Podcast appearances and mentions of bryson bort

  • 38PODCASTS
  • 133EPISODES
  • 49mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Apr 12, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about bryson bort

Latest podcast episodes about bryson bort

@BEERISAC: CPS/ICS Security Podcast Playlist
Bridging the Cybersecurity Resource Gap

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Apr 12, 2025 33:43


Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Bridging the Cybersecurity Resource GapPub date: 2025-04-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationBryson Bort welcomes Sarah Powazek, Program Director of Public Interest Cybersecurity at the UC Berkeley Center for Long-Term Cybersecurity, to discuss the organization's work providing cybersecurity resources for the public, and CyberCAN, a project to connect cities and nonprofits providing critical services.  How can cities play a larger role in protecting their communities? What are the biggest cybersecurity challenges facing nonprofits? What innovative solutions are being developed to address the cybersecurity resource gap? “It's never going to be enough to have one federal agency help every single organization in a country. We're just too large,” Sarah said. “I think the solution is to create more infrastructure at the state, local, and regional level.”Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plan[e]t is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Preparing for Unnatural Disasters

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 14, 2025 40:09


Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Preparing for Unnatural DisastersPub date: 2025-03-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome to season 5! Our host Bryson Bort sits down with Institute for Security and Technology (IST) Executive in Residence for Public Safety & Security Josh Corman. Josh previously joined us on season 1, episode 2 to discuss his experience founding I Am The Cavalry, a grassroots organization focused on the intersection of digital security, public safety, and human life. Today, Josh walks us through his Cyber Civil Defense initiative UnDisruptable27 and his work to bolster the resilience of local critical infrastructure systems. What role can you play in making our communities more resilient? What risks do we face from a hybrid conflict? How can we better prepare for disruptions to critical infrastructure? “You inform, influence, inspire. You make sure people aren't blindsided, and even if they can't stop the natural disaster, they can at least prepare for it and make informed decisions and innovate locally,” Josh said. “And unlike natural disasters, where we only have a couple hurricanes a year, we may have concurrent unnatural disasters on plural U.S. infrastructure sites across the country with finite resources to respond and recover.”Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plan[e]t is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist

Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: From the ArchivesPub date: 2025-02-28Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFor the final episode of the season, our host Bryson Bort reflects on four years and forty episodes of Hack the Plan[e]t, and picks a few favorites. Episode 8, DoD and Critical Infrastructure: https://hack-the-plant.simplecast.com/episodes/dod-and-critical-infrastructureEpisode 10, The Congressman, The Commission and Our Critical Infrastructure: https://hack-the-plant.simplecast.com/episodes/the-congressman-the-commission-and-our-critical-infrastructureEpisode 27, Managing Incident Responses to Critical Infrastructure Attacks: https://hack-the-plant.simplecast.com/episodes/managing-incident-responses-to-critical-infrastructure-attacksEpisode 28, Cyber Threat Intelligence Over the Past 25 Years: https://hack-the-plant.simplecast.com/episodes/cyber-threat-intelligence-over-the-past-25-yearsEpisode 36, Supporting Ukrainian Electrical Grid Resilience in Wartime: https://hack-the-plant.simplecast.com/episodes/supporting-ukrainian-electrical-grid-resilience-in-wartime-mxxhn2g3Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Protecting Critical Infrastructure for Rural Electric Cooperatives

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 5, 2025 31:09


Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Protecting Critical Infrastructure for Rural Electric CooperativesPub date: 2025-02-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationBryson is joined by Carter Manucy, Director of Cybersecurity at the National Rural Electric Cooperative Association to discuss rural electric cooperatives, the importance of collaboration, and the state of cybersecurity in the energy sector. With over two decades of experience in the sector, Carter was recently awarded E-ISAC's prestigious Michael J. Assante Award for his leadership on initiatives to protect the grid and electric co-ops. How are cooperatives fostering a stronger cybersecurity culture? What are the unique challenges faced by rural electric cooperatives in the cybersecurity landscape? And what does Carter see in his crystal ball for the future of cybersecurity in the energy sector?“I think as a country, we've really got to pull together or else we're going to be behind the eight ball in a few years, and that could really look bad for everybody...power runs all of our lives,” Carter said. “If I had that magic wand, I think I would get rid of a lot of the politics that are there so that we can focus on getting funding to help in the areas that it really is needed, and move that needle forward.” Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
The A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson Bort

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 31, 2025 32:46


Podcast: Industrial Cybersecurity InsiderEpisode: The A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson BortPub date: 2025-01-28Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoin us as we delve into the fascinating world of operational technology (OT) cybersecurity with Bryson Bort, founder of SCYTHE, Grimm, and co-founder of ICS Village. Discover how his experiences shaped innovative approaches to OT risk management, why visibility and architecture are foundational to security, and the importance of building trust between IT and OT teams. From real-world case studies to actionable strategies, this episode explores the evolving landscape of industrial cybersecurity and the steps organizations must take to stay ahead.Chapters:00:00:00 - Welcome and introduction to today's focus on industrial cybersecurity00:01:10 - Bryson Bort shares his journey from military service to OT security innovation00:02:02 - The evolution of cybersecurity: milestones and lessons for OT environments00:03:21 - Exploring industrial control systems and the roots of car hacking00:06:52 - Tackling real-world challenges in industrial cybersecurity00:08:00 - Why visibility and architecture are foundational for OT security00:09:30 - Dispelling misconceptions about air-gapped systems in OT environments00:11:10 - Practical insights on segmentation and defensible architectures00:13:00 - How attackers exploit vulnerabilities and why monitoring is essential00:14:30 - Building trust between IT and OT teams for successful convergence00:16:00 - Leveraging purple teaming to enhance collaboration and resilience00:17:07 - Strategies for building trust and creating effective OT security solutions00:26:54 - The future of cybersecurity and Bryson's parting insightsLinks And Resources:Bryson Bort on LinkedInSCYTHEICS VillageDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Velta Technology, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The RSnake Show
Demo Day - Scythe

The RSnake Show

Play Episode Listen Later Jan 16, 2025 56:21


Today Trey Ford and RSnake sat down with Bryson Bort to discuss Scythe - a post-infection utility that allows red teamers to upload simulated but functional malware to test the reactions and defenses of enterprises. Basically the ultimate cyber-weapons as legos to play with. Very cool stuff, check it out.

@BEERISAC: CPS/ICS Security Podcast Playlist
Reliability and Risks of the North American Power Grid

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 27, 2024 28:06


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Reliability and Risks of the North American Power GridPub date: 2024-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationBryson is joined by Sara Patrick, President and CEO at the Midwest Reliability Organization (MRO) to discuss cyber threats, mitigation strategies, and the United States energy infrastructure system. A lawyer by training, Sara led MRO's enforcement group and compliance monitoring team for 16 years before stepping into her position as CEO. What risks does AI pose to maintaining a reliable grid? How does MRO build resilience into the Northeast bulk power grid? What do smaller organizations need to be able to mitigate threats? “When we think about operations, we're a lot of times focused on the bigger organizations. But from a cyber perspective, it really doesn't matter the size of your organization. You're all susceptible,” Sara explained. Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Hack the Capital 7.0: Building Cybersecurity Connections with Bryson Bort & Tom Van Norman

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 14, 2024 17:08


Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: Hack the Capital 7.0: Building Cybersecurity Connections with Bryson Bort & Tom Van NormanPub date: 2024-11-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Derek Harp sits down with Bryson Bort and Tom Van Norman, co-founders of ICS Village and creators of Hack the Capital. They discuss the origins and evolution of Hack the Capital, now in its seventh year, and the conference's unique focus on bridging cybersecurity professionals with policy makers and industry leaders. They dive into the value of hands-on learning, the launch of Workforce Development Day, and the ongoing need for practical cybersecurity education and career opportunities for all. Bryson and Tom also highlight the significance of candor in the field and what attendees can look forward to at future conferences. Tune in for insights into the world of OT and ICS cybersecurity, hands-on training, and the importance of building community partnerships.The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Control System Cyber Security Association International: (CS)²AI
Hack the Capitol 7.0: Building Cybersecurity Connections with Bryson Bort & Tom Van Norman

Control System Cyber Security Association International: (CS)²AI

Play Episode Listen Later Nov 12, 2024 17:08


In this episode, host Derek Harp sits down with Bryson Bort and Tom Van Norman, co-founders of ICS Village and creators of Hack the Capitol. They discuss the origins and evolution of Hack the Capitol, now in its seventh year, and the conference's unique focus on bridging cybersecurity professionals with policy makers and industry leaders. They dive into the value of hands-on learning, the launch of Workforce Development Day, and the ongoing need for practical cybersecurity education and career opportunities for all. Bryson and Tom also highlight the significance of candor in the field and what attendees can look forward to at future conferences. Tune in for insights into the world of OT and ICS cybersecurity, hands-on training, and the importance of building community partnerships.

@BEERISAC: CPS/ICS Security Podcast Playlist

Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Securing Embedded SystemsPub date: 2024-09-25In this episode, Bryson sits down with MITRE EMB3D co-founder Niyo Little Thunder Pearson. For nearly 20 years, Niyo has been at the forefront of protecting critical infrastructure systems. He previously led incident response for American Express, directing the company's Security Operations Center during the LulzSec and Anonymous attacks, and worked to develop an adversarial cyber defense program for the nation's third largest gas utility at ONE Gas Oklahoma. Now, Niyo has co-founded MITRE EMB3D, a groundbreaking global threat network aimed at enhancing the security of embedded devices. What is MITRE EMB3D? Who is the intended audience? What problems is it trying to solve? “There is such a gap that exists today on what we understand and how risk averse these [embedded] devices are. They do well and they operate well. They're built for what they're doing in a safety context, but the security was never brought forward with it,” Niyo said. Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
The Case For A Cyber Force

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 30, 2024 41:55


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: The Case For A Cyber ForcePub date: 2024-07-23In this episode, Bryson sits down with Mark Montgomery, Senior Director at the Foundation for Defense of Democracies. For three years, Mark served as Executive Director of the Cyberspace Solarium Commission, created by congressional mandate to develop strategic approaches to defending against cyber attacks. Now, he directs CSC 2.0, an initiative that works to implement the recommendations of the Commission. What were the key recommendations of the Cyberspace Solarium Commission? What are the politics of cybersecurity? How do we ensure that our international partners have the same level of resiliency and recovery that we have domestically? “We'd like to fight our adversaries overseas. That means we have to fight with and through our allies and partners. So they have to have strong critical infrastructure as our forces arrive and execute their missions,” Mark said. Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Supporting Ukrainian Electrical Grid Resilience in Wartime

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 25, 2024 32:19


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Supporting Ukrainian Electrical Grid Resilience in WartimePub date: 2024-06-21Joe Marshall is a Senior IoT Security Strategist at Cisco Talos Intelligence Group. When Russia invaded Ukraine in 2022, Joe helped coordinate a multinational, multi-company coalition of volunteers and experts to find a technological solution. Bryson and Joe sat down to discuss his efforts in Ukraine, how he got the go-ahead from Cisco leadership, and more. “They were like, yeah, we can't even get accurate timing to work on our transmission grid because of jamming that is interrupting GPS communications,” Joe explains. “A week later I was sitting in my office and I went, ‘I wonder if we have something inside of Cisco that can actually help with this.'” Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Supporting Ukrainian Electrical Grid Resilience in Wartime

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 25, 2024 32:19


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Supporting Ukrainian Electrical Grid Resilience in WartimePub date: 2024-06-21Joe Marshall is a Senior IoT Security Strategist at Cisco Talos Intelligence Group. When Russia invaded Ukraine in 2022, Joe helped coordinate a multinational, multi-company coalition of volunteers and experts to find a technological solution. Bryson and Joe sat down to discuss his efforts in Ukraine, how he got the go-ahead from Cisco leadership, and more. “They were like, yeah, we can't even get accurate timing to work on our transmission grid because of jamming that is interrupting GPS communications,” Joe explains. “A week later I was sitting in my office and I went, ‘I wonder if we have something inside of Cisco that can actually help with this.'” Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Jennifer Minella on OT Cybersecurity Convergence

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 29, 2024 29:56


Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Jennifer Minella on OT Cybersecurity ConvergencePub date: 2024-05-28Jennifer Minella, founder and principal advisor of Viszen Security,  joins the Claroty Nexus podcast to discuss her experiences advising organizations on operational technology implementations, risk management, and succeeding at IT/OT convergence. This episode was recorded during RSA Conference where Jennifer and Bryson Bort gave a talk on convergence from the perspectives of a defender of industrial networks, and from the viewpoint of an offensive security specialist. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Jennifer Minella on OT Cybersecurity Convergence

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 29, 2024 29:56


Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Jennifer Minella on OT Cybersecurity ConvergencePub date: 2024-05-28Jennifer Minella, founder and principal advisor of Viszen Security,  joins the Claroty Nexus podcast to discuss her experiences advising organizations on operational technology implementations, risk management, and succeeding at IT/OT convergence. This episode was recorded during RSA Conference where Jennifer and Bryson Bort gave a talk on convergence from the perspectives of a defender of industrial networks, and from the viewpoint of an offensive security specialist. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Aperture: A Claroty Podcast
Jennifer Minella on OT Cybersecurity Convergence

Aperture: A Claroty Podcast

Play Episode Listen Later May 28, 2024 29:56


Jennifer Minella, founder and principal advisor of Viszen Security,  joins the Claroty Nexus podcast to discuss her experiences advising organizations on operational technology implementations, risk management, and succeeding at IT/OT convergence. This episode was recorded during RSA Conference where Jennifer and Bryson Bort gave a talk on convergence from the perspectives of a defender of industrial networks, and from the viewpoint of an offensive security specialist. 

@BEERISAC: CPS/ICS Security Podcast Playlist
Preparing for the potential worst day

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 23, 2024 30:36


Podcast: Hack the Plant (LS 34 · TOP 5% what is this?)Episode: Preparing for the potential worst dayPub date: 2024-05-21In this episode, Bryson Bort is joined by Paul Shaver, Global OT Security Practice Lead at Mandiant / Google Cloud to discuss the cyber threat landscape. How did Paul's military background play a role in his decision to start working with control systems? What is the difference between an advanced persistent threat and a regular threat? What does Paul think is the best way to protect against documented threats from nation-state actors?“I think if we're not doing a better job of protecting critical infrastructure, protecting our assets, any one of the nation state actors could cause that level of mass scale outage or destruction of capability. It comes down to being better prepared to protect these environments,” Paul said. Join us for this and more on this episode of Hack the Plant. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Preparing for the potential worst day

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 23, 2024 30:36


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Preparing for the potential worst dayPub date: 2024-05-21In this episode, Bryson Bort is joined by Paul Shaver, Global OT Security Practice Lead at Mandiant / Google Cloud to discuss the cyber threat landscape. How did Paul's military background play a role in his decision to start working with control systems? What is the difference between an advanced persistent threat and a regular threat? What does Paul think is the best way to protect against documented threats from nation-state actors?“I think if we're not doing a better job of protecting critical infrastructure, protecting our assets, any one of the nation state actors could cause that level of mass scale outage or destruction of capability. It comes down to being better prepared to protect these environments,” Paul said. Join us for this and more on this episode of Hack the Plant. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

She Said Privacy/He Said Security
Offensive Cybersecurity Strategies with Bryson Bort

She Said Privacy/He Said Security

Play Episode Listen Later May 9, 2024 34:10


Bryson Bort is the CEO and Founder of SCYTHE, a threat emulation platform. He is Co-founder of GRIMM, a cybersecurity consultancy and ICS Village, a 501c3 for industrial control security systems. He is recognized as a Top 50 in Cyber by Business Insider and SANS Difference Maker Awards' Innovator of the Year. In this episode… Any security or privacy protocol comes with a plan, and every plan fits into a larger strategy. Coordinating a large-scale strategy while maintaining the finer details is more complicated than it sounds. It helps to have professionals experienced not only in security, but also in strategy in general. Bryson Bort has translated much of his military experience into cybersecurity. His team-forward, offensive mindset has been the foundation of his consulting service and the SCYTHE tool. This framework has proven useful for many notable companies, and it could also work in your arsenal. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels speak with Bryson Bort, the CEO and Founder of SCYTHE, to discuss his offensive cybersecurity strategy. They talk about the issues with training, the problems SCYTHE solves, learning about ransomware, and his previous work with Target. They also touch on Bryson's process for grabbing and keeping attention.

@BEERISAC: CPS/ICS Security Podcast Playlist

Podcast: Hack the Plant (LS 34 · TOP 5% what is this?)Episode: The ICS HackerPub date: 2024-04-23Claroty is a cybersecurity company that helps organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). In this episode, Bryson Bort sits down with Claroty director of research and industrial control system (ICS) vulnerability expert Sharon Brizinov to discuss everything ICS.What are the most common vulnerabilities threatening ICS security? What's the impact of cybersecurity controls standardization? And if he could wave a magic wand, what is one thing he'd change in the ICS industry? “Don't expose ICS equipment over the Internet,” Sharon said. “That's my wish. To eliminate all the ICS Internet-exposed devices.”Join us for this and more on this episode of Hack the Plant. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist

Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: The ICS HackerPub date: 2024-04-23Claroty is a cybersecurity company that helps organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). In this episode, Bryson Bort sits down with Claroty director of research and industrial control system (ICS) vulnerability expert Sharon Brizinov to discuss everything ICS.What are the most common vulnerabilities threatening ICS security? What's the impact of cybersecurity controls standardization? And if he could wave a magic wand, what is one thing he'd change in the ICS industry? “Don't expose ICS equipment over the Internet,” Sharon said. “That's my wish. To eliminate all the ICS Internet-exposed devices.”Join us for this and more on this episode of Hack the Plant. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Resilient Cyber
S6E13: Bryson Bort - Cybersecurity and the Entrepreneurship Journey

Resilient Cyber

Play Episode Listen Later Apr 13, 2024 35:41


- First off, for folks not familiar with your background can you tell us a bit about your background from your journey in your earlier IT/Cyber and military time to eventually being a Founder and CEO?- What made you decide to take that leap and found not just one, but two cybersecurity companies, moving from being a practitioner?- What did you find to be some of the biggest challenges when transitioning from practitioner to business owner?- Have you had to navigate working on versus in the business, and what has that looked like for you?- For some aspiring cyber professionals with goals to found a company someday, what would be some of your key pieces of advice?- I know you're also very passionate about the veteran community in cyber, why do you think veterans make up such a share of our community and often make some of the best cyber practitioners?

@BEERISAC: CPS/ICS Security Podcast Playlist
Securing OT: Strategies for Prioritizing Vulnerabilities

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 24, 2024 42:26


Podcast: PrOTect It AllEpisode: Securing OT: Strategies for Prioritizing VulnerabilitiesPub date: 2024-03-14In this conversation, Bryson Bort discusses his background and the creation of Scythe, an offensive security platform. He also talks about the ICS Village and the Vulnerability Management Pavilion, as well as his collaboration with the Department of Energy on a vulnerability management research project. Bryson emphasizes the importance of prioritizing vulnerabilities in operational technology (OT) and understanding the risks in power plants. He also highlights the need to build trust with asset owners and gain leadership buy-in for cybersecurity initiatives. Finally, he discusses the importance of connecting technical expertise to business priorities. The conversation explores the importance of building trust and collaboration in the field of cybersecurity, particularly in the context of power utilities. It emphasizes the need for security professionals to be partners rather than adversaries, and highlights the role of organizations like the ICS Village in fostering collaboration and education. The conversation also delves into the concept of purple team exercises and the importance of starting small and growing in cybersecurity initiatives. Additionally, it discusses the significance of conversations with policymakers and the need for more cybersecurity professionals in the industry. More About The Episode Hosted by: Aaron Crow Guest: Sevak Avakians Connect with Bryson Bort: Website: scythe.io LinkedIn: https://www.linkedin.com/in/brysonbort/ Connect with Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://www.protectitall.co X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest, or suggest a guest/episode please email us at info@protectitall.co — Show notes by NMP. Audio production by NMP. We hear you loud and clear. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Securing OT: Strategies for Prioritizing Vulnerabilities

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 24, 2024 42:26


Podcast: PrOTect It AllEpisode: Securing OT: Strategies for Prioritizing VulnerabilitiesPub date: 2024-03-14In this conversation, Bryson Bort discusses his background and the creation of Scythe, an offensive security platform. He also talks about the ICS Village and the Vulnerability Management Pavilion, as well as his collaboration with the Department of Energy on a vulnerability management research project. Bryson emphasizes the importance of prioritizing vulnerabilities in operational technology (OT) and understanding the risks in power plants. He also highlights the need to build trust with asset owners and gain leadership buy-in for cybersecurity initiatives. Finally, he discusses the importance of connecting technical expertise to business priorities. The conversation explores the importance of building trust and collaboration in the field of cybersecurity, particularly in the context of power utilities. It emphasizes the need for security professionals to be partners rather than adversaries, and highlights the role of organizations like the ICS Village in fostering collaboration and education. The conversation also delves into the concept of purple team exercises and the importance of starting small and growing in cybersecurity initiatives. Additionally, it discusses the significance of conversations with policymakers and the need for more cybersecurity professionals in the industry. More About The Episode Hosted by: Aaron Crow Guest: Sevak Avakians Connect with Bryson Bort: Website: scythe.io LinkedIn: https://www.linkedin.com/in/brysonbort/ Connect with Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://www.protectitall.co X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest, or suggest a guest/episode please email us at info@protectitall.co — Show notes by NMP. Audio production by NMP. We hear you loud and clear. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Packet Pushers - Full Podcast Feed
PP005: Red, Blue, Purple: Choosing the Right Teams for Security Testing and Defense

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Mar 12, 2024 43:23


According to Bryson Bort, you can build higher metaphorical fences, electrify them, and have sharks with laser beams prowling the moat, but attackers are still going to get through the security perimeter. That's why the priority of any IT team should be to identify anomalies and anticipate attack logic. To do this, organizations need to... Read more »

Packet Pushers - Fat Pipe
PP005: Red, Blue, Purple: Choosing the Right Teams for Security Testing and Defense

Packet Pushers - Fat Pipe

Play Episode Listen Later Mar 12, 2024 43:23


According to Bryson Bort, you can build higher metaphorical fences, electrify them, and have sharks with laser beams prowling the moat, but attackers are still going to get through the security perimeter. That's why the priority of any IT team should be to identify anomalies and anticipate attack logic. To do this, organizations need to... Read more »

ITSPmagazine | Technology. Cybersecurity. Society
Startup Growth, Leadership, and Navigating Market Challenges | A Conversation with with Bryson Bort | Loops and Lifecycles Podcast with Josh Mason

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 12, 2024 14:18


Guest: Bryson Bort, CEO and Founder at SCYTHE [@scythe_io]On LinkedIn | https://www.linkedin.com/in/brysonbort/On Twitter | https://twitter.com/brysonbort/Host: Josh MasonOn ITSPmagazine  

@BEERISAC: CPS/ICS Security Podcast Playlist
Securing, Defending, and Bringing Resilience to Infrastructure

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 2, 2024 36:41


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Securing, Defending, and Bringing Resilience to InfrastructurePub date: 2024-02-28Psymetis creates Operational Technology (OT) security solutions that quickly and prevent electric grid outages and catastrophic infrastructure failures. Psymetis' Werewolf system provides condition monitoring and threat mitigation for the power grid, detecting cyberattacks, equipment failures, and physical damage in real-time. In this episode of Hack the Plant, Bryson sits down with Psymetis CEO Robert Shaughnessy to discuss his work with Psymetis, challenges to innovation in the private sector, and the role of government in developing new technologies. What ecosystem problem is Psymetis solving? How is the federal government involved? What threats do our critical infrastructure systems face? How is China involved?“We're not talking about shooting wars, we're talking about wars where adversaries–to include economic adversaries–can have advantage,”  Shaughnessy said. “As we're looking out over the next couple of years… there's a lot of frightening indicators that want us to plan for these events, knowing the capabilities of our tier one adversaries.” Join us for this and more on this episode of Hack the Plant. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Securing, Defending, and Bringing Resilience to Infrastructure

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 2, 2024 36:41


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Securing, Defending, and Bringing Resilience to InfrastructurePub date: 2024-02-28Psymetis creates Operational Technology (OT) security solutions that quickly and prevent electric grid outages and catastrophic infrastructure failures. Psymetis' Werewolf system provides condition monitoring and threat mitigation for the power grid, detecting cyberattacks, equipment failures, and physical damage in real-time. In this episode of Hack the Plant, Bryson sits down with Psymetis CEO Robert Shaughnessy to discuss his work with Psymetis, challenges to innovation in the private sector, and the role of government in developing new technologies. What ecosystem problem is Psymetis solving? How is the federal government involved? What threats do our critical infrastructure systems face? How is China involved?“We're not talking about shooting wars, we're talking about wars where adversaries–to include economic adversaries–can have advantage,”  Shaughnessy said. “As we're looking out over the next couple of years… there's a lot of frightening indicators that want us to plan for these events, knowing the capabilities of our tier one adversaries.” Join us for this and more on this episode of Hack the Plant. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
CISA's Critical Infrastructure Protection Mission with Jen Easterly

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 5, 2024 50:54


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: CISA's Critical Infrastructure Protection Mission with Jen EasterlyPub date: 2024-02-02As America's Cyber Defense Agency and the National Coordinator for Critical Infrastructure Security and Resilience, the Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every day. In this episode of Hack the Plant, Bryson sits down with CISA Director Jen Easterly to discuss her work on leading CISA's critical infrastructure mission, implementing efforts to make products Secure by Design, and working with private companies to combat ransomware.How has CISA's role evolved since 2018? How do they advance critical infrastructure protection and cyber defense? What are Director Easterly's priorities for 2024? And if she could wave a magic wand, what is one thing she would change? “We need transparency so that we can all work together to protect the ecosystem, because the actors are not ever going to fight fair,” Easterly said. “We need all the collective strength of the community to keep Americans safe and secure.”Join us for this and more on this episode of Hack the Plant. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
CISA's Critical Infrastructure Protection Mission with Jen Easterly

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 5, 2024 50:54


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: CISA's Critical Infrastructure Protection Mission with Jen EasterlyPub date: 2024-02-02As America's Cyber Defense Agency and the National Coordinator for Critical Infrastructure Security and Resilience, the Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every day. In this episode of Hack the Plant, Bryson sits down with CISA Director Jen Easterly to discuss her work on leading CISA's critical infrastructure mission, implementing efforts to make products Secure by Design, and working with private companies to combat ransomware.How has CISA's role evolved since 2018? How do they advance critical infrastructure protection and cyber defense? What are Director Easterly's priorities for 2024? And if she could wave a magic wand, what is one thing she would change? “We need transparency so that we can all work together to protect the ecosystem, because the actors are not ever going to fight fair,” Easterly said. “We need all the collective strength of the community to keep Americans safe and secure.”Join us for this and more on this episode of Hack the Plant. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Ensuring Cybersecurity for Amtrak

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 23, 2023 42:29


Podcast: Hack the Plant (LS 34 · TOP 5% what is this?)Episode: Ensuring Cybersecurity for AmtrakPub date: 2023-12-19I'm joined by Jesse Whaley, the Chief Information Security Officer at Amtrak, for this episode of Hack the Plant.  Amtrak is  the nation's largest passenger rail service provider and one of the most complex and critical transportation systems in the world. We discuss what it takes to oversee Amtrak's digital assets and infrastructure, and what it takes to keep them secure. “The company had a safety culture. Before every meeting before every job site that workers went out to on the railroad to do work. They did safety briefings … I got alignment on hey, this should be our standard company safety and security briefing, but with a whole pillar of safety as being cybersecurity. Since I did that, before every meeting, before every crew goes out to a job site, before every activity, there is a safety and security briefing, and it follows this essential template which highlights and reinforces cybersecurity.”We also cover the impressive talent pipeline and  team and workforce development programs Jesse put into place to staff Amtrak's cybersecurity efforts. Join us to learn more.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Ensuring Cybersecurity for Amtrak

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 23, 2023 42:29


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Ensuring Cybersecurity for AmtrakPub date: 2023-12-19I'm joined by Jesse Whaley, the Chief Information Security Officer at Amtrak, for this episode of Hack the Plant.  Amtrak is  the nation's largest passenger rail service provider and one of the most complex and critical transportation systems in the world. We discuss what it takes to oversee Amtrak's digital assets and infrastructure, and what it takes to keep them secure. “The company had a safety culture. Before every meeting before every job site that workers went out to on the railroad to do work. They did safety briefings … I got alignment on hey, this should be our standard company safety and security briefing, but with a whole pillar of safety as being cybersecurity. Since I did that, before every meeting, before every crew goes out to a job site, before every activity, there is a safety and security briefing, and it follows this essential template which highlights and reinforces cybersecurity.”We also cover the impressive talent pipeline and  team and workforce development programs Jesse put into place to staff Amtrak's cybersecurity efforts. Join us to learn more.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Open Source Data Visualization for Cyber Threats

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 22, 2023 39:24


Podcast: Hack the Plant (LS 33 · TOP 5% what is this?)Episode: Open Source Data Visualization for Cyber ThreatsPub date: 2023-11-21I'm joined by Dan Ricci, founder of the ICS Advisory Project, for this episode of Hack the Plant.The ICS Advisory Project is a free, open-source platform that helps asset owners across 16 critical infrastructure sectors stay secure by identifying threats in their environments.“I saw a gap in the community. There's good data that's coming at us…but no one did anything to take and make that data more digestible through visualization. So I decided, okay, well, I'm just going to do it now. I'm going to take the the data that I have been cleaning up and monitoring for like the past two years, and I'm going to put it together and visualize it, trying to build a tool that's more practical and usable by that asset owner, who may not have a cybersecurity background.”We discuss how data visualization translates into more accessible information for the ICS operators on the ground who need the information - and how the data in the platform is maintained.Join us for an interesting - if technical - discussion about how data from CISA and other agencies can be utilized by asset owners through ICS Advisory's platform.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Open Source Data Visualization for Cyber Threats

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 22, 2023 39:24


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Open Source Data Visualization for Cyber ThreatsPub date: 2023-11-21I'm joined by Dan Ricci, founder of the ICS Advisory Project, for this episode of Hack the Plant.The ICS Advisory Project is a free, open-source platform that helps asset owners across 16 critical infrastructure sectors stay secure by identifying threats in their environments.“I saw a gap in the community. There's good data that's coming at us…but no one did anything to take and make that data more digestible through visualization. So I decided, okay, well, I'm just going to do it now. I'm going to take the the data that I have been cleaning up and monitoring for like the past two years, and I'm going to put it together and visualize it, trying to build a tool that's more practical and usable by that asset owner, who may not have a cybersecurity background.”We discuss how data visualization translates into more accessible information for the ICS operators on the ground who need the information - and how the data in the platform is maintained.Join us for an interesting - if technical - discussion about how data from CISA and other agencies can be utilized by asset owners through ICS Advisory's platform.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Cyber Threat Intelligence Over the Past 25 Years

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 6, 2023 49:05


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Cyber Threat Intelligence Over the Past 25 YearsPub date: 2023-10-31I'm joined by Jason Healey, a Senior Research Scholar at Columbia University's School for International and Public Affairs, for this episode of Hack the Plant. Jason is a pioneer of cyber threat intelligence, with experience spanning fifteen years across the public and private sectors. Today, we discuss a recent article Jason published at Lawfare, looking at 25 years of White House cyber policies, from the Clinton to the Biden administrations. We explore how regulatory policy has become more sophisticated over time, and the evolving nature of threats.“One of the biggest debates right now amongst the international affairs community – is cyber really dangerous? You've got some people that look at how cyber capabilities have been used over the past two decades, how it's currently being used in Ukraine, and say, ‘it's difficult to use this stuff, and frankly it's not as dangerous as we think.' I tend to be on the more pessimistic side … if you're targeting things made of ones and zeros or things made of silicon, cyber can often not be that big a deal. But with smart grids, industrial control systems, and other things connected to the internet, it's not just things made of ones and zeros and silicon.  Cyber attacks can take down  things made of concrete and steel.”To what extent is cyber necessary as part of a defense strategy? How has our regulatory approach changed over 25 years?  Join us to learn more.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Cyber Threat Intelligence Over the Past 25 Years

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 6, 2023 49:05


Podcast: Hack the Plant (LS 33 · TOP 5% what is this?)Episode: Cyber Threat Intelligence Over the Past 25 YearsPub date: 2023-10-31I'm joined by Jason Healey, a Senior Research Scholar at Columbia University's School for International and Public Affairs, for this episode of Hack the Plant. Jason is a pioneer of cyber threat intelligence, with experience spanning fifteen years across the public and private sectors. Today, we discuss a recent article Jason published at Lawfare, looking at 25 years of White House cyber policies, from the Clinton to the Biden administrations. We explore how regulatory policy has become more sophisticated over time, and the evolving nature of threats.“One of the biggest debates right now amongst the international affairs community – is cyber really dangerous? You've got some people that look at how cyber capabilities have been used over the past two decades, how it's currently being used in Ukraine, and say, ‘it's difficult to use this stuff, and frankly it's not as dangerous as we think.' I tend to be on the more pessimistic side … if you're targeting things made of ones and zeros or things made of silicon, cyber can often not be that big a deal. But with smart grids, industrial control systems, and other things connected to the internet, it's not just things made of ones and zeros and silicon.  Cyber attacks can take down  things made of concrete and steel.”To what extent is cyber necessary as part of a defense strategy? How has our regulatory approach changed over 25 years?  Join us to learn more.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Architecting Threat Responses

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 3, 2023 46:52


Podcast: Hack the Plant (LS 33 · TOP 5% what is this?)Episode: Architecting Threat ResponsesPub date: 2023-10-31I'm joined by David Patrick Emmerich, the Principal Cyber-Physical Range Architect at the University of Illinois, for this episode of Hack the Plant. We're here today to talk about RADICS, a DARPA project. RADICS stands for Rapid Attack Detection, Isolation and Characterization Systems.  We discuss David's role in building automated data collection and set up simulations and testing, and how the process of doing vulnerability discovery for physical assets helps asset owners.“  ‘These are ways that an attacker could get around it.' ‘These are where your blind spots might be' … We help them understand that so that they can better improve the security of their systems. Or go back to their boards or their management and say ‘these are the tools we need' or ‘this is the equipment we need and this is why we need it to better improve our security posture.' Their systems are already critical, but as they become even more critical.”  We delve into challenges of securing operational technology (OT) for asset owners, different kinds of threats they face, and more technical projects that RADICS ignited.Join us for an interesting - if technical - discussion to learn more about how physical systems interact with data to support real-time threat response.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Architecting Threat Responses

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 3, 2023 46:52


Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Architecting Threat ResponsesPub date: 2023-10-31I'm joined by David Patrick Emmerich, the Principal Cyber-Physical Range Architect at the University of Illinois, for this episode of Hack the Plant. We're here today to talk about RADICS, a DARPA project. RADICS stands for Rapid Attack Detection, Isolation and Characterization Systems.  We discuss David's role in building automated data collection and set up simulations and testing, and how the process of doing vulnerability discovery for physical assets helps asset owners.“  ‘These are ways that an attacker could get around it.' ‘These are where your blind spots might be' … We help them understand that so that they can better improve the security of their systems. Or go back to their boards or their management and say ‘these are the tools we need' or ‘this is the equipment we need and this is why we need it to better improve our security posture.' Their systems are already critical, but as they become even more critical.”  We delve into challenges of securing operational technology (OT) for asset owners, different kinds of threats they face, and more technical projects that RADICS ignited.Join us for an interesting - if technical - discussion to learn more about how physical systems interact with data to support real-time threat response.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ITSPmagazine | Technology. Cybersecurity. Society
RSAC Sound Byte | A Conversation with Bryson Bort | Locked Down Podcast With Kayla Williams and Taylor Parsons

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Sep 13, 2023 25:37


Guest: Bryson Bort, CEO and Founder of Scythe [@scythe_io]On Twitter | https://twitter.com/brysonbortOn LinkedIn | https://www.linkedin.com/in/brysonbort/________________________________Hosts:Kayla WilliamsOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/kayla-williamsTaylor ParsonsOn ITSPmagazine | https://itspmagazine.com/itspmagazine-podcast-radio-hosts/taylor-parsons________________________________This Episode's SponsorsAre you interested in sponsoring an ITSPmagazine Channel?

@BEERISAC: CPS/ICS Security Podcast Playlist
92: From Military Service to Cyber Luminary: Bryson Bort's Inspiring Journey

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 15, 2023 57:08


Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: 92: From Military Service to Cyber Luminary: Bryson Bort's Inspiring JourneyPub date: 2023-08-15Step into the cybersecurity world with Derek Harp for another riveting episode of the CS2AI podcast show! Derek has welcomed a vast array of industry titans onto the podcast, and this episode is no exception!Today's show features Bryson Bort, the CEO and luminary Founder of Scythe. Bryson's influence spans the domains he has touched, nurtured, advised, and meticulously built from the ground up. As the creator of the renowned ICS Village and the driving force behind Grimm, his story is an intricate tapestry of innovation and impact. A military veteran from the US Army, a nurturing father, a culinary maestro hosting his own show, a kayaker, a relentless charity fundraiser, and an all-around exceptional individual, Bryson embodies a remarkable depth that will most certainly captivate all listeners! Bryson spent his formative years in Germany and the Soviet Union. His linguistic journey began with German, followed by immersion language programs to master English, which was crucial for his educational pursuits. He spent his early years in Berlin until 1988, then in Moscow until 1990. His journey eventually culminated in the United States during his teenage years.Grab a seat and tune in as Derek unravels the narrative that shaped the exceptional Bryson Bort!Show highlights:How Bryson got into cybersecurity.How Bryson learned that procurement is your best friend.The importance of building relationships and providing exceptional service.Bryson shares his recommendations for working with individuals with technical backgrounds and getting them on board. The importance of understanding the business and mission of the company you work for.How cybersecurity eventually took over Bryson's career path.How Bryson got the nickname, Grimm.Bryson talks about starting his company.Bryson shares some advice for taking on new ideas.Bryson explains what the ICS Village is all about.Links and resources:(CS)²AI Derek Harp on LinkedInBryson Bort on LinkedInScytheGRIMMEpisode 79 withMegan SanfordThe podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Control System Cyber Security Association International: (CS)²AI
92: From Military Service to Cyber Luminary: Bryson Bort's Inspiring Journey

Control System Cyber Security Association International: (CS)²AI

Play Episode Listen Later Aug 15, 2023 57:08


Step into the cybersecurity world with Derek Harp for another riveting episode of the CS2AI podcast show! Derek has welcomed a vast array of industry titans onto the podcast, and this episode is no exception!Today's show features Bryson Bort, the CEO and luminary Founder of Scythe. Bryson's influence spans the domains he has touched, nurtured, advised, and meticulously built from the ground up. As the creator of the renowned ICS Village and the driving force behind Grimm, his story is an intricate tapestry of innovation and impact. A military veteran from the US Army, a nurturing father, a culinary maestro hosting his own show, a kayaker, a relentless charity fundraiser, and an all-around exceptional individual, Bryson embodies a remarkable depth that will most certainly captivate all listeners! Bryson spent his formative years in Germany and the Soviet Union. His linguistic journey began with German, followed by immersion language programs to master English, which was crucial for his educational pursuits. He spent his early years in Berlin until 1988, then in Moscow until 1990. His journey eventually culminated in the United States during his teenage years.Grab a seat and tune in as Derek unravels the narrative that shaped the exceptional Bryson Bort!Show highlights:How Bryson got into cybersecurity.How Bryson learned that procurement is your best friend.The importance of building relationships and providing exceptional service.Bryson shares his recommendations for working with individuals with technical backgrounds and getting them on board. The importance of understanding the business and mission of the company you work for.How cybersecurity eventually took over Bryson's career path.How Bryson got the nickname, Grimm.Bryson talks about starting his company.Bryson shares some advice for taking on new ideas.Bryson explains what the ICS Village is all about.Links and resources:(CS)²AI Derek Harp on LinkedInBryson Bort on LinkedInScytheGRIMMEpisode 79 withMegan Sanford

@BEERISAC: CPS/ICS Security Podcast Playlist
90: SBOM: The Future of Cybersecurity with Daniel Bardenstein

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 27, 2023 34:02


Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: 90: SBOM: The Future of Cybersecurity with Daniel BardensteinPub date: 2023-07-25Prepare yourself for another captivating episode of the CS2AI Podcast! Today, we feature an exclusive interview with Daniel Bardenstein, a former USG official turned entrepreneur. Having recently launched a groundbreaking start-up centered on the critical concept of SBOM, Daniel brings a wealth of insider knowledge and experience to the table! Daniel is the Co-founder and Chief Technology Officer of Manifest, a pioneering company specializing in comprehensive SBOM management. Their core mission is to facilitate organizations in embracing this innovative and relatively new concept with utmost simplicity and automation. Through their state-of-the-art solutions, Manifest empowers businesses to navigate the complexities of SBOM seamlessly, ushering in a new era of efficiency and ease.In today's riveting discussion, hosted by Bryson Bort, Daniel pulls back the curtain on what truly happens in the trenches of SBOM and unlocks the secrets to implementing his game-changing approach within organizations. If you have ever wondered what SBOM is all about and how it could transform the way in which your organization operates, this interview is a must-listen! Get ready to dive into the nitty-gritty of SBOM as Daniel spills the beans on what is happening in the thick of it, offering invaluable insights on how to begin implementing this cutting-edge technology within your organization, starting today!Fasten your seatbelt and gear up to elevate your cybersecurity game to unprecedented heights!Show highlights: What is an SBOM? Why SBOM is essential for asset owners. Two key ways to collect SBOMs.Integrating vulnerability management with asset management. Looking retroactively at legacy systems. How SBOM makes vulnerability management better. The importance of vulnerability management. How to get started with internal product security.How to get customers to take action. How long will it take to see value? Links and resources:(CS)²AI Derek Harp on LinkedInDaniel Bardenstein on LinkedInManifest The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Control System Cyber Security Association International: (CS)²AI
90: SBOM: The Future of Cybersecurity with Daniel Bardenstein

Control System Cyber Security Association International: (CS)²AI

Play Episode Listen Later Jul 25, 2023 34:02


Prepare yourself for another captivating episode of the CS2AI Podcast! Today, we feature an exclusive interview with Daniel Bardenstein, a former USG official turned entrepreneur. Having recently launched a groundbreaking start-up centered on the critical concept of SBOM, Daniel brings a wealth of insider knowledge and experience to the table! Daniel is the Co-founder and Chief Technology Officer of Manifest, a pioneering company specializing in comprehensive SBOM management. Their core mission is to facilitate organizations in embracing this innovative and relatively new concept with utmost simplicity and automation. Through their state-of-the-art solutions, Manifest empowers businesses to navigate the complexities of SBOM seamlessly, ushering in a new era of efficiency and ease.In today's riveting discussion, hosted by Bryson Bort, Daniel pulls back the curtain on what truly happens in the trenches of SBOM and unlocks the secrets to implementing his game-changing approach within organizations. If you have ever wondered what SBOM is all about and how it could transform the way in which your organization operates, this interview is a must-listen! Get ready to dive into the nitty-gritty of SBOM as Daniel spills the beans on what is happening in the thick of it, offering invaluable insights on how to begin implementing this cutting-edge technology within your organization, starting today!Fasten your seatbelt and gear up to elevate your cybersecurity game to unprecedented heights!Show highlights: What is an SBOM? Why SBOM is essential for asset owners. Two key ways to collect SBOMs.Integrating vulnerability management with asset management. Looking retroactively at legacy systems. How SBOM makes vulnerability management better. The importance of vulnerability management. How to get started with internal product security.How to get customers to take action. How long will it take to see value? Links and resources:(CS)²AI Derek Harp on LinkedInDaniel Bardenstein on LinkedInManifest

Security Masterminds
Reducing Risk by addressing the Threats to your Cybersecurity program through innovative platforms, with our special guest, Bryson Bort.

Security Masterminds

Play Episode Listen Later Jun 21, 2023 46:04 Transcription Available


Check us out on our new LinkedIn Page!  - https://www.linkedin.com/company/security-masterminds-podcast/Does this sound familiar? You've invested in threat intelligence data and spent countless hours analyzing it, yet you still feel vulnerable to cyber threats. Maybe you were told that having the data alone would be enough to protect your organization. But the reality is, simply having the data without knowing how to turn it into actionable insights leaves you exposed and frustrated. The pain of constantly worrying about cyber attacks and feeling powerless to stop them is all too real. In this episode, we'll show you how to transform your threat intelligence data into actionable intelligence, giving you the tools to defend against even the most sophisticated cyber threats.In this episode, you will be able to:Realize the urgency of embracing cybersecurity for your business's sustained success.Explore how actionable threat intelligence can augment your defenses against cyber adversaries.Absorb the advantages of using a joint and innovative approach to stay on top of evolving digital dangers.Discern the impact of robust communication and leadership skills in fostering a secure digital environment.Appreciate the role of attack simulation technology in unveiling security blind spots and improving protection.My special guest isBryson Bort is an accomplished cybersecurity veteran with more than two decades of experience under his belt. As the founder of Scythe, Bryson has cultivated a platform that empowers professionals in the cybersecurity space to effectively address and combat cyber threats. Simultaneously, he co-founded ICS Village, a non-profit that aims to increase knowledge and awareness of industrial control system security. With a strong background in both offensive and defensive security, Bryson's drive for constant improvement and growth has made him an influential figure within the cybersecurity community.Connect with Bryson Bort!Linkedin: https://www.linkedin.com/in/brysonbort/Twitter: https://twitter.com/brysonbortScythe: https://scythe.io/ICS Village: https://www.icsvillage.com/Testimonial for Scythe  https://scythe.io/library/purple-team-approach-boosts-cybersecurityConnect with us:Website: securitymasterminds.buzzsprout.comKnowBe4 Resources:KnowBe4 Blog: https://blog.knowbe4.comErich Kron - https://www.linkedin.com/in/erichkronJelle Wieringa - https://www.linkedin.com/in/jellewieringaJames McQuiggan - https://www.linkedin.com/in/jmcquigganJavvad Malik: https://www.linkedin.com/in/javvadMusic Composed by: Brian Sanyshyn - https://www.briansanyshynmusic.comAnnouncer: Sarah McQuiggan - https://www.sarahmcquiggan.comThis show's sound is edited by ProPodcastSolutions -https://propodcastsolutions.com/Show Notes created with Capsho - www.capsho.com

@BEERISAC: CPS/ICS Security Podcast Playlist
Managing Incident Responses to Critical Infrastructure Attacks

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Apr 7, 2023 43:11


Podcast: Hack the Plant (LS 33 · TOP 5% what is this?)Episode: Managing Incident Responses to Critical Infrastructure AttacksPub date: 2023-04-03For today's episode, I'm joined by Lesley Carhart. Lesley is the Director of Incident Response for North America at the industrial cybersecurity company Dragos, Inc. She leads incident response and proactively hunts for threats in customers' ICS environments. Lesley was the incident response team lead at Motorola Solutions, and retired from the United States Air Force. Today, we dive into the kinds of active threats out there that incident response deals with:“We see insider cases, both intentional and unintentional insider cases. We see a lot of crime ware. So crime actors are getting smarter about where they're doing things like ransomware attacks. They're less haphazard. There's probably less overall attacks now, but they're more smartly performed. So they're targeting more critical industries. They are targeting people who they think will have to pay…And then there's still adversary groups who are more state style, who are building their capabilities to launch attacks in the future. And conducting espionage, preparing to do sabotage. And that's still happening and they're getting better at it.” - Lesley CarhartWe explore the challenges of securing operational technology (OT) for asset owners, different kinds of threats, and the process of doing vulnerability discovery for these physical assets.What do asset owners in critical infrastructure need to secure in the first place - and why is this so challenging to stay on top of? What kind of incident response plan is needed for OT in an industrial environment? Join us to learn more. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The PrOTect OT Cybersecurity Podcast
Bryson Bort: Security Is Defined By The Threat - Contextualizing Cyber Risks To Prioritize Security Efforts

The PrOTect OT Cybersecurity Podcast

Play Episode Listen Later Mar 30, 2023 52:40


About Bryson Bort: Bryson Bort is a skilled cybersecurity professional with an impressive background as an entrepreneur and former U.S. Army Officer. He founded SCYTHE, a platform for next-generation attack emulation, and GRIMM, a cybersecurity consulting firm. Additionally, he co-founded the ICS Village, a non-profit organization dedicated to raising awareness about industrial control system security. Bryson has received numerous awards and recognitions, including being named one of the Top 50 in Cyber by Business Insider and a Tech Titan in Washington DC. He also served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom during his military career. Bryson earned his Bachelor of Science in Computer Science with honors from the United States Military Academy at West Point and completed various professional education courses in tactical communications and information assurance. With his extensive experience in the cybersecurity industry, Bryson is a respected thought leader and advisor in the field.In this episode, Aaron and Bryson Bort discuss:The challenges and cultural divide in addressing cybersecurity issues in OT, why IT security solutions don't work for OT, and why OT security is lagging behind IT securityBridging the gap between OT and IT through education, but also listening and building trust.Vulnerability management and patching versus risk mitigationRansomware in cars, geopolitical concerns, and positive developments in government efforts and regulation to support risk management in education and critical infrastructure's OT side.Key Takeaways:OT cybersecurity requires a different approach than IT cybersecurity due to the complex technical environment and the potential safety risks involved, and tools alone cannot bridge the cultural and skillset divide between OT and IT professionals.When it comes to vulnerability management, IT emphasizes patching and is often compliance driven. In OT it's important to recognize that systems in an operational environment often cannot be patched without disruption operations, so OT vulnerability management emphasizes risk mitigation, and putting safeguards around the vulnerability.Security is defined by the threat. Security is measured and validated against how well that threat is mitigated. So it's important to understand the behavioral characteristics of threats in order to take the actions that improve your security posture. Contextualizing what the security threat means to you is important for prioritization. Relatively speaking, the cybersecurity industry is still young, and the U.S. Government's cybersecurity programs are even younger. We will continue to see more development and improvements with regard to unified cybersecurity programs in the near future. "I think a lot of people forget how young this industry is and also how young the government's attempts are at this industry." — Bryson Bort Connect with Bryson Bort: Website: https://scythe.io/ and https://grimmcyber.com/Show: https://podcasts.apple.com/us/podcast/hack-the-plant/id1528852909LinkedIn: https://www.linkedin.com/in/brysonbort/Twitter: https://twitter.com/brysonbortHack the Capitol 2023: https://www.icsvillage.com/hack-the-capitol-2023Connect with Aaron:LinkedIn: https://www.linkedin.com/in/aaronccrowLearn more about Industrial Defender:Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/Twitter: https://twitter.com/iDefend_ICSYouTube: https://www.youtube.com/@industrialdefender7120Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

Simply Cyber
Adversary Emulation All The Things!

Simply Cyber

Play Episode Listen Later Feb 24, 2023 68:49


Cyber attacks are an everyday occurrence and emulation is a great way to test the efficacy of your controls but are you doing it right? Do you know where the gaps are?Join us as Bryson Bort visits to share his informed thoughts on adversary emulation, and so much more from his vast #cybersecurity career on Simply Cyber Live.Its Going to Be Epic!Bryson Bort is a significant #cybersecurity community member and CEO of Scythe, a nex-gen cyber attack emulation platform.

ITSPmagazine | Technology. Cybersecurity. Society
Black Hat 25 & DEF CON 30 Live Streaming Coverage With ITSPmagazine | Chloé Messdaghi, Jake Williams, And Bryson Bort | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 10, 2022 46:37


It's Hacker Summer Camp time! Thank you for joining this live stream during Black Hat and DEF CON with guests Chloé Messdaghi, Jake Williams, and Bryson Bort!Watch the live stream video on our Black Hat and DEF CON coverage page: https://www.itspm.ag/bhdc22Follow our social media as everything will be streamed live as it is. No editing, no script, and most of all … no BS

ITSPmagazine | Technology. Cybersecurity. Society
ICS Village At DEF CON 30: Chats On The Road | A Conversation With Bryson Bort And Tom VanNorman | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 3, 2022 35:38


The ICS Village is one of the first DEF CON villages we ever connected with. A lot has changed over the years, including the threats faced by critical infrastructure entities around the world. Let's find out what to expect at this year's village.About the ICS VillageHigh profile industrial control system (ICS) security issues have grabbed headlines and sparked change throughout the global supply chain. The ICS Village allows defenders of any experience level to understand the unique failure modes of these systems and how to better prepare and respond to the changing threat landscape.Interactive simulated ICS environments, such as Hack the Plan(e)t and Howdy Neighbor, provide safe yet realistic environments to preserve safe, secure, and reliable operations. The ICS Village brings a compelling experience for all experience levels and types, with IT and industrial equipment. Our interactive learning approach invites you to get hands on with the equipment to build your skills.We bring you real components such as programmable logic controllers (PLC), human-machine interfaces (HMI), remote telemetry units (RTU), and actuators to simulate a realistic environment by using commonly used components throughout different industrial sectors. You will be able to connect your machine to the different industrial components and networks and try to assess these ICS devices with common security scanners to sniff the industrial traffic, and more!Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestsBryson BortCo-Founder of the ICS Village [@ICS_Village]On LinkedIn | https://www.linkedin.com/brysonbortOn Twitter | https://mobile.twitter.com/brysonbortOn YouTube | https://youtube.com/c/ICSVillageTom VanNormanFounding member of the ICS VillageOn LinkedIn | https://www.linkedin.com/in/thomasvannorman/On Twitter | https://twitter.com/Tom_VanNorman____________________________This Episode's SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegweb____________________________ResourcesICS Village Website: https://www.icsvillage.com/ICS Village at DEF CON 30 Schedule: https://www.icsvillage.com/schedule-def-con-30ICS Village 360 Tour: https://www.exhibitstudiosmedia.com/tours/21396_ics_360_tour/____________________________For more Black Hat and DEF CON  Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?