

About us
Welcome! This meetup dedicated to all professionals involved in Cyber Security for Automated Processes and Control Systems including security for Operating Technology (OT), Industrial Control Systems (ICS), SCADA Systems, Transportation Systems, Building Control Systems (BCS), and even emerging Industrial Internet of Things (IIoT) systems. Our purpose is to connect the professionals in the Greater Tokyo area with real interest in or responsibility for the cyber security of these systems.
Once we have enough critical mass of interest in São Paulo, we will gather for purposes of education, information exchange, and discovery of new opportunities and, yes, perhaps a few happy hours! If you are interested in serving on a committee to help shape this meetup experience, please contact the organizers directly.
We are looking for individuals interested in volunteering to help with organizing and running events. If you would like to be part of the leadership, please message the organizer.
Upcoming events
2
- Network event

(CS)²AI Online™ : OT Cyber Prioritization Under Fire
·OnlineOnline143 attendees from 112 groupsReserve a seat to join the discussion: https://events.zoom.us/ev/AkoaiMg-bHYv_TEkcpEffEb26h4cFeCIkbFmXAPVwweA9Q6IMUyB~AsTgHiu757xZ4LG-_g4cABRV_H7k5EkY4szDpRblMeCTlLxGt_yxPBBzfNSHJYGoGp-9-n8mRiTpTHuMvYaPj9c5Fg
Operational Technology defenders are being asked to prioritize risk in environments where accuracy, stability, and time no longer exist in abundance. OT inventories are often incomplete, outdated, or context‑poor, yet they form the foundation for risk mitigation management decisions that carry real safety, uptime, and financial consequences.
At the same time, vulnerability disclosure velocity is accelerating, attacker capabilities are being augmented by AI, and exploitation pathways are adapting faster than traditional defensive models can track. This creates a prioritization problem that is not purely technical, but structural forcing defenders to make high‑stakes decisions with partial visibility. In an AI‑driven world of constant change, static asset lists, scoring models, and patch‑centric workflows struggle to reflect how adversaries actually operate.
This session explores how OT security teams can navigate these contradictions, where prioritization breaks down under pressure, and what must evolve, across inventories, vulnerability management, and organizational decision‑making, to remain effective in the face of continuously shifting threats by reconnecting on the key priorities: why we are here.
Register now! https://events.zoom.us/ev/AkoaiMg-bHYv_TEkcpEffEb26h4cFeCIkbFmXAPVwweA9Q6IMUyB~AsTgHiu757xZ4LG-_g4cABRV_H7k5EkY4szDpRblMeCTlLxGt_yxPBBzfNSHJYGoGp-9-n8mRiTpTHuMvYaPj9c5Fg
---------------------------------------------------------
Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [[https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing))All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [[https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/](https://www.cs2ai.org/))
Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.[https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)](https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved))*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.
© Control System Cyber Security Association International 20261 attendee from this group - Network event

(CS)²AI Online™- Outpaced: Defending CI Against Rapidly Evolving Threats
·OnlineOnline148 attendees from 111 groupsReserve a seat to join the discussion: https://events.zoom.us/ev/AklCAhvRz-zrdAhax75wR_HJxnr5c_-VUirnHL_sACEY1dTonirp~AkMq9tokJx6dKRIc7LThVHQcvs6_sBJbbjsGXGW0KkXEUyMzzmNROc80mG6Mg7VhRFIQR2vOTDpShdUZUsHw--sN2g
How Critical Infrastructure Defends Against Threats That Arrive Faster Than the Playbook will examine the growing timing mismatch between critical infrastructure systems and the threats now moving against them. The systems that power, move, treat, manufacture, and connect modern life were built for long service lives, slow refresh cycles, and predictable engineering change. The threat is moving much faster than the traditional cycle can accommodate. Cyber operations, artificial intelligence, high-performance computing, and the accelerating transition to post-quantum cryptography are compressing the time between technical warning and operational consequences.
This panel will approach post-quantum readiness through the lens of acceleration, not vocabulary, asking what is changing, why it matters now, and why critical infrastructure cannot treat this as another enterprise IT upgrade. Harvest-now, decrypt-later risk means the distance to “Q-Day” is less important than the sensitivity of the assets. The lifespan of deployed equipment and the time required to migrate cryptography across vendors, embedded devices, control systems, and fielded assets are misaligned.
The discussion will translate standards and guidance into decisions for operators, vendors, executives, and boards. NIST, CISA, NSA, CNSA 2.0, and emerging post-quantum guidance are often treated as a reading list; this panel will frame them as governance choices involving inventory, vendor accountability, acquisition deadlines, budget cycles, and operational risk. It will also test where enterprise guidance is useful and where it breaks down in operational technology, embedded systems, long-lifecycle assets, and vendor-dependent environments.Register now!
https://events.zoom.us/ev/AklCAhvRz-zrdAhax75wR_HJxnr5c_-VUirnHL_sACEY1dTonirp~AkMq9tokJx6dKRIc7LThVHQcvs6_sBJbbjsGXGW0KkXEUyMzzmNROc80mG6Mg7VhRFIQR2vOTDpShdUZUsHw--sN2g
---------------------------------------------------------
Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [[https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing))All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [[https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/](https://www.cs2ai.org/))
Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.[https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)](https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved))*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.
© Control System Cyber Security Association International 20261 attendee from this group
Past events
253





