What we’re about
Welcome! This meetup dedicated to all professionals involved in Cyber Security for Automated Processes and Control Systems including security for Operating Technology (OT), Industrial Control Systems (ICS), SCADA Systems, Transportation Systems, Building Control Systems (BCS), and even emerging Industrial Internet of Things (IIoT) systems. Our purpose is to connect the professionals in the Greater Johannesburg area with real interest in or responsibility for the cyber security of these systems.
Once we have enough critical mass of interest in Johannesburg, we will gather for purposes of education, information exchange, and discovery of new opportunities and, yes, perhaps a few happy hours! If you are interested in serving on a committee to help shape this meetup experience, please contact the organizers directly.
Sponsors
See allUpcoming events (2)
See all- Network event36 attendees from 112 groups hosting(CS)²AI Online™: The Power of Industry Specific Security Platforms - RailwaysLink visible for attendees
Reserve your spot now: https://attendee.gotowebinar.com/register/6985307765369730144?source=11202024meetupevent
The talk examines why certain industries face unique security challenges that require specialized approaches. With specific standards, regulatory demands, and operational complexities, industry-specific platforms can address challenges that generic solutions often overlook. By considering sector-specific needs, these platforms provide enhanced protection that aligns with the distinct requirements of each field. The discussion will focus on the rail industry as a key example, highlighting its strict regulatory environment, safety constraints, and complex ecosystem of solutions that together create unique security challenges—and opportunities—for tailored platforms.
Speaker:
Miki Shifman: OT Cyber security researcher, practitioner, speaker, SME, and (CS)²AI FellowRegister now: https://attendee.gotowebinar.com/register/6985307765369730144?source=11202024meetupevent
------------------------------------------------------------------------------------------## Becoming a paid member is quick and easy (and helps us keep offering these free educational opportunities!). Please join now! https://www.cs2ai.org/plans-pricing
## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/
## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.
## If you're interested in speaking at a future (CS)2AI event, having your organization become a Strategic Alliance Partner, or engaging in any of the other ways available, please contact us on our https://www.cs2ai.org/get-involved
## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.
- Network event167 attendees from 112 groups hosting(CS)²AI Online™: Proactive OT Discovery and Remediation to Reduce Business RiskLink visible for attendees
Register now: https://attendee.gotowebinar.com/register/1718806497456804440?source=10132024meetupevent
Ditching Misconceptions: Embracing Proactive OT Discovery and Remediation to Reduce Business Risk
With over 65 billion smart devices in use today, there are 10 times more xIoT devices worldwide than all traditional endpoints combined. Most of these devices—including OT, ICS, IIoT, and adjacent IoT Cyber-Physical Systems (CPS)—are unknown, unmanaged, and unmonitored – posing significant security and operational risks.This massive, vulnerable xIoT attack surface is being successfully exploited by bad actors engaged in cyber espionage, data exfiltration, sabotage, and extortion. And this is especially true in the case of critical infrastructure and ICS environments as businesses gain powerful business benefits while increasing their risk with the convergence of OT and IT infrastructures.
Historically, active discovery and remediation of OT, ICS and IoT devices in sensitive industrial environments has been a HELL NO because it’s been perceived as dangerous and bad – and likely to disrupt operations, risk lives, and cost millions. Brutal.
This apprehension has limited operators and security practitioners to only explore legacy passive security tools – leaving them with limited visibility, incomplete or inaccurate inventory, vulnerable assets, and operational impact on sensitive, mission-critical devices.
When done the right way, however, active solutions are the scalpel rather than the cudgel, focusing on what the devices need rather than throwing the whole kitchen sink at them. This increases discovery speed, visibility completeness, classification accuracy, and risk assessment with zero operational impact – all while allowing for proactive hardening and remediation with full control.
And remember, bad actors are counting on you being passive. They want you to fail so they can continue to evade detection and maintain persistence on your mission-critical OT and IoT devices. Disappoint them!
In this presentation, we’ll help you take control of your embedded devices. We’ll detail findings from years of threat research across millions of Cyber-Physical Systems, demonstrate how IoT and OT devices can be hacked, recognize where they’re most vulnerable, and employ strategies – including a new generation of Intelligent Active Discovery technology – to not only safely find these assets but harden and remediate them at scale.
Attendees will understand:
● What went wrong with active discovery in the past
● How safe, fast, and accurate methods of intelligent active discovery can now be leveraged
● How devices can be hacked
● Why active discovery is the new path forward for organizations to safely FIND, FIX, and MONITOR OT & IoT Cyber-Physical systemsSpeaker:
John Vecchi, Cybersecurity Evangelist, Phosphorus
https://www.linkedin.com/in/johnvecchi/Register now: https://attendee.gotowebinar.com/register/1718806497456804440?source=10132024meetupevent
------------------------------------------------------------------------------------------
## Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! https://www.cs2ai.org/plans-pricing## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/
## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.
## If you're interested in speaking at a future (CS)2AI event, having your organization become a Strategic Alliance Partner, or engaging in any of the other ways available, please contact us on our https://www.cs2ai.org/get-involved
## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.
Past events (207)
See all- Network event29 attendees from 112 groups hosting(CS)²AI Author Spotlight™: Clint BodungenThis event has passed