![Delhi Cyber Security for Control Systems cover photo](https://secure.meetupstatic.com/photos/member/2/9/e/0/preview_255190720.webp?w=256)
![Delhi Cyber Security for Control Systems cover photo](https://secure.meetupstatic.com/photos/event/5/5/7/1/clean_494541873.webp)
What we’re about
Welcome! This meetup is dedicated to all professionals involved in Cyber Security for Automated Processes and Control Systems including security for Operating Technology (OT), Industrial Control Systems (ICS), SCADA Systems, Transportation Systems, Smart Cities, Grids & Factories, Building & Automation Control Systems (BACS), and emerging Industrial Internet of Things (IIoT) systems. Our purpose is to connect and develop community with professionals in and around Seoul who have real interest in or responsibility for the cyber security of these systems.
This group is part of a growing worldwide workforce development not-for-profit organization, the Control System Cyber Security Association International, aka (CS)2AI, which provides the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education and directly support cyber security professional development in every way.
Upcoming events (3)
See all- Network event160 attendees from 112 groups hosting(CS)²AI Fellow Fireside Chat with Jonathan PolletLink visible for attendees
CLICK HERE to REGISTER for the EVENT
(CS)²AI Fellow Fireside Chat featuring Jonthan Pollet
Amidst the escalating ransomware and cyber threats, coupled with the mounting pressure to adhere to evolving regulatory and security standards, executive leaders within organizations reliant on Operational Technology (OT) systems are compelled to articulate their strategic approach to safeguarding their OT systems from increasingly complex threats.
While securing industrial OT systems used to be decentralized and the responsibility of each plant manager, over the past 5 to 10 years, we have seen a noticeable shift in the industry to move the responsibility and ownership of cyber security to the CIO and those in leadership of the business IT cyber security systems. However, due to the inherent differences in technology, personnel, and processes between the business IT environment and industrialized OT systems, a successful leader cannot simply impose their IT cyber security strategy and solutions upon the OT side of the organization without first understanding the unique operating constraints, current technology portfolio, processes in place, and cyber risks prevalent on the OT side.
Jonathan Pollet and his team at Red Tiger Security have developed a field-tested and proven three-step process that empowers senior leadership with clarity regarding the current gaps on the OT side of their organizations and connects the dots to an actionable remediation strategy. This process generates a Strategic Roadmap that not only addresses current security gaps but also delivers a comprehensive multi-year plan for deploying missing technology solutions, updating processes and procedures, and elevating the knowledge of your workforce to enhance the maturity of your OT cyber security program. Going through this process also delivers a budgetary cost estimate with traceability built into the process, which significantly enhances your effectiveness at obtaining the funding needed to make the necessary security investments.
As with many of Pollet’s talks, this one is loaded with plenty of useful meat on the bone from years of experience in the trenches. These practical techniques and tips are also peppered with interesting stories from implementing this methodology in various critical infrastructure industrial environments around the world.
-----------------------------------------------------------------------------------------
Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)
Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)
*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.
- Network event191 attendees from 112 groups hosting(CS)²AI Symposium: Cyber Security for Smart BuildingsLink visible for attendees
In the realm of Operational Technology (OT) cybersecurity, the systems within buildings are often overlooked. These operating technology systems exist in various forms in every commercial building and are increasingly being connected to the internet.
We have convened nearly a dozen experts comprising facility owners and BAMS technology manufacturers to address these questions and more.
REGISTER NOW to join the event!
-----------------------------------------------------------------------------------------
Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)
Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)
*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.
- Network event15 attendees from 110 groups hostingLevel Zero ConferenceGeorgia Tech Exhibition Hall, Atlanta, GA
Click to LEARN MORE
Join the premier event for OT cyber security professionals, where engineering meets cyber security to protect critical infrastructure.
The Level Zero Conference brings experts from across industries together to address the complex challenges of securing operational technology. Our multidisciplinary approach integrates engineering, cyber security, and risk management to safeguard critical infrastructure from level zero to the cloud.
IT and OT have traditionally operated in silos, with each team lacking a critical understanding of the other. The Level Zero Conference bridges this divide by bringing together experts from OT and IT – engineering, operations, and cyber security.
Fostering collaboration and cross-disciplinary understanding are both essential for the protection of critical infrastructure. Through the exchange of ideas and expertise, Level Zero empowers professionals from different domains to develop a deeper understanding of both IT and OT environments enabling the creation of infrastructure that is integrated and resilient to evolving threats.
Level Zero Conference is where the future of OT cyber security is shaped. Don’t miss this opportunity to contribute to and learn from the industry’s leading minds.
===============================================================
Register now
LevelZeroConference.com
Interested in presenting or sponsoring? Contact [email protected].
Note cs2ai.org is the conference’s organizing sponsor.
Past events (206)
See all- Network event48 attendees from 111 groups hostingREPLAY: Creating and Running Effective ICS/OT Table Top ExercisesThis event has passed