Skip to content

Details

Reserve a seat to join the discussion: https://events.zoom.us/ev/AkoaiMg-bHYv_TEkcpEffEb26h4cFeCIkbFmXAPVwweA9Q6IMUyB~AsTgHiu757xZ4LG-_g4cABRV_H7k5EkY4szDpRblMeCTlLxGt_yxPBBzfNSHJYGoGp-9-n8mRiTpTHuMvYaPj9c5Fg

Operational Technology defenders are being asked to prioritize risk in environments where accuracy, stability, and time no longer exist in abundance. OT inventories are often incomplete, outdated, or context‑poor, yet they form the foundation for risk mitigation management decisions that carry real safety, uptime, and financial consequences.

At the same time, vulnerability disclosure velocity is accelerating, attacker capabilities are being augmented by AI, and exploitation pathways are adapting faster than traditional defensive models can track. This creates a prioritization problem that is not purely technical, but structural forcing defenders to make high‑stakes decisions with partial visibility. In an AI‑driven world of constant change, static asset lists, scoring models, and patch‑centric workflows struggle to reflect how adversaries actually operate.

This session explores how OT security teams can navigate these contradictions, where prioritization breaks down under pressure, and what must evolve, across inventories, vulnerability management, and organizational decision‑making, to remain effective in the face of continuously shifting threats by reconnecting on the key priorities: why we are here.

Register now! https://events.zoom.us/ev/AkoaiMg-bHYv_TEkcpEffEb26h4cFeCIkbFmXAPVwweA9Q6IMUyB~AsTgHiu757xZ4LG-_g4cABRV_H7k5EkY4szDpRblMeCTlLxGt_yxPBBzfNSHJYGoGp-9-n8mRiTpTHuMvYaPj9c5Fg
---------------------------------------------------------
Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [[https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing))

All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [[https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/](https://www.cs2ai.org/))
Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.[https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)](https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved))

*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.
© Control System Cyber Security Association International 2026

Related topics

Supply Chain Management
Cybersecurity
Insurance
Industrial Internet of Things (IIOT)
Smart Grid

Sponsors

KPMG

KPMG

Financial Support

Fortinet

Fortinet

Strategic Alliance Partner

Level Zero Conference

Level Zero Conference

Strategic Alliance Partner

CambiOS Academy

CambiOS Academy

Strategic Alliance Partner

You may also like