This webinar describes cyber risk assessment for operational technology. It argues that a risk management approach to cybersecurity includes the integration of key activities: Cyber Workforce Development and training; Public-Private Partnerships; Operational Technology Risk Management Supply Chain cybersecurity; and cyber threats.
CS Digest Section: CSIAC ANNOUNCEMENTS
The 15th annual NCSAM is coming to a close, and we hope you'll join in to promote a safer, more secure and more trusted Internet for these last few days of the month. CSIAC will continue to emphasize the importance of securing our critical infrastructure as we transition into November's Critical Infrastructure Security and Resilience Month (CISRM), which is
This webinar describes a cyber risk assessment approach for operational technology. It argues that a risk management approach to cybersecurity includes the integration of key activities: Cyber Workforce Development and training; Public-Private Partnerships; Operational Technology Risk Management Supply Chain cybersecurity; and cyber threats.
This webinar describes the Cyber Security Game (CSG). CSG is a method that has been implemented in software that quantitatively identifies cyber security risks and uses this metric to determine the optimal employment of security methods for any given investment level. Cyber Security Game maximizes a system’s ability to operate in today’s contested cyber
The purpose of this article is to make the case for increased research and development of autonomous control machine learning approaches in the cyber domain. In it, we discuss emerging autonomous machine learning technologies and their recent successes, technical and non-technical challenges that still need to be overcome for practical autonomous
In this episode of the CSIAC Podcast, SMEs discuss Tricking Neural Networks, CIA Impersonation, International Data Privacy, and Encrypted Malware Detection.
In this webinar, Neil Fitzpatrick, Senior Knowledge Manager at Quanterion Solutions Inc., uses the analogy of the construction of a Greek temple to identify the components and processes involved in the development of an efficient and effective organizational data to decision model.
This presentation will review various Cybersecurity for Energy Delivery Systems (CEDS) R&D projects in which Schweitzer Engineering Laboratories (SEL) has been involved including an overview of Operational Technology-Software Defined Networking (OT-SDN).
In this episode of The CSIAC Podcast, Sean Bird talks with James Rice, a Cybersecurity Instructor at Mohawk Valley Community College (MVCC) and the Lead Instructor for the GenCyber cybersecurity summer camp at MVCC.
Security concerns are at the forefront due to the reliance on mobile devices for both business and personal use, along with the ever-increasing data usage. This video podcast and companion article will give you an overview of the current threats to mobile device security and what you can do to mitigate them.