Jobs    Everything

Select a Metro Area
Observability at the edge: OpenTelemetry maturity of Kubernetes Ingress

Observability at the edge: OpenTelemetry maturity of Kubernetes Ingress

Platform Engineers Miami
Ingress controllers are the front door to Kubernetes, yet observability at the edge is often overlooked. As ingress-nginx approaches deprecation, platform teams must reassess ingress choices and their OpenTelemetry support. This session introduces a draft OpenTelemetry maturity framework and applies it to popular ingress controllers to reveal strengths, gaps, and trade-offs.

This webinar will explore:

* How to evaluate OpenTelemetry support beyond “does it emit telemetry” using a draft, multi-dimensional maturity framework covering integration surface, semantics, trace modeling, multi-signal correlation, and stability.
* Why ingress observability is critical for platform teams, and how missing or incorrect edge telemetry breaks distributed traces, latency attribution, and root-cause analysis.
* What today’s ingress controllers get right – and wrong through real-world evaluations of widely used controllers, highlighting practical implications for platform design, migration decisions, and future observability architectures.

After a 30-minute talk there’ll be a 15-minute Q&A, for which we encourage you to submit questions in advance.
A webinar recording and related materials will be shared with all attendees after the event.
___________
Speaker:
Kasper Borg Nissen – Principal Developer Advocate @ Dash0

Kasper Borg Nissen is a Principal Developer Advocate at Dash0, former KubeCon+CloudNativeCon Co-Chair, Golden Kubestronaut, and a CNCF Ambassador with deep experience in platform engineering and observability. He focuses on OpenTelemetry, Kubernetes infrastructure, and observability as a platform capability. Kasper is a frequent speaker at KubeCon and CNCF events and is actively involved in shaping OpenTelemetry adoption across the cloud-native ecosystem.

Level Zero OT Cyber Security Conference

Level Zero OT Cyber Security Conference

Miami Cyber Security for Control Systems
Meetup Members get 10% off!
Use code: **LZMEETUP10**
Atlanta, GA April 20 – 22
[www.LevelZeroConference.com](https://levelzeroconference.com/)

## **Attend The Level Zero Conference**

The Level Zero Conference brings experts from across industries together to address the complex challenges of securing operational technology. Our multidisciplinary approach integrates engineering, cyber security, and risk management to safeguard critical infrastructure from level zero to the cloud.

**Level Zero is designed for professionals responsible for the complex task of protecting their critical infrastructure from catastrophic failures.**

**Why Attend Level Zero?**

#### ***Bridge the IT-OT Divide***

Gain insights from both IT and OT perspectives to develop comprehensive security strategies

#### ***Expert-Led Sessions***

Learn from 60+ first hand authorities on OT threats, defenses, and compliance

#### ***Hands-On Experience***

Participate in the ICS Village, tabletop exercises, and interactive workshops

## **Level Zero Delivers.**

IT and OT have traditionally operated in silos, with each team lacking a critical understanding of the other. The Level Zero Conference bridges this divide by bringing together experts from OT and IT – engineering, operations, and cyber security.
Fostering collaboration and cross-disciplinary understanding are both essential for the protection of critical infrastructure. Through the exchange of ideas and expertise, Level Zero empowers professionals from different domains to develop a deeper understanding of both IT and OT environments enabling the creation of infrastructure that is integrated and resilient to evolving threats.n
## **Who Should Attend?**

**Level Zero Conference is for individuals responsible for building, maintaining, and defending ICS/OT environments:**

#### **Engineers**

responsible for addressing cyber threats to physical operations, looking for effective ways to improve the maturity of their security program.

#### **Executives**

managing cyber security budgets and physical operations, wanting to better understand real threats and ways to build a successful cyber security program.

#### **Experts**

wanting to learn from other experts and catch up with each other.n
#### **Practitioners**

needing contact with peers facing similar challenges and wanting to learn from experts.

#### **Compliance managers**

looking to reduce risks and lower costs.

#### **Enterprise security**

responsible for securing physical operations, wanting to get more insights into the threats of the cyber world.
![](https://levelzeroconference.com/wp-content/uploads/2024/10/it-ot-workers-1000×1000.webp)

## **Be Part of Securing Our Critical Infrastructure**

Level Zero Conference is where the future of OT cyber security is shaped. Don’t miss this opportunity to contribute to and learn from the industry’s leading minds.
n#### **Venue**

***

##### Georgia Tech Exhibition Hall

Physical Address (for walking to facility)
460 Fourth St. N.W. Atlanta, GA 30332

Hosted by: Control System Cyber Security Association Internatioal

(CS)²AI Online™ Symposium: ICS/OT Cybersecurity in the Manufacturing Sector

(CS)²AI Online™ Symposium: ICS/OT Cybersecurity in the Manufacturing Sector

Miami Cyber Security for Control Systems
Register now: https://events.zoom.us/ev/AmMfHwK3X4ldZMXmp0Cz2cJnZkIEUck3-0YUlRrwOJcFfN38eNaW\~AqEkrMaoscLWK-LtBdz5alf-KHHX6NTpJ2q8lR3hOkZ191-0EUPcupcvmaVVu7buKlRWQccJa7SMiit3RiEIUpvWjw

## **Shielding the Shop Floor: A Symposium on ICS/OT Cybersecurity**

In an era where a single line of code can halt a production line across the globe, resilience isn’t just a goal—it’s a requirement for survival. Join us for an intensive, high-impact symposium dedicated to the unique challenges of **ICS/OT** cybersecurity within the manufacturing sector.

***

### Why Attend?

The integration of IT and OT has opened unprecedented doors for efficiency, but it has also expanded the attack surface for bad actors. This symposium brings together frontline defenders, policy experts, and industry leaders to move beyond theoretical security and into **battle-tested resilience.**

### Key Sessionsn
* **Safeguarding Manufacturing Business Continuity in the Face of Disaster**
* *The Strategy:* Learn how to architect “fail-functional” systems that maintain core operations even during an active breach.
* *The Focus:* Bridging the gap between rapid incident response and long-term recovery to ensure your bottom line remains protected.
* **Case Study Estonia: Resilience in the Face of Cyber Warfare**
* *The Deep Dive:* Analyze the real-world tactics used by one of the world’s most digitally advanced nations to repel nation-state cyber aggression.
* *The Takeaway:* Actionable intelligence on how manufacturing hubs can adopt a “Digital Defense” posture modeled after Estonian infrastructure resilience.

***

### Event Details

**Date** April 1, 2026
**Location** All Online
**Target Audience** CISOs, Plant Managers, OT Engineers, and Risk Officers
**Engagement** Live “Deep Dive.” Ask the speakers and panelists questions live

> **”In the manufacturing world, uptime is the only metric that matters. Cybersecurity is no longer an IT expense; it is the insurance policy for your physical output.”**

***

### Secure Your Spot

Don’t wait for a system alert to start thinking about defense. Join your peers in defining the future of industrial safety.
**[Download the Full Agenda PDF]**
Would you like me to draft a series of promotional social media posts for LinkedIn and X to go along with this listing?

Register now: https://events.zoom.us/ev/AmMfHwK3X4ldZMXmp0Cz2cJnZkIEUck3-0YUlRrwOJcFfN38eNaW\~AqEkrMaoscLWK-LtBdz5alf-KHHX6NTpJ2q8lR3hOkZ191-0EUPcupcvmaVVu7buKlRWQccJa7SMiit3RiEIUpvWjw

\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-
Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [[[https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)]([https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing))]([https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)]([https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)))
All past seminars and symposiums are available to paid [CS2AI.ORG](http://cs2ai.org/) members. Check out the Resources area of our website in the Members Portal [[[https://www.cs2ai.org/](https://www.cs2ai.org/)]([https://www.cs2ai.org/](https://www.cs2ai.org/))]([https://www.cs2ai.org/](https://www.cs2ai.org/)]([https://www.cs2ai.org/](https://www.cs2ai.org/)))

Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.[[https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)]([https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved))]([https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)]([https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)))

\*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.

© Control System Cyber Security Association International 2026

(CS)²AI Online™ Seminar: Fortifying Critical Functions using CIE

(CS)²AI Online™ Seminar: Fortifying Critical Functions using CIE

Miami Cyber Security for Control Systems
*Register now to save yourself a seat!*
[https://events.zoom.us/ev/Asx3LT4tmNcZqKxjuEAGXIgd_8W2xGdggVtk_pn756NPUSFjyDJc~AljeJbVcVGC6V4p8cLtMEXHRaLjwTyhNaklb8cAg7CHbbolP9KNFwg6Mlj8daDhVg_cgDZqBZaJV-_2D_CJMssAnLg](https://events.zoom.us/ev/Asx3LT4tmNcZqKxjuEAGXIgd_8W2xGdggVtk_pn756NPUSFjyDJc~AljeJbVcVGC6V4p8cLtMEXHRaLjwTyhNaklb8cAg7CHbbolP9KNFwg6Mlj8daDhVg_cgDZqBZaJV-_2D_CJMssAnLg)

# **Design Out the Risk: The Cyber-Informed Engineering (CIE) Masterclass**

**Stop reacting to threats. Start engineering them out of existence.**
In an era where digital threats have physical consequences, traditional “bolt-on” security is no longer enough. We invite you to a session on **Cyber-Informed Engineering (CIE)**—the framework developed to integrate security directly into the engineering design lifecycle. (pre-cursor to a more intensive option at the Level Zero Conference).
This isn’t just a lecture; it’s a toolkit handover. Whether you are managing microgrids, BESS, or complex gas compressor stations, you will walk away with the exact blueprints needed to bridge the gap between the control room and the boardroom.

***

## **The Agenda**

### **Part I: The Paradigm Shift**
n* **Meet the Architects:** Introduction to the team leading the national transition toward CIE.
* **The CIE Core:** What is Cyber-Informed Engineering, and why is it the definitive answer to sophisticated infrastructure attacks?
* **Battle-Tested: The CIE Case Study:** A deep-dive post-mortem into how CIE principles transform vulnerable systems into resilient assets.

### **Part II: Strategic Integration**

* **From Engineering to the Boardroom:** How to connect CIE to **Enterprise Risk Management (ERM)**. Learn the adoption pathways that secure executive buy-in and funding.
* **The Implementation Roadmap:** A guided discussion on applying these frameworks to your current cybersecurity program without reinventing the wheel.

### **Part III: The Specialized Toolkit**

* **Sector-Specific Deep Dives:** Tailored tool demonstrations for:
* **Microgrids & BESS:** Securing the distributed edge.
* **Gas Compressor Stations:** Protecting high-consequence kinetic environments.
* **The Engineering Controls Database:** A tour of the universal tools and general application libraries available to you right now.
* **The Future—CMM for CIE:** An exclusive first look at the upcoming **Capability Maturity Model** to help you measure and scale your organization’s resilience.

***

## **What You’ll Carry Home**

By the end of this session, you won’t just have “information”—you’ll have **capability**:

* **Total Clarity:** A master-level understanding of CIE principles.
* **Day-One Application:** The ability to plug CIE directly into your existing security workflow.
* **The CIE Vault:** Full access to workbooks, tools, and the Engineering Controls Database.
* **Direct Access:** A directory of experts and resources for ongoing implementation support.

To learn all about Cyber Informed Engineering and its application to your ICS evnironment, **register now**:
[https://events.zoom.us/ev/Asx3LT4tmNcZqKxjuEAGXIgd_8W2xGdggVtk_pn756NPUSFjyDJc~AljeJbVcVGC6V4p8cLtMEXHRaLjwTyhNaklb8cAg7CHbbolP9KNFwg6Mlj8daDhVg_cgDZqBZaJV-_2D_CJMssAnLg](https://events.zoom.us/ev/Asx3LT4tmNcZqKxjuEAGXIgd_8W2xGdggVtk_pn756NPUSFjyDJc~AljeJbVcVGC6V4p8cLtMEXHRaLjwTyhNaklb8cAg7CHbbolP9KNFwg6Mlj8daDhVg_cgDZqBZaJV-_2D_CJMssAnLg)

\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-
Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [[[https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)]([https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing))]([https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)]([https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)))
All past seminars and symposiums are available to paid [CS2AI.ORG](http://cs2ai.org/) members. Check out the Resources area of our website in the Members Portal [[[https://www.cs2ai.org/](https://www.cs2ai.org/)]([https://www.cs2ai.org/](https://www.cs2ai.org/))]([https://www.cs2ai.org/](https://www.cs2ai.org/)]([https://www.cs2ai.org/](https://www.cs2ai.org/)))
Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.[[https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)]([https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved))]([https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)]([https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)))
\*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.
© Control System Cyber Security Association International 2026

March 2026 Monthly Meeting

March 2026 Monthly Meeting

South Florida ISSA Chapter
**March South Florida ISSA meeting**, and we’re excited to welcome our featured speaker **Dr. Emilio J. Del Riego, Ed.D**, US CISO & VP of Information Security at **TelevisaUnivision**.
Dr. Del Riego will be sharing insights on **“Managing for Value in the Cybersecurity Organization”** a conversation about how cybersecurity leaders can align security initiatives with business value, strategy, and measurable impact.

Whether you’re a **student, practitioner, leader, or simply passionate about cybersecurity**, this community is for you and we’d love to have you join us.

A special thank you to our **meeting sponsor Fortinet** for supporting the South Florida cybersecurity community.
Looking forward to seeing everyone there!