Consequence-driven, cyber-informed engineering (CIE) is rapidly becoming a cornerstone of modern cybersecurity practices, especially for critical infrastructure and industrial control systems. To help professionals deepen their understanding and practical application of CIE, the CIE Practitioners Workshop offered a series of insightful sessions led by field experts. Now, these invaluable learning resources are available to you through recorded videos.
This video series provides a comprehensive exploration of CIE principles and their implementation across various domains. The kickoff session, featuring key leaders from the Office of the National Cyber Director, U.S. Department of Homeland Security, CISA, INL, NREL, and CESER, sets the stage by highlighting the importance of CIE in the national cybersecurity landscape.
For those looking to build effective CIE teams, the “Fantasy CIE: Drafting A CIE Dream Team” session is crucial. It delves into identifying essential practitioners, engaging stakeholders, and integrating diverse perspectives to enrich security insights within CIE processes. Understanding how to advocate for CIE within organizations is addressed in “Making the Case for CIE: Getting Execs Onboard.” This session offers strategies for effectively communicating the benefits of CIE to executive leadership and building a compelling business case.
Bridging the gap between cybersecurity and engineering is vital, and the “Engaging Cybersecurity In Engineering: Adding A Consequence-Based Perspective To Cybersecurity” video explores how engineers can effectively communicate engineering consequences to cyber teams. It emphasizes the collaborative role engineers play in shaping a tailored, consequence-based cybersecurity approach. Furthermore, the session on “CIE and Culture” highlights the alignment of CIE with a strong human performance culture, explaining how to cultivate and leverage this culture to bolster cybersecurity efforts.
The practical application of CIE is further explored through sessions like “CIE Alignment with 62443,” which examines the synergy between CIE principles and the ISA 62443 standard for security in automation and industrial control systems. This session provides guidance on integrating CIE into existing 62443 practices. Proactive security measures are addressed in “Addressing Vulnerabilities Early: CIE for Research-Stage Technology.” This video outlines methods for identifying high-impact consequences early in the technology lifecycle, ensuring security considerations are integrated from the research phase onwards.
Finally, “The Devil in the Details – Addressing the Risk and Liability Challenges in Implementing Cyber “Secure-By-Design” Principles Within Engineering Practices” tackles the critical issues engineering firms face when incorporating CIE into risk and liability assessments. It explores aligning secure-by-design concepts with broader risk factors throughout design, procurement, and construction. For those seeking a practical guide, the “CIE Implementation Guide Walkthrough and Q&A Session” offers a detailed walkthrough of the newly developed CIE Implementation Guide, providing valuable insights and answering audience questions.
This video series is an essential resource for anyone seeking to enhance their Cie Learning and implement robust cybersecurity strategies. Explore these sessions to gain expert knowledge and advance your understanding of consequence-driven, cyber-informed engineering.