(CS)²AI Online™- Outpaced: Defending CI Against Rapidly Evolving Threats
150 attendees from 111 groups hosting
Details
Reserve a seat to join the discussion: https://events.zoom.us/ev/AklCAhvRz-zrdAhax75wR_HJxnr5c_-VUirnHL_sACEY1dTonirp~AkMq9tokJx6dKRIc7LThVHQcvs6_sBJbbjsGXGW0KkXEUyMzzmNROc80mG6Mg7VhRFIQR2vOTDpShdUZUsHw--sN2g
How Critical Infrastructure Defends Against Threats That Arrive Faster Than the Playbook will examine the growing timing mismatch between critical infrastructure systems and the threats now moving against them. The systems that power, move, treat, manufacture, and connect modern life were built for long service lives, slow refresh cycles, and predictable engineering change. The threat is moving much faster than the traditional cycle can accommodate. Cyber operations, artificial intelligence, high-performance computing, and the accelerating transition to post-quantum cryptography are compressing the time between technical warning and operational consequences.
This panel will approach post-quantum readiness through the lens of acceleration, not vocabulary, asking what is changing, why it matters now, and why critical infrastructure cannot treat this as another enterprise IT upgrade. Harvest-now, decrypt-later risk means the distance to “Q-Day” is less important than the sensitivity of the assets. The lifespan of deployed equipment and the time required to migrate cryptography across vendors, embedded devices, control systems, and fielded assets are misaligned.
The discussion will translate standards and guidance into decisions for operators, vendors, executives, and boards. NIST, CISA, NSA, CNSA 2.0, and emerging post-quantum guidance are often treated as a reading list; this panel will frame them as governance choices involving inventory, vendor accountability, acquisition deadlines, budget cycles, and operational risk. It will also test where enterprise guidance is useful and where it breaks down in operational technology, embedded systems, long-lifecycle assets, and vendor-dependent environments.
Register now!
https://events.zoom.us/ev/AklCAhvRz-zrdAhax75wR_HJxnr5c_-VUirnHL_sACEY1dTonirp~AkMq9tokJx6dKRIc7LThVHQcvs6_sBJbbjsGXGW0KkXEUyMzzmNROc80mG6Mg7VhRFIQR2vOTDpShdUZUsHw--sN2g
---------------------------------------------------------
Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [[https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing))
All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [[https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/](https://www.cs2ai.org/))
Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.[https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)](https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved))
*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.
© Control System Cyber Security Association International 2026




