BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//San Diego Tech Scene - ECPv6.15.19//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://sdtechscene.org
X-WR-CALDESC:Events for San Diego Tech Scene
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20260308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20261101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20270314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20271107T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260311T070000
DTEND;TZID=America/Los_Angeles:20260311T083000
DTSTAMP:20260418T024620
CREATED:20260311T075211Z
LAST-MODIFIED:20260311T075211Z
UID:10017191-1773212400-1773217800@sdtechscene.org
SUMMARY:(CS)²AI Online™ : The Insurable Gap: Why OT Security is the New Board Mandate
DESCRIPTION:Reserve a seat to join the discussion: https://events.zoom.us/ev/ArVlSsFSmLmNjLLQECZY1ddKFYOkiFauDlLU-xR_WlOQuj78IL4a~AmfeLEWldWGuhTJC5uLkVtt1cBNaQxet_i_mCTlORGuLn5L9uuvYrpYS7ybW3DQmMGvXrFkw9UOdHSZbmwINc1XACQ \nBackground:\nCybersecurity risk has evolved from merely an IT issue to a core strategic and operational challenge\, especially due to the convergence of IT and vulnerable\, legacy Operational Technology (OT) systems. Recent\, high-impact attacks (Colonial Pipeline\, MWAA\, Volt Typhoon) on critical infrastructure demonstrate that disruptions are inevitable and lead to severe financial\, operational\, and reputational costs\, risking national economic stability. \nObjective/Hypothesis:\nBoards that shift from passive oversight to active ownership and integration of cyber resilience into enterprise strategy will significantly mitigate the financial and reputational costs of breaches\, achieve sustained operations during disruptions\, and leverage resilience as a source of competitive advantage and long-term growth. This includes the strategic use of cyber insurance and liability management to transfer residual risk and protect the balance sheet. \nMethods:\nThe approach focuses on translating complex technical OT risks into board-level strategic actions. This is achieved through: 1) Cyber Risk Quantification (CRQ) (using Axio’s expertise to express risk in dollar terms for informed decision-making and insurance optimization); 2) AI-Driven Simulation (using ThreatGEN-powered exercises to model realistic\, tailored attacks); 3) Cross-Functional Collaboration (engaging boards\, executives\, and field teams); and 4) Continuous Feedback Loops to evaluate and update incident response plans. The process relies on an ecosystem of strategic partners for risk transfer\, adversarial testing\, compliance\, and zero-trust solutions. \nResults:\nA resilient enterprise is defined by its ability to Sustain operations during an event\, Recover quickly\, Adapt based on lessons learned\, and Grow market advantage by demonstrating superior risk management. The strategic use of CRQ and AI-powered exercises with a comprehensive continuous feedback loop secures board approval for investment and ensures that both internal defenses and external risk transfer mechanisms (insurance coverage and liability protection) are optimized and aligned with the organization’s true financial exposure and risk appetite. \nConclusions:\nCyber resilience is a board-level fiduciary responsibility that encompasses both technical preparedness and comprehensive financial risk transfer. Boards must move beyond oversight to ownership\, using quantifiable data to optimize cybersecurity investments\, negotiate appropriate cyber liability insurance limits for first- and third-party losses\, and position the organization to thrive in a volatile digital economy by turning preparation into a source of confidence and competitive strength. \nRegister now: https://events.zoom.us/ev/ArVlSsFSmLmNjLLQECZY1ddKFYOkiFauDlLU-xR_WlOQuj78IL4a~AmfeLEWldWGuhTJC5uLkVtt1cBNaQxet_i_mCTlORGuLn5L9uuvYrpYS7ybW3DQmMGvXrFkw9UOdHSZbmwINc1XACQ\n———————————————————\nBecoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [[https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)) \nAll past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [[https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/](https://www.cs2ai.org/))\nCertificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.[https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)](https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)) \n*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page\, all events are open for direct funding support.\n© Control System Cyber Security Association International 2026
URL:https://sdtechscene.org/event/cs%c2%b2ai-online-the-insurable-gap-why-ot-security-is-the-new-board-mandate/
LOCATION:Virtual
CATEGORIES:AI,Cybersecurity,Virtual
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260311T180000
DTEND;TZID=America/Los_Angeles:20260311T200000
DTSTAMP:20260418T024620
CREATED:20260310T084703Z
LAST-MODIFIED:20260310T084703Z
UID:10017186-1773252000-1773259200@sdtechscene.org
SUMMARY:San Diego Cyber Group Meetup (March 2026 event)
DESCRIPTION:This is a fun meetup for the cyber community in San Diego. Hosted by David Spark of the CISO Series. We’ll have conversation about cyber\, a few silly games\, and a guided discussion. \nWe’re open to your suggestions.\nAnd we’re looking for help. Message us if you’d like to get involved in the event. \nWe’ll have food and drink for the first 80 people who show up! \nThis event is ONLY for people who work in cybersecurity or who are studying cybersecurity. \nHUGE thanks to our sponsors Vanta and Netskope.
URL:https://sdtechscene.org/event/san-diego-cyber-group-meetup-march-2026-event/
LOCATION:Novo Brazil Brewing Mission Valley\, 1640 Camino Del Rio N Suite 341\, San Diego\, CA\, 92108\, United States
CATEGORIES:Cyber Community,Cybersecurity,Discussions
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260318T100000
DTEND;TZID=America/Los_Angeles:20260318T113000
DTSTAMP:20260418T024620
CREATED:20260317T065549Z
LAST-MODIFIED:20260317T065549Z
UID:10017239-1773828000-1773833400@sdtechscene.org
SUMMARY:(CS)²AI Online™ Seminar: Fortifying Critical Functions using CIE
DESCRIPTION:Register now to save yourself a seat!\nhttps://events.zoom.us/ev/Asx3LT4tmNcZqKxjuEAGXIgd_8W2xGdggVtk_pn756NPUSFjyDJc~AljeJbVcVGC6V4p8cLtMEXHRaLjwTyhNaklb8cAg7CHbbolP9KNFwg6Mlj8daDhVg_cgDZqBZaJV-_2D_CJMssAnLg \n# Design Out the Risk: The Cyber-Informed Engineering (CIE) Masterclass \nStop reacting to threats. Start engineering them out of existence.\nIn an era where digital threats have physical consequences\, traditional “bolt-on” security is no longer enough. We invite you to a session on Cyber-Informed Engineering (CIE)—the framework developed to integrate security directly into the engineering design lifecycle. (pre-cursor to a more intensive option at the Level Zero Conference).\nThis isn’t just a lecture; it’s a toolkit handover. Whether you are managing microgrids\, BESS\, or complex gas compressor stations\, you will walk away with the exact blueprints needed to bridge the gap between the control room and the boardroom. \n*** \n## The Agenda \n### Part I: The Paradigm Shift \n\nMeet the Architects: Introduction to the team leading the national transition toward CIE.\nThe CIE Core: What is Cyber-Informed Engineering\, and why is it the definitive answer to sophisticated infrastructure attacks?\nBattle-Tested: The CIE Case Study: A deep-dive post-mortem into how CIE principles transform vulnerable systems into resilient assets.\n\n### Part II: Strategic Integration \n\nFrom Engineering to the Boardroom: How to connect CIE to Enterprise Risk Management (ERM). Learn the adoption pathways that secure executive buy-in and funding.\nThe Implementation Roadmap: A guided discussion on applying these frameworks to your current cybersecurity program without reinventing the wheel.\n\n### Part III: The Specialized Toolkit \n\nSector-Specific Deep Dives: Tailored tool demonstrations for:\nMicrogrids & BESS: Securing the distributed edge.\nGas Compressor Stations: Protecting high-consequence kinetic environments.\nThe Engineering Controls Database: A tour of the universal tools and general application libraries available to you right now.\nThe Future—CMM for CIE: An exclusive first look at the upcoming Capability Maturity Model to help you measure and scale your organization’s resilience.\n\n*** \n## What You’ll Carry Home \nBy the end of this session\, you won’t just have “information”—you’ll have capability: \n\nTotal Clarity: A master-level understanding of CIE principles.\nDay-One Application: The ability to plug CIE directly into your existing security workflow.\nThe CIE Vault: Full access to workbooks\, tools\, and the Engineering Controls Database.\nDirect Access: A directory of experts and resources for ongoing implementation support.\n\nTo learn all about Cyber Informed Engineering and its application to your ICS environment\, register now:\nhttps://events.zoom.us/ev/Asx3LT4tmNcZqKxjuEAGXIgd_8W2xGdggVtk_pn756NPUSFjyDJc~AljeJbVcVGC6V4p8cLtMEXHRaLjwTyhNaklb8cAg7CHbbolP9KNFwg6Mlj8daDhVg_cgDZqBZaJV-_2D_CJMssAnLg \n——————————————————–\nBecoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [[https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing))\nAll past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [[https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/](https://www.cs2ai.org/))\nCertificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.[https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)](https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved))\n*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page\, all events are open for direct funding support.\n© Control System Cyber Security Association International 2026
URL:https://sdtechscene.org/event/cs%c2%b2ai-online-seminar-fortifying-critical-functions-using-cie/
LOCATION:Virtual
CATEGORIES:Cyber Community,Cybersecurity,Engineering & Developers,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260319T120000
DTEND;TZID=America/Los_Angeles:20260319T131500
DTSTAMP:20260418T024620
CREATED:20260318T064212Z
LAST-MODIFIED:20260318T064212Z
UID:10017244-1773921600-1773926100@sdtechscene.org
SUMMARY:Risk is good: A Hacker's Guide to Managing GRC
DESCRIPTION:“We turned tribal knowledge into a repeatable\, auditable playbook — think blue‑team discipline with rogue‑hacker swagger. \nWhat we did: \n\n\nRecon: Interviewed engineers\, architects\, analysts\, and leaders to expose undocumented ops and inconsistent controls. \n\n\nExploit the gaps: Mapped policies\, SOPs\, and GRC to reveal missing/ineffective controls and untracked risks. \n\n\nScore & Prioritize: Work with second line of defense to standardized risk scoring (likelihood × impact) aligned to NIST/ISO. \n\n\nDeploy the framework: Process → Risk → Controls with owners\, templates\, review cadences\, and preventive/detective/corrective controls. \n\n\nShip culture: Accessible docs\, continuous monitoring\, and training to make resilience repeatable. \n\n\nResult: From chaotic scripts to a hardened playbook — proactive risk management that works. \nSPEAKERS: \n\n\nCurtis Jones – Technology Analyst II at LPL Financial \n\n\nCurtis Jones is a cybersecurity professional with a strong background in information systems and a commitment to advancing enterprise security programs. He holds a bachelor’s degree in management information systems from San Diego State University (SDSU). \nCurtis began his career in Technology Governance\, helping mature the policy management process through annual reviews\, new policy development\, and alignment with the NIST Cybersecurity Framework. He later led the creation of the Process\, Risk\, and Controls (PRC) Program\, establishing its foundational structure and driving its evolution. \nHe is currently focused on expanding the PRC Program by integrating Key Risk Indicators (KRIs) and building an enterprise risk register to support proactive approaches to risk. Curtis continually strengthens his technical expertise and holds certifications including Security+\, CySA+\, AWS Cloud Practitioner\, and CRTO. \nDETAILS:\nDate: Thursday\, March 19\nTime: 12:00 – 1:15 p.m.\nLocation: In-Person and Online via Zoom\nCPE: 1 \nON PREMISES\nXiFin\, Inc.\n12225 El Camino Real\nSan Diego\, CA 92130\nAttendance capacity is limited to 50 \nONLINE\nOnline access is available via the chapter’s Zoom account (registration below).\nAttendance capacity is 500
URL:https://sdtechscene.org/event/risk-is-good-a-hackers-guide-to-managing-grc/
LOCATION:Hybrid
CATEGORIES:Cybersecurity,Hybrid,Professionals
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260319T173000
DTEND;TZID=America/Los_Angeles:20260319T200000
DTSTAMP:20260418T024620
CREATED:20260319T024852Z
LAST-MODIFIED:20260319T024852Z
UID:10017246-1773941400-1773950400@sdtechscene.org
SUMMARY:SD ISSA - InfoSec Networking Happy Hour (March)
DESCRIPTION:Please Register via our main Event Calendar Platform:\nLuma: Register Here\nAnyone is welcome to attend this event!\nAll SD ISSA events are included with Membership…\n– Take advantage & Become a Member Today! \nLocation: Coronado Brewing (Bay Park)\n1205 Knoxville St\, San Diego\, CA 92110 \n\nFood & Beverages Included\n\nCome for the drinks\, stay for the conversation.\n​Get out of the house to take advantage of this fantastic opportunity to connect with fellow cybersecurity professionals\, gain some professional development\, and have some well-deserved fun at this month’s Happy Hour!\n​We look forward to seeing you there. \n**Interested in Sponsoring? Please contact sponsorship@sdissa.org.** \nISSA Membership & Inquiries\nBecome a member and start attending our meetings & events for FREE! Please Join Today!\nIf you have a job opening to highlight\, please contact us at [recording@sdissa.org](mailto:recording@sdissa.org)\nTo inquire about sponsorship opportunities\, please contact us at [sponsorship@sdissa.org](mailto:sponsorship@sdissa.org) \nPlease Register via our main Event Calendar Platform:\nhttps://lu.ma/sdissa
URL:https://sdtechscene.org/event/sd-issa-infosec-networking-happy-hour-march/
LOCATION:Coronado Brewing Company San Diego Tasting Room\, 1205 Knoxville St\, San Diego\, CA\, 92110\, United States
CATEGORIES:Conversation,Cybersecurity,Networking
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260326T120000
DTEND;TZID=America/Los_Angeles:20260326T131500
DTSTAMP:20260418T024620
CREATED:20260326T072130Z
LAST-MODIFIED:20260326T072130Z
UID:10017298-1774526400-1774530900@sdtechscene.org
SUMMARY:Collaborative ISACA San Diego & SecurityStudio Academy Coffee Talk: A Look at Hack Space Con 2026: What to Know and Expect
DESCRIPTION:Join ISACA San Diego and SecurityStudio Academy for a special Coffee Talk with Phillip Wylie\, longtime Hack Space Con attendee\, instructor\, and community leader. \nFor the first time in SecurityStudio Academy history\, we be on the road\, delivering a 2-Day Accelerated Information CvCISO Foundations Security Leadership Bootcamp at Hack Space Con at the Kennedy Space Center in Florida. \nAs a participant of every previous Hack Space Con\, Phillip will share what makes this one of the most unique cybersecurity and aerospace‑focused conferences in the country; from hands‑on trainings and hacking villages to the incredible venue at the Kennedy Space Center. Whether you’re a student\, a professional\, or a parent supporting someone entering the field\, you’ll get an inside look at what to expect\, how to prepare\, and why this event has become a must‑attend experience. \nAs always\, this Coffee Talk is free\, open to the public\, and qualifying participants can earn 1 CPE. \nSPEAKER: Phillip Wylie – Chief Security Evangelist/Senior Consultant at Suzu Labs \nPhillip Wylie is a globally recognized offensive security professional and Chief Security Evangelist at Suzu Labs. He co-authored The Pentester Blueprint\, hosts The Phillip Wylie Show\, Simply Offensive\, and CYBR.HAK.CAST is a frequent speaker in the US and internationally. \nVisit Phillip on LinkedIn: https://www.linkedin.com/in/phillipwylie/ \nDETAILS:\nDate: Thursday\, March 26th\nTime: 12:00 – 1:15 p.m.\nLocation: Online via Zoom\nCPE: 1 \nONLINE\nOnline access is available via the chapter’s Zoom account (registration below).\nAttendance capacity is 500
URL:https://sdtechscene.org/event/collaborative-isaca-san-diego-securitystudio-academy-coffee-talk-a-look-at-hack-space-con-2026-what-to-know-and-expect/
LOCATION:Virtual
CATEGORIES:Collaboration,Cybersecurity,Lecture
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260331T220000
DTEND;TZID=America/Los_Angeles:20260401T023000
DTSTAMP:20260418T024620
CREATED:20260330T065538Z
LAST-MODIFIED:20260330T065538Z
UID:10017312-1774994400-1775010600@sdtechscene.org
SUMMARY:(CS)²AI Online™ Symposium: ICS/OT Cybersecurity in the Manufacturing Sector
DESCRIPTION:Register now: https://events.zoom.us/ev/AmMfHwK3X4ldZMXmp0Cz2cJnZkIEUck3-0YUlRrwOJcFfN38eNaW~AqEkrMaoscLWK-LtBdz5alf-KHHX6NTpJ2q8lR3hOkZ191-0EUPcupcvmaVVu7buKlRWQccJa7SMiit3RiEIUpvWjw \nShielding the Shop Floor: ICS/OT Cybersecurity for the Manufacturing Sector\nIn an era where a single line of code can halt a production line across the globe\, resilience isn’t just a goal—it’s a requirement for survival. Join us for an intensive\, high-impact symposium dedicated to the unique challenges of ICS/OT cybersecurity within the manufacturing sector. \nWhy Attend?\nThe integration of IT and OT has opened unprecedented doors for efficiency\, but it has also expanded the attack surface for bad actors. This symposium brings together frontline defenders\, policy experts\, and industry leaders to move beyond theoretical security and into battle-tested resilience. \nSessions\nSafeguarding Manufacturing Business Continuity in the Face of Disaster \n\nThe Strategy: Learn how to architect “fail-functional” systems that maintain core operations even during an active breach.\nThe Focus: Bridging the gap between rapid incident response and long-term recovery to ensure your bottom line remains protected.\nCase Study Estonia: Resilience in the Face of Cyber Warfare\nThe Deep Dive: Analyze the real-world tactics used by one of the world’s most digitally advanced nations to repel nation-state cyber aggression.\nThe Takeaway: Actionable intelligence on how manufacturing hubs can adopt a “Digital Defense” posture modeled after Estonian infrastructure resilience.\n\nPanel discussion: Manufacturing Uptime – Operational Continuity and Resilience in the Face of Emerging Threats \n\nChallenges:\nSupply Chain Intrusions\nAI-Powered Threats\nRansomware tailored to Industrial Environments\nMalware impacting Safety Systems\nStrategies:\nIntegrating IT/OT Strategies & Security\nComplying with ISA/IEC 62443 Standards\nTabletop Exercises and Runbooks\nImplementing Strong IT/OT Segmentation and Zone/Conduit Design\nContinuous Monitoring and Anomaly Detection\n\nSecuring Brownfield Modernizations\, Expansions\, & Greenfield Builds in the Smart Manufacturing Era\nWhat steps can you take to engineer a secure solution for brownfield sites that meets the increased business intelligence demand of the Smart Manufacturing era\nHow can your brownfield experience reasonably advance greenfield project design and implementation?\nWhat are the uplift paths available for brownfields within your resource constraints? \n\nThe Takeaway:\nWe illustrate simple steps to secure Smart Manufacturing-ready sites based on our experience uplifting brownfield sites and through deliberate Secure-by-Design for Operational Technology (SbD4OT) at greenfield sites.\n\nApplying Two Decades of OT Security Compliance to Protect Manufacturing Operations\nRegulatory expectations for cybersecurity and operational resilience are increasing across manufacturing environments. Manufacturers must strengthen OT security in ways that protect uptime\, safety\, and production without adding unnecessary complexity. This session shares practical lessons from 20 years of OT security compliance experience across regulated industrial sectors.\nIn this session\, you will learn how to: \n\nApply proven OT security compliance practices to modern manufacturing environments\nMove from checkbox compliance to proactive\, operationally-aligned security\nUse centralized visibility and near real‑time risk insights to protect distributed industrial assets\n\nDate April 1\, 2026\nLocation All Online\nTarget Audience CISOs\, Plant Managers\, OT Engineers\, and Risk Officers\nEngagement Live “Deep Dive.” Ask the speakers and panelists questions live \n> “In the manufacturing world\, uptime is the only metric that matters. Cybersecurity is no longer an IT expense; it is the insurance policy for your physical output.” \nSecure your Spot!\nDon’t wait for a system alert to start thinking about defense. Join your peers in defining the future of industrial safety. \nRegister now: https://events.zoom.us/ev/AmMfHwK3X4ldZMXmp0Cz2cJnZkIEUck3-0YUlRrwOJcFfN38eNaW~AqEkrMaoscLWK-LtBdz5alf-KHHX6NTpJ2q8lR3hOkZ191-0EUPcupcvmaVVu7buKlRWQccJa7SMiit3RiEIUpvWjw \n——————————————————–\nBecoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [[https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing))\nAll past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [[https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/](https://www.cs2ai.org/)) \nCertificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.[https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)](https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)) \n*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page\, all events are open for direct funding support. \n© Control System Cyber Security Association International 2026
URL:https://sdtechscene.org/event/cs%c2%b2ai-online-symposium-ics-ot-cybersecurity-in-the-manufacturing-sector/
LOCATION:Virtual
CATEGORIES:Cybersecurity,Symposium
END:VEVENT
END:VCALENDAR