Thursday Thoughts | (CS)²AI Weekly Updates | Issue No. 15
(CS)²AI Online™ Calendar of Events
Wednesday, May 4 | 1:00PM - 2:30PM EST: DoD Cyber FVEYS Nations Mission Assurance Table-Top Exercise with Daryl Haegley, Michael Chipley, & Leigh Armistead Register Here
Tuesday, May 10 | 7:00AM -11:30AM EST: Symposium RECAST: Securing the Software Supply Chain: Forging an Unbreakable Chain Register Here
Wednesday, May 11 | 1:00PM - 2:30PM EST: Research, Regulators, and Recalls – What We Can Learn From the Medical Device Cybersecurity Community with Billy Rios Register Here
Thursday, May 12 | 1:00AM - 5:30AM EST: Symposium RECAST: Securing the Software Supply Chain: Forging an Unbreakable Chain Register Here
** This recast is intended for our members across the globe!
Wednesday, May 18 | 1:00PM - 2:30PM EST: Special: Follow-up to Supply Chain Symposium Register Here
In response to popular demand we are holding a special event. Our April supply chain symposium had so much discussion and so many Quality Questions asked that we ran out of time, so we are bringing the speakers back together to answer everything you want to know on the subject. Our panel of SMEs will start out with questions submitted during the original symposium and move on to new ones you ask during their live discussion. If you missed the symposium, please register for one of the two RECAST options above so you are up to date for this follow up event!
Wednesday, May 25 | 1:00PM - 5:30PM EST: Symposium: Control System Security for Manufacturing Register Here
What's new with (CS)²AI?
(CS)²AI Podcast
Releasing a new episode every Tuesday. Derek Harp interviews control system cyber security leaders from around the world.
April Episodes | Cyber Security Leaders Series
Strategic Alliance Partner Spotlight
Trend Micro | Faster, better protection with security for:
Hybrid Cloud
Secure your physical, virtual, cloud, and container environments more effectively with the Trend Micro Cloud One™ security services platform.
Networks
Protect against known, unknown and undisclosed vulnerabilities across IT and IOT environments with Trend Micro Network One™.
Users
Protect your endpoints, email, and more with Trend Micro Apex One™.
Extended Detection & Response
See more and respond faster with Trend Micro Vision One™, a cyber defense center that goes beyond other XDR solutions. Learn more about Trend Micro
Recommended by LinkedIn
White Paper | Industrial Digital Transformation | Download your copy here
(CS)²AI Job Board
Cybersecurity Consultant | GHD | USA
This Cybersecurity Consultant will be an integral part of GHD’s Advanced Automation Group, with a focus on providing OT cybersecurity design support for GHD’s core engineering services in the water/wastewater, energy, transportation, and building sectors. Apply Now
Cybersecurity - Senior - Operational Technology | EY | USA
Our cybersecurity services assist our clients in aligning security management strategy with business goals. With a focus on OT cybersecurity and network security, you will serve in a key role of leading technical discussions, guiding the development of strategic and tactical security architecture efforts, designing and driving implementations to completion, and function overall as a technical security leader for traditional solutions and evolving risk-based security architectures. Apply Now
Latest News & Articles on Cyber Security
CertiK raises $60 million to address the growing demand for Web3 security
CertiK announced an additional $60 million USD investment from SoftBank Vision Fund 2 and Tiger Global. This marks SoftBank’s first venture into the Web3 security space.... Read more
Hackers find 122 vulnerabilities — 27 deemed critical — during first round of DHS bug bounty program
More than 450 security researchers working through the Department of Homeland Security’s “Hack the DHS” bug bounty program identified more than 122 vulnerabilities, 27 of which were deemed critical, according to a DHS statement first obtained by CyberScoop.... Read more
Strategic Alliance Partner Spotlight
Verve Industrial Protection has ensured reliable and secure industrial control systems for 25 years. Its principal offering, the Verve Security Center, is a unique, vendor-agnostic OT end point management platform that provides IT-OT asset inventory, vulnerability management, and the ability to remediate threats and vulnerabilities from its orchestration platform.
Verve’s Design-4-Defense professional services support clients in ensuring their OT environments are designed and operated in a secure manner. Learn more about Verve
White Paper | OT Systems Management | Download your copy here
Conferences and Events - Featured Event
We like to promote what others are doing in the Control System Cyber Security space. If you are hosting an event or know of other events, please send them our way so we can add them to the Conferences and Events page on our website.
Hack The Capitol 5.0! | May 4, 2022 | Washington, DC US
ICS Village is proud to present Hack the Capitol 5.0! This is the fifth installment of a free, day-long, multi-track event designed to educate congressional staffers, scholars, and the press on some of the most critical cybersecurity challenges facing our nation today.
Hosted by Crowell & Moring LLP, Hack the Capitol will be a hybrid conference with a live-stream option for those unable to attend in-person. Register to join attendees such as Congressional policymakers and staffers, executives from the private sector across all several critical infrastructure verticals, academic subject matter experts from other think tanks and universities, and the press. In-person tickets include access to a closing cocktail reception at 6pm. Register Here