@BEERISAC: CPS/ICS Security Podcast Playlist

Follow @BEERISAC: CPS/ICS Security Podcast Playlist
Share on
Copy link to clipboard

A curated playlist of Cyber-Physical Systems and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter if something is missing.

Anton Shipulin / Listen Notes


    • Dec 20, 2025 LATEST EPISODE
    • daily NEW EPISODES
    • 37m AVG DURATION
    • 2,305 EPISODES


    Search for episodes from @BEERISAC: CPS/ICS Security Podcast Playlist with a specific topic:

    Latest episodes from @BEERISAC: CPS/ICS Security Podcast Playlist

    AI and the Future of Maritime Cybersecurity

    Play Episode Listen Later Dec 20, 2025 40:57


    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: AI and the Future of Maritime CybersecurityPub date: 2025-12-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Bryson Bort sits down with Gary Kessler, retired cybersecurity professor and co-founder and director of the Maritime Hacking Village. As a maritime cybersecurity researcher, consultant, and practitioner with nearly fifty years of experience, Gary walks us through the ins and outs of cybersecurity at sea, automated identification systems (AIS), and AI's current and future role in maritime operations. What is AIS spoofing, and why is it dangerous? What are the unique challenges posed by cybersecurity at sea? Is the maritime industry ready for artificial intelligence integrations? “AI is going to [present] really incredible opportunities for us moving forward. I think however, it is a tool that is not well understood in general by people who are not specialists. And particularly in the maritime industry, we're going to have to get a lot better at understanding the capabilities and the pitfalls,” Gary said. Join us for this and more on this episode of Hack the Plan[e]t. The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Secure Deployment in OT | 57

    Play Episode Listen Later Dec 20, 2025 62:23


    Podcast: ICS Arabia PodcastEpisode: Secure Deployment in OT | 57Pub date: 2025-12-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoined by Marco (Marc) Ayala on ICS Arabia Podcast

    AI, Governance & Cybersecurity Culture: Why People and Process Still Matter Most

    Play Episode Listen Later Dec 18, 2025 51:45


    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: AI, Governance & Cybersecurity Culture: Why People and Process Still Matter MostPub date: 2025-12-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCybersecurity has evolved from an afterthought to a business-critical responsibility - and AI is accelerating that shift faster than most organizations are ready for. In this episode of Protect It All, host Aaron Crow sits down with Sue McTaggart, a cybersecurity leader with a software development background and more than 15 years of experience driving security transformation. Together, they explore how cybersecurity success today depends less on shiny new tools and more on culture, governance, and fundamentals done right. Sue shares her journey from developer to cybersecurity leader, offering real-world insights into embedding security thinking into everyday work - not bolting it on after something breaks. The conversation tackles the realities of AI adoption, the risks of over-automation, and why human oversight and curiosity remain essential in an increasingly automated world. You'll learn: Why technology alone can't fix cybersecurity problems How to embed a security-first mindset across teams and leadership What AI changes - and what it doesn't - in cybersecurity governance The role of Zero Trust and foundational cyber hygiene Why people, process, and accountability prevent more breaches than tools How generational shifts and curiosity shape the future of cyber careers Whether you're a security leader, technologist, or business decision-maker navigating AI adoption, this episode delivers grounded, practical wisdom for building resilience that lasts. Tune in to learn why strong cybersecurity still starts with people, not platform,s only on Protect It All. Key Moments: 01:12 Cybersecurity Evolution and Insights 03:51 "Cybersecurity Requires Culture Shift" 07:09 "Tech Failures and Curfew Challenges" 10:30 "Prioritizing Security in AI Development" 15:05 Cybersecurity's Role in Everything 19:37 "Everything is Sales" 23:54 Adapting Communication for Audiences 26:26 "Think Ahead, Stay Curious." 28:30 Tinkering and Curiosity Unleashed 31:32 "Gen Z: Redefining Work and Life." 36:17 Governing AI: Benefits and Risks 37:59 AI Needs Human Oversight 42:35 "AI's Role in Cybersecurity." 47:25 "Hackers Exploit Basic Vulnerabilities." About the guest: Sue McTaggart is a passionate educator and cybersecurity professional with a strong background in software development. Her curiosity and desire to raise awareness led her to transition from developing applications primarily in languages like Java in the early 2000s to the field of cybersecurity. Sue is dedicated to empowering others through education and strives to share her knowledge to help others better understand cybersecurity risks and solutions. She is honored and humbled by opportunities to speak about her work and continues to inspire those around her with her commitment to ongoing learning and public awareness. How to connect Sue: https://www.linkedin.com/in/sue-mctaggart-24604158/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast  To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    IT/OT convergence with ISA President Scott Reynolds | 61

    Play Episode Listen Later Dec 17, 2025 54:21


    Podcast: ICS Arabia PodcastEpisode: IT/OT convergence with ISA President Scott Reynolds | 61Pub date: 2025-12-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of the ICS Arabia Podcast, Scott Reynolds, President of the International Society of Automation (ISA), shares his deep insights on bridging IT and OT cybersecurity, emphasizing how collaboration and mutual understanding are key to building secure, resilient, and efficient industrial systems.Scott discusses:

    Rapid Recovery - When Security Fails [The Industrial Security Podcast]

    Play Episode Listen Later Dec 16, 2025 43:41


    Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Rapid Recovery - When Security Fails [The Industrial Security Podcast]Pub date: 2025-12-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe've been hacked. Everything is down. Or more mundane - there was a power surge and 5% of our cyber gear is fried. How do we get back into operation fastest? Stephen Nichols of Acronis joins us to look at rapid recovery of OT systems - from the mundane to the arcane.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Interview with Mohammed AlDabbous (Arabic) | 46

    Play Episode Listen Later Dec 16, 2025 122:27


    Podcast: ICS Arabia PodcastEpisode: Interview with Mohammed AlDabbous (Arabic) | 46Pub date: 2025-12-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoin us for a special live session

    When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems

    Play Episode Listen Later Dec 15, 2025 29:30


    Podcast: Exploited: The Cyber Truth Episode: When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded SystemsPub date: 2025-12-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOpen source accelerates development in embedded systems, but hidden license obligations can quickly create legal and operational risk. In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and Salim Blume, Director of Security Applications, for a look at how copyleft risk emerges and why compliance in embedded products is more challenging than many teams expect. Salim breaks down how restrictive licenses, such as GPL and AGPL, can force the disclosure of proprietary code, interrupt product shipments, or create exposure long after devices are deployed in the field. Joe shares why accurate SBOMs, automated license checks, and enforcing policy at build time are critical to preventing surprises in downstream products. The discussion also touches on the ongoing Vizio case, where the TV manufacturer faces litigation that could compel public release of source code under the GPL, highlighting how open source obligations can surface years after products hit the market. Together, Paul, Joe, and Salim explore: How copyleft obligations can require source-code disclosureWhy embedded environments complicate license complianceReal-world cases where unnoticed GPL dependencies caused major issues, such as Vizio's GPL lawsuit and Cisco's WRT54G router familyThe growing implications of AGPL for SaaS and connected servicesHow build-time SBOMs and automated controls reduce long-term risk Whether you're building connected devices, managing software supply chain compliance, or protecting proprietary IP, this episode offers practical guidance to reduce copyleft risk before it becomes a costly problem.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Building an OT Security Company from Scratch (Arabic) | 52

    Play Episode Listen Later Dec 15, 2025 71:48


    Podcast: ICS Arabia PodcastEpisode: Building an OT Security Company from Scratch (Arabic) | 52Pub date: 2025-12-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, I'm joined by Engineer Ali Laribi, the founder of Fortress Plus, to dive deep into what it takes to build and lead in the OT security space — especially when you're going against the crowd.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    EP 77: Building a Cyber Physical System Device Library

    Play Episode Listen Later Dec 14, 2025 27:29


    Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 77: Building a Cyber Physical System Device LibraryPub date: 2025-12-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDo you really know what's on your network? A lot of OT devices are white labeled, meaning they have a brand name but under the hood they're made by someone else. Sean Tufts, Field CTO for Claroty, explains how his team is using AI to sift through all the available data and build a cyber physical library that starts to add specificity to remediation operations, and improve cyber physical security overallThe podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    OT Risk Management | 55 with Steve Mustard

    Play Episode Listen Later Dec 14, 2025 58:27


    Podcast: ICS Arabia PodcastEpisode: OT Risk Management | 55 with Steve MustardPub date: 2025-12-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization

    How OT Managed Services Are Revolutionizing Industrial Cybersecurity

    Play Episode Listen Later Dec 13, 2025 34:02


    Podcast: Industrial Cybersecurity InsiderEpisode: How OT Managed Services Are Revolutionizing Industrial CybersecurityPub date: 2025-12-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with industrial automation and industrial cybersecurity expert Kevin Kumpf, fresh off the floor of Rockwell Automation Fair 2025. They discuss why OT managed services are finally becoming viable for manufacturing, the critical 80/20 split between people and technology challenges, and how the industry's "silver tsunami" of retiring talent is forcing a reckoning. Kevin shares insights on building unified platforms that can manage everything from 30-year-old paper tape systems to AI-powered smart factories, why IT's "patch now" mentality fails in OT environments, and how the DG 360 platform is delivering true cyber-physical convergence today - not tomorrow. They discuss the reality that most OT cybersecurity tools only discover 30% of plant assets, the importance of human-in-the-loop decision making, and why the OT ecosystem - not IT - must drive the managed services revolution. This is a must-listen for anyone struggling with the complexity of protecting and managing modern manufacturing facilities.Chapters:(00:00:00) - Introduction and Rockwell Automation Fair Recap(00:01:43) - The OT Managed Services Evolution and Rebranding(00:04:15) - The Three-Legged Stool: IT, OT, and OEMs(00:07:32) - Point Solutions vs. Unified Platforms in Manufacturing(00:10:45) - The DG 360 Vision: 360-Degree Plant Visibility(00:14:28) - The Silver Tsunami and Training Challenges(00:18:22) - Alert Fatigue and Actionable Intelligence(00:22:45) - Software Defined Automation and Legacy Systems(00:26:18) - Why OT Must Drive the Cybersecurity Conversation(00:30:35) - Real-Time Demo and Implementation ReadinessLinks And Resources:Kevin Kumpf on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    AI, Human Behavior & Cybersecurity's Future: Cutting Complexity and Strengthening Defense

    Play Episode Listen Later Dec 12, 2025 38:27


    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: AI, Human Behavior & Cybersecurity's Future: Cutting Complexity and Strengthening DefensePub date: 2025-12-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe future of cybersecurity won't be won by tools alone - it will be won by people, process, and smarter use of AI. In this episode of Protect It All, host Aaron Crow sits down with cybersecurity veteran Sharad Rai to explore how IT and OT security teams can reduce complexity, fight alert fatigue, and build stronger defenses through foundational practices and intelligent automation. Sharad brings decades of real-world experience - from early firewall management to leading large-scale security programs at major financial institutions. Together, Aaron and Sharad break down what actually works in cybersecurity today: simplifying policies, understanding user behavior, strengthening basics like patching, and leveraging AI for contextual decision-making. You'll learn: Why human behavior is the root of both risk and resilience How AI can reduce complexity, noise, and alert fatigue What “good vs bad” looks like through an AI-driven, context-aware lens How policy overload cripples organizations - and how to fix it Why OT and IT security still depend on foundational hygiene The rise of browser-based security and Chrome as an endpoint What's coming next: AI-driven phishing, contextual controls, and automated response Whether you're a security leader, practitioner, or just navigating modern cyber challenges, this episode will reshape how you think about defending systems and the people using them. Tune in to discover how AI, clarity, and human-centered design are shaping cybersecurity's next chapter only on Protect It All. Key Moments:  06:21 "Cybersecurity Basics: Know the Layers" 09:49 "Defining Good to Block Bad" 13:03 Alarm Fatigue and Information Overload 14:01 Alarm Tuning and Data Utilization 19:02 RFID Tags and Process Frustration 23:03 Simplifying Cybersecurity for Success 25:18 "AI Optimizing Policy Adjustments" 27:33 "Tech Frustrations Then and Now" 31:46 Cloud Computing Transformed Everyday Work 36:05 Focus on Foundational Basics About the guest :  Sharad Rai is a cybersecurity leader and architect with over 20 years of experience securing some of the world's most complex financial institutions. As Vice President of Security and Architecture at State Street, he leads regulatory-driven initiatives and delivers enterprise-wide cybersecurity programs across cloud, infrastructure, and endpoint platforms. Sharad has held key security roles at Morgan Stanley, BNP Paribas, Jefferies, and Foundation Medicine, with deep expertise in EDR, PAM, SASE, ZTNA, and cloud-native security. He is known for simplifying complexity, reducing risk, and bridging product, engineering, and executive teams. How to connect Sharad: https://www.linkedin.com/in/sharad-rai-cissp-a951a28 Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast  To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made Simple

    Play Episode Listen Later Dec 11, 2025 21:27


    Podcast: OT Security Made SimpleEpisode: Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made SimplePub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJanka Kreißl von der Agentur Dunkelblau spricht über Krisenprävention und Krisenbewältigung bei Cybervorfällen. Sie erläutert aus Erfahrung, was gute Abläufe brauchen und wer von Anfang involviert sein sollte. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an podcast@rhebo.com. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    The Asymmetric Advantage: How Cybersecurity Can Outpace Adversaries

    Play Episode Listen Later Dec 10, 2025 27:18


    Podcast: Exploited: The Cyber Truth Episode: The Asymmetric Advantage: How Cybersecurity Can Outpace AdversariesPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin sits down with RunSafe Founder and CEO Joseph M. Saunders to explore why the future of cyber defense depends on disrupting attacker economics rather than racing to keep up with every new threat. Joe breaks down how organizations can gain an asymmetric advantage by reducing exploitability across entire classes of vulnerabilities, especially persistent memory safety flaws that continue to expose critical systems. He shares why adding lightweight, automated protections at build time is one of the fastest ways to shift the cost curve onto attackers without forcing massive code rewrites or slowing development teams down. Together, Paul and Joe discuss: Why attackers' resource advantage requires a new defensive mindsetThe power of “patchless” protection in embedded and OT environmentsWhy memory safety flaws persist and how to neutralize them at scaleThe risks of AI-generated code and how to prevent silent vulnerabilitiesHow Secure by Design practices improve resilience for critical infrastructure If you're responsible for securing embedded systems, OT assets, or long-lived devices where patch cycles are slow and risk is high, this episode offers a new mindset that gives defenders the upper hand.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Conserva #50 con Jose Ramon Coz (AGENCIA ESPACIAL EUROPEA) - Ciberseguridad y sector aeroespacial

    Play Episode Listen Later Dec 9, 2025 30:56


    Podcast: Conservas Guillén by Trend MicroEpisode: Conserva #50 con Jose Ramon Coz (AGENCIA ESPACIAL EUROPEA) - Ciberseguridad y sector aeroespacialPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn Conservas Guillén abrimos una nueva lata para hablar con José Ramón Coz Fernandez, Director de Auditoría Interna de Ciberseguridad en la Agencia Espacial Europea (European Space Agency - ESA). Hablamos de ciberseguridad en el sector espacial, del sistema Galileo, del sistema EGNOS... Conservaciones de 30 minutos, aproximadamente, en lenguaje entendible y coloquial.The podcast and artwork embedded on this page are from Trend Micro Iberia, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets

    Play Episode Listen Later Dec 9, 2025 38:23


    Podcast: Industrial Cybersecurity InsiderEpisode: Former U.S. Secret Service Special Agent Shares Cyber Criminal SecretsPub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFormer U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail, how ransomware attacks actually cost organizations millions if not billions beyond the ransom payment itself, and why the timeline between compromise and detection has shrunk from months to minutes. He shares jaw-dropping statistics on vulnerability management failures, explains how adversaries are using AI to become exponentially more dangerous, and provides actionable insights for building resilient security programs that protect what matters most to your business. Whether you're defending critical infrastructure or managing security for a manufacturing organization, this conversation offers a rare insider perspective on the evolving threat landscape and what it takes to stay ahead of increasingly sophisticated cyber criminals.Chapters:(00:00:00) - Meet the Ex-Secret Service Agent Who Infiltrated Underground Cyber Criminal Networks(00:03:00) - Inside Operation Carder Kaos: Going Undercover in the Dark Web(00:06:00) - The Real Price Tag: Why Ransomware Costs Go Far Beyond the Ransom(00:11:00) - When Production Lines Go Dark: The Hidden Costs of Manufacturing Downtime(00:14:00) - Reality Check: How Prepared Is Your Organization for a Cyber Attack?(00:17:00) - The AI Arms Race: How Adversaries Are Weaponizing Artificial Intelligence(00:21:00) - 2027 Threat Landscape: What Keeps a Field CISO Up at Night(00:24:00) - Follow the Bitcoin: How Cyber Criminals Launder Billions Through Cryptocurrency(00:31:00) - Why Speed Matters: The Critical Window for Law Enforcement Notification(00:33:00) - The Security Leader's Playbook: Threat Intelligence + Business ContextLinks And Resources:Richard LaTulip on LinkedInRichard's Book: Operation Carder KaosRecorded FutureWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Demystifying ISA/IEC 62443 with Khalid Ansari | 48

    Play Episode Listen Later Dec 8, 2025 72:33


    Podcast: ICS Arabia PodcastEpisode: Demystifying ISA/IEC 62443 with Khalid Ansari | 48Pub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPodcast with Khalid Ansari, an expert in ISA/IEC 62443 and a passionate advocate for OT product certification and standardization.Khalid shared incredible insights from his engineering journey—from instrumentation to working with Yokogawa, Qatalum and FM Approvals—and we dove deep into some of the most pressing topics in OT security, including:

    Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

    Play Episode Listen Later Dec 7, 2025 59:02


    Podcast: Security Weekly Podcast Network (Audio) (LS 47 · TOP 1% what is this?)Episode: Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359Pub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFor OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359The podcast and artwork embedded on this page are from Security Weekly Productions, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Medical Systems: Cybersecurity Challenges Arabic | 38

    Play Episode Listen Later Dec 7, 2025 115:04


    Podcast: ICS Arabia PodcastEpisode: Medical Systems: Cybersecurity Challenges Arabic | 38Pub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMedical Systems Cybersecurity Challenges Arabic with Eng Hussain EssayeghThe podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Inside Cyber Incident Response: Military Lessons, OT Challenges & the Power of Blameless Culture

    Play Episode Listen Later Dec 5, 2025 55:20


    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Inside Cyber Incident Response: Military Lessons, OT Challenges & the Power of Blameless CulturePub date: 2025-12-01Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCyber incidents don't just test your technology - they test your people, your processes, and your culture. In this episode of Protect It All, host Aaron Crow sits down with Daniel Swann, Cyber Incident Commander at Rockwell Automation, to pull back the curtain on what really happens during IT and OT incidents. With decades of experience across the U.S. Air Force, enterprise environments, and industrial operations, Daniel shares lessons learned the hard way - from managing chaos in real time to building a culture where teams can learn without blame. You'll learn: Why documentation and scribe roles can make or break an incident response How blameless postmortems actually strengthen team performance What military-style discipline can teach us about OT and IT incident handling How to run effective tabletop exercises that expose real gaps The human factors - communication, clarity, ownership - that reduce downtime and panic Practical strategies to evolve your incident response plan before the next breach Whether you're developing your first IR playbook or leading seasoned response teams, this episode delivers actionable, real-world insights that help you prepare, respond, and recover with confidence. Tune in for battle-tested wisdom from military operations to industrial control rooms - only on Protect It All. Key Moments:  00:00 "Protect IT/OT Cybersecurity Podcast" 03:30 Cybersecurity: Versatility Is Key 07:52 "Balancing Bureaucracy and Flexibility" 10:20 "Practice Makes Plans Effective" 14:17 "Learning While Doing" 18:44 "Document Key Info in Incidents" 19:46 "Versatile Team Role Importance" 22:45 "Tracking Lessons with Visibility" 28:34 Proactive Reporting Encouraged 29:33 Safe Reporting Prevents Phishing Incidents 32:52 "Bridging IT and OT Safely" 37:15 Team Collaboration Enhances Outcomes 41:00 Military Preparedness and Logistics Planning 42:59 Preparing for Unlikely Scenarios 47:20 AI Threats to OT Systems 48:32 "AI's Impact on Learning and Jobs" About the guest:  Daniel Swann is a seasoned Cyber Incident Commander at Rockwell Automation, bringing 17+ years of IT leadership and nearly a decade of cybersecurity experience. A U.S. Air Force veteran, he has led global cyber operations, responded to major vulnerabilities like Log4J, and driven large-scale improvements in incident response and vulnerability management. Daniel is highly certified, mission-driven, and recognized for building strong, resilient security teams. Links :  Video of Daniel Swann with Kate Vajda, Director of Vulnerability Research and Malware Threat Research, Dragos : https://www.youtube.com/watch?v=4zotgrPk8vI Connect with Daniel on LinkedIn : https://www.linkedin.com/in/j-daniel-swann/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast  To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Hands-On ICS/OT Testbeds | 18

    Play Episode Listen Later Dec 5, 2025 58:00


    Podcast: ICS Arabia PodcastEpisode: Hands-On ICS/OT Testbeds | 18Pub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoin Us Dr. Sridhar Adepu from University of Bristol . as we delve into the Bristol University-developed testbed by The Bristol Cyber Security Group. We'll cover specifications, physical processes, software, cybersecurity, training, and explore the ICS/OT capture the flag (CTF) challenges conducted in this lab. The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    EP 76: Why Security Certs for New Medical Devices Might Just Work

    Play Episode Listen Later Dec 4, 2025 36:50


    Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 76: Why Security Certs for New Medical Devices Might Just WorkPub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDiversity in healthcare devices complicates segmentation, security controls, and zero-trust approaches. New certifications aim to help. Bob Lyle, CRO of Medcrypt, identifies how layered defenses, rigorous cybersecurity requirements for new devices, continuous monitoring, and dark-web credential surveillance can reduce risk.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Engineering OT Security: ISA Standards & Open Source in Action | 62

    Play Episode Listen Later Dec 4, 2025 51:46


    Podcast: ICS Arabia PodcastEpisode: Engineering OT Security: ISA Standards & Open Source in Action | 62Pub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization

    Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You Think

    Play Episode Listen Later Dec 3, 2025 22:46


    Podcast: Industrial Cybersecurity InsiderEpisode: Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You ThinkPub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this eye-opening conversation, Dino and Craig address a critical issue facing manufacturing organizations today: the dangerous gap between perceived and actual cybersecurity preparedness in operational technology (OT) environments.They discuss why many organizations "don't know what they don't know" when it comes to securing industrial control systems, the myth of isolated manufacturing equipment, and why 25% of companies still lack comprehensive OT asset monitoring. Drawing powerful parallels to safety protocols, they explain why cybersecurity must become as ingrained in plant culture as wearing a hard hat on the factory floor.Their bottom line: Back up your beliefs with data, treat every system as if it's connected, and verify, don't just trust, your security posture. In OT cybersecurity, perception isn't reality, and that gap could cost not only millions but also brand perception and even human life.This episode is a must-listen for anyone serious about protecting their industrial environments.Chapters:00:00:00 - Kicking Off: Are You Truly Secure or Just Comfortable?00:01:15 - OT Security Reality Check: Do You Really Know Your Risks?00:01:45 - The Hidden Challenges Holding OT Security Back00:03:15 - Lack of Skilled Resources: The Biggest Barrier to Security00:05:30 - Security Frameworks: Are They Reaching the Plant Floor?00:06:15 - The Dangerous Myth of “Isolated” OT Systems00:07:58 - From Theory to Action: Winning Strategies for OT Security00:12:13 - Leadership's Role in Cybersecurity: Who's Driving the Change?00:19:55 - No More Blind Spots: Key Takeaways for a Secure FutureLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    OT Incident Response Explained | 68

    Play Episode Listen Later Dec 3, 2025 69:54


    Podcast: ICS Arabia PodcastEpisode: OT Incident Response Explained | 68Pub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode

    Realities in the Systems That Produce Our Food with James Slaby

    Play Episode Listen Later Dec 2, 2025 38:41


    Podcast: Bites & Bytes PodcastEpisode: Realities in the Systems That Produce Our Food with James SlabyPub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat does a deep fake phone call scamming your grandma have to do with food manufacturing? More than you think. In this episode of Bites and Bytes Podcast, host Kristin King and James Slaby discuss the operational technology challenges in food production—from legacy systems running Windows XP to ransomware threats when production lines go down. James is Director of OT Solutions GTM at Acronis and brings over 20 years of cybersecurity and industry analyst experience from Forrester Research, HFS Research, and technology companies. The conversation covers why food plants can't update their systems, the growing threat of social engineering and deep fakes, and practical strategies like the family password defense. Topics include: Why food manufacturers still run ancient operating systems Deep fake threats and how to protect yourself Air-gapped systems and OT security challenges Social engineering targeting industrial operations Legacy technology in food production environments Whether you're in food manufacturing, cybersecurity, or just curious about the systems behind your food supply, this episode reveals the realities of keeping production running while managing cyber threats. --------------- Guest Contact Information: James Slaby's LinkedIn Company: Acronis Role: Director of OT Solutions GTM at Acronis --------------- Episode Key Highlights ---------------

    OT Security Posture & Attack Path Analysis | 59

    Play Episode Listen Later Dec 2, 2025 48:00


    Podcast: ICS Arabia PodcastEpisode: OT Security Posture & Attack Path Analysis | 59Pub date: 2025-11-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn our latest episodes, we were joined by Vivek Ponnada, SVP at Frenos and a veteran with nearly 30 years in OT, for a deep dive into the future of industrial cybersecurity.We explored:

    The Future of Cybersecurity Careers: Human Skills, AI Disruption & How to Stand Out Now

    Play Episode Listen Later Dec 1, 2025 56:24


    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: The Future of Cybersecurity Careers: Human Skills, AI Disruption & How to Stand Out NowPub date: 2025-11-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe cybersecurity job market is changing faster than ever - and the skills that mattered five years ago won't carry you into the future. In this episode of Protect It All, host Aaron Crow sits down with Mark Sasson, Managing Partner at Pinpoint Search Group, to break down what the future of cybersecurity careers really looks like. From the rise of AI and automation to the growing importance of human skills, they uncover the new realities facing candidates, hiring managers, and leaders across IT and OT security. You'll learn: Why soft skills, communication, and adaptability are now just as critical as technical expertise How AI is reshaping job searches, resumes, and candidate evaluation The shift between employer-driven and candidate-driven markets What separates standout candidates in today's competitive landscape How startups think about hiring -  and what they won't compromise on Practical steps to future-proof your cybersecurity career starting now Whether you're entering cybersecurity, leveling up your role, or hiring your next team member, this episode delivers real-world, actionable insights to help you stay relevant  - and competitive in an evolving industry. Tune in to learn how to stay ahead in the cybersecurity job market of today and tomorrow  only on Protect It All. Key Moments:  04:14 Recruitment Growth and Funding Trends 06:42 Tangible Value in AI Age 12:18 "Stepping Outside the Comfort Zone" 15:16 "Growth Through Embracing Discomfort" 19:23 "Embracing Growth and New Challenges" 21:01 Balancing Growth and Bold Moves 25:14 "Breaking Into Tech: Sacrifice & Strategy" 27:40 Experience Beats Book Knowledge 32:13 Human Insight Beats AI in Hiring 34:45 AI Recruitment: Potential, Limits, Distinctions 39:37 "Reluctant Growth through Opportunity" 42:47 "AI Tools: Benefits and Downsides" 44:29 "Human-Centered Hiring Over AI" 50:12 "Human Connection Over Technology" 53:23 "Planning Your Next Step" About the guest:  Mark Sasson is the Managing Partner of Pinpoint Search Group, a recruitment firm specializing in helping innovators in emerging markets attract the talent needed to drive maturation, scale, and successful outcomes. In 2014, Mark launched Pinpoint's Cybersecurity practice, where he and his team have successfully completed hundreds of executive and senior-level individual contributor searches for leading Cybersecurity vendors. Building on that success, Mark is now guiding Pinpoint's expansion into the rapidly evolving Space sector. Connect Mark:  Website: https://pinpointsearchgroup.com/ LinkedIn: linkedin.com/in/markjsasson/Learn more about Cybersecurity Vendor M&A + Funding Roundups here : https://pinpointsearchgroup.com/cybersecurity-industry-reports/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast  To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Labshock | 51

    Play Episode Listen Later Dec 1, 2025 59:19


    Podcast: ICS Arabia PodcastEpisode: Labshock | 51Pub date: 2025-11-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationZakhar has given the OT security community something truly special — LabShock, a free and open OT testbed that anyone can use to gain hands-on experience in ICS/OT cybersecurity. No hardware required. No excuses.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    We can't - and shouldn't - fix everything [The Industrial Security Podcast]

    Play Episode Listen Later Nov 30, 2025 54:53


    Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: We can't - and shouldn't - fix everything [The Industrial Security Podcast]Pub date: 2025-11-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe know there are problems in our security systems, but we can't and shouldn't fix everything. What do we fix? Who decides? How do we explain what's reasonable to people who do decide? Kayne McGladrey, CEO In Residence at Hyperproof, joins us to explore risk, communication, and a surprising role for insurance.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Cybersecurity Journalism & OT Security | 43

    Play Episode Listen Later Nov 30, 2025 68:59


    Podcast: ICS Arabia PodcastEpisode: Cybersecurity Journalism & OT Security | 43Pub date: 2025-11-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHow does journalism influence OT security? In this episode, Dr Sulaiman talk to Eduard Kovacs, Managing Editor at SecurityWeek, about the impact of cybersecurity journalism, investigative reporting in OT security, and ethical challenges in covering cybercrime.Eduard Kovacs Twitter: https://x.com/eduardkovacsThe podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Greg Garcia on the Sector Mapping and Risk Toolkit for Healthcare

    Play Episode Listen Later Nov 29, 2025 36:56


    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Greg Garcia on the Sector Mapping and Risk Toolkit for HealthcarePub date: 2025-11-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationGreg Garcia, Executive Director of the Health Sector Coordinating Council Cybersecurity Working Group, joins the Nexus Podcast to discuss the recent publication of the working group's Sector Mapping and Risk Toolkit. The SMART toolkit is a methodology that helps healthcare providers visualize key services that support workflows in the industry and is also used to measure risk appropriately for each of those services.Listen and subscribe to the Nexus Podcast. Get the SMART Toolkit here. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Smarter Vulnerability Management in OT Systems: Building Resilience

    Play Episode Listen Later Nov 29, 2025 28:23


    Podcast: Exploited: The Cyber Truth Episode: Smarter Vulnerability Management in OT Systems: Building ResiliencePub date: 2025-11-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAs OT environments face rising geopolitical tensions, ransomware threats, and aging infrastructure, vulnerability management has never been more complex. In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Stuxnet expert Ralph Langner, Founder and CEO of Langner, Inc. Ralph shares from his decades of firsthand experience defending industrial control systems and explains why traditional CVE-focused vulnerability management falls short in OT. He breaks down the three major categories of OT vulnerabilities—design flaws, feature abuse, and configuration errors—and reveals why competent attackers often ignore CVEs entirely. Joe highlights how memory-based vulnerabilities continue to threaten critical systems and why eliminating entire vulnerability classes can create an asymmetric advantage for defenders. Together, Ralph and Joe explore: Why most OT equipment remains insecure by design and why replacement will take decadesHow features, not bugs, often become the real attack vectorThe growing role of ransomware and IT-side weaknesses in OT compromisesPractical steps OT defenders can take today to incrementally improve resilienceThe value of class-level protections, better architectures, and secure development processes Whether you secure energy infrastructure, manufacturing systems, or mixed IT/OT networks, this episode delivers experience-driven guidance for strengthening cyber-physical resilience.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Is PLC Remote Mode Secure? Mike Holcomb Breaks It Down | 49

    Play Episode Listen Later Nov 29, 2025 70:50


    Podcast: ICS Arabia PodcastEpisode: Is PLC Remote Mode Secure? Mike Holcomb Breaks It Down | 49Pub date: 2025-11-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of ICS Arabia, we sit down with Mike Holcomb, Mike breaks down what Remote Mode really means for PLC security and explains why monitoring PLC mode changes is one of the most overlooked—but critical—aspects of protecting industrial systems.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    J. Assaf Turner Founder & CEO @Maya Security on CxO & regulators' cyber dilemmas not limited to ICS

    Play Episode Listen Later Nov 28, 2025 46:39


    Podcast: ICS Cyber Talks PodcastEpisode: J. Assaf Turner Founder & CEO @Maya Security on CxO & regulators' cyber dilemmas not limited to ICSPub date: 2025-11-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationעֲקַבְיָא בֶּן מַהֲלַלְאֵל אוֹמֵר, הִסְתַּכֵּל בִּשְׁלֹשָׁה דְּבָרִים וְאֵין אַתָּה בָּא לִידֵי עֲבֵרָה. דַּע מֵאַיִן בָּאתָ וּלְאָן אַתָּה הוֹלֵךְ וְלִפְנֵי מִי אַתָּה עָתִיד לִתֵּן דִּין וְחֶשְׁבּוֹן.“ (משנה, מסכת אבות – פרק ג, משנה א) ללא הידיעה אין אפשרות לנהל סיכונים, עצם הידיעה נותנת את האפשרות לקבל החלטות מושכלות החל מהעובד הזוטר ועד ההנהלה והדירקטוריון נחשון פינקו מארח את אסף טורנר מיסד ומנכ"ל מאיה סייבר סקיורטי לשעבר ראש יחידת הסייבר המגזרי במשרד האנרגיה והתשתיות הלאומיות בשיחה על החובה של כול ארגון לבצע סקר סיכונים וסיכוני סייבר בפרט, הצורך בגיבוש שפת סייבר אחידה בין החברה, ספקים ויצרנים והרגולטור והאקו סיסטם האנרגטי מה חשיבות סקר סיכוני הסייבר לארגון קביעת רמות הגנת סייבר לפי חשיבות אזורים ורמות סיכון חשיבות ביצוע סקר נכסים עם או בלי סקר סיכוני סייבר הבחור החדש בשכונה ההיי.איי תיקון 13 וחוק הגנת הפרטיות ועוד "Akavya ben Mahalalel says, "Look at three things, and you will not come to sin. Know from where you came and where you are going, and before whom you are destined to give account." (Mishnah, Ethics of the Fathers – Chapter 3, Mishnah 1) Without knowledge, it is impossible to manage risks; the very act of knowing enables informed decision-making from the lowest employee to management and the board of directors Nachshon Pincu hosts J. Asaf Turner, Founder & CEO of Maya Cyber Security and former head of the Cyber Sector Unit at the Ministry of Energy and National Infrastructure, in a discussion about the obligation of every organization to conduct a risk assessment, particularly regarding cyber risks. They emphasize the need to establish a unified cybersecurity language among the company, suppliers, manufacturers, regulators, and the energy ecosystem The importance of a cybersecurity risk assessment for an organization lies in establishing cybersecurity protection levels based on the significance of areas and associated risk levels The importance of conducting an asset assessment with or without a cybersecurity risk assessment The newcomer in the AI sector Amendment 13 and the Privacy Protection Law And moreThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    S2 E8: The Value of ICS & OT Exercises

    Play Episode Listen Later Nov 28, 2025 23:23


    Podcast: Simply ICS CyberEpisode: S2 E8: The Value of ICS & OT ExercisesPub date: 2025-11-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Simply ICS Cyber, Don and Tom welcome Sam Blaney, retired Chief Warrant Officer (CW3) from the Georgia National Guard and current cybersecurity professor at the University of North Georgia.Sam shares insights from his career building and leading Cyber Protection Team 170, his transition into teaching, and his continued work helping state and local governments strengthen cybersecurity.The conversation digs into Sam's recent experience coaching students at the Department of Energy CyberForce Competition, where the University of North Georgia team defended a simulated offshore drilling platform with both IT and OT components.Sam discusses what made the event realistic, how students approached identity and access management, OT network analysis, and what they learned about preparation, tooling, and industrial control system challenges.The group also explores:- Effective defense preparation for cyber competitions- Building and tuning SIEM tools for constrained environments- The value of exercises like CCDC and CyberShield- How multidisciplinary tabletops improve communication across organizations- The increasing role of AI in attack and defense, including the Anthropic AI-assisted malware research- Concerns about AI-driven automation, skill multiplier effects, and the importance of understanding fundamentalsResources:Sam Blaney: https://www.linkedin.com/in/samblaney65/University of North Georgia: https://ung.edu/DOE CyberForce Program: https://cyberforce.energy.gov/ US CyberCom: https://www.cybercom.mil/National Guard Cyber Defense Team: https://www.nationalguard.mil/Portals/31/Resources/Fact%20Sheets/Cyber%20Defense%20Team%202022.pdfNational Guard CyberShield: https://www.dvidshub.net/feature/CyberShield25Anthropic Malware Write-up: https://www.anthropic.com/news/disrupting-AI-espionage=========================

    From Academia to Cybersecurity Leadership (Arabic) | 42

    Play Episode Listen Later Nov 28, 2025 81:28


    Podcast: ICS Arabia PodcastEpisode: From Academia to Cybersecurity Leadership (Arabic) | 42Pub date: 2025-11-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of ICS Arabia Podcast, I sit down with Dr. Haitham Rashwan, Field CTO at Dell, to discuss his journey from Electrical Engineering to Cybersecurity, his experience as a pen tester at IBM, SecureWorks, and Dell, and his insights on OT SOCs, AI in security, pen testing, and the cybersecurity market. We also debunk the air gap myth and explore how to build a strong cybersecurity program.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    EP 197: Operational Cyber Resilience

    Play Episode Listen Later Nov 27, 2025 43:18


    Podcast: Cyber Risk Management Podcast (LS 35 · TOP 3% what is this?)Episode: EP 197: Operational Cyber ResiliencePub date: 2025-11-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat happens when critical third-party services go down? What do your vendors actually owe you when that happens? Are new regulations going to make a difference? Let's find out with our guest Dan Bowdan, Global Business CISO with Marsh McLennan. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.   "Cyber Incident Reporting for Critical Infrastructure Act” (CIRCIA) episodes:   https://cr-map.com/podcast/161 https://cr-map.com/podcast/162/The podcast and artwork embedded on this page are from Kip Boyle, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    OT Cybersecurity with Abdulrahman AlSafh (Arabic) | 41

    Play Episode Listen Later Nov 27, 2025 121:46


    Podcast: ICS Arabia PodcastEpisode: OT Cybersecurity with Abdulrahman AlSafh (Arabic) | 41Pub date: 2025-11-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationفي هذه الحلقة المميزة من ICS Arabia نستضيف المهندس عبدالرحمن الصفّح، أحد أبرز المتخصصين في أمن الأنظمة الصناعية، ليشاركنا مسيرته المهنية الغنية وتجربته الطويلة في مجال OT Security.يأخذنا ضيفنا في جولة عبر محطات مشواره، من البدايات الأولى وحتى توليه مهام متقدمة في حماية الأنظمة الصناعية، موضحًا كيف تطوّر المجال وما المهارات التي يحتاجها المهندس الراغب في خوض هذا التخصص.كما يناقش المهندس عبدالرحمن أهم التحديات التي تواجه المؤسسات اليوم، مثل تعقيد بيئات ICS، نقص الكفاءات المتخصصة، متطلبات الامتثال المتزايدة، وضغط التحول الرقمي على الأنظمة التشغيلية. ويقدّم نصائح عملية من واقع خبرته للمهنيين والمهندسين الراغبين في التميز في هذا المجال.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    The Silver Tsunami: Manufacturing's Talent and Knowledge Retirement Crisis

    Play Episode Listen Later Nov 27, 2025 31:20


    Podcast: Industrial Cybersecurity InsiderEpisode: The Silver Tsunami: Manufacturing's Talent and Knowledge Retirement CrisisPub date: 2025-11-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this milestone 100th episode, Craig and Dino tackle the critical intersection of workforce retirement and industrial cybersecurity knowledge in manufacturing.They explore how 82% of manufacturing workforce exits are due to retirement, creating a dangerous knowledge vacuum as decades of plant expertise walk out the door. The conversation reveals why traditional IT security tools consistently miss 50-70% of OT assets, the problematic practice of buying equipment that's obsolete before installation, and why plant operators bypass corporate security policies when downtime costs a million dollars per day. Craig and Dino state that the solution isn't just better tools, it's bridging the gap between centralized IT teams and the decentralized OT ecosystem by partnering with the system integrators and OEMs who actually keep plants running. They discuss how manufacturers must choose between multi-million dollar capital investments in modern equipment or implementing proper network segmentation and security around legacy systems.They address the reasons why the next generation of talent won't be attracted to facilities running decades-old technology.Chapters:(00:00:00) - Introduction and Industry Growth Update(00:02:15) - The Silver Tsunami: 82% of Manufacturing Exits Are Retirements(00:05:42) - Why IT Security Tools Miss 50-70% of OT Assets(00:09:18) - The Knowledge Vacuum: What Happens When Experience Walks Out(00:13:05) - Why Plant Operators Bypass Corporate Security Policies(00:16:30) - The Problem with Buying Obsolete Equipment(00:19:45) - Centralized IT vs Decentralized OT: Bridging the Gap(00:23:20) - Building Partnerships with System Integrators and OEMs(00:26:50) - Capital Investment vs Network Segmentation Strategy(00:29:35) - Attracting Next-Gen Talent to Manufacturing EnvironmentsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Cybersicherheit in kommunalen Verwaltungen | OT Security Made Simple

    Play Episode Listen Later Nov 25, 2025 24:28


    Podcast: OT Security Made SimpleEpisode: Cybersicherheit in kommunalen Verwaltungen | OT Security Made SimplePub date: 2025-11-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationProf. Dr. Dennis-Kenji Kipker, Mitgründer des Cyber Intelligence Institute und Berater an allen Fronten, analysiert, warum Cybersicherheit auch mit NIS2 in Deutschland so kompliziert ist, und gibt Einblicke in die Cybersicherheitsrealität in kommunalen Verwaltungen. Der Podcast entstand kurz vor Verabschiedung des NIS2UmsuCG. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an podcast@rhebo.com.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Interview with Sinclair Koelemij | 36

    Play Episode Listen Later Nov 25, 2025 70:48


    Podcast: ICS Arabia PodcastEpisode: Interview with Sinclair Koelemij | 36Pub date: 2025-11-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationSinclair Koelemij is a Cyber-Physical Risk Expert with over 45 years of experience in OT and OT security .Topics Covered in this episode:1️⃣ His story: Why he chose this field and how he started his journey.2️⃣ The history of OT cybersecurity: How the field evolved during his career.3️⃣ Risk assessment in OT: Why it matters and why he specialized in it.4️⃣ His opinion on current OT cybersecurity standards and training courses.5️⃣ His coming book "Deep Defence" .6️⃣ What he's working on now and his thoughts on finding "low-hanging fruit" ICS devices on Shodan.

    Conversations on OT Cybersecurity with Anton Shipullin | 17

    Play Episode Listen Later Nov 25, 2025 54:47


    Podcast: ICS Arabia PodcastEpisode: Conversations on OT Cybersecurity with Anton Shipullin | 17Pub date: 2025-11-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoin Dr Sulaiman Alhasawi for an interesting conversation as he sits down with Anton Shipullin. In this interview, we delve into Anton's extensive experience and invaluable contributions to the community of ICS/OT cybersecurity. From his insights on OT cybersecurity in Russia to Dubai , we explore the multifaceted aspects of his journey.Anton has confounded BEERISAC podcast and RUSCADASEC.com and he has worked with international OT Cybersecurity companies , such as Kaspersky and Nozomi Networks. We touch upon his evangelism efforts, shedding light on how he spreads awareness about the significance of ICS/OT cybersecuritThe podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Solution for the OT Safety Brain Drain

    Play Episode Listen Later Nov 25, 2025 22:58


    Podcast: Today with ISSSourceEpisode: Solution for the OT Safety Brain DrainPub date: 2025-11-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIt's a fact, manufacturing as a whole is losing more and more workers every day. Now add to that the rise in experienced safety professionals getting ready to retire and leave the industry, it is easy to fear that exodus of quality experience. But the key questions are can companies fill the roles? And who or what will take on the safety duties.The podcast and artwork embedded on this page are from Gregory Hale, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Clean Files, Safe Operations: Defending Federal and OT Systems from AI-Driven Threats

    Play Episode Listen Later Nov 24, 2025 26:47


    Podcast: Exploited: The Cyber Truth Episode: Clean Files, Safe Operations: Defending Federal and OT Systems from AI-Driven ThreatsPub date: 2025-11-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAI is fueling both innovation and new attack tactics. In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and Kelly Davis, Senior Solutions Architect at Glasswall, to uncover how AI-powered malware is slipping through traditional detection in federal and defense environments—and what can be done about it. Kelly breaks down how “clean file” strategies are redefining cybersecurity by ensuring only safe, verified content enters critical systems. Joe connects these insights to operational technology (OT), where malicious code can disrupt industrial operations, safety systems, and even national infrastructure. Together, they explore: How AI is changing both attack and defense in cybersecurityWhy detection-based security is too slow—and how AI is widening the gapHow Content Disarm and Reconstruction (CDR) strengthens federal and defense workflowsHow federal agencies can adopt file-level defenses using pilots, boundary controls, and workflow APIsThe parallels between clean files in IT and secure binaries in OT Whether you're defending national assets or securing industrial systems, this episode reveals why prevention—not detection—is the smartest defense in the AI era.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    5 ICS Critical Controls (Arabic) | 40

    Play Episode Listen Later Nov 24, 2025 72:26


    Podcast: ICS Arabia PodcastEpisode: 5 ICS Critical Controls (Arabic) | 40Pub date: 2025-11-14Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationLeen Alhalabi — an electrical engineer turned OT security consultant with experience at Siemens and Dragos . Enjoy !The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    OT Red Team (Arabic) | 39

    Play Episode Listen Later Nov 23, 2025 91:54


    Podcast: ICS Arabia PodcastEpisode: OT Red Team (Arabic) | 39Pub date: 2025-11-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoin us on ICS Arabia Podcast . as we explore OT red teaming with Fawaz Adi, covering hacking, pentesting, methodologies, tools, case studies, and more!The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Cyber Things, EP01: The Unseen World with Kam Chumley-Soltani

    Play Episode Listen Later Nov 23, 2025 26:06


    Podcast: Bad ActorsEpisode: Cyber Things, EP01: The Unseen World with Kam Chumley-SoltaniPub date: 2025-11-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome to Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire that plunges into the hidden world beneath our connected reality. Inspired by Stranger Things, we explore the digital realm's own Upside Down - a space teeming with unseen devices, silent intruders, and invisible threats that quietly impact our everyday lives.In this first episode, we tackle the core challenge of modern defense: seeing the unseen. Rebecca Cradick, VP of Global Communications at Armis, is joined by Kam Chumley-Soltani, Director of OT Solutions Engineering at Armis. They discuss what it truly takes for cybersecurity professionals to achieve full visibility and how early intelligence acts as a crucial barrier, stopping a devastating cyber storm before it breaks through the gate.Tune in now to hear how defenders are fighting back against the digital demons that lurk in the shadows.The podcast and artwork embedded on this page are from Armis, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    How Cybersecurity Impacts Patient Care in Hospitals with Christian Dameff

    Play Episode Listen Later Nov 20, 2025 27:37


    Podcast: To The Point - Cybersecurity (LS 36 · TOP 2.5% what is this?)Episode: How Cybersecurity Impacts Patient Care in Hospitals with Christian DameffPub date: 2025-11-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome to To the Point Cybersecurity podcast, brought to you by Forcepoint! This week, hosts Rachael Lyon and Jonathan Knepher are joined by Dr. Christian Dameff, the nation's very first Medical Director of Cybersecurity at UC San Diego Health. Dr. Dameff brings a unique perspective to the evolving intersection of healthcare, patient safety, and cybersecurity—combining his experience as an emergency physician, clinical informaticist, and self-proclaimed lifelong hacker. In this episode, we dive into the critical challenges faced by healthcare organizations, from bridging the gap between CISOs and clinical staff to the urgent realities of cyberattacks that threaten patient outcomes. Dr. Dameff shares real-world stories and research about the very tangible impact of ransomware on hospitals and patient care, emphasizing the need for interdisciplinary collaboration and evidence-based solutions. Whether you're a cybersecurity professional, a healthcare provider, or just interested in how digital threats are reshaping medicine, this episode promises insights into the balancing act between innovation, security, and saving lives. Hit play, subscribe, and join us as we get to the point—where cybersecurity meets patient care! For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e359The podcast and artwork embedded on this page are from Forcepoint | Global Cybersecurity Leader | Security. Simplified., which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Episodio 315: El Impacto de los Ciberataques a Infraestructuras Críticas

    Play Episode Listen Later Nov 20, 2025 52:41


    Podcast: CiberAfterWork: ciberseguridad en Capital RadioEpisode: Episodio 315: El Impacto de los Ciberataques a Infraestructuras CríticasPub date: 2025-10-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationLos anfitriones e invitados discuten la creciente frecuencia y el impacto de incidentes cibernéticos, particularmente aquellos que afectan a infraestructuras críticas y cadenas de suministro, haciendo referencia a un reciente ataque de ransomware a un proveedor de software de aerolíneas (el software Muse de la empresa Collins Aerospace) que impactó a múltiples aeropuertos europeos, como Dublín, Berlín, Bruselas e Hidrow. También analizan las consecuencias económicas de ciberataques prolongados, utilizando el ejemplo de la producción de Jaguar Land Rover que ha estado paralizada durante semanas, generando pérdidas económicas considerables y elevando la crisis a un asunto de carácter nacional. Una porción significativa de la conversación aborda los nuevos desafíos planteados por la inteligencia artificial (IA), específicamente cómo los deepfakes y las voces clonadas por IA se están utilizando para perpetrar fraude financiero sofisticado y suplantación de identidad. Finalmente, la discusión aborda la necesidad más amplia de mejorar la cultura de ciberseguridad pública y corporativa, lamentando que, a pesar de las crecientes amenazas, la respuesta (ciudadana y política) no va acorde con el verdadero desafío y que el ritmo de cambio es lento. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/The podcast and artwork embedded on this page are from psaneme, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Data Diodes & Remote Access: How Industrial Systems Stay Secure in a Connected World

    Play Episode Listen Later Nov 19, 2025 76:43


    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Data Diodes & Remote Access: How Industrial Systems Stay Secure in a Connected WorldPub date: 2025-11-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCan your plant stay connected and completely secure? In this episode of Protect It All, host Aaron Crow teams up with Lior Frenkel, CEO and co-founder of Waterfall Security, to explore how industries are rethinking OT cybersecurity in the age of ransomware and AI-powered attacks. Together, they break down why traditional firewalls can't fully protect industrial control systems and how unidirectional gateways (data diodes) are redefining safety for everything from nuclear plants to casinos. You'll learn: What data diodes really are and how they physically block inbound attacks. Why “air gaps” are no longer enough for modern connected environments. How remote-access tools like HERA are enabling secure operations. Real-world stories of industries upgrading defenses without losing efficiency. Whether you manage critical infrastructure, handle OT security, or just want to understand how cyber-physical systems stay safe, this episode will give you a new appreciation for data flow, digital risk, and resilience. Tune in to discover the future of secure connectivity - only on Protect It All. Key Moments:  07:46 Balancing Security and Operational Data 16:25 "One-Way Data Flow Explained" 22:19 "Air Gap for Data Transfer" 27:44 Increasing Awareness of Security Threats 32:05 Challenges of Power Plant Management 35:29 Global Risks Require Local Understanding 44:44 "OT Security and Zero Trust" 48:24 "Remote Access vs On-Site Work" 55:48 "HERA: TPM-Powered Remote Access" 58:43 Encrypted Remote Access Streaming 01:05:32 Secure Remote Control for Infrastructure 01:13:00 "Solving Critical Incident Response Gaps"   About the Guest : Lior Frenkel is a globally recognized OT cybersecurity leader and the CEO/co-founder of Waterfall Security Solutions, the company behind the industry-standard Unidirectional Security Gateways protecting critical infrastructure worldwide. With 25+ years of cybersecurity expertise, multiple patents, and leadership roles across Israel's top technology, industrial, and export organizations, Lior is a key voice shaping the future of industrial cyber defense and national cyber strategy.How to connect Lior: Website: https://waterfall-security.com/LinkdIn: https://www.linkedin.com/in/lior-frenkel-91534/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Claim @BEERISAC: CPS/ICS Security Podcast Playlist

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel