Skip to content

(CS)²AI Symposium: Cyber Security for Critical Manufacturing

Network event
303 attendees from 112 groups hosting
Photo of Derek Harp
Hosted By
Derek H.
(CS)²AI Symposium: Cyber Security for Critical Manufacturing

Details

Bad actors do not discriminate. They look for ways to disrupt. Most often it is a matter of when, not if, your organization could experience a breach. Manufacturing organizations need the ability to see and understand everything that is on their industrial networks. Once visibility is established, you then need to protect any devices that appear to be vulnerable.

This requires protective compensating controls that are purpose-built for sensitive OT devices. Capabilities such as protocol-aware network policies, system-to-system interaction analysis, and endpoint monitoring can detect and prevent compromises of vulnerable assets.

During this session, we examine ways to assess rick to cyber-physical systems and leverage threat intel to secure your environment.

CLICK HERE to REGISTER

-----------------------------------------------------------------------------------------

Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)

All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [[https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/%5D(https://www.cs2ai.org/))

Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)

*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.

Photo of Sydney Cyber Security for Control Systems group
Sydney Cyber Security for Control Systems
See more events