What we're about

Welcome! This meetup dedicated to all professionals involved in Cyber Security for Automated Processes and Control Systems including security for Operating Technology (OT), Industrial Control Systems (ICS), SCADA Systems, Transportation Systems, Building Control Systems (BCS), and even emerging Industrial Internet of Things (IIoT) systems. Our purpose is to connect the professionals in the Greater Johannesburg area with real interest in or responsibility for the cyber security of these systems.

Once we have enough critical mass of interest in Johannesburg, we will gather for purposes of education, information exchange, and discovery of new opportunities and, yes, perhaps a few happy hours! If you are interested in serving on a committee to help shape this meetup experience, please contact the organizers directly.

Upcoming events (2)

Top 5 Use Cases for Endpoint Protection in Operational Technology (sponsored)

NOTE: Registration at gotowebinar.com is required to attend this event. Also, as with all (CS)2AI hosted training and education events, certificates for PDU registration will be issued following completion. Endpoints are frequently targeted for initial compromise or attacks. It can take just minutes, if not seconds, to compromise endpoints putting industrial environments at risk. A recent study found 30% of breaches involved malware being installed on endpoints. OT endpoints are particularly vulnerable due to legacy tech powering manufacturing plants, power stations, and other critical infrastructure. Many organizations rely on air gaps for cybersecurity to protect industrial environments, but an air gap is not enough. While it may help insulate and shrink attack surfaces, like all prevention measures it is not 100%. During this session we will explore five-use cases in OT that may require you to rethink the protection you perceive the air gap providing, including: -Stop breaches and prevent data loss and ransomware damage with no dwell time. -Eliminate alert fatigue and optimize operations with customizable, standardized incident response processes. -Ensure business continuity in the event of a security incident, keeping systems online. -Reduce cost of legacy EDR solutions enabling response and remediation without negative business impact SPEAKERS: Michelle Balderson: Director, Operational Technology and Critical Infrastructure, Fortinet https://www.linkedin.com/in/michelle-balderson-34498a13/ Michelle has supported deployment of cybersecurity solutions for IT and OT organizations globally. She's known for thinking beyond technology to impacts on people and processes. Driven to align projects to business objective and desired outcomes rather than hype, in the world of security, she focuses on understanding the assets needing protection and why. Tsailing Merrem: Director, Product Marketing, Fortinet Tsailing leads the integration and delivery of endpoint protection, detection and response capabilities. Prior to joining Fortinet, Tsailing spent over 10 years working for endpoint protection companies including Kaspersky, McAfee and Sophos. She has experienced the endpoint industry’s significant transformation and she witnessed the process play out. https://www.linkedin.com/in/tsailing/ Register now to reserve a seat at https://attendee.gotowebinar.com/register/2623394469160812816?source=0619MtpEvnt

Top 5 Takeaways on IEC 62443-3-3, w/Palo Alto Networks & Siemens (sponsored)

NOTE: Registration at https://attendee.gotowebinar.com/register/803470728521671691?source=07092020MtpEvnt is required to attend this event. Also, as with all (CS)2AI hosted training and education events, certificates for PDU registration will be issued following completion. Join (CS)2AI ONline and our guest SMEs for a deep dive into this important international standard. The ongoing growth of ICS applications continues to increase the complexity of control systems infrastructure and the pressure on IT and OT security resources while, simultaneously, cyber attacks grow more sophisticated and numerous. Leveraged properly, industry standards are essential components in Operations defenders' toolboxes efforts to provide the consistent continuous protection demanded of them. This session will address key steps in applying IEC[masked] to industrial control systems from process to implementation. SPEAKERS: Thomas Balint, Head of Center of Excellence Industrial Security Services at Siemens (https://www.linkedin.com/in/thomas-balint-40027bb/) Thomas has been with Siemens since 1998, where he originally developed their Industrial Security Services business. In 2018 he took over responsibility for Industrial Security Services Center of Competence. He also leads the Industrial Security Services R&D unit. Stefan Woronka, Director Industrial Security Services at Siemens (https://www.linkedin.com/in/woronka/) Stefan has been with Siemens since 1997. He was instrumental in creating and developing a holistic security concept for their Digital Factory and Process Industries & Drives divisions and, since 2017, has been responsible for the worldwide rollout of Siemens entire Industrial Security Services portfolio. Dharminder Debisarun, Industry Security Architect for Transportation, Internet of Things, Manufacturing, at Palo Alto Networks (https://www.linkedin.com/in/dharminder-debisarun-2b750a1/) Dharminder has decades of experience bridging the gap between IT/OT and business needs. A member of ENISA's expert group for Industry 4.0, he speaks extensively across Europe and beyond on IT/SCADA security matters. Register now to reserve a seat at https://attendee.gotowebinar.com/register/803470728521671691?source=07092020MtpEvnt

Past events (4)

OPERATION: Poison Supply Chain

Online event

Photos (7)