A curated playlist of Cyber-Physical Systems and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter if something is missing.

Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: Compliance Isn't Security: NERC CIP 15 and the Real Gaps in OT Network MonitoringPub date: 2026-02-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPassing an audit doesn't mean you're secure. In this episode of Protect It All, host Aaron Crow dives into one of the biggest misconceptions in operational technology: the belief that compliance equals protection. Using NERC CIP 15 as a real-world case study, Aaron explores why meeting regulatory requirements is only the starting point - not the finish line. A major focus of this conversation is OT network monitoring, especially the often-overlooked east-west traffic inside your environment. Many organizations monitor perimeter traffic while internal blind spots remain wide open. You'll learn: Why compliance frameworks don't automatically create security The real challenges of implementing NERC CIP 15 at scale Why internal network visibility (east-west monitoring) matters How to establish meaningful baselines in legacy OT environments The difference between audit success and operational resilience Why architecture, tooling, and skilled personnel must work together Whether you're working in utilities, manufacturing, or critical infrastructure, this episode provides practical guidance on how to move beyond checklists and build security programs that truly reduce risk. Tune in to learn how to transform compliance requirements into real operational protection - only on Protect It All. Key Moments: 00:00 OT Security Blind Spots 05:15 "OT Security and Monitoring Challenges" 10:41 Aging Switches and Monitoring Challenges 13:16 OT Protocols and Infrastructure Challenges 15:42 "IT vs OT: Complexity Challenges" 18:03 "Balancing Compliance and Security" 21:57 Securing Critical Infrastructure Spaces Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Casos de Ciberseguridad IndustrialEpisode: 3/4 Acciones de Orquestando de la seguridad OTPub date: 2026-02-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se abordan retos reales de integrar la seguridad OT y los errores más comunes en ese proceso. Aborda cómo la automatización del cumplimiento libera a los equipos para tareas de mayor valor. Explica cómo la remediación basada en esfuerzo e impacto cambia la forma de trabajar de OT y seguridad.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: OT Security Made SimpleEpisode: Warum die Integration von Security Events in Leitwarten entscheidend ist | OT Security Made SimplePub date: 2026-02-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDirk Lüders, Director of Marketing & Sales International bei Jungmann Systemtechnik, spricht mit Host Klaus Mochalski über seine mehrjährigen Erfahrungen als Turnkey-Solution-Anbieter für Leitwarten, welche Vorteile KVM-Systeme bieten und was für Herausforderungen durch verstaubte DOS-Altlasten sowie streng regulierte Maustreiber entstehen. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an podcast@rhebo.com. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 81: Root of Trust: Why Security Now Starts in SiliconPub date: 2026-02-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationRising software complexity in safety-critical industries is forcing cybersecurity requirements on systems previously not thought about before. David Sequino, CEO of OmniTrust (formerly ISS), talks about the need to secure digital certificates on life critical systems like cars and planes and the challenges in doing so.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Industrial Cybersecurity InsiderEpisode: Your OT Cybersecurity Strategy Is Failing: Here's WhyPub date: 2026-02-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino and Craig reunite to tackle the shifts occuring in industrial cybersecurity in 2026.They discuss how OT-focused IDS software companies are shifting away from managed services to partner with systems integrators who understand the plant floor.The conversation explores the challenges manufacturers face—from aging infrastructure spanning decades to flat layer-2 networks that give remote vendors unrestricted access.They emphasize that IT departments cannot effectively manage OT assets they don't own or understand, especially when dealing with equipment older than their cybersecurity staff.The episode covers the pitfalls of penetration testing in live manufacturing environments, the reality of shadow IT versus shadow OT, and why EDR solutions struggle in control system environments.Dino and Craig stress the importance of treating cybersecurity as a marathon rather than a sprint, starting with basic asset inventory and microsegmentation.They call on manufacturing leaders to stop deferring to IT for OT security, attend industry-specific conferences like S4X26, and partner with systems integrators who have deep automation expertise.With threats mounting, the time for action is now—not next quarter.Chapters:(00:00:00) - Welcome & What We've Been Up To(00:00:48) - The Big Shift: Why OT IDS Companies Are Backing Away From Managed Services(00:03:00) - The Shelfware Problem: When Security Tools Sit Unused(00:04:12) - Why Pen Testing Can Be Disruptive (or Dangerous) in Manufacturing Environments(00:05:54) - The Reality of Legacy Infrastructure: Equipment Older Than Your Cybersecurity Team(00:07:43) - Who Can Actually Patch Your Control Systems?(00:09:04) - Supply Chain Vulnerabilities: You're Only as Strong as Your Weakest Link(00:11:01) - The Last Mile Challenge: Asset Inventory, Microsegmentation & Starting Small(00:13:55) - The Shelfware to Tool-Switching Problem: Why Companies Are Reconsidering Their First Choice(00:16:18) - Shadow IT vs. Shadow OT: Who Really Owns Plant Floor Security?(00:19:00) - Why EDR Struggles in Control System Environments(00:21:35) - Time to Step Up: Why Manufacturing Leaders Can't Defer to IT Anymore(00:23:00) - Where to Learn: S4, Automation Fair, and Why You Need to Attend Industry Conferences(00:25:00) - Finding the Right Partner: Systems Integrators Who Speak Automation and Cybersecurity(00:27:00) - Final Thoughts: The Time for Action Is NowLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: OT Cybersecurity That Works: Tabletop Exercises, Critical Controls & Building TrustPub date: 2026-02-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationYou can't secure OT environments with checklists alone - you secure them with trust, clarity, and focused action. In this episode of Protect It All, host Aaron Crow sits down with OT security expert Dean Parsons to unpack what actually improves cybersecurity maturity in manufacturing, water, and wastewater environments. From remote access blind spots to outdated network architecture, they explore the practical gaps many organizations face - and how to fix them without massive budgets. A central theme? Tabletop exercises. Not as a compliance checkbox - but as a powerful tool to build collaboration between IT and OT teams, clarify roles, and stress-test real incident response plans before a crisis hits. You'll learn: Why tabletop exercises accelerate OT maturity The importance of trust between engineers and IT teams How focusing on the SANS 5 Critical Controls drives meaningful progress Why visibility and architecture matter more than shiny tools How to improve OT security without overwhelming teams or budgets The human and process factors that determine response success Whether you're leading OT security, managing critical infrastructure, or trying to bridge IT and engineering teams, this episode delivers practical, experience-backed strategies you can implement immediately. Tune in to learn how to strengthen OT security through people, process, and purposeful action - only on Protect It All. Key Moments: 03:57 "Improved IT-OT Collaboration Tabletops" 08:57 "ICS Security Priorities" 12:16 "Accelerating ICS Cybersecurity Programs" 15:07 Trusted Expertise Builds Credibility 17:28 "Engineering Role in Incident Response" 20:53 "Cybersecurity: Tabletops Gain Traction" 26:34 "Control Systems, Protocol Abuse Insights" 27:51 Secure Architecture Enables Network Visibility 33:07 "Targeted Network Monitoring Essentials" 35:23 Prioritize Critical Assets Strategically 37:50 "Bridging IT and OT Expertise" 41:56 Critical Infrastructure Security Risks 44:30 ICS Leadership and Threat Strategy 48:14 "Power Plant Walkthrough Insights" 52:02 Critical Cyber Asset Management 57:29 "SANS Courses: Essential and Valuable" About the guest : Dean Parsons is a SANS Principal Instructor and the CEO and Principal Consultant of ICS Defense Force. Over the past two decades, Dean has built and led industrial cyber defense programs, conducted incident response and digital forensics in live plants and partnered with operators and engineers to maintain both safety and uptime across major industrial sectors. He helps organizations align investment and policy decisions with operational priorities, developing risk metrics and tabletop exercises that unify operations, engineering, and cybersecurity so organizations in any industrial sector can prioritize and measure what matters. How to connect Dean : https://www.linkedin.com/in/dean-parsons-cybersecurity Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Systems Engineering for Survival: A Physician's Guide to Emergency ManagementPub date: 2026-02-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOur host Bryson Bort welcomes Dr. Natalie Sullivan, Medical Director of the Emergency Response Medical Group and an emergency medicine physician at a D.C. area hospital. Trained in EMS and disaster and operational medicine, Natalie turned her attention to the critical intersection of clinical medicine, patient safety, and cybersecurity resilience after experiencing a prolonged ransomware attack on a major hospital. Dr. Sullivan lays out the disaster preparedness cycle, and the many vectors of risks for hospitals. How does a cyberattack on one hospital lead to increased cardiac arrest mortality at the hospital three blocks away? Why is a generation of "digital native" doctors a hidden vulnerability in an analog emergency? And what happens when a hospital's reliance on these "tightly coupled" systems—like water, power, and the Medical IoT—collapses during a ransomware event?“We are critical infrastructure, but we're deeply, deeply dependent on the surrounding critical infrastructure,” Dr. Sullivan said. Join us for this and more on this episode of Hack the Plan[e]t. The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Casos de Ciberseguridad IndustrialEpisode: 2/4 Análisis de Orquestando de la seguridad OTPub date: 2026-02-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se analiza la diferencia entre mostrar información y facilitar decisiones reales en ciberseguridad OT. Aborda cómo priorizar el riesgo por impacto operativo y de negocio sin generar alarmismo. Explica por qué el exceso de alertas y ruido puede ser más peligroso que la falta de visibilidad.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Today with ISSSourceEpisode: AI Boosts Functional SafetyPub date: 2026-02-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFacing a serious crunch of safety experts leaving the manufacturing industry and not enough coming in to fill the void, and add in a complex and more connected digital environment, the sector could use a technological boost. Artificial intelligence could be the answer.The podcast and artwork embedded on this page are from Gregory Hale, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: CISA's Matthew Rogers on Secure OT Protocol CommunicationPub date: 2026-02-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMatthew Rogers, ICS Cybersecurity Lead at the Cybersecurity Infrastructure and Security Agency (CISA) joins the Nexus Podcast to discuss new guidance published by the agency to help manufacturers and asset owners move toward more secure OT communication protocols. Legacy protocols that contain little to no basic security capabilities are still prevalent in OT environments today. Rogers explains the risk and why manufacturers should begin their journey away from proprietary protocols and toward open standards. According to CISA's guidance, operators want authentication and integrity capabilities to protect process data, but need to understand the value and business impact of doing so. Download CISA's guidance here. Subscribe and listen to the Nexus Podcast here. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Bites and Bytes PodcastEpisode: Danielle Jablanski on Food & Ag, OT Security & Everything in BetweenPub date: 2026-02-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDanielle Jablanski isn't your typical OT security expert… she studied genocide in Rwanda, analyzed future water wars for her master's thesis, and once received a phishing text inviting her to eat grilled crocodile on the beach. Now leading STV's OT cybersecurity consulting program and teaching at both Middlebury Institute and Dallas College, Danielle brings policy depth, technical expertise, and genuine curiosity to oneof the most wide-ranging conversations we've ever had.We chase every rabbit worth chasing, smart greenhouses, vulnerabilities, food monopolies, insects, data integrity risks, geopolitics, and how food travels. Danielle shares lessons from nuclear security, explains why compromised data is scarier than loss of control, and makes the case for why more security pros should care about what ends up on our plates.This is exactly how Kristin and Danielle talk when the mics aren't rolling… except this time they were.---------------Episode Key Highlights00:01:03 — Creative Phishing Texts00:10:27 — How Kristin and Danielle Met00:17:08 — Insects and the Food Chain00:28:05 — Monopolies and Single Points of Failure00:30:32 — Rat Trap Sensors vs. Robot Pickers00:33:46 — Centralization Risk00:44:25 — Data Integrity vs. Loss of Control00:55:30 — Food as Critical Infrastructure01:06:30 — Global Supply Chain and Ports01:15:45 — China, Soybeans, and Soft Power---------------

Podcast: Energy TalksEpisode: #120: Use of Deception Solutions in Energy Sector CybersecurityPub date: 2026-02-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDiscover how digital twins of online infrastructure can be used to fool attackers In this episode of Energy Talks, host Simon Rommer, OT Security Consultant at OMICRON, and his guest. Christoph Kukovic, Chief Information Security Officer at Verbund AG, Austria's leading energy company and one of the largest producers of hydroelectricity in Europe, discuss the critical roles of IT and OT in power systems cybersecurity, focusing on the use of deception solutions. Deception solutions aim to create realistic online environments for attackers. The idea is to challenge them with a digital twin of the online infrastructure so that they attack the deception solution instead of the real infrastructure. Christoph shares his insights with Simon into his personal cybersecurity journey, the challenges faced in implementing innovative cybersecurity measures, and the development of his company's own deception solutions. The conversation delves into the importance of collaboration, the need for realistic simulations, the difference between honeypot and deception solutions, and testing deception solutions in real-world scenarios. Get more information about OT cybersecurity for power grids . We welcome your questions and feedback. Simply send us an email to podcast@omicronenergy.com. Please join us to listen to the next episode of Energy Talks.The podcast and artwork embedded on this page are from OMICRON electronics GmbH, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Exploited: The Cyber Truth Episode: The OT Mistakes Attackers Count On—And How to Fix Them Before They DoPub date: 2026-02-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joseph M. Saunders and OT/ICS security expert Mike Holcomb, founder of UTILSEC, for a candid discussion about the weaknesses attackers exploit inside industrial environments. Mike shares what he repeatedly finds during assessments of large OT and ICS networks: no effective firewall between IT and OT, flat networks with little segmentation, stale Windows domains, shared engineering credentials, exposed HMIs, and OT protocols that will accept commands from any reachable host. He explains how attackers move from IT into OT using familiar enterprise techniques before pivoting into PLCs, RTUs, safety systems, and historians. Joe outlines why secure-by-design practices, higher software quality, and “secure by demand” procurement are critical to long-term resilience—especially as cloud connectivity and AI accelerate modernization in industrial environments. Together, they explore: Why a missing or misconfigured IT/OT firewall remains the most common and dangerous gapHow micro-segmentation and unidirectional architectures reduce blast radiusThe risks of web-enabled HMIs and long-lived legacy systemsWhy monitoring PLC programming traffic and historian queries mattersHow the Cyber Resilience Act is reshaping accountability for OT vendors If you're responsible for industrial operations, plant uptime, or product security, this episode shows how attackers actually move through OT environments—and how to eliminate the mistakes they depend on.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Industrial Cybersecurity InsiderEpisode: Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to ManufacturingPub date: 2026-02-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Dick Wilkinson, CTO and co-founder of Proof Labs, to explore the intersection of space technology and industrial cybersecurity.Dick shares his 20-year journey in the U.S. Army with the National Security Agency, transitioning from signals intelligence to becoming a CISO for critical infrastructure organizations, including New Mexico's Supreme Court and the Albuquerque water authority.The conversation dives deep into the challenges of securing satellite systems with onboard intrusion detection and the persistent gap between IT and OT security teams. We also explore why the "castle wall" perimeter security model is dangerously outdated.Dick reveals how AI is lowering the barrier to entry for both attackers and defenders, and discusses the real-world applications of satellite communications in oil and gas operations.He also introduces a revolutionary physical layer-one air gap device called Goldilock Secure, which could transform how we protect remote industrial assets.This episode is essential listening for CISOs, CTOs, and security leaders looking to understand emerging threats in space-based infrastructure and practical solutions for securing distributed industrial environments.Chapters:(00:00:00) - Dick's Journey: From NSA to Space Cybersecurity(00:04:32) - What is Proof Labs and Why Space Security Matters(00:08:15) - Satellites as OT Assets: Oil, Gas, and Critical Infrastructure(00:12:47) - How Onboard Intrusion Detection Works in Spacecraft(00:16:23) - The Castle Wall Problem: Moving Beyond Perimeter Security(00:19:41) - IT vs OT: Bridging the Gap in Manufacturing Cybersecurity(00:24:18) - AI's Impact: Lowering the Barrier for Attackers and Defenders(00:27:35) - The Visibility Challenge: Why Most Plants Don't Know Their Assets(00:30:12) - Goldilock Firebreak: A Physical Air Gap Device That Changes Everything(00:35:20) - Real-World Applications for Remote Industrial Asset ProtectionLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Dick Wilkinson on LinkedInProof Labs WebsiteIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: Pen Testing Reality Check: Why Cybersecurity Fundamentals Still Matter More Than AIPub date: 2026-02-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationShiny tools don't break attackers in basic mistakes. In Episode 92 of Protect It All, host Aaron Crow sits down with Corey LeBleu, founder of Relix Security and seasoned penetration tester, for a candid look at what actually causes organizations to get compromised and why fundamentals still matter more than the latest security trends. Drawing from years of red-team and penetration-testing experience, Corey shares real stories from the field: forgotten printers, unmanaged IoT devices, legacy systems no one owns anymore, and misconfigurations hiding in plain sight. Together, Aaron and Corey unpack why asset visibility, patching, and change management continue to be the weakest links - even as AI and automation enter the security conversation. You'll learn: Why old printers, IoT devices, and “temporary” systems are prime attack paths What most organizations misunderstand about pen testing and red teaming How poor asset inventory and change management undermine security programs The real risks behind shadow IT and unmanaged tools Where AI helps in pen testing and where experience still wins Why mastering the basics beats chasing new security gadgets every time Whether you're a security professional, IT leader, or someone looking to break into cybersecurity, this episode delivers practical, no-nonsense lessons from the front lines - focused on what actually reduces risk. Tune in to hear why cybersecurity success still starts with the fundamentals - only on Protect It All. Key Moments: 03:57 Critical Infrastructure: Finding Vulnerabilities 06:44 "Cyber Risks from Hidden Devices" 11:25 Cybersecurity: Focus on Basics 16:09 Complex Systems Demand Continuous Testing 18:17 Understanding Complex System Security 22:54 "Testing: External vs. Internal" 24:12 Enterprise Challenges with AI Integration 27:40 AI Lowers Barriers for Hacking About the guest : Corey LeBleu has built a career around application security testing, becoming deeply involved in integrating vulnerability assessments throughout the software testing lifecycle. Noticing shifts in industry practices, Corey observed major international financial institutions moving to routinely pentest every application- even legacy IBM systems - leading the way in robust cybersecurity practices. In contrast, Corey also highlights the challenges faced by manufacturing, where operational technology often suffers from outdated, vulnerable systems. Corey's experience showcases the evolving landscape of application security, emphasizing the need for continuous testing and vigilance across diverse industries. How to connect Corey : https://www.linkedin.com/in/coreylebleu/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Casos de Ciberseguridad IndustrialEpisode: 1/4 Contexto de Orquestando la seguridad OTPub date: 2026-02-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se aborda el paso de la detección a la orquestación como principal reto de la seguridad OT. Se analiza cómo se puede perder el control del riesgo pese a tener muchas herramientas de seguridad. Destaca que en entornos IT/OT/IoT la complejidad organizativa suele ser la más subestimada.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: ICS Cyber Talks PodcastEpisode: Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO viewPub date: 2026-02-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationניהול סייבר הוא הרבה דברים שהם מעבר להגנה, היכולת לעבוד מול כלל הגורמים בחברה ממשתמשי הקצה בנושא מודעות סייבר, דרך יצירת מרחב עבודה ושיתוף פעולה של גורמי מקצוע האחרים כגון: ניהול סיכונים, המחלקה המשפטית, מערכות המידע והרשימה עוד ארוכה. כול זה עוד לפני הצורך לתת מענה להיבטים העסקיים ועבודה שוטפת מול הנהלה ודירקטוריון. הפעם בקשתי לפתוח את נושא ההנהלה בצורה רחבה יותר, מה קורה שאתה מקבל/לוקח עליך כסמנכ"ל את האחריות הניהולית למערכות המידע של החברה וכפל כפלים בחברה שהיא תשתיות קריטיות תחת רגולציות קשיחות. נחשון פינקו מארח את עידן פלק סמנכ"ל הסחר ומערכות המידע של קבוצת אורות אנרגיה בשיחה על ראיית המנהל לאחר שנתיים וחצי מאז שלקח על עצמו את האחריות למערכות המידע ללא שום ידע בתחום. ההתמודדות עם מלחמה שהאתרי הייצור של החברה הם מטרה ברורה לתקיפה פיזית וקיברנטית. ניהול סיכונים בנית צוות העבודה במסגרת ההנהלה הבכירה והדירקטוריון גיבוש תקציב תחת "שמיכה קצרה" וסדר עדיפויות ועוד Cyber management is about much more than just protection. It's the ability to work with every entity in the company, from end-users on cyber awareness to creating a collaborative workspace with other professionals, such as risk management, legal, IT, and more. All of this is even before addressing business aspects and ongoing work with senior management and the Board of Directors This time, I wanted to explore the management aspect more broadly: what happens when you, as a VP, take on the administrative responsibility for the company's information systems, especially in a critical infrastructure company under strict regulation Nachshon Pincu hosts Idan Flek, VP Chief Commercial Officer and Information Systems at the Orot Energy Group, for a conversation from a manager's perspective, two and a half years after taking on IT responsibilities with no prior knowledge of the field. Dealing with a war where the company's production sites are clear targets for physical and cyber attacks Risk management Building a team Prioritizing cyber within senior management and the Board formulating a budget under a 'short blanket' and shifting priorities and moreThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: 131: OT Monitoring & SOC and Incident Response — Lessons from the Field with Cambios AcademyPub date: 2026-02-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of the (CS)²AI Podcast, host Derek Harp is joined by Jonathan Pollet, Marc Visser, and Bryan Singer for a deep-dive Q&A discussion following CS2AI's January 21st community event on OT Monitoring, SOC operations, and Incident Response. Drawing on decades of hands-on experience across industrial environments worldwide, the panel expands on questions that couldn't be fully addressed during the live sessions.The conversation explores why OT monitoring and SOC capabilities must come before incident response, and how poor network architecture, lack of visibility, and organizational silos continue to undermine response efforts when incidents occur. Jonathan outlines the architectural foundations required to support effective detection, response, and recovery, while Marc emphasizes the practical realities of implementing OT monitoring—from working with factory engineers to reducing alert fatigue and building usable SOC workflows.Bryan brings the incident responder's perspective, sharing real-world insights from global OT incidents, including prolonged dwell times, ransomware impacts on production, and why organizations without proper segmentation and monitoring often experience the most severe and prolonged outages. The discussion also tackles common questions around Fusion SOCs vs. dedicated OT SOCs, the human challenges of translating OT data into actionable intelligence, and what asset owners should realistically expect from incident response retainers.This episode is a must-listen for OT practitioners, security leaders, and asset owners looking to move beyond theory and understand what actually works in the field. Whether you are just beginning your OT monitoring journey or refining mature SOC and IR capabilities, this discussion offers practical guidance rooted in real operational experience.The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: OT Security Made SimpleEpisode: What's going on with manufacturing OT security? | OT Security Made SimplePub date: 2026-02-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOT security researcher Ben Book takes an unapologetic view on the state of OT security in manufacturing. He doesn't blame anybody but provides a clear analysis of business dynamics and offers what many lack when talking OT security solutions: the right questions. You can find more information on OT Security Made Simple at rhebo.com or send us your ideas, questions, or guest suggestions at podcast@rhebo.com. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Industrial Cybersecurity InsiderEpisode: The IT-OT Knowledge Gap Costing Organizations MillionsPub date: 2026-02-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Adeel Shaikh Muhammad, a Dubai-based cybersecurity expert and researcher with 16+ years in IT and OT security. They dive into why IT and OT teams still can't communicate effectively. The conversation reveals why most CISOs struggle to secure manufacturing environments. Adeel shares real-world insights from securing industrial systems across the Middle East, Africa, and Asia. They tackle the implementation gap in OT SOCs and why legacy systems remain vulnerable. The discussion covers third-party access risks, OEM warranty restrictions, and system integrator challenges. AI might finally solve IT-OT convergence by acting as a translator between these worlds. But first, organizations need to master the fundamentals: asset inventory, vulnerability management, and network segmentation. Most companies still haven't nailed these basics in their industrial environments. This conversation cuts through the hype to focus on what actually works.Chapters:(00:00:00) - 16 Years in Cybersecurity: Why CISOs Don't Know What a PLC Is(00:01:48) - Career Journey: From IT to OT Cybersecurity Focus(00:02:48) - Books on AI Transforming Security Operations Centers(00:04:44) - The Implementation Gap: Challenges Building OT SOCs(00:06:40) - The IT-OT Cultural Divide and Missing Communication(00:08:40) - Why the OT Ecosystem Must Proactively Bring Cybersecurity Tools(00:10:00) - Can IT-OT Convergence Actually Happen?(00:11:00) - AI as the Bridge: The Black Box Solution for IT-OT Communication(00:12:42) - Legacy Systems Reality: Windows 7 Running $5M Equipment(00:14:00) - OT Cybersecurity Conferences: S4, Intersec, and Rockwell Automation Fair(00:16:00) - Market Consolidation: Who's Been Acquired in OT Security(00:17:48) - Back to Basics: Asset Inventory, Vulnerabilities, and Network Segmentation(00:18:40) - Third-Party Access Control and OEM Warranty Restrictions(00:20:40) - Why We Can't Ignore Asset Inventory and Segmentation in OT AnymoreLinks And Resources:Adeel Shaikh Muhammad on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 80: The Dangers of White Label DevicesPub date: 2026-02-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMany devices on modern networks aren't what their labels claim. This episode, Rob King, Director of Applied Security Research at runZero, explores white-labeled surveillance and IoT hardware, why some vendors are banned by governments, and how hidden risks can spread across enterprises. Discovery, device fingerprinting, and protocol analysis reveal what's really connected—and why knowing your true inventory is now essential for security, compliance, and trust.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: OT Remote Access After COVID: Why IT Tools Fail and What Critical Infrastructure Needs NowPub date: 2026-02-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationRemote access transformed overnight - and OT environments are still feeling the impact. In this episode of Protect It All, host Aaron Crow is joined by Steve Rutherford, VP of Sales at Hyperport and former military officer, for a candid conversation on how secure remote access in operational technology (OT) has evolved - and where it's heading next. They unpack how COVID accelerated remote connectivity across critical infrastructure, why many traditional IT security tools fall short in OT environments, and what protection really looks like when safety, reliability, and uptime are non-negotiable. Drawing from military discipline and frontline OT experience, Steve shares a grounded perspective on managing risk in environments where failure has physical-world consequences. You'll learn: How COVID permanently changed OT remote access expectations Why IT-first security approaches don't translate well to OT The role of layered access controls and policy-driven permissions How dynamic access and trust scoring are reshaping OT security Where IT/OT convergence helps - and where it creates new risk What leaders must prioritize to balance access, safety, and resilience If you're responsible for enabling remote access while protecting critical operations, this episode delivers real-world insight, practical guidance, and a forward-looking view of OT cybersecurity. Tune in to understand what secure OT access really requires in today's threat landscape- only on Protect It All. Key Moments: 00:00 Securing Critical Infrastructure Access 03:59 "OT Mindset: Defense and Offense" 07:26 "Remote Access Challenges in Operations" 11:45 "Challenges in OT-IT Integration" 16:07 Authority Must Match Responsibility 18:23 Simplifying OT Authentication Challenges 21:53 "Dynamic Trust Scoring with AI" 24:05 "Access Control and Segmentation" 28:57 "Secure Access Without Overreach" 33:12 "Left of Boom Awareness" 35:56 OT Security and Local Control 39:35 "Driving Early Adoption Awareness" 41:54 "Proactive Support for Critical Infrastructure" 45:52 "Remote Work Enhances Team Efficiency" 47:17 "Exciting Tech for Cybersecurity" About the guest : Steve Rutherford is a former U.S. Army officer and aviator who transitioned his mission-driven mindset from military service to protecting critical infrastructure through operational technology (OT) security. After exploring multiple industries, Steve found a natural alignment between military operations and OT environments - where safety, reliability, and uptime are non-negotiable. Today, he works in secure user access for OT, helping organizations protect the systems that power modern life. How to connect steve : Website : https://hyperport.io/ Linkedin: https://www.linkedin.com/in/steverutherford1/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Casos de Ciberseguridad IndustrialEpisode: 4/4 Desenlace en Monitorización de seguridad OT con telemetría del procesoPub date: 2026-02-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEste episodio aborda el impacto real observado en reducción de incidentes y decisiones preventivas, la evolución futura de la seguridad OT basada en señales de proceso y el consejo clave para responsables de ciberseguridad industrial.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Critical Assets PodcastEpisode: Policy Pulse: Regulatory Roundtable - NERC CIP, Cybersecurity Strategy, AI & Electric SectorPub date: 2026-02-01Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome to the Policy Pulse Panel, a new monthly series within the Critical Assets Podcast. Hosted by Patrick Miller (Ampyx Cyber), Earl Shockley (CEO, Inpowerd), and Joy Ditto (CEO, Joy Ditto Consulting), this recurring panel dives into the most significant policy shifts and regulatory developments impacting critical infrastructure, operational technology (OT), and industrial cybersecurity. Each month, we unpack emerging legislation, agency actions, and standards updates - connecting the dots between policy and the practical realities faced by asset owners, utilities, vendors, and government partners. If you're trying to stay ahead of your auditors and your legislators, this is your monthly must-listen.https://ampyxcyber.com/podcast/policy-pulse-regulatory-roundtable-nerc-cip-cybersecurity-strategy-ai-electric-sectorThe podcast and artwork embedded on this page are from Patrick Miller, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: ICS Arabia PodcastEpisode: Medical Devices Exposed | 29Pub date: 2026-01-31Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode , I'm joined by Alessio Rosas, an OT cybersecurity expert from Italy, to dive deep into the world of medical devices and the potential risks they face when exposed to the internet.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: ICS Arabia PodcastEpisode: FAT/SAT for ICS/OT: Break Early, Build Secure | 70Pub date: 2026-01-31Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe're excited to host Dieter Sarrazyn , Industrial Security Advisor and Founder of Secudea — a specialist in SCADA/ICS/OT cybersecurity, IEC 62443, and FAT/SAT security validation.In this episode, we dive into:

Podcast: Three Buddy Problem (LS 39 · TOP 2% what is this?)Episode: A destructive cyberattack in Poland raises NATO 'red-line' questionsPub date: 2026-01-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization(Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 83: Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war. Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (unedited, AI-generated)Material Security (Use Cases)ESET DynoWiper update: Technical analysis and attributionPoland CERT on Russian wiper attacksPoland blames two Ukrainians allegedly working for Russia for railway blastBritain's New Spy Chief Has a New MissionTwo New Ivanti 0days ExploitedMicrosoft ships emergency Office patch to thwart attacksAnalysis of Single Sign-On Abuse on FortiOSFortinet PSIRT: Administrative FortiCloud SSO authentication bypassDiverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088WhatsApp Strict Account SettingsChina Executes 11 People Linked to Cyberscam Centers in MyanmarSingapore to start caning for scammersGermany on hacking attacks: "We will strike back, including abroad"Acting CISA chief uploaded sensitive files into a public version of ChatGPTTLP BLACKLABScon 2026KasperSekretsThe podcast and artwork embedded on this page are from Security Conversations, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: SecurityWeek Podcast Series - Cybersecurity InsightsEpisode: Embedded Industrial Security: The Network-Native AdvantagePub date: 2026-01-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAndrew McPhee, Industrial IoT Security Solution Manager at Cisco, joins the SecurityWeek podcast and dives into why traditional monitoring and SPAN-based approaches fail to deliver true visibility in industrial environments, and how network-native security embeds inspection, segmentation, and protection directly into the network. We discuss real-world implementation challenges, economic tradeoffs, and how to move from visibility to action without disrupting operations. (Want to continue the discussion? Contact Cisco.)Follow SecurityWeek on LinkedInThe podcast and artwork embedded on this page are from SecurityWeek, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: ICS Cyber Talks PodcastEpisode: Ramy Nahum CEO & owner @Triple C veteran of Israeli IT infrastructure industry on BCP, recovery & backupPub date: 2026-01-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationנושא ההתאוששות מכשל מערכות ו/או אירוע סייבר דורש הכנה אפקטיבית שמתחילה בגיבוש תוכנית המשכיות עסקית (ביי.סיי.פיי) ותוכנית להתאוששות מאסון (דיי. אר. פיי) המגדירות תפקידים ושלבי פעולה ברורים בזמן אמת. נדבך מרכזי בהכנה הוא יישום מערך גיבויים אוטומטי ומבוזר (כולל גיבויים "קרים" המנותקים מהרשת הראשית) ובדיקת תקינותם באופן תקופתי. בנוסף, על הארגון לקיים תרגולים המדמים תרחישי קיצון בקנה מידה משמעותי ממפגשים עם ארגונים רבים נראה שיש חוסר הבנה על ההבדל בין דיי.אר וגיבוי, תרומה משמעותית לבלבול הזה מגיע מכיוון יצרני תוכנות הגיבוי והמעבר להתאוששות וגיבוי בענן. הפרק הזה הוא חובה לכול מנכ"ל, מנהל מערכות מידע ומנהל אבטחת מידע ונועד לעשות סדר במונחים והפעולות השונות נחשון פינקו מארח את רמי נחום המנכ"ל והבעלים של חברת טריפל סי מוותיקי התחום בישראל, בשיחה על התאוששות, גיבוי וכול מה שביניהם. מה ההבדל בין אתר התאוששות לבין מערכת גיבויים מתי מספיק גיבוי באמצעי איחסון אלקטרונים ומתי מומלץ להוסיף גם קלטות כגיבוי קר (מבחינתי תמיד!) למה נדרש לבצע תרגולים בקנה מידה גדול ולא רק ע"ג שרת או שניים ומספר קטן של משתמשים למה נדרש לבדוק גיבויים באופן שוטף ועודThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Safe Mode Podcast (LS 25 · TOP 10% what is this?)Episode: Opportunistic by Default: How OT gets pulled into the blast radiusPub date: 2026-01-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Safe Mode, we look at how opportunistic campaigns—often starting as loud disruption like DDoS—can probe for weak points and, in some cases, move closer to operational technology and industrial control systems. Using a recent Justice Department case tied to pro‑Russia hacktivist groups as a jumping-off point, we discuss what this pattern says about the OT threat landscape in 2025, from remote access and trust boundaries to engineering workflows and data integrity risk. Chris Grove, Director of Cybersecurity Strategy at Nozomi Networks, joins to explain what defenders should prioritize now to keep “noise” from becoming real-world operational impact.The podcast and artwork embedded on this page are from Safe Mode Podcast, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Exploited: The Cyber Truth Episode: Balancing Speed and Security: The Open Source Dilemma in Embedded DevelopmentPub date: 2026-01-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and embedded systems expert Elecia White, host of Embedded.fm and author of Making Embedded Systems, to discuss the trade-offs of using open source in embedded development. The conversation goes beyond debates about “open vs. proprietary” to explore how a single library can quietly introduce sprawling dependency chains, unclear maintenance responsibilities, licensing obligations, and long-term security exposure, especially in devices expected to operate for years or decades. Elecia and Joe share guidance for using open source intentionally, including how to set guardrails early, limit dependency blast radius, and design systems that can respond when vulnerabilities emerge, even when patching isn't easy. Together, they cover: Why embedded teams don't get burned by open source, they get burned by unexamined dependenciesHow transitive dependencies and “helpful” packages quietly expand attack surfaceWhy professionalism, documentation, and disclosure practices signal trustworthy projectsWhy build-time SBOMs matter more than after-the-fact analysisHow Secure by Design thinking reduces reliance on emergency patching For embedded engineers, product leaders, and security teams balancing delivery pressure with long-lived risk, this episode offers advice for using open source without inheriting future incidents.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: CYBR.SEC.CAST (LS 25 · TOP 10% what is this?)Episode: OT.SEC.CAST – The OT.SEC.CON. Podcast with Mike HolcombPub date: 2026-01-28Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThis week, Michael and Sam chat with educator, founder, and OT.SEC.CON. opening keynote speaker Mike Holcomb! They discuss his free, in-person training coming up on March 31 in Houston, how - like many others - the movie War Games played a role in his journey into the cybersecurity industry, and how his focus has shifted toward OT/ICS security education.Things Mentioned:Mike's site - https://www.mikeholcomb.com/Mike's YouTube Channel - https://www.youtube.com/@utilsecBSides ICS - https://www.bsidesics.org/Sign up for Mike's free class on March 31, 2026 when you sign up for OT.SEC.CON. - https://www.xcdsystem.com/cybrseccommunity/attendee/index.cfm?ID=DwWuEm5Register for Jeremiah Grossman's Webinar - https://www.cybrsecmedia.com/webinar/Do you have a question for the hosts? Reach out to us at media@cscgroupllc.com Keep up with CYBR.SEC.CON.:LinkedInXFacebookInstagramKeep up with CYBR.SEC.Media:LinkedInXFacebookInstagramCheck out our Conferences and Events:CYBR.SEC.CON.OT.SEC.CON.CYBR.HAK.CON.EXEC.SEC.CON.CSC User GroupSupport or apply to our Scholarship Program:TAB Cyber FoundationSubscribe to the podcast: AppleSpotifyListen to our other show:CYBR.HAK.CAST In this episode:Host: Michael FarnumHost: Sam Van RyderGuest: Mike HolcombProduction and editing: Lauren AndrusMusic by: August HoneyThe podcast and artwork embedded on this page are from CYBR.SEC.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Industrial Cybersecurity InsiderEpisode: The Patching Gap Putting Industrial Operations at Risk: IT vs OTPub date: 2026-01-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig and Dino tackle one of industrial cybersecurity's most critical challenges in this Rewind episode: the massive gap between IT and OT patching strategies. IT organizations patch constantly—think Patch Tuesday. OT environments rarely patch at all, creating dangerous vulnerability gaps across connected networks. The hosts explore why this disconnect exists. Production floor downtime costs are astronomical, making patching a risky business decision. OEM restrictions complicate matters further. Many vendors won't support systems or warranties after unauthorized updates. Managing decades-old equipment alongside modern systems creates another layer of complexity. Legacy PLCs weren't designed with patching in mind. The consequences of not patching are mounting. Insurance companies are tightening requirements and regulatory pressures are intensifying. Craig and Dino offer practical solutions that don't require shutting down production lines. Virtual patching technologies can protect legacy control systems without traditional software updates. The hosts emphasize the urgent need for IT-OT collaboration. All stakeholders—including OEMs and system integrators—must be part of strategic cybersecurity conversations. This episode is essential listening for CISOs, plant managers, and anyone responsible for protecting industrial operations. The connected world isn't waiting for OT to catch up. Chapters:00:00:00 - Introduction to Patching Challenges00:01:08 - IT vs OT Patching: Key Differences00:02:55 - Understanding the Cost of Downtime in OT00:03:32 - Overcoming Challenges with Legacy Systems00:05:21 - Navigating OEMs and Safety Concerns00:06:45 - The Role of Safety in OT Patching00:08:52 - Exploring Virtual Patching Solutions00:13:11 - Enhancing Vendor Collaboration and Risk Management00:16:48 - Impact of Mergers and Acquisitions on Cybersecurity00:18:33 - Addressing Insurance and Compliance Issues00:20:12 - Significant Consequences of Not Patching00:23:14 - Building an Effective Collaborative Cybersecurity Strategy00:24:03 - Conclusion and Actionable InsightsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Casos de Ciberseguridad IndustrialEpisode: 3/4 Acciones en Monitorización de seguridad OT con telemetría del procesoPub date: 2026-01-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEste episodio trata de las acciones prácticas: los primeros pasos para iniciar un proyecto de telemetría aplicada a la seguridad, la conexión con equipos de operación y mantenimiento, y el papel de los proveedores de automatización.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Today with ISSSourceEpisode: Safety Services Provide an AnswerPub date: 2026-01-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe are going through an advancing digital age, no one can deny that. Data is coming at workers from all directions. There is great knowledge in that data, but who has the time to sort through it, after all, we have to keep making product and keep the process moving safe and sound. For safety and functional safety, manufacturers need to manage data and be able to identify trends to understand all levels of risk. That is where safety services can come into playThe podcast and artwork embedded on this page are from Gregory Hale, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 79: Ignore OT Security At Your Own PerilPub date: 2026-01-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe growing importance of OT security, highlighting overlooked risks in critical infrastructure, legacy systems, and supply chains. Through real-world examples, Eric Durr, Chief Product Officer at Tenable, shows why OT security differs from IT, emphasizing visibility, resilience, and risk prioritization to protect safety, operations, and business continuity. The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: OT Security Made SimpleEpisode: NIS2 mit gesundem Menschenverstand umsetzen | OT Security Made SimplePub date: 2026-01-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationKlaus Kilvinger von Opexa Advisory zieht dem NIS2UmsuCG den Zahn und nimmt die Angst vor Überregulierung und Überforderung bei der Implementierung von NIS2. Er argumentiert, dass die Grundlagen in den meisten Unternehmen schon existieren und das Management des Cyberrisikos ein natürlicher Bestandteil des regulären Risikomanagements ist, für das die Geschäftsführung seit eh und je verantwortlich ist. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an podcast@rhebo.com. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Bridging the IT/OT Divide in Oil & GasPub date: 2026-01-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationBryson Bort is joined by Dd Budiharto, Microsoft's Customer Security Officer for the Oil, Gas, and Energy sectors, to share her experience bridging the IT/OT divide in the energy sector. Drawing on her background as a former CISO and industry veteran with decades of experience starting security programs at giants like Halliburton and Marathon Oil, Dd breaks down IT vs OT auditing, the cultural divide in oil and gas, and what cybersecurity looks like in the energy sector. How did an early mistake involving a patch reboot change Dd's career forever? What is preventing private companies and the FBI from working together? Why is basic hygiene—like disabling terminated accounts—still the biggest "unsolved" problem in billion-dollar industries? “If you want to upgrade your home, to modernize it, the foundation still needs to be fixed first,” Dd said. Join us for this and more on this episode of Hack the Plan[e]t. The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Industrial Cybersecurity InsiderEpisode: Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT SecurityPub date: 2026-01-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThis compilation episode brings together the most critical insights from Industrial Cybersecurity Insider conversations about the fundamental challenges plaguing OT security implementation and management.Industry experts dissect why traditional IT security approaches fail catastrophically on the plant floor, revealing that the core issue isn't technology—it's ownership, collaboration, and understanding.From the dangers of deploying endpoint detection without vendor qualification to the millions lost in unplanned downtime, this episode exposes the gap between security theory and operational reality.Listeners will discover why cybersecurity tools are often shelfware, how the "have and have-not" world creates vulnerability gaps across manufacturing facilities, and what "left of boom" thinking means for preventing incidents before they happen. Featuring hard-won lessons about shutdown windows, cyber-informed engineering, and the critical importance of building relationships between IT teams and plant floor operations, this episode delivers actionable intelligence for CISOs, plant managers, and anyone responsible for securing industrial control systems.Chapters:(00:00:00) - Introduction: The Core Problem of Ownership in OT Security(00:01:45) - Why IT Security Approaches Fail on the Plant Floor(00:04:30) - The Cloud Analogy: Lessons for OT Implementation(00:07:15) - The Missing Conversation: Capital Plans and OEMs(00:10:20) - IT vs OT Networks: Different Purposes, Different Risks(00:13:35) - EDR in OT: The Aftermarket Parts Problem(00:16:10) - Cyber-Informed Engineering: Building Security into Design(00:19:45) - The Have and Have-Not World of Plant Security(00:23:20) - Left of Boom: Visibility Beyond Security(00:27:15) - Who Should Lead the OT Security DiscussionLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: Securing Remote Access in OT: Visibility, Segmentation, and What Compliance MissesPub date: 2026-01-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationRemote access is no longer optional in OT - but unmanaged connectivity is one of the fastest ways to lose control of critical systems. In this episode of Protect It All, host Aaron Crow breaks down the real challenges of securing connectivity across IT and OT environments. As vendors, technicians, and support teams increasingly rely on remote access, many organizations struggle with poor visibility, legacy systems, and unclear network boundaries - creating unnecessary risk. Aaron walks through newly released secure connectivity guidance from CISA and the UK National Cyber Security Centre, translating an eight-point framework into practical, real-world steps that security and operations teams can actually implement. You'll learn: Why remote access is one of the biggest OT risk multipliers How poor visibility creates blind spots attackers love Why asset inventory and documentation are foundational - not optional How segmentation and least-privilege design shrink the attack surface What compliance frameworks get right - and what they don't Best practices for vendor access, MFA, session recording, and monitoring How to design secure connectivity without breaking operations Whether you're responsible for OT security, managing vendors, or bridging IT and OT teams, this episode delivers actionable guidance to help you regain control of connectivity and protect critical infrastructure. Tune in to learn how to secure access without sacrificing operations - only on Protect It All. Key Moments: 01:11 "Secure Connectivity in OT" 05:10 "Reducing Attack Surface Through Access Limits" 10:02 "Control System Upgrade Failure Impact" 12:00 Beyond Passwords: Strengthening Security 17:16 "Strengthening Cybersecurity Basics" 18:26 "Balancing Compliance and Security" Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Casos de Ciberseguridad IndustrialEpisode: 2/4 Análisis de Monitorización de seguridad OT con telemetría del procesoPub date: 2026-01-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEste episodio se centra en el análisis: cómo distinguir la variabilidad normal del proceso de eventos sospechosos, qué incidentes se han detectado gracias a la telemetría y los retos técnicos de trabajar con datos industriales reales.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: 130: S4's “Connect” Theme Explained — Dale Peterson on OT Security's Hyper-Connected FuturePub date: 2026-01-14Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of the (CS)²AI Podcast, host Derek Harp is joined once again by Dale Peterson, Founder of the S4 Conference and one of the longest-standing voices in OT cybersecurity. As Dale marks 25 years in the industry, the conversation takes a forward-looking turn toward what he believes is the next major inflection point for industrial security: connectivity driven by AI, data, and business systems.Dale explains why the 2026 S4 Conference theme, Connect, is not just about networking people, but about the explosive growth of connections between OT systems, enterprise platforms, and analytics driven by AI. From MES, ERP, and PLCs to asset inventories and security telemetry, these connections are accelerating faster than most security teams are prepared for—often driven by business value rather than security design.Listeners will hear why manufacturing is emerging as the epicenter of this transformation, how AI is enabling real-time querying across operational systems, and why OT security teams must prepare for a future where their tools become just another data source in larger operational workflows. Dale also shares how this shift will reshape risk, attack surfaces, and even the role of humans in control and response.The episode also provides an inside look at S4 2026, including this year's Proof-of-Concept Pavilion, where vendors will be forced to demonstrate their technologies live on a real manufacturing environment, as well as updates on attendance, ticket availability, and why this will be the final year S4 is held in Miami Beach before moving back to Tampa.This is a must-listen for OT security professionals, automation leaders, and anyone trying to understand how AI-driven connectivity will redefine both risk and opportunity across industrial environments in the years ahead.The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Exploited: The Cyber Truth Episode: Beyond Defense: Building Cyber Resilience in Autonomous and Connected MobilityPub date: 2026-01-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAutonomous and connected vehicles are reshaping transportation, but increased software complexity and connectivity introduce serious security and safety challenges that can't be solved with traditional perimeter defenses. In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and Hemanth Tadepalli, Senior Cybersecurity & Compliance SME at May Mobility, for a practical discussion on what cyber resilience looks like inside real-world autonomous vehicle programs. Hemanth draws on his experience securing mobility systems at May Mobility, as well as prior work with Mandiant, Google, and AlixPartners, to explain how automotive organizations are adapting to software-defined vehicle architectures, regulatory pressure, and expanding attack surfaces. Joe shares his perspective on why mobility companies increasingly resemble software companies and what that means for engineering, governance, and operational security. Together, they explore: How connected and autonomous vehicle architectures expand the attack surfaceWhat cyber resilience means in day-to-day engineering and fleet operationsHow governance, threat intelligence, and software validation reduce riskRegulatory pressures shaping automotive security decisionsHow teams balance detection, response, and safety in autonomous systems Whether you're building autonomous platforms, managing connected fleets, or securing safety-critical software, this episode offers a grounded look at what it takes to keep modern mobility systems trustworthy and safe.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: ICS Arabia PodcastEpisode: From Physical Security to OT Cybersecurity (Arabic) | 45Pub date: 2026-01-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoin us in this new episode of the ICS Arabia Podcast as we sit down with Bassem Ben Amor, a seasoned Physical Security Manager from Tunisia with over 12 years of experience.Bassem shares his journey from managing physical security and BMS systems to transitioning into the world of OT cybersecurity.We discuss his work as a security integrator, his passion for writing articles, and exciting projects he's currently involved in.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: ICS Cyber Talks PodcastEpisode: Dr. Yaniv Harel cyber expert & key figure in bridging between cyber industry and academia in IsraelPub date: 2026-01-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationבניגוד להרבה תחומים אחרים בסייבר התעשייה והאקדמיה הולכים יד ביד ולעיתים דווקא האקדמיה היא זו שדוחפת את החדשנות בתעשייה לקצוות. לראיה ה CyberWeek של אוניברסיטת ת"א מצליחה פעם אחר פעם לרכז את מיטב המוחות לדון על הווה ועתיד, למה הפעם זה כן עובד? שמדובר בסייבר הישראלי בצורה מפתיעה (או שלא) תמיד תפגשו את ד"ר יניב הראל. יניב מלווה את הסייבר האזרחי בישראל פחות או יותר מאז הקמתו ועל גלגולו השונים מאין סוף כיוונים, אחל מימיו בצבא, תפקידים ממשלתיים, אוניברסיטת ת"א והרשימה עוד ארוכה. כמו רבים וטובים אחרים בשל האירועים מאז אוקטוב 2023 הפודקאסט נדחה ונדחה וסוף סוף הוא קרה. נחשון פינקו מארח את ד"ר יניב הראל יזם ומומחה סייבר שיש לו חלק משמעותי בדבק שבין תעשיית הסייבר ואקדמיה בישראל בשיחה על ההווה ועתיד הסייבר. החיבור בין תעשיית הסייבר ואקדמיה בישראל מחקרי סייבר שהובילו לשינוי תפיסה AI ועוד Unlike many other sectors, the cyber industry and academia go hand in hand, and at times, it is actually academia that pushes industrial innovation to its limits. A prime example is Tel Aviv University's CyberWeek, which consistently brings together the brightest minds to discuss the present and future. Why does it work so well this time? When discussing Israeli cybersecurity, it's no surprise that you will always run into Dr. Yaniv Harel. Yaniv has been a cornerstone of Israel's civilian cyber landscape since its inception, witnessing its various evolutions from numerous vantage points, including his service in the IDF and the Israel National Cyber Directorate, as well as his work at Tel Aviv University, among others. Like many other projects, this podcast was repeatedly postponed due to the events of October 2023, but it has finally come to fruition. Nachshon Pincu hosts Dr. Yaniv Harel, an entrepreneur, cyber expert, and a key figure in bridging the gap between the cyber industry and academia in Israel, for a conversation on the present and future of cybersecurity. The connection between the cyber industry and academia in Israel's Cyber research has led to conceptual shifts. AI and more. The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Industrial Cybersecurity InsiderEpisode: Your New Equipment Just Shipped With Security Risks & Here's Why Your OEM Won't Fix ThemPub date: 2026-01-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino and Craig tackle one of manufacturing's most pressing challenges: the OEM blockade. They explore why brand-new equipment often ships with hundreds of unpatched vulnerabilities, how the gap between IT and OT teams creates operational blind spots, and why manufacturers can't rely on traditional IT solutions to secure their plant floors.From the CrowdStrike incident that took down HMIs to the "ghost in the machine" causing unexplained downtime, they reveal why OT teams must take ownership of their cybersecurity posture and build partnerships with the right ecosystem of OT-focused service providers.If you've ever wondered why your million-dollar machine center is running Windows 7 or why your cybersecurity reports don't match reality, this episode provides the answers—and a path forward.Chapters:(00:00:00) - The OEM Blockade Problem(00:01:00) - Understanding OEM Software Lock and Remote Access(00:03:00) - The Reality of Unpatched Vulnerabilities in New Equipment(00:06:00) - The IT/OT Blockade and Convergence Challenges(00:09:00) - Why IT Disciplines Don't Translate to OT Environments(00:11:00) - The CrowdStrike Incident: What Really Happened on Plant Floors(00:13:00) - The Lack of Due Diligence in Manufacturing M&A(00:16:00) - Chasing the Ghost in the Machine(00:19:00) - Process Integrity vs. Cybersecurity Tools(00:22:00) - Why OT Teams Must Take Ownership and Build the Right PartnershipsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Radio Davos (LS 38 · TOP 2% what is this?)Episode: Cybersecurity Outlook 2026: the view from Interpol and the threat to 'OT'Pub date: 2026-01-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe Global Cybersecurity Outlook 2026 is an essential report on the state of cyber threats facing the world, and what can be done to tackle them. Akshay Joshi, head of the World Economic Forum's Centre for Cybersecurity joins as co-host as we speak to Interpol Director for Cybercrime Neal Jetton, and Robert Lee, CEO and co-founder of Dragos, a company that specialises in protecting 'OT' - the operational technology that companies rely on. Links: Global Cybersecurity Outlook 2026: https://www.weforum.org/publications/global-cybersecurity-outlook-2026/ Cybercrime Atlas: https://initiatives.weforum.org/cybercrime-atlas/home Centre for Cybersecurity: https://centres.weforum.org/centre-for-cybersecurity/home Partnership against Cybercrime: https://initiatives.weforum.org/partnership-against-cybercrime/home Interpol on cybercrime: https://www.interpol.int/en/Crimes/Cybercrime Dragos: https://www.dragos.com/ Related podcasts: Understanding today's cyber readiness risks: Key questions to stay ahead of the next attack: https://www.weforum.org/podcasts/meet-the-leader/episodes/cybersecurity-vinod-bange-baker-mckenzie/ Superpower rivalry and geopolitics in Trump 2.0: https://www.weforum.org/podcasts/radio-davos/episodes/geopolitics-lynn-kuok-the-national/ Global Cybersecurity Outlook 2025: the risks we all face and how to fight back: https://www.weforum.org/podcasts/radio-davos/episodes/cybersecurity-outlook-2025/ Check out all our podcasts on wef.ch/podcasts: YouTube: https://www.youtube.com/@wef Radio Davos - subscribe: https://pod.link/1504682164 Meet the Leader - subscribe: https://pod.link/1534915560 Agenda Dialogues - subscribe: https://pod.link/1574956552 The podcast and artwork embedded on this page are from World Economic Forum, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: CanadianSME Small Business PodcastEpisode: From Controls to Control: The Governance Imperative in OT / Critical Infrastructure CybersecurityPub date: 2026-01-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome to the CanadianSME Small Business Podcast, hosted by SK Uddin. Today we explore the world of Industrial Cybersecurity and how businesses can safeguard critical infrastructure in an increasingly connected environment.Our guest is Denrich Sananda, Managing Partner and Senior Consultant at Arista Cyber, a Harvard Business School alumnus and member of the ISA 62443 standard committee. Denrich and his team specialize in protecting Industrial Control Systems by ensuring cybersecurity, reliability, and uptime work in harmony.Key HighlightsGovernance & Standards: Denrich explains why frameworks like IEC 62443 and NIST CSF 2.0 are essential in OT environments. Leadership & Turnaround: He shares the key mindset shift that drove a major multi million euro corporate turnaround. Cybersecurity & Safety: Denrich breaks down how Arista Cyber unites cybersecurity, reliability, and functional safety. Resilience Roadmaps: He outlines layered security approaches like the Purdue Model and Industrial Threat Detection. Global Vision: Denrich discusses TÜV certification and Arista Cyber's long term mission to protect global critical infrastructure.Special Thanks to Our Partners:UPS: https://solutions.ups.com/ca-beunstoppable.html?WT.mc_id=BUSMEWAGoogle: https://www.google.ca/A1 Global College: https://a1globalcollege.ca/ADP Canada: https://www.adp.ca/en.aspxFor more expert insights, visit www.canadiansme.ca and subscribe to the CanadianSME Small Business Magazine. Stay innovative, stay informed, and thrive in the digital age!Disclaimer: The information shared in this podcast is for general informational purposes only and should not be considered as direct financial or business advice. Always consult with a qualified professional for advice specific to your situation.The podcast and artwork embedded on this page are from SK Uddin, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Cloud Security Podcast by Google (LS 36 · TOP 2.5% what is this?)Episode: EP257 Beyond the 'Kaboom': What Actually Breaks When OT Meets the Cloud?Pub date: 2026-01-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationGuest: Chris Sistrunk, Technical Leader, OT Consulting, Mandiant Topics: When we hear "attacks on Operational Technology (OT)" some think of Stuxnet targeting PLCs or even backdoored pipeline control software plot in the 1980s. Is this space always so spectacular or are there less "kaboom" style attacks we are more concerned about in practice? Given the old "air-gapped" mindset of many OT environments, what are the most common security gaps or blind spots you see when organizations start to integrate cloud services for things like data analytics or remote monitoring? How is the shift to cloud connectivity - for things like data analytics, centralized management, and remote access - changing the security posture of these systems? What's a real-world example of a positive security outcome you've seen as a direct result of this cloud adoption? How do the Tactics, Techniques, and Procedures outlined in the MITRE ATT&CK for ICS framework change or evolve when attackers can leverage cloud-based reconnaissance and command-and-control infrastructure to target OT networks? Can you provide an example? OT environments are generating vast amounts of operational data. What is interesting for OT Detection and Response (D&R)? Resources: Video version Cybersecurity Forecast 2026 report by Google Complex, hybrid manufacturing needs strong security. Here's how CISOs can get it done blog "Security Guidance for Cloud-Enabled Hybrid Operational Technology Networks" paper by Google Cloud Office of the CISO DEF CON 23 - Chris Sistrunk - NSM 101 for ICS MITRE ATT&CK for ICS The podcast and artwork embedded on this page are from Anton Chuvakin, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: Casos de Ciberseguridad IndustrialEpisode: 1/4 Contexto de Monitorización de seguridad OT con telemetría del procesoPub date: 2026-01-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se aborda cómo surge en Takasago la necesidad de explorar la telemetría del proceso como herramienta para identificar anomalías, diferenciando entre fallos técnicos y señales de posibles ciberataques. Participa Fernando Manuel Martínez García, Director Técnico, EHS y de Sistemas de la información en TAKASAGO (Europe).The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: Small Business Cybersecurity: Practical Steps to Survive Big Threats on a Small BudgetPub date: 2026-01-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationSmall businesses aren't too small to be targeted; they're often the first targets. In this episode of Protect It All, host Aaron Crow breaks down what cybersecurity really looks like for small and medium-sized businesses with limited resources. With nearly half of all cyberattacks aimed at SMBs and many companies never recovering, this episode focuses on what actually matters when budgets, time, and teams are tight. Aaron cuts through fear-based messaging and tool overload to share simple, affordable steps that can dramatically reduce risk without requiring a full security team or enterprise spend. You'll learn: Why small businesses are prime cyber targets The most common mistakes that lead to catastrophic loss How basic policies and employee awareness stop most attacks Why multi-factor authentication, backups, and segmentation are non-negotiable How to prioritize cybersecurity when resources are limited Why resilience not perfection is the real goal Whether you're a founder, business owner, or IT lead at a growing company, this episode gives you practical guidance you can act on immediately before a cyber incident forces your hand. Tune in to learn how to protect your business, your data, and your future only on Protect It All. Key Moments: 03:37 Cybersecurity Risks for Small Businesses 08:06 System Security and Backup Essentials 12:21 Cybersecurity: Prepare, Monitor, Survive 14:21 Efficient Device Monitoring Simplified 19:31 "Three-Two-One Backup Strategy" 20:20 "Planning Left of Bang" Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.