@BEERISAC: CPS/ICS Security Podcast Playlist

Follow @BEERISAC: CPS/ICS Security Podcast Playlist
Share on
Copy link to clipboard

A curated playlist of Cyber-Physical Systems and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter if something is missing.

Anton Shipulin / Listen Notes


    • Apr 18, 2026 LATEST EPISODE
    • daily NEW EPISODES
    • 37m AVG DURATION
    • 2,440 EPISODES


    Search for episodes from @BEERISAC: CPS/ICS Security Podcast Playlist with a specific topic:

    Latest episodes from @BEERISAC: CPS/ICS Security Podcast Playlist

    EP 84: Airports as Critical Infrastructure: OT Security and Operational Disruption

    Play Episode Listen Later Apr 18, 2026 37:19


    Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 84: Airports as Critical Infrastructure: OT Security and Operational DisruptionPub date: 2026-04-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAirports illustrate the potential impact of OT attacks that disrupt functionality. Dan Gunter, CEO of Insane Cyber, talks about how industrial environments differ from traditional IT, particularly in their reliance on availability and safety, where disruptions can have significant real-world and financial consequences.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    OT Patching vs IT Patching: What's Commonly Misunderstood

    Play Episode Listen Later Apr 18, 2026 27:35


    Podcast: Industrial Cybersecurity InsiderEpisode: OT Patching vs IT Patching: What's Commonly MisunderstoodPub date: 2026-04-14Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMost cybersecurity teams treat patching like a universal fix. In manufacturing, that assumption can take down a production line, trigger a safety event, or void the warranty on a $2 million piece of equipment.In this episode, Dino Busalachi and Craig Duckworth break down why patching in operational technology environments is a fundamentally different problem than patching enterprise IT — and why closing that gap requires more than just pushing an update.The bottom line: A firewall is not a patching strategy. Neither is hoping your systems are isolated. Organizations that get this right use risk-based prioritization, lab testing, virtual patching, and real collaboration between IT and OT teams.If you are responsible for a plant floor — or for the people who are — this conversation is for you.

    Ferrari ohne Führerschein? Die richtige Reihenfolge zur OT-Sicherheit für CEOs | OT Security Made Simple

    Play Episode Listen Later Apr 17, 2026 25:12


    Podcast: OT Security Made SimpleEpisode: Ferrari ohne Führerschein? Die richtige Reihenfolge zur OT-Sicherheit für CEOs | OT Security Made SimplePub date: 2026-04-14Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationKlaus Mochalski & Erwin Kruschitz (anapur AG) diskutieren den Wert von NIS2. Erfahren Sie, warum Angriffserkennung nicht der erste Schritt ist, wie Sie Compliance-Blindleistung vermeiden und weshalb OT-Security zwingend bei der Geschäftsführung beginnen muss. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an podcast@rhebo.com.  The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Digital Twins in ICS/OT (Arabic)

    Play Episode Listen Later Apr 17, 2026 70:24


    Podcast: ICS Arabia PodcastEpisode: Digital Twins in ICS/OT (Arabic)Pub date: 2026-04-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization

    OT Risk Management That Works: Asset Visibility, Risk Quantification & CISO-Level Strategy

    Play Episode Listen Later Apr 16, 2026 61:16


    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: OT Risk Management That Works: Asset Visibility, Risk Quantification & CISO-Level StrategyPub date: 2026-04-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationYou can't manage risk you can't measure - or even see. In this episode of Protect It All, host Aaron Crow sits down with Nicholas Friedman to explore how organizations can move beyond compliance and build real, measurable cybersecurity programs across IT and OT environments. With experience spanning banking, aerospace, and critical infrastructure, Nicholas shares how risk management principles translate across industries - and why understanding business context is critical to protecting operational systems. This conversation dives into one of the biggest challenges in OT today: asset visibility and risk quantification. From outdated spreadsheets to modern automation, Aaron and Nicholas break down what it actually takes to understand exposure, justify investment, and communicate risk at the board level. You'll learn: Why asset inventory is the foundation of OT security How to move from compliance checklists to real risk reduction The importance of risk quantification for CISOs and executives How to communicate cybersecurity in business and financial terms The role of automation and knowledge transfer in scaling security programs Lessons from banking and aerospace applied to utilities and critical infrastructure Whether you're leading a cybersecurity program, managing OT environments, or presenting to the board, this episode delivers practical strategies to align security with business value and measurable outcomes. Tune in to learn how to turn cybersecurity into a risk-driven, business-aligned strategy - only on Protect It All. Key Moments:  05:14 Understanding business risk basics 08:40 Building effective OT cybersecurity teams 13:26 Challenges with aging IT and OT systems 14:19 Organizing IT and OT assets 18:31 Understanding OT and IT risks 21:53 Evaluating security risks and priorities 25:31 Improving asset deployment and management 29:14 Evaluating and prioritizing risks 31:12 Shifting focus to success plans 35:59 Selling tech that delivers results 37:22 Hands-on approach to cybersecurity 42:39 Challenges with NERC audit processes 44:47 Balancing compliance and security 49:45 Challenges in power utility operations 51:55 AI, OT, and risk management 56:31 Importance of early compliance planning About the guest :  Nicholas Friedman is an enterprise risk and governance leader with 25+ years of experience across Fortune 500 companies and government sectors. He specializes in integrated risk management, compliance, and AI governance - helping organizations build scalable frameworks that align security, risk, and business resilience. How to connect Nicholas Friedman :  Linkedin :  https://www.linkedin.com/in/nicholasfriedman/ Website : https://www.templarshield.com/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    HaHacking Health: Unveiling vulnerabilities in Wearable Medical Devices

    Play Episode Listen Later Apr 16, 2026 58:52


    Podcast: ICS Arabia PodcastEpisode: HaHacking Health: Unveiling vulnerabilities in Wearable Medical DevicesPub date: 2026-04-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode we're joined by Mohammad AlHussan from Kuwait. We dive into the world of wearable medical devices, discussing how attacks like DoS and MITM can target devices such as insulin pumps.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    PLC Scanning: Safe Practice or Security Risk?

    Play Episode Listen Later Apr 14, 2026 72:29


    Podcast: ICS Arabia PodcastEpisode: PLC Scanning: Safe Practice or Security Risk?Pub date: 2026-04-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOn the ICS Arabia Podcast with our guest, Raphael Arakelian, an OT engineer. We discuss his research and project: scanning PLCs from three different vendors (Allen-Bradey, Phoenix contact and Siemens) using various scanning tools to see the impact on them.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Disaster Recovery in OT with Saltanat Mashirova

    Play Episode Listen Later Apr 14, 2026 54:47


    Podcast: ICS Arabia PodcastEpisode: Disaster Recovery in OT with Saltanat MashirovaPub date: 2026-04-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationwe are joined by Saltanat to discuss a vital topic: Disaster Recovery in OT. Saltanat introduced her new framework, designed specifically to help OT companies effectively tackle disasters and incidents. This framework is a important to consider for any OT organization looking to protect its assets and ensure a fast, effective recovery and response process.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    2/4 Análisis de la Fragilidad Digital Industrial

    Play Episode Listen Later Apr 14, 2026 10:53


    Podcast: Casos de Ciberseguridad IndustrialEpisode: 2/4 Análisis de la Fragilidad Digital IndustrialPub date: 2026-04-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEste episodio identifica si la fragilidad digital reside en la tecnología, las personas o el modelo organizativo, cuestionando por qué la automatización y las certificaciones pueden aumentar la vulnerabilidad de un sistema. Finalmente, analiza el peligro de la fragilidad invisible frente a la evidente en la experiencia operativa real.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    009 - OT Cybersecurity in the Maritime Sector

    Play Episode Listen Later Apr 13, 2026 46:09


    Podcast: PodomationEpisode: 009 - OT Cybersecurity in the Maritime SectorPub date: 2026-04-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOperational technology (OT) systems are vital for the control, operation and security of shipboard processes. But in today's threat landscape, is the maritime sector adequately defending against cyber attacks?  PanelistsMorgan Foor, ModeratorMarco Ayala, Director, Technical - Cybersecurity Center of Excellence (CoE), Global Energy, ABS ConsultingSteve Mustard, President and CEO, National Automation, Inc.The podcast and artwork embedded on this page are from ISA - International Society of Automation, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Joe Slowik on Exposed, Internet-Facing OT

    Play Episode Listen Later Apr 12, 2026 24:33


    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Joe Slowik on Exposed, Internet-Facing OTPub date: 2026-04-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoe Slowik, Director of Cybersecurity Alerting Strategy at Dataminr, joins the Nexus Podcast to discuss the alarming trend of lesser-skilled hacktivist groups leveraging operational technlogy (OT) and cyber-physical systems (CPS) in attacks. Many of these exposed devices are easily scannable and accessible online, and attackers are hurdling low barriers to entry such as poor or missing authentication, or insecure, legacy protocols to access assets and either cause disruption or move further into the process or business networks. Often these attacks are carried out without exploits or malware. Subscribe and listen to the Nexus Podcast here. Download Team82's report: "Analyzing CPS Attack Trends"The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Who Actually Owns OT Cybersecurity? Not Who You Think

    Play Episode Listen Later Apr 11, 2026 30:36


    Podcast: Industrial Cybersecurity InsiderEpisode: Who Actually Owns OT Cybersecurity? Not Who You ThinkPub date: 2026-04-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino and Craig break down what they are seeing in real industrial environments as companies begin the OT cybersecurity journey. They outline why most organizations are still in an “unaware to awareness” phase, what creates the “oh wow” moment after the first pilot, and why ownership and execution often falls to plant-floor teams and their OEM and integrator partners.The conversation covers the limits of surface-level visibility, why accurate asset inventory and remote access control are foundational, and how practical constraints like flat networks, legacy switches, warranty concerns, and limited human capital can stall progress.They also share cautionary examples of IT-first security tooling causing operational impact, and they close with a clear message: think globally, act locally, and build a defensible OT program that matches how plants actually run.Chapters:(00:00:00) Why OT vulnerabilities and remote access are the real “kicker”(00:01:00) The market reality: 60% unaware, 30% starting, 10% operationalized(00:03:00) Who owns remediation: IT vs OT and the plant-floor accountability gap(00:05:00) Why “visibility” often stops at Purdue Level 3 and misses Level 2 assets(00:07:00) OEMs, integrators, and why support models matter in OT cybersecurity(00:09:00) Flat networks, north-south traffic, and why you still miss panel-level devices(00:11:00) The human capital problem and why outsourcing is often unavoidable(00:18:00) A real-world warning: EDR in ICS can create massive operational cost(00:20:00) Safety, quality, and cybersecurity: the three things leaders will fund(00:24:00) Change management failures and why monitoring PLC edits mattersLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    100 Episodes of Protect It All: Aaron Crow's Journey Through IT, OT & Cybersecurity

    Play Episode Listen Later Apr 10, 2026 32:20


    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: 100 Episodes of Protect It All: Aaron Crow's Journey Through IT, OT & CybersecurityPub date: 2026-04-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this special milestone episode of Protect It All, host Aaron Crow steps away from the usual format to share his personal journey - from early days working with PLCs at a kitchen table to building a platform that connects and educates cybersecurity professionals around the world. This episode is more than a reflection - it's a story of persistence, curiosity, and community. Aaron walks through the evolution of IT and OT cybersecurity, the lessons learned from decades in the field, and how conversations with experts across 100 episodes have shaped his perspective on what it truly means to “Protect It All.” You'll hear: How Aaron's career in IT and OT began - and what kept him going The biggest lessons learned across 30+ years in cybersecurity What building a podcast taught him about community and leadership How the industry has evolved - and what still hasn't changed Why relationships and shared knowledge matter more than ever What's next for the future of cybersecurity and the podcast Whether you've been listening since episode one or you're just discovering the show, this episode offers inspiration, perspective, and a deeper look behind the mic. Tune in to celebrate 100 episodes and the journey of protecting what matters most - only on Protect It All. Key Moments:  04:12 Early tech projects and hobbies 09:31 First tech job setting up classrooms 11:20 Getting certified in IT 16:49 Early career in power and cybersecurity 18:08 Building a versatile IT team 24:23 Starting the cybersecurity podcast journey 26:28 Feeling recognized in the podcast world 29:22 Getting started in cybersecurity Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    1/1 Contexto de la Fragilidad Digital Industrial

    Play Episode Listen Later Apr 8, 2026 8:00


    Podcast: Casos de Ciberseguridad IndustrialEpisode: 1/1 Contexto de la Fragilidad Digital IndustrialPub date: 2026-04-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio recorre se pone en contexto las vulnerabilidades estructurales en los entornos industriales. Se explora, además, las características exclusivas de los sistemas industriales complejos que los diferencian de cualquier otro entorno operativo.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Phil Englert on Medical Device Cybersecurity

    Play Episode Listen Later Apr 7, 2026 25:46


    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Phil Englert on Medical Device CybersecurityPub date: 2026-04-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPhil Englert, VP, Medical Device Security, Health-ISAC joins to discuss the cybersecurity risks introduced by legacy technology in healthcare and how it impacts patient care and safety. Phil also brings some context and insight into the U.S. Food and Drug Administration's (FDA) updated guidance on cybersecurity requirements for medical devices aimed at manufacturers and premarket product submissions. The guidance proposes stricter secure development processes, software component tracking, and more.Subscribe and listen to the Nexus Podcast here. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    How drones are becoming critical infrastructure for utilities

    Play Episode Listen Later Apr 7, 2026 45:35


    Podcast: Energy Central (LS 29 · TOP 10% what is this?)Episode: How drones are becoming critical infrastructure for utilitiesPub date: 2026-04-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat does the pathway look like from shiny new toy to core operational tool? That's the trajectory drones have seemingly taken in many utility operations, highlighting that the hype was real and the future is now.On this episode of Power Perspectives, host Matt Chester goes behind the scenes with three members of Skydio's utility team to show why drones have graduated from novelty to mission-critical infrastructure. In this conversation, Christina Park (Senior Director, Energy Strategy), Suchet Bargoti (Director of Inspection and Mapping), and Cooper Linn (Senior Product Manager) walk through real-world utility deployments, the field-driven product choices that mattered, and how autonomy is changing inspection workflows.Skydio's case studies highlight how drone deployments have moved from proving concepts to operational scale: the shift to “drones as infrastructure,” the importance of engineers riding along on field missions, and the evolution from broad 3D semantic scans to efficient, asset-based inspection workflows that actually save crews time and prevent outages.Thanks to Skydio for sponsoring this episode. Skydio helps utilities move beyond outdated time based maintenance to smarter, safer and more scalable condition-based maintenance. Powered by autonomous remote operated drones, over 280 utilities trust Skydio. Because with real time aerial data and remote inspection, utilities can spot issues early, reduce forced outages and make confident, efficient, cost effective decisions.Signup for the Energy Central Daily Newsletter: https://energycentral.beehiiv.com/subscribeThe podcast and artwork embedded on this page are from Energy Central, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Interview With Rob Lee On Dragos At 10, OT Threat & Incidents, Ransomware & More

    Play Episode Listen Later Apr 6, 2026 68:04


    Podcast: Unsolicited Response (LS 33 · TOP 5% what is this?)Episode: Interview With Rob Lee On Dragos At 10, OT Threat & Incidents, Ransomware & MorePub date: 2026-04-01Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIt's great to have my friend Rob Lee back on the podcast. Rob and I discuss: 4:00 Dragos at 10 years old, the OT detection market, and will there be another OT market segment valued at over $1B. 24:34 What's new in the 2026 Dragos Year In Review Report. 33:06 The dichotomy between the high level threat identified in reports by Dragos and others and the low level of publicly acknowledged impactful attacks (outside of ransomware). 45:30 Ransomware ... 3300 cases on industrial organizations and is any of it bypassing IT and going after OT? 49:48 Back to the level of incidents, what can Rob and Dale agree on? 1:01:22 Integration of products like Dragos with other OT and IT information sources.The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Wenn Maschinen plötzlich Ausweise brauchen | OT Security Made Simple

    Play Episode Listen Later Apr 5, 2026 26:00


    Podcast: OT Security Made SimpleEpisode: Wenn Maschinen plötzlich Ausweise brauchen | OT Security Made SimplePub date: 2026-03-31Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationKlaus Mochalski und Marcel Fischer (BxC Security) diskutieren den Bedarf an Maschinenidentitäten in der OT. Erfahren Sie, ob Zero Trust in der OT umsetzbar ist und wie automatisiertes Zertifikatsmanagement teure Anlagenstillstände verhindert.Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an podcast@rhebo.com.  The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Iran's Cyber Front: Where Digital and Physical War Converge with Matt Suiche

    Play Episode Listen Later Apr 4, 2026 32:42


    Podcast: National Security Law Today (LS 36 · TOP 2.5% what is this?)Episode: Iran's Cyber Front: Where Digital and Physical War Converge with Matt SuichePub date: 2026-04-01Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAs the conflict with Iran evolves, cyber capabilities are proving just as consequential as traditional military force. This week, Elisa sits down with Matt Suiche, founder of OnDB and a former hacker, to examine how cyber operations shape intelligence gathering, targeting, and real-time decision-making in modern conflict. Together, they explore the vulnerabilities of AI systems, the physical risks to critical infrastructure like data centers and undersea cables, and what these emerging threats reveal about the limits of technology in high-stakes warfare.Matt Suiche is a cybersecurity researcher and founder of OnDB Inc., a data infrastructure startup for the agentic economy.References:NSLT Episode: Elemental Power: Mining, Markets, and the Critical Minerals Challenge with Tommy Beaudreau (Part 1). Feb 18 2025NSLT Episode: Seabed Mining as a National Security Threat: The Laws of the Sea with Matt Dianni (Part 1). Jan. 13 2022NSLT Episode: Profiting from Polarization: The Economics of America's Culture War. Nov. 26 2025The New York Times. "Meta and YouTube Found Negligent in Landmark Social Media Addiction Trial." 25 Mar. 2026The podcast and artwork embedded on this page are from National Security Law Today, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    EP 83: Cybersecurity and Risk in a Decentralized Energy Grid

    Play Episode Listen Later Apr 3, 2026 24:45


    Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 83: Cybersecurity and Risk in a Decentralized Energy GridPub date: 2026-03-31Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe surge in renewables and decentralized power is reshaping grids—and exposing them to new operational and cyber risks. In this episode, Rafael Narezzi, Co-Founder & CEO of Centrii, explains how rising connectivity widens the attack surface, leaving energy infrastructure increasingly vulnerable.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    You Think Your Plant Is Secure. Your Data Says Otherwise.

    Play Episode Listen Later Apr 2, 2026 33:02


    Podcast: Industrial Cybersecurity InsiderEpisode: You Think Your Plant Is Secure. Your Data Says Otherwise.Pub date: 2026-03-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig Duckworth sits down with CIO and Chief Enterprise Architect Shellie D'Angelo to address why so many OT and IT modernization efforts stall out at the foundation.Shellie explains why data governance must come before “another tool,” how inconsistent data quality quietly sabotages reporting and risk decisions, and why leadership transparency is the fastest path to maturity. Craig and Shellie also explore the reality of shadow IT on the plant floor, the growing impact of AI as both a defensive advantage and an attacker accelerator, and the practical steps teams can take to move from reactive chaos to measurable business outcomes.Chapters:(00:00:00) Why honest risk conversations are the starting line(00:01:00) Shellie's background: rebuilding enterprise tech foundations(00:02:00) OT/IT convergence: start with business drivers and data governance(00:05:00) “Tools first” vs business-first security decisions(00:08:00) Knowing what you have before buying more tools(00:11:00) How far along are most organizations, really?(00:15:00) AI as a double-edged sword: defense vs attacker acceleration(00:18:00) Where to start: inventory first vs governance structure(00:22:00) OT tech is often easier prey: PLCs, HMI/SCADA, cameras(00:25:00) Partnering vs going it alone: don't reinvent the wheel(00:26:00) Tech debt and why technology can't be an afterthought(00:29:00) Governance should increase speed, not slow it down(00:30:00) Final advice: “turn chaos into cash” and own your impactLinks And Resources:Shellie D'Angelo on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Episode 63: From Research to Reality - Closing OT Security Blind Spots and Strengthening Defenses

    Play Episode Listen Later Apr 1, 2026 22:23


    Podcast: Digitalization Tech TalksEpisode: Episode 63: From Research to Reality - Closing OT Security Blind Spots and Strengthening DefensesPub date: 2026-03-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn Episode 63, we conclude a two‑part series on cybersecurity by shifting from research insights to real‑world operational experience. Building on the findings from the recently released Intelligence‑Driven Active Defense Report 2026, this episode focuses on what those findings mean on the plant floor. We are joined by Marco Ayala, a long‑time cybersecurity practitioner with extensive experience across the process industries. Marco also serves as President of InfraGard's Houston Chapter and National Sector Chief for Energy, offering a unique perspective at the intersection of industry and critical infrastructure protection. The group explores what OT teams are dealing with day to day, where common cybersecurity blind spots exist, and how IT/OT convergence is creating new challenges. They also examine the current of OT defenses, why gaps persist, and what practical first steps organizations can take to strengthen their cybersecurity posture. The episode wraps up with actionable takeaways aimed at helping listeners better understand today's threat landscape and take meaningful steps toward improving the resilience of their operations. Show Notes:Website: Welcome to InfraGard (https://infragard.fbi.gov/)Website: ISA/IEC 62443 Series of Standards (https://bit.ly/3NUPyfc)Website: ISA/IEC 62443 Cybersecurity Certificate Program (https://bit.ly/4t3ySkx)Website: ABS Industrial and OT Cybersecurity Solutions (https://bit.ly/4bPohTn)Website: Siemens IT/OT Cybersecurity (https://bit.ly/4svqY3z)Video: Increased visibility and security level within the OT (https://bit.ly/3O05AV4)Whitepaper: Intelligence-Driven Active Defense Report 2026 (https://www.siemens.com/en-us/events/s4/)Contact Us:Marco Ayala (marco.ayala@infragardhouston.org and https://www.linkedin.com/in/marco-marc-ayala-a3b26934/)Jonas Norinder (jonas.norinder@siemens.com and linkedin.com/in/jonasnorinder)Don Mack (mack.donald@siemens.com and linkedin.com/in/don-mack)The podcast and artwork embedded on this page are from Siemens, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    OT Cybersecurity That Works: Budgets, Soft Skills & AI Reality for Stronger Defense

    Play Episode Listen Later Mar 31, 2026 51:52


    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: OT Cybersecurity That Works: Budgets, Soft Skills & AI Reality for Stronger DefensePub date: 2026-03-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationStrong OT cybersecurity programs aren't built on tools alone, they're built on strategy, communication, and smart investment. In this episode of Protect It All, host Aaron Crow is joined by cybersecurity expert Don C. Weber for a candid, real-world discussion on what it actually takes to build and sustain effective security programs across IT and OT environments. From CapEx vs OpEx decisions to the growing role of AI in both attack and defense, this conversation cuts through the noise and focuses on what drives real outcomes: understanding business workflows, aligning with leadership, and developing the soft skills needed to turn strategy into action. You'll learn: Why budgeting (CapEx vs OpEx) directly impacts security success The underrated power of soft skills in driving security programs How to connect cybersecurity efforts to business value and operations The role of pen testing and assessments in improving maturity Where AI adds value and where it introduces new risk How training and process understanding strengthen long-term resilience Whether you're building a new security program or scaling an existing one, this episode delivers practical, experience-driven insights to help you make smarter decisions and drive real impact. Tune in to learn how to align strategy, people, and investment for stronger OT cybersecurity only on Protect It All. Key Moments:  05:49 Technical skills and security requirements 09:10 Understanding data workflows 12:29 Building a vulnerability management program 13:26 Understanding organizational decision history 17:44 Budgeting challenges with CAPEX and OPEX 21:36 Steps in a security assessment 24:17 Starting a cybersecurity program 28:02 Prioritizing remote access security 31:21 Discussing AI's impact on cybersecurity 32:55 Using AI in cybersecurity 38:07 AI simplifying complex knowledge 40:35 AI tools making data queries easier 45:02 Detecting and responding faster 46:05 Networking and shared experiences About the guest:  Don C. Weber is a visionary cybersecurity leader who helps defenders safely prove security where it matters most in industrial operations. He is a SANS Principal Instructor, Founder of Cutaway Security, co-author of SANS ICS613: ICS/OT Penetration Testing & Assessments, and he also teaches SANS ICS410: ICS/SCADA Security Essentials to SANS student around the world. He brings years of field work into creating step-by-step labs and planning methods teams can use right away. How to connect Don:  LinkedIn: https://www.linkedin.com/in/cutaway/  Cutaway Security: https://www.linkedin.com/company/cutaway-security-llc  CutSec Github: https://github.com/cutaway-security  CutSec GasPot HMI Lab: https://github.com/cutaway-security/gaspot-hmi-lab  SANS ICS ICS613 ICS/OT Penetration Testing and Assessments: https://www.sans.org/cyber-security-courses/ics-ot-penetration-testing-assessments Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Raphael Arakelian on Operation Grim Beeper

    Play Episode Listen Later Mar 30, 2026 36:42


    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Raphael Arakelian on Operation Grim BeeperPub date: 2026-03-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationRaphael Arkelian, the OT/IOT cybersecurity manager at Accenture, joins the Nexus Podcast to discuss his research into Operation Grim Beeper, the name given to a two-day attack in 2024 in the Middle East where explosives were introduced into pagers and walkie-talkies favored by Hezbollah. The explosions injured more than 1500 and killed dozens. Raphael's research looks at several aspects of this attack and shares lessons and security gaps that can be applied across the OT and supply chain ecosystems. Subscribe and listen to the Nexus Podcast here. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    AI vs. Vulnerabilities: Who Really Wins?

    Play Episode Listen Later Mar 29, 2026 33:56


    Podcast: Exploited: The Cyber Truth Episode: AI vs. Vulnerabilities: Who Really Wins?Pub date: 2026-03-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationArtificial intelligence is transforming cybersecurity but not in the way many expect. While defenders are using AI to accelerate detection, triage, and threat hunting, adversaries are leveraging the same tools to scale reconnaissance, automate exploit development, and dramatically increase the speed of attack. In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Joe Slowik, Director of Cybersecurity Alerting Strategy at Dataminr, to discuss one critical question: Does AI actually reduce vulnerability risk or just accelerate the conflict? With a background including MITRE ATT&CK, Dragos, Los Alamos National Laboratory, and U.S. government offensive operations, Slowik offers a dual-lens perspective on how AI is reshaping both sides of cybersecurity. Together, they explore: How AI is increasing the velocity of vulnerability discovery and exploitationWhy attackers may benefit from “good enough” AI outputs, while defenders require precisionThe rise in CVEs and why more vulnerabilities doesn't necessarily mean worse securityThe growing risk in OT, IoT, and unmanaged edge devicesWhy AI is a powerful tool—not a magic bullet—and what that means for defenders From enterprise security teams to critical infrastructure operators, this episode breaks down what security leaders must understand to stay ahead in an AI-accelerated threat landscape.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    ICIT's Val Moon: Fixing Cybersecurity's Workforce Problem is Essential for National Security

    Play Episode Listen Later Mar 28, 2026 31:02


    Podcast: CYBR.SEC.CAST (LS 25 · TOP 10% what is this?)Episode: ICIT's Val Moon: Fixing Cybersecurity's Workforce Problem is Essential for National SecurityPub date: 2026-03-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, hosts Michael Farnum and Sam Van Ryder sit down with Valerie Moon, Executive Director of the Institute for Critical Infrastructure Technology (ICIT) for a wide-ranging discussion about cybersecurity policy, workforce development, and the growing threats facing critical infrastructure.Things Mentioned:Website for ICIT: https://www.icitech.org/Upcoming CYBR.SEC.Community events: https://www.cybrsecmedia.com/conference/CYBR.SEC.Careers: https://www.linkedin.com/company/cybr-sec-careers/about/ fundraisers:Cards for a Cause: https://www.linkedin.com/posts/cybr-sec-careers_cybrseccareers-nonprofit-cybersecurity-activity-7436794892787359744-v4CzCYBR CLAY SHOOT: https://www.linkedin.com/posts/cybr-sec-careers_cybrclayshoot-cybersecurity-cybercareers-activity-7435353518951084033-1iw9Proceeds support CYBR.SEC.Careers mission is to build a strong, diverse workforce by providing career exposure, access to education and certifications, and mentorship for students and veterans pursuing careers in cybersecurity.Do you have a question for the hosts? Reach out to us at media@cscgroupllc.com Keep up with CYBR.SEC.CON.:LinkedInXFacebookInstagramKeep up with CYBR.SEC.Media:LinkedInXFacebookInstagramCheck out our Conferences and Events:CYBR.SEC.CON.OT.SEC.CON.CYBR.HAK.CON.EXEC.SEC.CON.CSC User GroupSupport CYBR.SEC.Careers Non-Profit EffortsCYBR.SEC.CareersApply to the CYBR.SEC.Careers ScholarshipTaylor Austin Broussard Memorial ScholarshipListen to our other show:CYBR.HAK.CASTThank you to our Media Partners:CYBR.SEC.CON. and OT.SEC.CON. OGGN (Oil & Gas Global Network)UtilSecCYBR.SEC.CON. and CYBR.HAK.CON. BarCode PodcastCyber Distortion PodcastThe podcast and artwork embedded on this page are from CYBR.SEC.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Plot Twist: I Wrote a Book | Kristin King & Securing What Feeds Us

    Play Episode Listen Later Mar 27, 2026 30:40


    Podcast: Bites and Bytes PodcastEpisode: Plot Twist: I Wrote a Book | Kristin King & Securing What Feeds UsPub date: 2026-03-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationShe's back. And she brought a book.After a quieter stretch on the feed, Kristin King returnsto the Bites & Bytes Podcast with a solo episode to announce what she's been building behind the scenes: Securing What Feeds Us: Cybersecurity in Food and Agriculture, published by Wiley and available for pre-order now, with an official release date of September 29, 2026.In this episode, Kristin breaks down what's inside the nearly 500-page book, from precision agriculture and operational technology to aquaculture, agroterrorism, food science innovation, and the human layer that runs through all of it. She makes the case for why food and agriculture deserve the same cybersecurity attention we give to the power grid or financial sector and explains who this book is really for (spoiler: it's anyone who eats).She also talks about where the podcast is headed next andmakes one clear ask of the community that helped get her here.Here are the “Securing What Feeds Us: Cybersecurity in Food and Agriculture” book Pre-Order Links:

    Adm. Michael Rogers on his time as NSA Director

    Play Episode Listen Later Mar 27, 2026 26:57


    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Adm. Michael Rogers on his time as NSA DirectorPub date: 2026-03-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFormer NSA Director and Commander of U.S. Cyber Command Adm. Michael S. Rogers (Ret. USN) joins the Nexus Podcast. Rogers spoke in advance of an RSA Conference panel discussion today with the other living NSA directors, Keith Alexander, Paul Nakasone, and Tim Haugh, a rare time when the four can be in the same room. Rogers describes the principles that guided his time as director of these intelligence agencies, how the role changes as administrations change, and some of the core strategies that led to success. Subscribe and listen to the Nexus Podcast here. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon Chassar

    Play Episode Listen Later Mar 26, 2026 31:06


    Podcast: Industrial Cybersecurity InsiderEpisode: Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon ChassarPub date: 2026-03-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino Busalachi sits down with Simon Chassar, former Chief Revenue Officer at Claroty and current OT cybersecurity advisor and investor, to explore the evolution and future of industrial cybersecurity. Simon shares insights from his decade-long journey in the space, discussing how OT asset visibility has become commoditized and why the industry is experiencing two major shifts: moving right toward threat-led SOC services and perimeter protection, and moving left toward secure-by-design approaches and attack simulation. They dive into the persistent challenge of self-performing versus partnering with specialized integrators, the critical skills shortage commanding 30-40% salary premiums, and why AI is both accelerating security challenges and offering new solutions. Simon reveals how private equity firms are finally prioritizing OT cybersecurity at the board level, discusses the emerging OT SOC landscape, and explains why the traditional IT security budget model is failing operational technology environments. The conversation addresses the disconnect between IT leadership and the OT ecosystem, the proliferation of unmanaged remote access technologies, and the urgent need for manufacturers to engage their trusted system integrators and OEMs as cybersecurity partners before the next major incident occurs.Chapters:(00:00:00) - Meet Simon : From Claroty's Hypergrowth to OT Security's Next Chapter(00:02:00) - The Commoditization of OT Asset Visibility(00:04:00) - Two Major Industry Shifts: Right and Left(00:07:00) - The Self-Performing Problem: Why OT Security Becomes Shelfware(00:10:00) - IT/OT Convergence and the Skills Gap Crisis(00:13:00) - Secure by Design and the AI Leapfrog(00:15:00) - AI Uncovers Hidden OT Vulnerabilities and Risks(00:18:00) - Funding Models and Private Equity's Cybersecurity Awakening(00:22:00) - Why the OT Ecosystem Must Drive Its Own Security Strategy(00:25:00) - M&A Activity and Consolidation in OT Cybersecurity(00:27:00) - The Rise of OT SOCs and MSP PartnershipsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter

    Play Episode Listen Later Mar 25, 2026 32:08


    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises MatterPub date: 2026-03-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCyberattacks don't just test your systems - they test your preparedness. In this episode of Protect It All, host Aaron Crow breaks down key lessons from the Striker attack and what it reveals about today's evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like “living off the land” - blending into normal operations instead of deploying obvious malware. Aaron takes this beyond theory, focusing on what organizations must do before an attack happens. A major theme? Tabletop exercises. Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can't catch. You'll learn: What the Striker attack teaches about modern cyber warfare How living-off-the-land tactics bypass traditional defenses Why tabletop exercises are essential for real-world readiness The role of threat hunting and collaboration across teams How attackers exploit weaknesses in both IT and OT environments Why small, consistent actions can dramatically improve resilience Whether you're defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers practical insights you can apply immediately. Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All. Key Moments:  04:59 "Modern Warfare: Cyber and Beyond" 08:47 "Security Risks of Remote Wipe" 10:31 "Living Off the Land Tactics" 13:11 "Balancing Power and Security" 19:12 "Vulnerabilities Demand Swift Action" 20:21 Prioritize Risk, Justify Investment 25:04 Practice Preparedness Before Crisis 26:48 Weak Links Threaten Cybersecurity Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    3/4 Accionesde Auditoría de seguridad OT

    Play Episode Listen Later Mar 24, 2026 12:59


    Podcast: Casos de Ciberseguridad IndustrialEpisode: 3/4 Accionesde Auditoría de seguridad OTPub date: 2026-03-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se propone un rediseño de las auditorías modernas, planteando el uso de simulación de escenarios y «gemelos de incidentes» como evidencias de confianza. Explica la importancia de integrar la seguridad industrial con la seguridad funcional y la continuidad operativa para gestionar el riesgo sistémico de forma integral.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Michael Pyle on Securing Internet-Facing OT and ICS Assets

    Play Episode Listen Later Mar 23, 2026 24:19


    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Michael Pyle on Securing Internet-Facing OT and ICS AssetsPub date: 2026-03-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMichael Pyle, Director of Product Cybersecurity at Schneider Electric, joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to operational technology and industrial control systems that are insecurely connected to the internet. Attackers are adept at enumerating exposed devices and leveraging OT and ICS to access process and corporate networks. Pyle explains that Internet Exposure Prevention drops inbound traffic that the asset did not initiate. Checks are made on the IP address initiating the connection and whether it's a routable source IP, and an allow/deny decision is made. Pyle explains the risk to exposed devices, and the need to shut down illicit connections. Subscribe and listen to the Nexus Podcast here. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Cyber-Informed Engineering: Moving Beyond the Firewall

    Play Episode Listen Later Mar 22, 2026 43:07


    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Cyber-Informed Engineering: Moving Beyond the FirewallPub date: 2026-03-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFor the last episode of season 5, host Bryson Bort sat down with Andrew Ohrt, Resilience Director at West Yost Associates. A civil engineer specializing in water infrastructure, Andrew bridges the gap between traditional engineering and digital risk. Andrew walks us through the "invisible" nature of water systems, the impact of data centers on utility resilience, and how Cyber-Informed Engineering (CIE) protects our most essential resource. How did a drive under a rebuilt bridge in Minneapolis pivot Andrew's career toward critical infrastructure? Why did a single wastewater release shut down Waikiki Beach for an entire week? And what happens when a cybersecurity team finds a client's PLC exposed on the open internet? “To me, the integration of understanding cyber or digital risk in our critical infrastructure, the engineers picking that understanding up, building awareness, building skill sets, figuring out how to manage that risk, is one of the most important things that we've been working on,” he said. Join us for this and more on this episode of Hack the Plan[e]t.  The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers.  Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Episode 64: Rob Lee

    Play Episode Listen Later Mar 21, 2026 33:14


    Podcast: CYBR.SEC.CAST (LS 25 · TOP 10% what is this?)Episode: Episode 64: Rob LeePub date: 2026-03-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDragos CEO and U.S. National Guard Lt. Col. Rob Lee joins hosts Michael Farnum and Sam Van Ryder to discuss why he returned to military service, the growing cyber threats to critical infrastructure, and the role exercises like Cyber Fortress play in preparing both government and private sector operators for real-world cyber incidents. SHOW NOTES:Things Mentioned:Cyber Fortress 2026: https://va.ng.mil/Cyber-Fortress/Upcoming CYBR.SEC.Community events: https://www.cybrsecmedia.com/conference/CYBR.SEC.Careers: https://www.linkedin.com/company/cybr-sec-careers/about/ fundraisers:Cards for a Cause: https://www.linkedin.com/posts/cybr-sec-careers_cybrseccareers-nonprofit-cybersecurity-activity-7436794892787359744-v4CzCYBR CLAY SHOOT: https://www.linkedin.com/posts/cybr-sec-careers_cybrclayshoot-cybersecurity-cybercareers-activity-7435353518951084033-1iw9Proceeds support CYBR.SEC.Careers mission is to build a strong, diverse workforce by providing career exposure, access to education and certifications, and mentorship for students and veterans pursuing careers in cybersecurity.Episode 64 Timestamps:6:48 – Why Lee returned to military serviceLee explains how calls from government and military leaders prompted him to return to the National Guard to help address unresolved questions around defending operational technology (OT) during conflict.9:33 – Role in the 91st Cyber BrigadeLee describes his position as executive officer and the mission of the Army National Guard's cyber brigade.14:52 – Cyber Fortress exercise explainedLee walks through the origins of Cyber Fortress and how it evolved from a state-level exercise into a broader operational technology training environment.17:53 – How Cyber Fortress worksThe exercise combines training, red-team simulations, and participation from infrastructure operators to practice responding to real OT cyber incidents.20:10 – Cyber conflict and civilian infrastructureLee discusses the growing risk of state actors targeting hospitals, utilities, and other civilian infrastructure.24:23 – Cyber attacks that lead to loss of lifeLee argues the cybersecurity community must acknowledge that cyber operations have already contributed to real-world deaths.27:04 – The role of cyber in modern warfareThe discussion explores how cyber capabilities are increasingly intertwined with traditional military conflict.Do you have a question for the hosts? Reach out to us at media@cscgroupllc.com The podcast and artwork embedded on this page are from CYBR.SEC.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    The Hard Reality of Patch Management in OT Networks | OT Security Made Simple

    Play Episode Listen Later Mar 20, 2026 25:41


    Podcast: OT Security Made SimpleEpisode: The Hard Reality of Patch Management in OT Networks | OT Security Made SimplePub date: 2026-03-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoin Klaus Mochalski and Westermo's CISO Niklas Mörth to explore why OT patch management differs from IT. Discover the challenges of safety, the importance of system baselines, and alternative mitigations like zero trust to keep your critical infrastructure secure.You can find more information on OT Security Made Simple at rhebo.com or send us your ideas, questions, or guest suggestions at podcast@rhebo.com. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    The Connected Plant Floor: What S4X26 Revealed

    Play Episode Listen Later Mar 19, 2026 20:18


    Podcast: Industrial Cybersecurity InsiderEpisode: The Connected Plant Floor: What S4X26 RevealedPub date: 2026-03-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig and Dino recap their experience at S4X26, the leading global OT cybersecurity conference in Miami.They discuss the conference's "connected" theme and how AI is creating an inflection point in industrial cybersecurity, driving unprecedented connectivity between IT and OT environments.The hosts explore the challenges of the "silver tsunami" as experienced engineers retire, how AI-powered tools are being embedded directly into edge devices and industrial products from vendors like Cisco and Fortinet, and why the regulatory landscape in Europe is advancing faster than other regions.They emphasize the importance of connecting with peers and partners in the OT security community, highlight key vendors and technologies showcased at the event, and explain why both IT and OT professionals should attend S4X together to bridge the knowledge gap.The episode concludes with details about next year's expanded conference in Tampa, February 8-11.Chapters:(00:00:00) - Random Encounter with Team USA Hockey in Miami(00:01:00) - S4X26 Conference Kickoff: The "Connected" Theme(00:03:00) - AI as the Inflection Point for OT Connectivity(00:05:00) - AI Embedded in Edge Devices and Vendor Technologies(00:07:00) - First-Time Attendee Experiences and Key Takeaways(00:10:00) - Europe's Cyber Resiliency Act and Regulatory Advancements(00:12:00) - Vendor Presence and the OT Technology Marketplace(00:14:00) - S4X27 Moving to Tampa: February 8-11, 2027(00:16:00) - AI's Role in Addressing the Silver Tsunami(00:18:00) - Final Thoughts: Why IT and OT Teams Should Attend TogetherLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    OT Under Siege: How to Defend Critical Infrastructure From Nation-State Cyber Threats

    Play Episode Listen Later Mar 18, 2026 23:19


    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: OT Under Siege: How to Defend Critical Infrastructure From Nation-State Cyber ThreatsPub date: 2026-03-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationGlobal conflicts are no longer confined to physical battlefields - they're spilling into cyberspace. In this urgent episode of Protect It All, host Aaron Crow breaks down the rising wave of cyber threats targeting critical infrastructure, from energy and water utilities to manufacturing and transportation systems. Drawing on recent global events and real-world incidents, Aaron explores how nation-state actors, hacktivists, and advanced adversaries are increasingly targeting operational technology environments. These attacks often rely on “living off the land” techniques - leveraging existing tools and access inside networks rather than deploying obvious malware. But this episode isn't about panic. It's about practical defense. Aaron outlines the immediate steps OT security teams can take to strengthen resilience - even with limited resources and tight budgets. In this episode, you'll learn: Why global instability increases cyber risk for critical infrastructure How attackers exploit existing tools using living-off-the-land tactics The importance of vigilance, monitoring, and patching in OT environments Why access control and identity management are critical defenses How organizations can improve security posture without massive investments The role of collaboration and awareness in defending essential systems Whether you operate power systems, water facilities, industrial plants, or transportation infrastructure, this episode provides real-world guidance to help you stay ahead of evolving threats. Tune in to learn how OT teams can strengthen defenses and protect the systems society depends on - only on Protect It All. Key Moments: 03:41 "Rising Cyber Threats Amid Tensions" 08:24 Nation-State Cyber Threats Unveiled 11:23 "Advanced Cybersecurity and Monitoring" 14:24 Prioritizing and Addressing Security Risks 17:24 Practical Steps for Cybersecurity Improvements 19:34 "Focus on Resources and Action" Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast   To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    2/4 Análisis de Auditoría de seguridad en OT

    Play Episode Listen Later Mar 17, 2026 14:17


    Podcast: Casos de Ciberseguridad IndustrialEpisode: 2/4 Análisis de Auditoría de seguridad en OTPub date: 2026-03-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se cuestiona si las organizaciones actuales auditan controles teóricos o su capacidad real de resistir incidentes industriales. Se explora la paradoja de las empresas que, a pesar de superar auditorías, siguen siendo frágiles ante amenazas, y se analiza el peso de la cultura de decisión frente a la arquitectura técnica.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Gus Serino on a Massachusetts Water Cybersecurity Collaborative

    Play Episode Listen Later Mar 15, 2026 26:39


    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Gus Serino on a Massachusetts Water Cybersecurity CollaborativePub date: 2026-03-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationGus Serino, President of I&C Secure, joins the Nexus Podcast to discuss the formation and evolution of an ongoing water utility cybersecurity collaborative that leans on a collective defense model to share resources and threat intelligence among six water & wastewater companies in the commonwealth. Serino helped put together this coalition, and he explains how a feasibility study came together resulting in a shared grant that member utilities can use to improve their security programs. Gus talks about the origins of this collaborative and how other utilities can follow this model to improve cybersecurity in this struggling, resource-strapped critical infrastructure sector.Subscribe and listen to the Nexus Podcast here. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Brass Tacks S2E06 – Fighting Cybercrime at Global Scale

    Play Episode Listen Later Mar 15, 2026 27:13


    Podcast: Fortinet Cybersecurity Podcast (LS 26 · TOP 10% what is this?)Episode: Brass Tacks S2E06 – Fighting Cybercrime at Global ScalePub date: 2026-03-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCybercrime runs like a business, fast, scalable, and hard to stop. Jürgen Stock, Former Secretary General INTERPOL, explains how criminal networks work, why basic cyber hygiene still blocks many attacks, and how police, companies, and governments must share data to keep pace as AI speeds crime up. Watch or listen to the episode, and read the blog to understand how cybercrime works at scale. https://www.youtube.com/watch?v=NOLgv_a2w6oThe podcast and artwork embedded on this page are from Fortinet Cybersecurity Podcast, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    The Hidden Cost of Siloed OT Security Tools

    Play Episode Listen Later Mar 14, 2026 25:10


    Podcast: Industrial Cybersecurity InsiderEpisode: The Hidden Cost of Siloed OT Security ToolsPub date: 2026-03-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAs we lookback, Craig and Dino tackle a critical disconnect in industrial cybersecurity: the failure to share OT security tool data with the people who actually need it.They explore why IT teams often purchase and deploy OT IDS platforms without engaging plant floor teams, system integrators, and OEMs who are actively working in manufacturing environments.The conversation reveals that 85% of data collected by these tools is meant for OT teams to act on, yet it rarely reaches them.They discuss the consequences of this siloed approach—including system integrators bringing their own tools to fill the gap—and provide practical advice on achieving true IT/OT convergence.The episode emphasizes the importance of working with partners who can "build the car" rather than just "sell the car," and challenges organizations to evaluate whether they're truly practicing IT/OT convergence or just paying lip service to it.Chapters:(00:00:00) - The Data Sharing Problem in OT Cybersecurity(00:01:00) - Why System Integrators Can't Access Security Tool Data(00:04:00) - Who's Keeping the Data and Why(00:08:00) - The IT/OT Oil and Water Problem(00:11:00) - When System Integrators Bring Their Own Tools(00:14:00) - Questions to Ask Your Cybersecurity Partners(00:17:00) - The Car Analogy: Buyers vs. Builders(00:19:00) - Who Asset Owners Really Trust(00:21:00) - The Three-Legged Stool of OT Security(00:23:00) - The Path to True IT/OT ConvergenceLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    AI Wrote the Code—Who Owns the Risk?

    Play Episode Listen Later Mar 13, 2026 31:34


    Podcast: Exploited: The Cyber Truth Episode: AI Wrote the Code—Who Owns the Risk?Pub date: 2026-03-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and embedded systems expert Jacob Beningo to explore how AI is changing the software development lifecycle for embedded and firmware teams. Together, they unpack the risks and responsibilities that come with AI-generated code. While AI can accelerate development and automate tedious tasks, it can also introduce defects, expand the attack surface, and create a dangerous illusion of completeness. Unlike human engineers, AI cannot explain intent, reason about long-term system behavior, or take accountability when systems fail. Joe and Jacob discuss how engineering teams can safely integrate AI into development workflows without sacrificing security, reliability, or accountability, especially in systems that must operate safely for years in the field. In this episode, they explore: Why AI-generated code can introduce hidden vulnerabilities and complexityThe accountability challenge: who owns the risk when AI writes the code?How AI output should be treated as untrusted code by defaultWhy rigorous testing, validation, and security reviews still matterPractical ways engineering teams can use AI responsibly in embedded development For engineers, security leaders, and product teams navigating AI adoption in embedded systems, this episode offers practical insights into how to move faster with AI without weakening trust in the systems you build.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Poland's Power Grid Cyberattack What It Teaches Us About OT Security and Renewable Energy Risks

    Play Episode Listen Later Mar 12, 2026 34:26


    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: Poland's Power Grid Cyberattack What It Teaches Us About OT Security and Renewable Energy RisksPub date: 2026-03-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat happens when attackers target the systems that keep the lights on? In this episode of Protect It All, host Aaron Crow breaks down the December 2025 cyberattack on Poland's energy infrastructure, where coordinated attackers disrupted wind farms, solar installations, and heat and power plants - impacting nearly half a million people. This real-world incident highlights the growing risks facing distributed energy resources (DER) and modern power grids. As energy systems become more connected and decentralized, the attack surface expands - often faster than security programs can adapt. Aaron walks through what actually went wrong: default passwords, unpatched devices, and weak network segmentation that allowed attackers to brick OT equipment and blind operators to what was happening in their own systems. You'll learn: How attackers targeted renewable energy infrastructure at scale Why edge devices and distributed assets create new vulnerabilities The importance of eliminating default credentials and poor configurations Why network segmentation and secure remote access are essential What grid operators and OT teams must prioritize immediately How lessons from Poland apply to power grids worldwide For engineers, operators, and cybersecurity leaders responsible for critical infrastructure, this episode delivers practical insights on defending modern energy systems before attackers strike again. Tune in to understand what Poland's grid attack reveals about the future of OT security - only on Protect It All. Key Moments:  04:57 "Corrupted Firmware Disables System Control" 10:01 DER Risks and Scaling Threats 10:55 Risks of Expanding Energy Grids 16:30 OT Security Vulnerabilities and Risks 18:34 Prioritize OT Security Systems 23:06 Change Default Passwords Immediately 24:49 "Critical ICS Security Measures" 30:15 "OT Cyber-Physical Response Plan" 32:56 "Critical Security Steps for Resilience" Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast   To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4 The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    1/4 Contexto de Auditoría de seguridad en OT

    Play Episode Listen Later Mar 11, 2026 16:52


    Podcast: Casos de Ciberseguridad IndustrialEpisode: 1/4 Contexto de Auditoría de seguridad en OTPub date: 2026-03-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se aborda la transición necesaria de la auditoría documental clásica a la evaluación del comportamiento real de los sistemas industriales. Analiza los errores críticos al intentar aplicar metodologías IT en plantas de producción y cómo cambiar la perspectiva cuando el activo a proteger no es un servidor, sino el proceso físico que […]The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Dan Ricci on Four Years of the ICS Advisory Project

    Play Episode Listen Later Mar 10, 2026 28:58


    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Dan Ricci on Four Years of the ICS Advisory ProjectPub date: 2026-03-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIndustrial cybersecurity expert Dan Ricci, the founder and maintainer of the ICS Advisory Project, joins the Nexus Podcast to discuss the evolution of the industry's premier ICS and OT security advisory repository as it turns 4 years old. Dan talks about the impact of the project on OT security teams, the dashboards he's created to better parse the volume of data on the site, and unique use cases that asset owners and operators have for this critical information. Subscribe and listen to the Nexus Podcast here. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    EP 82: Kerberos in OT: RC4 Downgrade Attacks

    Play Episode Listen Later Mar 9, 2026 26:42


    Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 82: Kerberos in OT: RC4 Downgrade AttacksPub date: 2026-03-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationKerberos, a decades-old authentication protocol, creates hidden risks in OT environments. Dor Segal, security researcher team lead at Silverfort, discusses delegation abuse, cipher downgrade attacks, and person-in-the-middle threats—highlighting why legacy encryption, patching challenges, and operational constraints make identity security critical in industrial networks.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook

    Play Episode Listen Later Mar 8, 2026 31:38


    Podcast: Industrial Cybersecurity InsiderEpisode: The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity OutlookPub date: 2026-03-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationLuRae Lumpkin, Producer of Industrial Cybersecurity Insider, sits down with industrial cybersecurity expert Dino Busalachi to break down the 2026 World Economic Forum Global Cybersecurity Outlook Report and what it really means for manufacturers. While the report surveyed nearly a thousand CEOs, CIOs, and CISOs, Dino reveals a critical blind spot: industrial control systems and OT environments are being left dangerously exposed. They discuss how AI is becoming a double-edged sword for attackers and defenders, why supply chain vulnerabilities remain unaddressed, the shocking lack of cybersecurity skills on plant floors, and why most companies still aren't conducting incident response exercises. Dino shares real-world insights from working in nearly 2,000 plants over four decades, explaining why IT and OT remain disconnected, how remote access creates massive security gaps, and why outdated equipment with decades-old vulnerabilities sits unpatched in critical manufacturing environments. The conversation reveals that while enterprises focus on IT security, the plant floor—where revenue is actually generated—remains critically vulnerable, with potentially catastrophic consequences for businesses, supply chains, and even national GDP. Chapters: (00:00:00) - Introduction and Overview of WEF 2026 Cybersecurity Report (00:01:00) - Where Cybersecurity Funding Actually Goes: IT vs OT Reality (00:03:00) - The Myth of Disconnected Legacy Equipment (00:05:00) - AI as a Double-Edged Sword in Industrial Environments (00:08:00) - The Vulnerability Crisis: Thousands of Unpatched Systems (00:09:00) - Third-Party and Supply Chain Security Gaps (00:12:00) - Remote Access: The Hidden Attack Vector (00:14:00) - Critical Supplier Dependencies and Decentralized OT (00:15:00) - The Skills Gap: Why Industrial Cybersecurity Expertise is Scarce (00:19:00) - The Shocking Truth About Incident Response Exercises (00:22:00) - Real-World Impact: When Manufacturers Get Hit (00:24:00) - Getting All Stakeholders in the Same Room (00:28:00) - Insurance vs Prevention: The True Cost of Cyber Incidents (00:29:00) - Final Thoughts: Who Should Own OT Cybersecurity? Links And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    NIS-2 kompakt: Was für Unternehmen zählt | OT Security Made Simple

    Play Episode Listen Later Mar 7, 2026 26:45


    Podcast: OT Security Made SimpleEpisode: NIS-2 kompakt: Was für Unternehmen zählt | OT Security Made SimplePub date: 2026-03-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationKlaus Mochalski und Rechtsanwalt sowie Partner Thomas Schmeding (BBH Consulting) klären die wichtigsten Fragen zu NIS-2: Wer ist durch die neuen Schwellenwerte betroffen? Welche Haftungsrisiken kommen auf die Geschäftsleitung zu und wie gelingt die Umsetzung? Ein Pflicht-Update zur Cybersicherheit.Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an podcast@rhebo.com.  The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    IT SOC vs OT SOC How & Why They're Different

    Play Episode Listen Later Mar 6, 2026 26:17


    Podcast: Industrial Cybersecurity InsiderEpisode: IT SOC vs OT SOC How & Why They're DifferentPub date: 2026-02-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig and Dino tackle the critical differences between IT and OT Security Operations Centers, revealing why traditional IT-centric SOCs are failing to protect manufacturing environments.Drawing from real-world examples, including a global beverage company that discovered they were only monitoring one-third of their OT assets, the hosts expose the fundamental disconnect between IT security teams and operational technology environments.They discuss why IT SOCs struggle with OT visibility, the challenges of asset inventory in dynamic manufacturing environments, and the critical importance of localization in security operations.The conversation covers practical barriers like line changeovers, PLC modifications, remote access vulnerabilities, and the need for OT-specific incident response protocols.Craig and Dino emphasize that effective OT security requires IT teams to become embedded in plant operations, working collaboratively with OEMs and system integrators, and understanding the unique operational context of manufacturing assets.This episode is essential listening for CISOs, plant managers, and security professionals trying to bridge the IT-OT security gap.Chapters:(00:00:00) - The Two-Thirds Problem: When Your SOC Can't See Your Plant Floor(00:01:00) - The OT SOC Asset Visibility Problem: A Case Study(00:03:00) - Why IT SOCs Can't Manage OT Assets(00:05:00) - Line Changeovers and Operational Context(00:07:00) - First Responders and Incident Response Challenges(00:10:00) - The WannaCry Response Gap(00:12:00) - Asset Inventory and Baseline Challenges(00:15:00) - Incident Response and Phone Trees(00:17:00) - Organizational Accountability Problems(00:19:00) - Greenfield Opportunities and Standardization(00:22:00) - The IT-OT Collaboration Challenge(00:24:00) - Think Global, Act Local: Embedding IT in PlantsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Safe AI Automation for Cybersecurity: Practical Workflows Without the Risk

    Play Episode Listen Later Mar 5, 2026 15:47


    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: Safe AI Automation for Cybersecurity: Practical Workflows Without the RiskPub date: 2026-03-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAI can accelerate cybersecurity - or accidentally expose it. In this solo episode of Protect It All, host Aaron Crow breaks down how cybersecurity professionals can safely integrate AI into their IT and OT workflows. As tools like ChatGPT, Copilot, and enterprise AI platforms become part of daily operations, the question isn't whether to use AI - it's how to use it responsibly. Aaron moves beyond buzzwords to focus on practical, everyday applications: automating reports, summarizing threat intelligence, drafting policies, enhancing documentation, and streamlining repetitive tasks. At the same time, he tackles the real concerns leaders face - data privacy, compliance, policy alignment, and shadow AI risks. You'll learn: Where AI delivers immediate value in cybersecurity workflows How to automate without exposing proprietary or regulated data The difference between enterprise AI tools and public platforms How to align AI usage with corporate security policies Practical ways CISOs and analysts can boost productivity safely Why governance and awareness matter as much as innovation Whether you're leading a security program or working hands-on in IT or OT environments, this episode delivers actionable strategies to use AI smarter—not riskier. Tune in to learn how to automate with confidence and stay ahead of the curve—only on Protect It All. Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast   To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    4/4 Desenlace de Orquestando de la seguridad OT

    Play Episode Listen Later Mar 4, 2026 11:18


    Podcast: Casos de Ciberseguridad IndustrialEpisode: 4/4 Desenlace de Orquestando de la seguridad OTPub date: 2026-03-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se exploran las capacidades futuras que necesitarán los responsables de ciberseguridad OT para orquestar y no solo reaccionar. Analiza cómo convertir NIS2 e IEC 62443 en motores de madurez y no en una carga. Propone el primer paso realista para avanzar hacia la orquestación de la seguridad OT.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Claim @BEERISAC: CPS/ICS Security Podcast Playlist

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel