartered Engineer with technical development and management experience in process automation and business process re-engineering across multiple sectors.

Fellow of Institution of Engineering and Technology and former Chairman of Americas Regional Board, former Chairman of Control & Automation Technical & Professional Network, former Council member. Senior Member of ISA, Certified Automation Professional (CAP) and former board member of Automation Federation. GIAC Global Industrial Cyber Security Professional (GICSP). GSX Certified Mission Critical Professional (CMCP), and former Chair of Automation Federation's Cyber-security committee. Member of ISA99 committee.

Register now at: https://attendee.gotowebinar.com/register/3039123143420891479?source=01312024MeetupEvt

-------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Seminar: How to Apply 62443 – A Practical Guide

Join us for a discussion of how to apply 62443 with one of the key figures in its creation. Register now at: https://attendee.gotowebinar.com/register/3039123143420891479?source=01312024MeetupEvt

ISA/IEC62443 is the consensus-based international standard covering industrial automation and control system security. The standard has been under development by the International Society of Automation since 2002, and is constantly evolving. While the reference number is well known in control systems security circles, detailed knowledge varies, including what it covers, what it proscribes, and, perhaps most importantly, how to implement it. In this presentation, Steve Mustard will give an overview of ISA/IEC62443, help navigate through the documents, discuss where to use it and how to implement and validate it. This presentation will be of interest to control system product vendors seeking to demonstrate security by design, asset owners seeking to secure their control system environments, and integrators/consultants looking to manage projects involving control systems security. Speaker: Steve Mustard, President & CEO at National Automation and CS2AI Senior Fellow, Inc. Licensed Professional Engineer (Texas, Kansas) and UK Chartered Engineer with technical development and management experience in process automation and business process re-engineering across multiple sectors.

Fellow of Institution of Engineering and Technology and former Chairman of Americas Regional Board, former Chairman of Control & Automation Technical & Professional Network, former Council member. Senior Member of ISA, Certified Automation Professional (CAP) and former board member of Automation Federation. GIAC Global Industrial Cyber Security Professional (GICSP). GSX Certified Mission Critical Professional (CMCP), and former Chair of Automation Federation's Cyber-security committee. Member of ISA99 committee.

Register now at: https://attendee.gotowebinar.com/register/3039123143420891479?source=01312024MeetupEvt

-------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Seminar: How to Apply 62443 – A Practical Guide

Join us for a discussion of how to apply 62443 with one of the key figures in its creation. Register now at: https://attendee.gotowebinar.com/register/3039123143420891479?source=01312024MeetupEvt

ISA/IEC62443 is the consensus-based international standard covering industrial automation and control system security. The standard has been under development by the International Society of Automation since 2002, and is constantly evolving. While the reference number is well known in control systems security circles, detailed knowledge varies, including what it covers, what it proscribes, and, perhaps most importantly, how to implement it. In this presentation, Steve Mustard will give an overview of ISA/IEC62443, help navigate through the documents, discuss where to use it and how to implement and validate it. This presentation will be of interest to control system product vendors seeking to demonstrate security by design, asset owners seeking to secure their control system environments, and integrators/consultants looking to manage projects involving control systems security. Speaker: Steve Mustard, President & CEO at National Automation and CS2AI Senior Fellow, Inc. Licensed Professional Engineer (Texas, Kansas) and UK Chartered Engineer with technical development and management experience in process automation and business process re-engineering across multiple sectors.

Fellow of Institution of Engineering and Technology and former Chairman of Americas Regional Board, former Chairman of Control & Automation Technical & Professional Network, former Council member. Senior Member of ISA, Certified Automation Professional (CAP) and former board member of Automation Federation. GIAC Global Industrial Cyber Security Professional (GICSP). GSX Certified Mission Critical Professional (CMCP), and former Chair of Automation Federation's Cyber-security committee. Member of ISA99 committee.

Register now at: https://attendee.gotowebinar.com/register/3039123143420891479?source=01312024MeetupEvt

-------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Seminar: How to Apply 62443 – A Practical Guide

Join us for a discussion of how to apply 62443 with one of the key figures in its creation. Register now at: https://attendee.gotowebinar.com/register/3039123143420891479?source=01312024MeetupEvt

ISA/IEC62443 is the consensus-based international standard covering industrial automation and control system security. The standard has been under development by the International Society of Automation since 2002, and is constantly evolving. While the reference number is well known in control systems security circles, detailed knowledge varies, including what it covers, what it proscribes, and, perhaps most importantly, how to implement it. In this presentation, Steve Mustard will give an overview of ISA/IEC62443, help navigate through the documents, discuss where to use it and how to implement and validate it. This presentation will be of interest to control system product vendors seeking to demonstrate security by design, asset owners seeking to secure their control system environments, and integrators/consultants looking to manage projects involving control systems security. Speaker: Steve Mustard, President & CEO at National Automation and CS2AI Senior Fellow, Inc. Licensed Professional Engineer (Texas, Kansas) and UK Chartered Engineer with technical development and management experience in process automation and business process re-engineering across multiple sectors.

Fellow of Institution of Engineering and Technology and former Chairman of Americas Regional Board, former Chairman of Control & Automation Technical & Professional Network, former Council member. Senior Member of ISA, Certified Automation Professional (CAP) and former board member of Automation Federation. GIAC Global Industrial Cyber Security Professional (GICSP). GSX Certified Mission Critical Professional (CMCP), and former Chair of Automation Federation's Cyber-security committee. Member of ISA99 committee.

Register now at: https://attendee.gotowebinar.com/register/3039123143420891479?source=01312024MeetupEvt

-------------------------------------------------------------------------------------------- ## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/

## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.

## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved

## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online™ Seminar: How to Apply 62443 – A Practical Guide
Showing 15 results