What we’re about
Welcome! This meetup dedicated to all professionals involved in Cyber Security for Automated Processes and Control Systems including security for Operating Technology (OT), Industrial Control Systems (ICS), SCADA Systems, Transportation Systems, Building Control Systems (BCS), and even emerging Industrial Internet of Things (IIoT) systems. Our purpose is to connect the professionals in the Greater Newark area with real interest in or responsibility for the cyber security of these systems.
Once we have enough critical mass of interest in Newark, we will gather for purposes of education, information exchange, and discovery of new opportunities and, yes, perhaps a few happy hours! If you are interested in serving on a committee to help shape this meetup experience, please contact the organizers directly.
Sponsors
See allUpcoming events (1)
See all- Network event26 attendees from 112 groups hosting(CS)²AI Online™ Seminar: Applying "Secure-by-Design" Principles to OT SystemsLink visible for attendees
Register now at: https://attendee.gotowebinar.com/register/1139083489887822681?source=04242024meetupevent
In April 2023, CISA and 17 U.S. and international partners issued a joint publication on "Secure-by-Design" principles and guidance, kicking off a campaign urging software manufacturers to take urgent steps necessary to ship products that are secure by design and revamp their design and development programs to permit only secure by design products to be shipped to customers. The importance of building security into industrial control system (ICS) products has been recognized by the OT security community for many years and has been incorporated into standards such as ISA/IEC 62443-4-1 and 62443-4-2 as well as in the ISASecure certification program.
Furthermore, the OT security community has recognized that "Secure-by-Design" principles also need to be applied to the design and implementation of OT systems, which involve the complex integration of ICS-specific products and applications with IT infrastructure. Similar to ICS product security, OT system security requirements have been incorporated into standards such as ISA/IEC 62443-3-3 and 62443-2-4 as well as in the ISASecure certification program.
This presentation will discuss the challenges of designing cybersecurity into new (i.e., greenfield) OT systems and how "Security by Design" principles can and should be applied by the organizations that design and integrate these systems. The presentation will also discuss the importance of understanding the security capabilities of the products being integrated into OT systems. proper design documentation, design reviews, risk assessments, cyber acceptance testing (e.g., Cyber FAT and SAT), as well as the integration of technology to monitor, maintain, and manage security during operations.
Speaker
John Cusimano is the Vice President of OT Security at Armexa and a CS2AI Fellow.Register now at: https://attendee.gotowebinar.com/register/1139083489887822681?source=04242024meetupevent
-------------------------------------------------------------------------------------------
## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/
## Becoming a paid member is quick and easy. Join now! https://www.cs2ai.org/plans-pricing
## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.
## If you're interested in speaking at a future (CS)2AI event, having your organization become a Strategic Alliance Partner, or engaging in any of the other ways available, please contact us on our https://www.cs2ai.org/get-involved
## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.
Past events (157)
See all- Network event134 attendees from 112 groups hosting(CS)²AI Online™ Replay: Proactive Vulnerability Management in OTThis event has passed