Podcasts about Critical infrastructure

Infrastructure important to national security

  • 556PODCASTS
  • 1,118EPISODES
  • 35mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Feb 13, 2026LATEST
Critical infrastructure

POPULARITY

20192020202120222023202420252026


Best podcasts about Critical infrastructure

Show all podcasts related to critical infrastructure

Latest podcast episodes about Critical infrastructure

Energy Talks
#120: Use of Deception Solutions in Energy Sector Cybersecurity

Energy Talks

Play Episode Listen Later Feb 13, 2026 9:02


In this episode of Energy Talks, host Simon Rommer, OT Security Consultant at OMICRON, and his guest, Christoph Kukovic, Chief Information Security Officer at Verbund AG , Austria's leading energy company and one of the largest producers of hydroelectricity in Europe, discuss the critical roles of IT and OT in power systems cybersecurity, focusing on the use of deception solutions to fool attackers and protect online infrastructure.

@BEERISAC: CPS/ICS Security Podcast Playlist
Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to Manufacturing

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 12, 2026 33:41


Podcast: Industrial Cybersecurity InsiderEpisode: Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to ManufacturingPub date: 2026-02-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Dick Wilkinson, CTO and co-founder of Proof Labs, to explore the intersection of space technology and industrial cybersecurity.Dick shares his 20-year journey in the U.S. Army with the National Security Agency, transitioning from signals intelligence to becoming a CISO for critical infrastructure organizations, including New Mexico's Supreme Court and the Albuquerque water authority.The conversation dives deep into the challenges of securing satellite systems with onboard intrusion detection and the persistent gap between IT and OT security teams. We also explore why the "castle wall" perimeter security model is dangerously outdated.Dick reveals how AI is lowering the barrier to entry for both attackers and defenders, and discusses the real-world applications of satellite communications in oil and gas operations.He also introduces a revolutionary physical layer-one air gap device called Goldilock Secure, which could transform how we protect remote industrial assets.This episode is essential listening for CISOs, CTOs, and security leaders looking to understand emerging threats in space-based infrastructure and practical solutions for securing distributed industrial environments.Chapters:(00:00:00) - Dick's Journey: From NSA to Space Cybersecurity(00:04:32) - What is Proof Labs and Why Space Security Matters(00:08:15) - Satellites as OT Assets: Oil, Gas, and Critical Infrastructure(00:12:47) - How Onboard Intrusion Detection Works in Spacecraft(00:16:23) - The Castle Wall Problem: Moving Beyond Perimeter Security(00:19:41) - IT vs OT: Bridging the Gap in Manufacturing Cybersecurity(00:24:18) - AI's Impact: Lowering the Barrier for Attackers and Defenders(00:27:35) - The Visibility Challenge: Why Most Plants Don't Know Their Assets(00:30:12) - Goldilock Firebreak: A Physical Air Gap Device That Changes Everything(00:35:20) - Real-World Applications for Remote Industrial Asset ProtectionLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Dick Wilkinson on LinkedInProof Labs WebsiteIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Easy Prey
Critical Infrastructure Risks

Easy Prey

Play Episode Listen Later Feb 11, 2026 38:41


Most cybersecurity conversations focus on stolen data, breached accounts, and attacks that live entirely on screens. This episode looks at a far more consequential threat: what happens when cyberattacks target the physical systems that keep society running. Power, water, transportation, and manufacturing. When those systems fail, the consequences aren't just digital. They're immediate, visible, and sometimes dangerous. My guest is Lesley Carhart, Technical Director of Incident Response at Dragos, a cybersecurity firm focused exclusively on protecting critical infrastructure. Lesley specializes in industrial control systems and operational technology, investigating real-world attacks against power plants, water systems, transportation networks, and industrial facilities built on aging, irreplaceable technology. We talk about why these environments are uniquely vulnerable, how ransomware groups and nation-state actors quietly gain long-term access, and why many compromises go undetected for years. The conversation also explores the limits of traditional cybersecurity thinking, the real-world constraints operators face, and what organizations can realistically do to improve security when failure isn't an option. Show Notes: [01:30] Lesley Carhart is here and explains what operational technology is and why industrial systems are uniquely vulnerable [03:40] How decades-old computers still run power plants, water systems, and transportation infrastructure [06:10] Why industrial environments can't simply patch, upgrade, or shut systems down [08:25] The mindset shift required when safety and continuity matter more than stopping an intrusion [10:40] Why air-gapped systems are mostly a myth in modern critical infrastructure [13:15] How remote access became unavoidable—and one of the biggest risk factors [16:05] The three main threat categories facing industrial systems: ransomware, insiders, and nation-state actors [18:45] Why ransomware is especially damaging in power, water, and manufacturing environments [21:30] How nation-state attackers quietly establish footholds years before taking action [24:20] Why many industrial compromises go undetected for months—or even years [27:10] What incident response looks like when you can't just "pull the plug" [30:05] The most common causes of industrial failures: human error, maintenance issues, and environment [32:40] A surprising incident that looked like a nation-state attack—but wasn't [34:55] Why critical infrastructure organizations often feel pressure to pay ransoms [37:00] Practical starting steps for organizations with aging, mission-critical systems [39:20] Advice for people interested in industrial cybersecurity and working with legacy technology [42:10] Why mentorship matters and why Lesley chooses to give back to the field Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Lesley Carhart Lesley Carhart - LinkedIn Lesley Carhart - Dragos

Breakfast with Refilwe Moloto
What the Hack! Flood-fighting tech, why AI still needs humans, and the rise of AI agents

Breakfast with Refilwe Moloto

Play Episode Listen Later Feb 10, 2026 9:02 Transcription Available


In this week’s edition of What the Hack!, Arthur Goldstuck shares with Lester Kiewit insights from Amsterdam, where he attended Cisco Live and visited the Maeslantkering, a vast automated storm surge barrier protecting the Netherlands from flooding. He also discusses why AI still needs human input, drawing on a major African-led language project, and unpacks the growing role of AI agents as intelligent assistants, alongside the risks of agent sprawl as automation accelerates. Good Morning Cape Town with Lester Kiewit is a podcast of the CapeTalk breakfast show. This programme is your authentic Cape Town wake-up call. Good Morning Cape Town with Lester Kiewit is informative, enlightening and accessible. The team’s ability to spot & share relevant and unusual stories make the programme inclusive and thought-provoking. Don’t miss the popular World View feature at 7:45am daily. Listen out for #LesterInYourLounge which is an outside broadcast – from the home of a listener in a different part of Cape Town - on the first Wednesday of every month. This show introduces you to interesting Capetonians as well as their favourite communities, habits, local personalities and neighbourhood news. Thank you for listening to a podcast from Good Morning Cape Town with Lester Kiewit. Listen live on Primedia+ weekdays between 06:00 and 09:00 (SA Time) to Good Morning CapeTalk with Lester Kiewit broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/xGkqLbT or find all the catch-up podcasts here https://buff.ly/f9Eeb7i Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567See omnystudio.com/listener for privacy information.

@BEERISAC: CPS/ICS Security Podcast Playlist
Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO view

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 9, 2026 45:59


Podcast: ICS Cyber Talks PodcastEpisode: Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO viewPub date: 2026-02-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationניהול סייבר הוא הרבה דברים שהם מעבר להגנה, היכולת לעבוד מול כלל הגורמים בחברה ממשתמשי הקצה בנושא מודעות סייבר, דרך יצירת מרחב עבודה ושיתוף פעולה של גורמי מקצוע האחרים כגון: ניהול סיכונים, המחלקה המשפטית, מערכות המידע והרשימה עוד ארוכה. כול זה עוד לפני הצורך לתת מענה להיבטים העסקיים ועבודה שוטפת מול הנהלה ודירקטוריון. הפעם בקשתי לפתוח את נושא ההנהלה בצורה רחבה יותר, מה קורה שאתה מקבל/לוקח עליך כסמנכ"ל את האחריות הניהולית למערכות המידע של החברה וכפל כפלים בחברה שהיא תשתיות קריטיות תחת רגולציות קשיחות. נחשון פינקו מארח את עידן פלק סמנכ"ל הסחר ומערכות המידע של קבוצת אורות אנרגיה בשיחה על ראיית המנהל לאחר שנתיים וחצי מאז שלקח על עצמו את האחריות למערכות המידע ללא שום ידע בתחום. ההתמודדות עם מלחמה שהאתרי הייצור של החברה הם מטרה ברורה לתקיפה פיזית וקיברנטית. ניהול סיכונים בנית צוות העבודה במסגרת ההנהלה הבכירה והדירקטוריון גיבוש תקציב תחת "שמיכה קצרה" וסדר עדיפויות ועוד Cyber management is about much more than just protection. It's the ability to work with every entity in the company, from end-users on cyber awareness to creating a collaborative workspace with other professionals, such as risk management, legal, IT, and more. All of this is even before addressing business aspects and ongoing work with senior management and the Board of Directors This time, I wanted to explore the management aspect more broadly: what happens when you, as a VP, take on the administrative responsibility for the company's information systems, especially in a critical infrastructure company under strict regulation Nachshon Pincu hosts Idan Flek, VP Chief Commercial Officer and Information Systems at the Orot Energy Group, for a conversation from a manager's perspective, two and a half years after taking on IT responsibilities with no prior knowledge of the field. Dealing with a war where the company's production sites are clear targets for physical and cyber attacks Risk management Building a team Prioritizing cyber within senior management and the Board formulating a budget under a 'short blanket' and shifting priorities and moreThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cyber Security Uncut
The CISO Brief: Critical infrastructure, CEOs back down on AI, and how to navigate AI threats

Cyber Security Uncut

Play Episode Listen Later Feb 9, 2026 17:11


In this episode of The CISO Brief, the Cyber Daily team outlines the lessons learnt from the cyber attack on Poland's power grid, what legal counsel can do to guide you through an AI threat, and why CEOs are more cautious of the technology than ever. In this episode, hosts Liam Garman and Daniel Croft discuss the impact of critical infrastructure cyber attacks and what Australia can learn from them as they occur overseas. The two then outline how legal counsel can guide a business through AI and deepfake threats as the technology changes the threat landscape. Finally, the two discuss how CEOs are more cautious than ever about AI implementation and why it's a good thing. Enjoy the show, The Cyber Daily team

The CyberWire
The quietest weapon in America's loudest strike.

The CyberWire

Play Episode Listen Later Feb 5, 2026 31:42


Cyber weapons knock out Iranian air defenses during strikes on nuclear sites. ShinyHunters dump more than a million stolen records from Harvard and Penn. Betterment confirms a breach exposing data from roughly 1.4 million accounts. Researchers uncover a sprawling scam network impersonating law firms. Italy blocks cyberattacks aimed at Olympics infrastructure. Critical bugs put n8n and Google Looker servers at risk of full takeover. A state-backed Shadow Campaign hits governments worldwide. OpenClaw shows how AI-powered attacks are becoming faster, cheaper, and harder to stop. Our guest is Tony Scott, CEO of Intrusion and former federal CIO, sharing his perspective on evolving regulation and the realities behind critical policy shifts. Your smartphone may testify against you. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today comes as a segment from our Caveat podcast. Tony Scott, CEO of Intrusion and former federal CIO, joins Dave Bittner to share his perspective on evolving regulation and the realities behind critical policy shifts. You can listen to Tony and Dave's full conversation on this week's episode of Caveat, and catch new episodes of Caveat every Thursday on your favorite podcast app. Selected Reading Exclusive: US used cyber weapons to disrupt Iranian air defenses during 2025 strikes (The Record) Personal data stolen during Harvard and UPenn data breaches leaked online - over a million details, including emails, home addresses and more, all published (TechRadar) Data breach at fintech firm Betterment exposes 1.4 million accounts (Bleeping Computer) Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign (SecurityWeek) Italy Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says (SecurityWeek) n8n security woes roll on as new critical flaws bypass December fix (The Register) LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem) (Tenable) Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries (SecurityWeek) The Rise of OpenClaw (SECURITY.COM) Smartphones Now Involved in Nearly Every Police Investigation (Infosecurity Magazine) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Gate 15 Podcast Channel
Weekly Security Sprint EP 144. Kermit the Frog, Threat Management, Cyber Resilience and more!

The Gate 15 Podcast Channel

Play Episode Listen Later Feb 4, 2026 22:04


In this week's episode of the Security Sprint, Dave and Andy covered the following topics:Opening:Check out the new SUN format and Subscribe to GRIP! Gate 15's Resilience and Intelligence PortalBig News! The Tribal-ISAC Appoints First Executive Director to Advance Cybersecurity for Tribal Governments and Enterprises – Tribal-ISAC | 27 Jan 2026: Keys & Locks – The Overlooked Security Risk – Fact Sheet — WaterISAC | 28 Jan 2026 Main Topics:Insider Threats: Assembling A Multi-Disciplinary Insider Threat Management Team — CISA | 27 Jan 2026 (Analysis/Commentary) CISA's new infographic guides organizations in forming insider threat teams that bring together HR, legal, IT, security, and leadership under a “Plan, Organize, Execute, Maintain” framework. Savannah Best Buy employee says hacker group blackmailed him into theft ring scheme Study: Future workers would sell patient data Former Google Engineer Found Guilty of Economic Espionage and Theft of Confidential AI Technology Former TD Bank Employee Pleads Guilty to Accepting Bribes and Laundering $55 Million From Colombia Two Recent Guilty Pleas Highlight Financial Crime Risks Posed by Bank Insiders The Evolution of Insider Threat Ransomware Threat Outlook 2025-2027 — Canadian Centre for Cyber Security | 28 Jan 2026 The Cyber Centre assesses that ransomware against Canadian organizations is increasing and rapidly evolving, with actors almost certainly opportunistic and financially motivated, and essentially all organizations and individuals at risk of being targeted at some point. Ransomware: How to Prevent and Recover (ITSAP.00.099) — Canadian Centre for Cyber Security Ransomware Playbook (ITSM.00.099) — Canadian Centre for Cyber Security Threat Spotlight: Ransomware and Cyber Extortion in Q4 2025 NCC Group Monthly Threat Pulse – Review of December 2025 The Convergence of Infostealers and Ransomware: From Credential Harvesting to Rapid Extortion ChainsFBI Operation Winter SHIELD: 10 Cybersecurity Actions for Critical Infrastructure & FBI Launches ‘Winter SHIELD' Cyber Campaign — FBI & Infosecurity Magazine, 29 Jan 2026. NSA Releases Phase One and Phase Two of the Zero Trust Implementation Guidelines How to prepare and plan your organisation's response to a severe cyber threat: a guide for CNI Cyber security considerations for drone use (ITSAP.00.143) Cyber security advisory AV26-058: OpenSSL Security Advisory Cyber Incident Reporting Guidelines: Key Information & Sharing Requirements — Canadian Centre for Cyber Security, 2026DOD: JIATF 401 Publishes New Guidance for Physical Protection of Critical Infrastructure (U.S. Department of Defense, Jan 2026) Spotting malicious email messages (ITSAP.00.100) — Canadian Centre for Cyber Security | Jan 2026 Quick Hits:2025 Threat Report: Exploitation Grows Across IT, IoT, and OT — Forescout Vedere Labs | 29 Jan 2026 Man arrested after spraying substance on Rep. Ilhan Omar Ilhan Omar Attack: Suspect Identified as Anthony Kazmierczak Amid Rising Political Violence Calls to Impeach DHS Secretary Noem Grow After Minneapolis Shootings and Omar Attack ‘No Kings' march event in Twin Cities & ‘No Kings' protest march set for March 28 USCP Threat Assessment Cases for 2025 – Source: U.S. Capitol Police, 27 Jan 2026.

@BEERISAC: CPS/ICS Security Podcast Playlist
OT Remote Access After COVID: Why IT Tools Fail and What Critical Infrastructure Needs Now

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 4, 2026 49:30


Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: OT Remote Access After COVID: Why IT Tools Fail and What Critical Infrastructure Needs NowPub date: 2026-02-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationRemote access transformed overnight - and OT environments are still feeling the impact. In this episode of Protect It All, host Aaron Crow is joined by Steve Rutherford, VP of Sales at Hyperport and former military officer, for a candid conversation on how secure remote access in operational technology (OT) has evolved - and where it's heading next. They unpack how COVID accelerated remote connectivity across critical infrastructure, why many traditional IT security tools fall short in OT environments, and what protection really looks like when safety, reliability, and uptime are non-negotiable. Drawing from military discipline and frontline OT experience, Steve shares a grounded perspective on managing risk in environments where failure has physical-world consequences. You'll learn: How COVID permanently changed OT remote access expectations Why IT-first security approaches don't translate well to OT The role of layered access controls and policy-driven permissions How dynamic access and trust scoring are reshaping OT security Where IT/OT convergence helps - and where it creates new risk What leaders must prioritize to balance access, safety, and resilience If you're responsible for enabling remote access while protecting critical operations, this episode delivers real-world insight, practical guidance, and a forward-looking view of OT cybersecurity. Tune in to understand what secure OT access really requires in today's threat landscape- only on Protect It All. Key Moments:  00:00 Securing Critical Infrastructure Access 03:59 "OT Mindset: Defense and Offense" 07:26 "Remote Access Challenges in Operations" 11:45 "Challenges in OT-IT Integration" 16:07 Authority Must Match Responsibility 18:23 Simplifying OT Authentication Challenges 21:53 "Dynamic Trust Scoring with AI" 24:05 "Access Control and Segmentation" 28:57 "Secure Access Without Overreach" 33:12 "Left of Boom Awareness" 35:56 OT Security and Local Control 39:35 "Driving Early Adoption Awareness" 41:54 "Proactive Support for Critical Infrastructure" 45:52 "Remote Work Enhances Team Efficiency" 47:17 "Exciting Tech for Cybersecurity" About the guest : Steve Rutherford is a former U.S. Army officer and aviator who transitioned his mission-driven mindset from military service to protecting critical infrastructure through operational technology (OT) security. After exploring multiple industries, Steve found a natural alignment between military operations and OT environments - where safety, reliability, and uptime are non-negotiable. Today, he works in secure user access for OT, helping organizations protect the systems that power modern life. How to connect steve :  Website : https://hyperport.io/ Linkedin: https://www.linkedin.com/in/steverutherford1/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast  To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ICS Cyber Talks Podcast
Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO view

ICS Cyber Talks Podcast

Play Episode Listen Later Feb 4, 2026 45:59


ניהול סייבר הוא הרבה דברים שהם מעבר להגנה, היכולת לעבוד מול כלל הגורמים בחברה ממשתמשי הקצה בנושא מודעות סייבר, דרך יצירת מרחב עבודה ושיתוף פעולה של גורמי מקצוע האחרים כגון: ניהול סיכונים, המחלקה המשפטית, מערכות המידע והרשימה עוד ארוכה. כול זה עוד לפני הצורך לתת מענה להיבטים העסקיים ועבודה שוטפת מול הנהלה ודירקטוריון. הפעם בקשתי לפתוח את נושא ההנהלה בצורה רחבה יותר, מה קורה שאתה מקבל/לוקח עליך כסמנכ"ל את האחריות הניהולית למערכות המידע של החברה וכפל כפלים בחברה שהיא תשתיות קריטיות תחת רגולציות קשיחות. נחשון פינקו מארח את עידן פלק סמנכ"ל הסחר ומערכות המידע של קבוצת אורות אנרגיה בשיחה על ראיית המנהל לאחר שנתיים וחצי מאז שלקח על עצמו את האחריות למערכות המידע ללא שום ידע בתחום. ההתמודדות עם מלחמה שהאתרי הייצור של החברה הם מטרה ברורה לתקיפה פיזית וקיברנטית. ניהול סיכונים בנית צוות העבודה במסגרת ההנהלה הבכירה והדירקטוריון גיבוש תקציב תחת "שמיכה קצרה" וסדר עדיפויות ועוד Cyber management is about much more than just protection. It's the ability to work with every entity in the company, from end-users on cyber awareness to creating a collaborative workspace with other professionals, such as risk management, legal, IT, and more. All of this is even before addressing business aspects and ongoing work with senior management and the Board of Directors This time, I wanted to explore the management aspect more broadly: what happens when you, as a VP, take on the administrative responsibility for the company's information systems, especially in a critical infrastructure company under strict regulation Nachshon Pincu hosts Idan Flek, VP Chief Commercial Officer and Information Systems at the Orot Energy Group, for a conversation from a manager's perspective, two and a half years after taking on IT responsibilities with no prior knowledge of the field. Dealing with a war where the company's production sites are clear targets for physical and cyber attacks Risk management Building a team Prioritizing cyber within senior management and the Board formulating a budget under a 'short blanket' and shifting priorities and more

Joey Pinz Discipline Conversations
#804 MSSP Alert Live - Valerie Cofield:

Joey Pinz Discipline Conversations

Play Episode Listen Later Jan 21, 2026 48:34


Send us a textIn this powerful and deeply insightful conversation, Joey Pinz sits down with national security leader Valerie Cofield to explore the past, present, and future of cybersecurity across government, critical infrastructure, and everyday life. With 26 years at the FBI, senior leadership at CISA, and her current mission at ICIT, Valerie brings unmatched clarity to the threats shaping our world—from nation-state attacks on rural water systems to AI-enabled scams targeting vulnerable populations.Valerie reflects on why critical infrastructure is now a primary battleground, how bipartisan policy work shaped U.S. cyber readiness, and why the private sector—not government—will be on the front lines of future conflicts. She also shares her personal journey as the daughter of South Korean immigrants, the gratitude that shaped her service, and the emotional weight of protecting the country that gave her family a second chance.Beyond cyber, Joey and Valerie discuss reading habits, mental health, misinformation, and the dangers social media poses to young people. Valerie also offers a heartfelt perspective on leadership, longevity, habits, exercise, and earning success through consistency—not perfection.

No Password Required
No Password Required Podcast Episode 68 — Rob Hughes

No Password Required

Play Episode Listen Later Jan 20, 2026 44:51


Rob Hughes — CISO at RSA and Champion of a Passwordless FutureNo Password Required Season 7:  Episode 1 - Rob HughesRob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA's Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA's products and corporate environment.Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point.  The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars.Follow Rob on LinkedIn: https://www.linkedin.com/in/robert-hughes-816067a4/Chapters: 00:00 Introduction to No Password Required01:43 Meet Rob Hughes, CISO at RSA02:05 The Role of a CISO in a Security Company05:09 Transitioning to the CISO Role08:00 The Early Days of Geek.com12:14 Launching a Startup During the Dot Com Boom14:30 The Push for a Passwordless Future18:21 Tipping Point for Passwordless Adoption20:20 Ongoing Learning in Cybersecurity26:09 Managing Stress in High-Pressure Environments33:46 The Lifestyle Polygraph Begins34:15 Career Insights in Cybersecurity36:08 Dream Cars and Personal Preferences39:58 Underrated Horror Films41:19 Creating a Cybersecurity Monster

@BEERISAC: CPS/ICS Security Podcast Playlist
From Controls to Control: The Governance Imperative in OT / Critical Infrastructure Cybersecurity

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 14, 2026 25:29


Podcast: CanadianSME Small Business PodcastEpisode: From Controls to Control: The Governance Imperative in OT / Critical Infrastructure CybersecurityPub date: 2026-01-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome to the CanadianSME Small Business Podcast, hosted by SK Uddin. Today we explore the world of Industrial Cybersecurity and how businesses can safeguard critical infrastructure in an increasingly connected environment.Our guest is Denrich Sananda, Managing Partner and Senior Consultant at Arista Cyber, a Harvard Business School alumnus and member of the ISA 62443 standard committee. Denrich and his team specialize in protecting Industrial Control Systems by ensuring cybersecurity, reliability, and uptime work in harmony.Key HighlightsGovernance & Standards: Denrich explains why frameworks like IEC 62443 and NIST CSF 2.0 are essential in OT environments. Leadership & Turnaround: He shares the key mindset shift that drove a major multi million euro corporate turnaround. Cybersecurity & Safety: Denrich breaks down how Arista Cyber unites cybersecurity, reliability, and functional safety. Resilience Roadmaps: He outlines layered security approaches like the Purdue Model and Industrial Threat Detection. Global Vision: Denrich discusses TÜV certification and Arista Cyber's long term mission to protect global critical infrastructure.Special Thanks to Our Partners:UPS: https://solutions.ups.com/ca-beunstoppable.html?WT.mc_id=BUSMEWAGoogle: https://www.google.ca/A1 Global College: https://a1globalcollege.ca/ADP Canada: https://www.adp.ca/en.aspxFor more expert insights, visit www.canadiansme.ca and subscribe to the CanadianSME Small Business Magazine. Stay innovative, stay informed, and thrive in the digital age!Disclaimer: The information shared in this podcast is for general informational purposes only and should not be considered as direct financial or business advice. Always consult with a qualified professional for advice specific to your situation.The podcast and artwork embedded on this page are from SK Uddin, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Helicopter Podcast
Episode #161: How Helicopters Support Critical Infrastructure | Mark Wegele - The Helicopter Podcast

The Helicopter Podcast

Play Episode Listen Later Jan 13, 2026 62:51


Send us a textWelcome to The Helicopter Podcast, brought to you by Vertical HeliCASTS!In this episode of The Helicopter Podcast, host Halsey J. Schider sits down with Mark Wegele, director of operations for the Salt River Project, to explore how helicopters support critical infrastructure across the Phoenix region.Mark shares how SRP's flight department uses helicopters for power line maintenance, environmental management, dam inspections, and utility operations, and why these missions demand a strong balance between pilots, maintainers, and leadership. Coming from a maintenance background himself, Mark offers a unique perspective on managing a growing flight department without being pulled away to fly — allowing the team to stay focused as operations scale.The conversation also dives into in-house maintenance, hiring challenges in aviation, and why personality, adaptability, and team fit matter just as much as technical skill. Mark and Halsey discuss how drones and submersible systems now complement helicopter operations, drastically reducing inspection time while improving safety — without replacing the helicopter's core role.From career progression and industry advocacy to workforce development and future technology, this episode offers valuable insight for pilots, maintainers, managers, and anyone interested in how helicopters quietly keep essential services running.Thank you to our sponsors Metro Aviation, Quantum Helicopters and Airbus.

CanadianSME Small Business Podcast
From Controls to Control: The Governance Imperative in OT / Critical Infrastructure Cybersecurity

CanadianSME Small Business Podcast

Play Episode Listen Later Jan 13, 2026 25:29


Welcome to the CanadianSME Small Business Podcast, hosted by SK Uddin. Today we explore the world of Industrial Cybersecurity and how businesses can safeguard critical infrastructure in an increasingly connected environment.Our guest is Denrich Sananda, Managing Partner and Senior Consultant at Arista Cyber, a Harvard Business School alumnus and member of the ISA 62443 standard committee. Denrich and his team specialize in protecting Industrial Control Systems by ensuring cybersecurity, reliability, and uptime work in harmony.Key HighlightsGovernance & Standards: Denrich explains why frameworks like IEC 62443 and NIST CSF 2.0 are essential in OT environments. Leadership & Turnaround: He shares the key mindset shift that drove a major multi million euro corporate turnaround. Cybersecurity & Safety: Denrich breaks down how Arista Cyber unites cybersecurity, reliability, and functional safety. Resilience Roadmaps: He outlines layered security approaches like the Purdue Model and Industrial Threat Detection. Global Vision: Denrich discusses TÜV certification and Arista Cyber's long term mission to protect global critical infrastructure.Special Thanks to Our Partners:UPS: https://solutions.ups.com/ca-beunstoppable.html?WT.mc_id=BUSMEWAGoogle: https://www.google.ca/A1 Global College: https://a1globalcollege.ca/ADP Canada: https://www.adp.ca/en.aspxFor more expert insights, visit www.canadiansme.ca and subscribe to the CanadianSME Small Business Magazine. Stay innovative, stay informed, and thrive in the digital age!Disclaimer: The information shared in this podcast is for general informational purposes only and should not be considered as direct financial or business advice. Always consult with a qualified professional for advice specific to your situation.

DCD Zero Downtime: The Bi-Weekly Data Center Show
Episode 94 - Your next job could be in critical infrastructure (you just don't know it yet) – with Kao Data

DCD Zero Downtime: The Bi-Weekly Data Center Show

Play Episode Listen Later Jan 8, 2026 27:13


While critical infrastructure has always been the backbone of the digital landscape, the recent data center boom has caused more people than ever before to become aware of the industry and consider the career opportunities it might have to offer.However, like the tech industry writ large, there's a perception amongst some outside of the critical infrastructure sector that its workforce lacks diversity and therefore isn't an industry in which they could excel professionally.In this episode, Lizzy McDowell, director of marketing, Kao Data, tries to dispel some of the myths about the industry and discusses the importance of promoting diversity within the data center sector and why there's never been a better time to consider a career in critical infrastructure.

IT Privacy and Security Weekly update.
Electricity and the IT Privacy and Security Weekly Update for the week ending January 6th, 2026

IT Privacy and Security Weekly update.

Play Episode Listen Later Jan 7, 2026 25:24


EP 273.  This year starts with the high cost of Electricity and gets left exposed.Communities Across America Mobilize Against Massive AI-Powered Data Center Expansions.Surging GPS Interference Disrupts U.S. Aviation, Highlighting Growing Vulnerabilities in Critical Infrastructure.Cybersecurity Researchers Outsmart Notorious Cybercrime Group with Elaborate Honeypot Trap.Malicious Chrome Extensions Exposed for Stealthily Harvesting User Credentials from Over 170 Websites.Grok AI Faces Intense Scrutiny for Generating Widespread Nonconsensual Sexualized Images of Women.Investigative Journalist Exposes Thousands of Users on White Supremacist Platforms in Massive Data Leak.OpenAI Reportedly Preparing to Introduce Sponsored Content into ChatGPT Responses Starting in 2026.Ledger Confirms Fresh Data Breach via Third-Party Processor, Exposing Customer Names and Contacts.European Space Agency Acknowledges Cyber Intrusion as Hacker Claims Theft of 200GB of Sensitive Data.Let's start the new year with a bang!Find the full transcript here.

@BEERISAC: CPS/ICS Security Podcast Playlist
2026 ICS Security Predictions: What's Next for Critical Infrastructure

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 1, 2026 31:41


Podcast: Exploited: The Cyber Truth Episode: 2026 ICS Security Predictions: What's Next for Critical InfrastructurePub date: 2025-12-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAs industrial control systems become more connected, more Linux-based, and more exposed to IT-style threats, 2026 is shaping up to be a turning point for ICS security. In this end-of-year predictions episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder & CEO Joseph M. Saunders and CTO Shane Fry to discuss what will define ICS and critical infrastructure security in 2026. The episode explores a bold prediction: We will see a major ICS breach originating from a web application vulnerability running directly on an embedded control device. As full Linux operating systems, Node.js apps, and web servers increasingly appear inside OT equipment, long-standing IT vulnerabilities are colliding with systems that are difficult—or impossible—to patch. Joe and Shane dig into why detection-only strategies fall short in constrained, long-lived devices, and why secure by design engineering, memory safety, and runtime protections are becoming essential. They also discuss the importance of accurate, build-time Software Bills of Materials, especially as regulations like the EU Cyber Resilience Act push manufacturers toward transparency, accountability, and provable supply-chain visibility. Together, they cover: Why ICS exploitation is shifting from theoretical to operationalHow web app and RCE vulnerabilities are creeping into OT devicesThe limits of detection-only security strategiesWhy memory safety and runtime protections reduce exploitable riskHow build-time SBOMs improve vulnerability tracking and trustThe podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The John Batchelor Show
S8 Ep214: PREVIEW Guest: Henry Sokolski. Sokolski describes a new warfare tactic piloted by Russia that utilizes non-nuclear strategic weapons to disable critical infrastructure nodes, such as electricity and communications. While China is actively buildi

The John Batchelor Show

Play Episode Listen Later Dec 19, 2025 1:13


PREVIEW Guest: Henry Sokolski. Sokolski describes a new warfare tactic piloted by Russia that utilizes non-nuclear strategic weapons to disable critical infrastructure nodes, such as electricity and communications. While China is actively building these intercontinental systems to force surrender without nuclear fallout, the U.S. currently lacks a coherent response to this specific threat.

The Green Insider Powered by eRENEWABLE
Securing Critical Infrastructure: Insights from Tom Sego

The Green Insider Powered by eRENEWABLE

Play Episode Listen Later Dec 18, 2025 15:20


Tom Sego, founder and CEO of BlastWave, discussed his background in chemical engineering and his journey through various industries, including roles at Caterpillar, Eli Lilly, Emerson Electric, Alta Vista, and Apple. He explained that BlastWave was founded to combine Apple’s ease of use with cybersecurity, focusing on protecting critical infrastructure as it becomes increasingly digitized. Tom emphasized that human error is a significant security risk, citing an example from the San Jacinto Water District. This Follower Friday podcast is sponsored by UTSI International. Tom's podcast includes: Critical infrastructure sectors (like oil and gas, transportation, and manufacturing) face higher cyber risks than traditional IT systems due to the severe consequences of attacks and the challenge of securing legacy devices. Integrating old and new technologies is achieved by using a translation mechanism that enables secure communication between legacy systems and modern infrastructure. Artificial intelligence (AI) has a dual impact: it can enhance attackers' ability to automate cyberattacks, but it also offers opportunities to improve security, such as by eliminating vulnerabilities like passwords. Technology solutions are essential for reducing the human burden in security, especially for defending against phishing and reconnaissance attacks. Eliminating attack vectors (e.g., usernames and passwords) can significantly reduce security risks, regardless of how effective or frequent attacks become. Focusing on the safety of critical infrastructure allows people to prioritize what matters most in life, such as family, relationships, and health. To be an Insider Please subscribe to The Green Insider powered by ERENEWABLE wherever you get your podcast from and remember to leave us a five-star rating. This podcast is sponsored by UTSI International. To learn more about our sponsor or ask about being a sponsor, contact ERENEWABLE and the Green Insider Podcast. The post Securing Critical Infrastructure: Insights from Tom Sego appeared first on eRENEWABLE.

Disruption / Interruption
Disrupting the Cyber War: Why Patented IoT Security is the Key to a Safer Society with Min Kyriannis

Disruption / Interruption

Play Episode Listen Later Dec 18, 2025 35:32


In this episode of Disruption/Interruption, host KJ sits down with Min Kyriannis, a trailblazer in the global security industry and CEO of Amyna Systems. Min shares her journey from immigrant roots to industry leadership, discusses the evolving landscape of network security, and explains how Amyna Systems is revolutionizing device-level protection. The conversation covers the challenges of legacy technology, the importance of proactive security, and Min’s commitment to both technological and humanitarian causes. Four Key Takeaways: The Human Element is the Weakest Link [11:03]Min emphasizes that despite technological advances, human error and lack of education remain the biggest vulnerabilities in network security. Legacy Systems Create Modern Risks [16:00]Integrating old technologies with new networks opens up significant security gaps, as outdated protocols are not designed for today’s threats. Proactive Security Over Reactive Patching [15:01]The industry often relies on patching vulnerabilities as they arise, but Min advocates for addressing root causes to prevent issues before they occur. Amyna Systems’ Revolutionary Approach [25:12]Amyna Systems has developed patented technology that detects and remediates anomalies within seconds, providing a new layer of defense for modern networks. Quote of the Show (24:29):“You have to be constantly learning. You have to be constantly trying to discover something, and it’s always fascinating to see what’s there.” – Min Kyriannis Join our Anti-PR newsletter where we’re keeping a watchful and clever eye on PR trends, PR fails, and interesting news in tech so you don't have to. You're welcome. Want PR that actually matters? Get 30 minutes of expert advice in a fast-paced, zero-nonsense session from Karla Jo Helms, a veteran Crisis PR and Anti-PR Strategist who knows how to tell your story in the best possible light and get the exposure you need to disrupt your industry. Click here to book your call: https://info.jotopr.com/free-anti-pr-eval Ways to connect with Min Kyriannis: LinkedIn: https://www.linkedin.com/in/mkyri Company Website: https://amyna.io/ How to get more Disruption/Interruption: Amazon Music - https://music.amazon.com/podcasts/eccda84d-4d5b-4c52-ba54-7fd8af3cbe87/disruption-interruption Apple Podcast - https://podcasts.apple.com/us/podcast/disruption-interruption/id1581985755 Spotify - https://open.spotify.com/show/6yGSwcSp8J354awJkCmJlDSee omnystudio.com/listener for privacy information.

Pearl Snap Tactical
When the Grid Fails: Lessons from Real Attacks on the Homeland

Pearl Snap Tactical

Play Episode Listen Later Dec 16, 2025 36:37


What happens when the power goes out—and it's not an accident?In recent years, attacks on our nation's critical infrastructure have revealed just how fragile these modern systems we all rely on really are. When infrastructure fails, the effects cascade fast: hospitals strain, medical devices stop working, fuel pumps go offline, and public safety degrades. Civilians often suffer the most, even though they play no role in protecting these systems.In this episode, we examine real attacks on the U.S. power grid, what actually happened on the ground, how some plots were detected and stopped, and what these incidents reveal about risk, preparedness, and resilience.We'll also explore what you can realistically do—without paranoia or vigilantism—to recognize warning signs, respond during outages, and reduce second-order effects when systems fail.So, pull up a chair and sit a spell as we talk about When the Grid Fails: Lessons from Real Attacks Nation's Infrastructure.Resources:Learn about DHS' National Infrastructure Protection PlanBaltimore Substation Plot 2022DOJ Press Release on the Washington State AttackAdditional news stories here and hereSupport the showGet Members Only Content when you upgrade to a premium membership on our Substack page. Click here.Link up with us:Website: Pearl Snap TacticalInstagram: Pearl Snap Tactical X: Pearl Snap TaciticalThe views and opinions expressed by the guests do not necessarily reflect those of the host, this podcast or affiliates. The information provided in these shows are for educational purposes do not constitute legal advice. Those interest in training in the use of firearms or other self-defense applications are advised to seek out a professional, qualified instructor.(Some of the links in the episode show notes are affiliate links. This means that if you make a purchase through these links, we may earn a commission at no additional cost to you. We only recommend products or services we have personally used and believe will add value to our listeners.)

@BEERISAC: CPS/ICS Security Podcast Playlist
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 7, 2025 59:02


Podcast: Security Weekly Podcast Network (Audio) (LS 47 · TOP 1% what is this?)Episode: Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359Pub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFor OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359The podcast and artwork embedded on this page are from Security Weekly Productions, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Paul's Security Weekly
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

Paul's Security Weekly

Play Episode Listen Later Dec 2, 2025 59:02


For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359

Paul's Security Weekly TV
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

Paul's Security Weekly TV

Play Episode Listen Later Dec 2, 2025 59:02


For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Show Notes: https://securityweekly.com/asw-359

Application Security Weekly (Audio)
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

Application Security Weekly (Audio)

Play Episode Listen Later Dec 2, 2025 59:02


For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359

Application Security Weekly (Video)
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

Application Security Weekly (Video)

Play Episode Listen Later Dec 2, 2025 59:02


For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Show Notes: https://securityweekly.com/asw-359

The Audit
Critical Infrastructure: Everything is Connected and Vulnerable

The Audit

Play Episode Listen Later Dec 1, 2025 32:52 Transcription Available


When hackers target the systems controlling your water, power, and transportation, the consequences go far beyond data breaches—people can die. Leslie Carhartt, Technical Director of Incident Response at Dragos, pulls back the curtain on one of cybersecurity's most critical blind spots: industrial control systems that keep society running but remain dangerously exposed. What You'll Learn: Why industrial control systems can't be updated like your laptop—and what that means for security How threat actors are using AI to generate custom malware for power plants and water treatment facilities The real state of critical infrastructure security (spoiler: forget about air gaps) Why commodity ransomware has become an existential threat to industrial operations The five critical controls organizations should implement right now to defend OT environments Don't wait until your organization becomes the next headline. Like, share, and subscribe for more in-depth security intelligence that goes beyond the buzzwords. #industrialcybersecurity #criticalinfrastructure #OTsecurity #ICS #SCADA #dragos #incidentresponse #ransomware #AIthreats #cybersecurity #infosec 

The International Risk Podcast
Episode 292: Critical Infrastructure Under Threat: Securing the Foundations of a Connected World with Dr Tim Stevens

The International Risk Podcast

Play Episode Listen Later Dec 1, 2025 38:47 Transcription Available


Today, Dominic Bowen hosts Dr Tim Stevens on The International Risk Podcast to examine how hybrid threats, cyber operations and infrastructure vulnerabilities are reshaping Europe's security environment. They discuss how adversaries exploit the interdependence of digital, physical and informational systems, why hybrid activity sits deliberately below the threshold of open conflict, and how these pressures are redefining strategic risk for governments, businesses and critical-infrastructure operators across Europe. Together they explore how cyber intrusions, sabotage, supply-chain exposure and targeted information operations generate cumulative effects that undermine resilience, erode trust and complicate decision-making.Dr Tim Stevens is Reader in International Security at King's College London and co-director of its Cyber Security Research Group. His work analyses the politics of cybersecurity, hybrid threats, cyber risk and the global contest over technological infrastructures. He is the author of several leading publications in the field, including Research Handbook on Cyberwarfare (2024) and What Is Cybersecurity For? (2023). His research examines how cyber operations intersect with societal vulnerabilities, strategic signalling and governance capacity, offering perspectives that inform policymakers, security professionals and institutions responding to the rapidly evolving cyber-hybrid threat landscape.The International Risk Podcast brings you conversations with global experts, frontline practitioners, and senior decision-makers who are shaping how we understand and respond to international risk. From geopolitical volatility and organised crime to cybersecurity threats and hybrid warfare, each episode explores the forces transforming our world and what smart leaders must do to navigate them. Whether you're a board member, policymaker, or risk professional, The International Risk Podcast delivers actionable insights, sharp analysis, and real-world stories that matter.Dominic Bowen is the host of The International Risk Podcast and Europe's leading expert on international risk and crisis management. As Head of Strategic Advisory and Partner at one of Europe's leading risk management consulting firms, Dominic advises CEOs, boards, and senior executives across the continent on how to prepare for uncertainty and act with intent. He has spent decades working in war zones, advising multinational companies, and supporting Europe's business leaders. Dominic is the go-to business advisor for leaders navigating risk, crisis, and strategy; trusted for his clarity, calmness under pressure, and ability to turn volatility into competitive advantage. Dominic equips today's business leaders with the insight and confidence to lead through disruption and deliver sustained strategic advantage.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn and Subscribe for all our updates!Tell us what you liked!

T-Minus Space Daily
Should space be designated as critical infrastructure?

T-Minus Space Daily

Play Episode Listen Later Nov 28, 2025 23:52


Should space be designated as critical infrastructure? What are the threats we're facing in space for cybersecurity? We tackle these questions with our guest Jake Braun, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin. You can connect with Jake on LinkedIn. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Once BITten!
Knots V Core And BIP 444, The Pleb Slop Edition. - Luke De Wolf # 576

Once BITten!

Play Episode Listen Later Nov 25, 2025 121:01


Are you tired of hearing "It's too technical bro…"? $ BTC 87,162 Block Height 925,015 Today's guest is @lukedewolf, who joins me to discuss the Knots vs. Core debate and the recent appearance of BIP 444. Key Topics: Bitcoin Knots Core Bitcoin Improvement Proposals (BIPs) BIP444 Decentralization Critical Infrastructure Cybersecurity Mining 'Spam' Transactions Luke explains his background in industrial control systems cybersecurity and draws parallels to Bitcoin as critical infrastructure. He emphasises the need for layered defences to protect against various threats and that filters, even basic ones, can effectively block a significant percentage of attacks. Follow Luke: X - @lukedewolf NOSTR - npub1fk8h6g8zhftw8c7pga2zjd84p2z949up5lc3qdchm9v4m0q7mwws7jcwld Bitcoin Infinity Podcast - https://www.youtube.com/@BitcoinInfinityShow Check out my book ‘Choose Life' - https://bitcoinbook.shop/search?q=prince ALL LINKS HERE - FOR DISCOUNTS AND OFFERS - https://vida.page/princey - https://linktr.ee/princey21m Pleb Service Announcements: Join 19 thousand Bitcoiners on @cluborange https://signup.cluborange.org/co/princey Support the pod via @fountain_app -https://fountain.fm/show/2oJTnUm5VKs3xmSVdf5n The Once Bitten YouTube Channel: https://www.youtube.com/@Princey21m The Bitcoin And Show: https://www.bitcoinandshow.com/ https://fountain.fm/show/eK5XaSb3UaLRavU3lYrI Shills and Mench's: CONFERENCES 2025: BITFEST - MANCHESTER - ENGLAND - 21st - 23rd November 2025. https://bitfest.uk/ - USE CODE BITTEN - 10% BTC JAPAN - TPKYO - 23rd - 24th November. https://btc-jpn.com/en USE CODE BITTEN - 10% PAY WITH FLASH. Accept Bitcoin on your website or platform with no-code and low-code integrations. https://paywithflash.com/ RELAI - STACK SATS - www.relai.me/Bitten Use Code BITTEN SWAN BITCOIN - www.swan.com/bitten BITBOX - SELF CUSTODY YOUR BITCOIN - www.bitbox.swiss/bitten Use Code BITTEN PLEBEIAN MARKET - BUY AND SELL STUFF FOR SATS; https://plebeian.market/ @PlebeianMarket ZAPRITE - https://zaprite.com/bitten - Invoicing and accounting for Bitcoiners - Save $40 KONSENSUS NETWORK - Buy bitcoin books in different languages. Use code BITTEN for 10% discount - https://bitcoinbook.shop?ref=bitten SEEDOR STEEL PLATE BACK-UP - @seedor_io use the code BITTEN for a 5% discount. www.seedor.io/BITTEN SATSBACK - Shop online and earn back sats! https://satsback.com/register/5AxjyPRZV8PNJGlM HEATBIT - Home Bitcoin mining - https://www.heatbit.com/?ref=DANIELPRINCE - Use code BITTEN. CRYPTOTAG STEEL PLATE BACK-UP https://cryptotag.io - USE CODE BITTEN for 10% discount.

Federal Drive with Tom Temin
Army looks to small nuclear reactors to power critical infrastructure

Federal Drive with Tom Temin

Play Episode Listen Later Nov 21, 2025 7:27


The Army is taking the next step in its ambitions to start using small nuclear reactors to power critical infrastructure on at least some of its bases. This week, the service started the solicitation process for its Janus program via the Defense Innovation Unit, and assuming the technology works out the way the Army thinks it will, we now also know some of the first bases that are most likely to benefit from it. Details here from Federal News Network's Jared Serbu,See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Security Unfiltered
The FUTURE of Device Authentication is Here NOW

Security Unfiltered

Play Episode Listen Later Nov 10, 2025 45:43 Transcription Available


Send us a textWe explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines.• life on the road, burnout signals and recovery• global threats to critical infrastructure and state actor pressure• startup culture, expectations and keeping teams healthy• Jason's path through engineering to entrepreneurship• identity's failure modes and why credentials are stolen• asymmetric, hardware-bound authentication and device posture• extending identity to agents, drones and satellites• cyber-physical risk and why finance invests heavily• identity as the universal control plane in cloud• practical steps to prevent session hijack and MFA fatigueConnect with Jason: “Hit me up on LinkedIn… our website, beyondidentity.com… even X”Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

@BEERISAC: CPS/ICS Security Podcast Playlist
E38: The Unseen Threats to Critical Infrastructure with Patrick Gillespie

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 10, 2025 37:04


Podcast: Bad ActorsEpisode: E38: The Unseen Threats to Critical Infrastructure with Patrick GillespiePub date: 2025-10-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Bad Actors, host Rebecca Craddick speaks with Patrick Gillespie, OT Practice Director at GuidePoint Security, about the unique and often misunderstood world of operational technology (OT) and its critical role in many areas, from manufacturing to public utilities.Patrick discusses the increasing threats to critical infrastructure, the challenges of bridging the gap between IT and OT teams, and the importance of adopting a "survivable" security posture. He also explains how GuidePoint's partnership with Armis helps organizations gain visibility into their OT environments and prioritize vulnerabilities. This episode is a must-listen for anyone interested in the evolving landscape of cybersecurity and the protection of our most vital systems.The podcast and artwork embedded on this page are from Armis, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

RTÉ - The Late Debate
Delaysto critical infrastructure projects remain

RTÉ - The Late Debate

Play Episode Listen Later Nov 6, 2025 20:23


Shane Curley, Fianna Fáil Senator, Pa Daly, Sinn Féin TD for Kerry and Party Spokesperson on the Environment, Energy and Transport, Sinéad Gibney, Social Democrats TD for Dublin Rathdown and Tabitha Monahan, Political Correspondent with the Irish Independent.

The Gate 15 Podcast Channel
Weekly Security Sprint EP 134. Cyber Resilience, Critical Infrastructure attacks, Alphabet soup, and offboarding concerns

The Gate 15 Podcast Channel

Play Episode Listen Later Nov 4, 2025 20:07


In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:Critical infrastructure sectors on the most concerning threats – and needed solutions. “With critical infrastructure constantly under myriad threats, sector-focused information sharing and analysis centers and organizations collect, analyze and disseminate actionable cyber and physical threat information to stakeholders and provide them with tools to mitigate risks and enhance resiliency. To mark Cybersecurity Awareness Month, Threat Beat asked: 1) What is the most pressing short-term security concern in your sector? 2) What is one thing the public and/or industry/government can do now to address this?” Responses include DNG-ISAC, E-ISAC, FB-ISAO, Food and Ag-ISAC, Health-ISAC, MS-ISAC, ONE-ISAC, Space ISAC, and WaterISAC. Main Topics:Canadian Centre for Cyber Security: Alert - AL25-016 Internet-accessible industrial control systems (ICS) abused by hacktivists. In recent weeks, the Cyber Centre and the Royal Canadian Mounted Police have received multiple reports of incidents involving internet-accessible ICS. One incident affected a water facility, tampering with water pressure values and resulting in degraded service for its community. Another involved a Canadian oil and gas company, where an Automated Tank Gauge (ATG) was manipulated, triggering false alarms. A third one involved a grain drying silo on a Canadian farm, where temperature and humidity levels were manipulated, resulting in potentially unsafe conditions if not caught on time. Hackers are attacking Britain's drinking water suppliers(TLP:CLEAR) Threat Analysis for the Water and Wastewater Sector, October 2025 – Executive SummaryThreat Snapshot: Cyber Threats Remain Heightened Amid Lapse In Information Sharing Authorities, Government Shutdown. As Cybersecurity Awareness Month comes to a close and Critical Infrastructure Security and Resilience Month nears, today, the House Committee on Homeland Security released an updated “Cyber Threat Snapshot,” outlining the heightened threats posed by malign nation-states and criminals to U.S. networks and critical infrastructure since 2024. Read the previous “Cyber Threat Snapshot,” which outlined threats from 2021 through 2024, here. 2 shot dead at Tennessee plastics plant by gunman who was ex-employee. Two employees of a plastics maker were fatally shot Monday morning in Cleveland, Tennessee, by an employee in the process of termination, authorities said. The two men killed at Barku Plastics were Tobias Gleinig and Ivan Aldergot, police said. Both were supervisors at the plant and citizens of Germany, Cleveland Police Capt. Evie West said at a news conference Monday night. Barku is a subsidiary of Barku Kunststofftechnik, a plastics producer established in Germany in 1977, which confirmed the "violent deaths" of Gleinig and Aldergot in a statement.Quick Hits:• Hurricane Melissa makes historic landfall in Jamaica as Category 5 storm• 'Total devastation': Hurricane Melissa leaves trail of destruction, flooding in Jamaica• ‘Tremendous unprecedented devastation' in Jamaica from Hurricane Melissa, UN coordinator says• Hurricane Melissa death toll nears 50 as Jamaica relief efforts intensify and storm heads north• Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says

JSA Podcasts for Telecom and Data Centers
What is AI Poisoning? A New Threat to Critical Infrastructure

JSA Podcasts for Telecom and Data Centers

Play Episode Listen Later Nov 3, 2025 4:05


Live from #DCDVirginia 2025, Alexandra Bromson, Managing Director of Origination at Available Infrastructure, joins JSA TV to discuss the urgent need for national security-grade cyber protection for smart cities and digital infrastructure.In this discussion, Alexandra breaks down the serious risks of "AI Poisoning" where attackers corrupt AI models by feeding them bad data and how it can be used to cause serious risk to operations, safety and reputation.Learn how Available Infrastructure's SanQtum AI platform provides a defense, using a CISA-compliant zero trust architecture, NIST-approved quantum-resilient encryption, and a nationwide fleet of quantum-ready micro data centers to protect the future of AI. #CriticalInfrastructure #Cybersecurity #AIPoisoning

Lend Academy Podcast
Bill Capuzzi, CEO of Apex, on the critical infrastructure powering modern investing

Lend Academy Podcast

Play Episode Listen Later Oct 31, 2025 40:24


Today, I sit down with Bill Capuzzi, CEO of Apex Fintech Solutions, to explore the critical infrastructure powering modern fintech investing. Bill shares the fascinating journey of Apex from its roots as a pioneer in API-enabled clearing to fractional share trading and becoming the clearing firm behind investment accounts for close to 25 million people across household names like Robinhood, SoFi, and Betterment.The conversation dives deep into what it takes to be a reliable infrastructure player in fintech, from opening accounts in seconds, to enabling investment globally, to Apex's bold expansion plans with State Street and their strategic embrace of stablecoins. Bill also pulls back the curtain on how Apex uses AI inside the company and shares his perspective on the complex plumbing that makes seamless, modern fintech experiences possible. It's a rare inside look at the unsexy but essential backbone of the fintech revolution.In this podcast, you will learn:Bill's interesting journey from environmental scientist to fintech entreprenuer.Why he decided to join Apex ten years ago.How their capabilities were so different to the traditional custodians.What a clearing broker does exactly.How the idea for fractional share trading came about.How they have built their brand in the fintech space.Why they are seeing interest from banks and traditional wealth providers today.The only two firms that have left Apex and why they left.How they are working with the digital assets/stablecoins space today.Why they sold Apex Crypto to Bakkt in 2022.How they are growing internationally.What their partnership with State Street means for Apex.What Apex is doing to prepare for the AI-enabled future.What Bill is most excited about for the future of Apex.Connect with Fintech One-on-One: Tweet me @PeterRenton Connect with me on LinkedIn Find previous Fintech One-on-One episodes

Federal Drive with Tom Temin
CISA sounds the alarm on cyber threats to critical infrastructure

Federal Drive with Tom Temin

Play Episode Listen Later Oct 28, 2025 9:24


The Cyber Security and infrastructure security agency has been sounding the alarm about cyber threats to us critical infrastructure like power and water systems. CISA officials are particularly concerned about hackers targeting so called operational technology or OT systems. Targeting of those systems could pose major health and safety risks. For more on what the agency is doing to combat those threats. Federal News Network's Justin Doubleday spoke with the OT cyber lead at CISA, Matt Rogers.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Silicon Curtain
Europe WILL be Attacked - But How Soon and at What Scale?

Silicon Curtain

Play Episode Listen Later Oct 21, 2025 19:44


2025-10-21 | Silicon Wafers 036 | DAILY UPDATES | Is Russia's Hybrid War on Europe a precursor to a full incursion on European territory, or even the invasion of a European country? This is Silicon Wafers. Today: why Russia is probing and testing Europe, how hybrid attacks work, and what happens if the Kremlin pushes further escalating to a full invasion — and how we can deter it.Why the probing is intensifying - Moscow is stress-testing Europe's seams, pulling at the threads to see if the fabric of our institutions and resilience will unravel. But it is conducting this below the threshold of open war — because hybrid pressure is cheap, deniable, and strategically useful. Sub-threshold does not trigger a direct armed response but can also achieve Russia's strategic objectives without direct confrontation. It's a war sandbox, for testing and learning. Think of it as a toolkit of rolling lab experiments in limited aggression: sabotage, arson, cyber, GPS jamming, “grey fleet” shenanigans at sea, drones in NATO airspace, and influence operations that launder Kremlin narratives through local proxies, compliant channels and criminal networks.----------Partner on this video: KYIV OF MINE Watch the trailer now: https://www.youtube.com/watch?v=arJUcE1rxY0'Kyiv of Mine' is a documentary series about Ukraine's beautiful capital, Kyiv. The film production began in 2018, and much has changed since then. It is now 2025, and this story is far from over.https://www.youtube.com/@UCz6UbVKfqutH-N7WXnC5Ykg https://www.kyivofmine.com/#theprojectKyiv of Mine is fast paced, beautifully filmed, humorous, fun, insightful, heartbreaking, moving, hopeful. The very antithesis in fact of a doom-laden and worthy wartime documentary. This is a work that is extraordinarily uplifting. My friend Operator Starsky says the film is “Made with so much love. The film series will make you laugh and cry.” ----------SOURCES: IISS — The Scale of Russian Sabotage Operations Against Europe's Critical Infrastructure* (research paper, Aug. 2025). Council of the EU — Statement condemning Russia's persistent hybrid campaigns (July 18, 2025); EU hybrid-threats sanctions framework (Oct. 8, 2024; prolonged Oct. 3, 2025)Reuters — Poland/Romania foil exploding-parcel plot (Oct. 21, 2025); Spanish minister's jet GPS interference near Kaliningrad (Sept. 24, 2025); German CHOD: 5–8 year window (Apr. 18, 2024); Hybrid threat to Europe's energy (Oct. 13, 2025)AP News — Arrests tied to parcel-bomb plot in Poland and Romania (Oct. 21, 2025)The Guardian — Sikorski on drone incursion: “tactically stupid and counterproductive” (Oct. 15, 2025)The Insider — Inside Russia's Latvian Sabotage Squad (July 10, 2024)Meduza - ‘There has to be a cost' — Russian sabotage spiked in Europe last year (Mar. 21, 2025)RFE/RL — Admiral Rob Bauer warning (NATO readiness) (Jan. 19, 2024); IISS sabotage overview (Aug. 20, 2025)UK Government — Condemnation of “malicious cyber activity by the Russian Intelligence Services” (May 3, 2024); UK/US advisory on Star Blizzard spear-phishing (Dec. 7, 2023)ACLED — Suspected Russia-linked hybrid incidents across Europe (2022–Apr. 2025)Estonian Foreign Intelligence Service — International Security and Estonia 2025 (threat horizon)----------SILICON CURTAIN FILM FUNDRAISERA project to make a documentary film in Ukraine, to raise awareness of Ukraine's struggle and in supporting a team running aid convoys to Ukraine's front-line towns.https://buymeacoffee.com/siliconcurtain/extras----------

West Michigan Live with Justin Barclay
China hacking America's critical infrastructure (Tech Talk) 10-14-25

West Michigan Live with Justin Barclay

Play Episode Listen Later Oct 14, 2025 14:58 Transcription Available


Get the stories from today's show in THE STACK: https://justinbarclay.comJoin Justin in the MAHA revolution - http://HealthWithJustin.comProTech Heating and Cooling - http://ProTechGR.com New gear is here! Check out the latest in the Justin Store: https://justinbarclay.com/storeKirk Elliott PHD - FREE consultation on wealth conservation - http://GoldWithJustin.comTry Cue Streaming for just $2 / day and help support the good guys https://justinbarclay.com/cueUp to 80% OFF! Use promo code JUSTIN http://MyPillow.com/JustinPatriots are making the Switch! What if we could start voting with our dollars too? http://SwitchWithJustin.com

Connected FM
Proactive Cybersecurity Strategies for Facility Managers

Connected FM

Play Episode Listen Later Oct 14, 2025 13:37


Every day, critical infrastructure is under siege with about 1.2 million cyberattacks per day. For facility managers, that means cybersecurity isn't just an IT issue, it's a frontline responsibility. In today's episode, Stacey Shepard and E.J. von Schaumburg from Building Cybersecurity, discuss why facility managers must treat digital threats with the same urgency as physical ones and how leaders can use proactive strategies, assessments and insurance awareness to stay prepared. Together, they share how facility managers can build resilience, safeguard their organizations, and lead the way in a world where cyber risk is constant.Sponsor:This episode is sponsored by ODP Business Solutions! 00:00 Introduction: The Growing Threat of Cyber Attacks00:19 Podcast Overview and Guest Introduction01:23 Understanding Cybersecurity in Facility Management02:24 The Importance of Data Management02:54 Building Cybersecurity: Framework and Training03:38 The Role of Facility Managers in Cybersecurity05:01 Cybersecurity Training and Preparedness08:11 Insurance and Risk Management11:11 Leadership and Legal Implications11:48 Resources and Conclusion Connect with Us:LinkedIn: https://www.linkedin.com/company/ifmaFacebook: https://www.facebook.com/InternationalFacilityManagementAssociation/Twitter: https://twitter.com/IFMAInstagram: https://www.instagram.com/ifma_hq/YouTube: https://youtube.com/ifmaglobalVisit us at https://ifma.org

Robots and Red Tape: AI and the Federal Government
Inside the Invisible War: AI, Counterintelligence, and America's Critical Infrastructure

Robots and Red Tape: AI and the Federal Government

Play Episode Listen Later Oct 14, 2025 62:35


AI is transforming our world, but is its infrastructure secure? In this Robots and Red Tape episode, host Nick Schutt sits down with Matt Wesmiller, a counterintelligence veteran, to explore the unseen risks in critical infrastructure security. Matt reveals the complexity of supply chains, from adversary-controlled rare earth minerals to data poisoning threats in AI models. “The human is always the weakest link,” he warns, citing insider threats like Robert Hanssen. From intellectual property theft to fragile water systems, Matt emphasizes proactive counterintelligence to protect national security. Essential listening for those invested in AI's risks and rewards. Tune in to uncover strategies to safeguard our tech-driven future. Subscribe for more tech-driven insights: / @RobotsandRedTapeAI

ITSPmagazine | Technology. Cybersecurity. Society
Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 13, 2025 28:05


Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived."Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear."We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.AISA CyberCon Melbourne runs October 15-17, 2025 Virtual coverage provided by ITSPmagazineGUEST:Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: https://www.linkedin.com/in/amberley-b-a62022353/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

The AI with Maribel Lopez (AI with ML)
AI Meets Cybersecurity: Protecting Critical Infrastructure with Black & Veatch's Ian Bramson

The AI with Maribel Lopez (AI with ML)

Play Episode Listen Later Oct 13, 2025 25:45


In this episode of AI with Maribel Lopez, Maribel sits down with Ian Bramson, Vice President of Global Industrial Cybersecurity at Black & Veatch, to explore the growing intersection between artificial intelligence and operational technology (OT) security.From power grids and oil refineries to manufacturing plants, critical infrastructure systems are becoming increasingly connected—and therefore more vulnerable. Ian shares how Black & Veatch is helping industrial organizations rethink cybersecurity from the ground up, integrating protection early in the design and build process rather than bolting it on later.Together, Maribel and Ian discuss the evolution of OT threats, the rise of AI in both defense and attack scenarios, and why cybersecurity must be seen as a core business function, not an afterthought.

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 229 - The Evolution of Ransomware: From Spray-and-Pray to Sophisticated Cybercrime

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Oct 13, 2025 52:26


Welcome to this week's episode of the PEBCAK Podcast!  We've got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   2016: The Dawn of Modern Ransomware The debut of Petya and Russian-affiliated groups like CryptoWall, TeslaCrypt, and Locky. Attacks were largely indiscriminate, targeting anyone from Fortune 500 companies to "Grandma's laptop." Early mitigation tactics, like installing Russian language packs to avoid infection, highlighted the state-tolerated nature of these groups.   2017: Ransomware Goes Mainstream A pivotal year with the WannaCry attack (attributed to North Korea's Lazarus Group) and NotPetya (Russian-backed), causing billions in damages to companies in multiple verticals. The SAMSAM attacks hit U.S. cities like Baltimore and Atlanta, marking Iran's brief foray into ransomware. Ransomware became a household name, sparking executive-level discussions in boardrooms.   2020: The Rise of Ransomware-as-a-Service Groups like Ryuk, REvil, and Conti refined ransomware into a business model, outsourcing tasks like initial access and money laundering. Double extortion emerged, with attackers stealing data and threatening to leak it, even if backups were restored. Some groups introduced “terms of service,” avoiding hospitals and schools to dodge law enforcement scrutiny.   2021: Critical Infrastructure in the Crosshairs High-profile attacks on Colonial Pipeline, JBS Foods, and Ireland's National Health Service disrupted daily life, from gas shortages to meat supply issues. These incidents underscored ransomware's real-world impact, elevating cybersecurity to a boardroom priority.   2022: Geopolitical Shifts and New Players Russian-backed groups like Conti and LockBit shifted focus to Ukraine amid the Russia-Ukraine conflict. The rise of Scattered Spider, a Western-based group excelling at social engineering and SIM swapping, marked a shift from Eastern state-tolerated actors.   2023: Trust Breaks Down The ALFV/BlackCat group's $22 million rug pull against affiliates signaled the decline of Russian-backed ransomware dominance. Scattered Spider solidified its reputation, targeting major hospitality and cleaning companies with sophisticated social engineering tactics.   2025: The Western Cybercrime Surge Scattered Spider and affiliates like DragonForce dominate, hitting retailers, insurance, aviation, and automotive sectors. The shift to Western-based actors, often young and operating in Five Eyes nations, makes them more vulnerable to law enforcement.   Trends and Takeaways The move from expensive zero-day exploits to cheaper n-day exploits and social engineering highlights attackers' adaptability. Double extortion and even “double dipping” (demanding additional ransoms months later) have become standard tactics. The accessibility of AI tools and open-source platforms like Venice AI has lowered the barrier for creating ransomware, even for non-programmers. Law enforcement's increasing success in arrests and Bitcoin recovery (e.g., DarkSide's downfall) offers hope for curbing cybercrime.       Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Ben - https://www.linkedin.com/in/benjamincorll/

Federal Drive with Tom Temin
CISA's Nick Anderson on defending government networks and critical infrastructure

Federal Drive with Tom Temin

Play Episode Listen Later Oct 10, 2025 6:56


The Cybersecurity and infrastructure Security Agency is hyper focused on its core priorities of defending government networks and critical infrastructure. That's the key message from Nick Anderson, CISA's new Executive Assistant Director for Cybersecurity, Federal News Network's Justin Doubleday spoke with Anderson as part of our Cyber Leaders Exchange 2025.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

The Security Podcasts
Protecting Critical Infrastructure With Limited Funding

The Security Podcasts

Play Episode Listen Later Oct 7, 2025 15:27


Mosley-Romero shares common threats towards critical infrastructure and advice for security leaders navigating different challenges.

ITSPmagazine | Technology. Cybersecurity. Society
Why This Cybersecurity Executive Left Corporate to Start Asimily and Secure Healthcare, Manufacturing, and Critical Infrastructure | An Asimily Brand Origin Story with Shankar Somasundaram, CEO and Founder

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Sep 17, 2025 34:52


The decision to leave a successful corporate position and start a company requires more than just identifying a market opportunity. For Shankar Somasundaram, it required witnessing firsthand how traditional cybersecurity approaches consistently failed in the environments that matter most to society: hospitals, manufacturing plants, power facilities, and critical infrastructure.Somasundaram's path to founding Asimily began with diverse technical experience spanning telecommunications and early machine learning development. This foundation proved essential when he transitioned to cybersecurity, eventually building and growing the IoT security division at a major enterprise security company.During his corporate tenure, Somasundaram gained direct exposure to security challenges across healthcare systems, industrial facilities, utilities, manufacturing plants, and oil and gas operations. Each vertical revealed the same fundamental problem: existing security solutions were designed for traditional IT environments where confidentiality and integrity took precedence, but operational technology environments operated under entirely different rules.The mismatch became clear through everyday operational realities. Hospital ultrasound machines couldn't be taken offline during procedures for security updates. Manufacturing production lines couldn't be rebooted for patches without scheduling expensive downtime. Power plant control systems required continuous availability to serve communities. These environments prioritized operational continuity above traditional security controls.Beyond technical challenges, Somasundaram observed a persistent communication gap between security and operations teams. IT security professionals spoke in terms of vulnerabilities and patch management. Operations teams focused on uptime, safety protocols, and production schedules. Neither group had effective frameworks for translating their concerns into language the other could understand and act upon.This divide created frustration for Chief Security Officers who understood risks existed but lacked clear paths to mitigation that wouldn't disrupt critical business operations. Organizations could identify thousands of vulnerabilities across their operational technology environments, but struggled to prioritize which issues actually posed meaningful risks given their specific operational contexts.Somasundaram recognized an opportunity to approach this problem differently. Rather than building another vulnerability scanner or forcing operational environments to conform to IT security models, he envisioned a platform that would provide contextual risk analysis and actionable mitigation strategies tailored to operational requirements.The decision to leave corporate security and start Asimily wasn't impulsive. Somasundaram had previous entrepreneurial experience and understood the startup process. He waited for the right convergence of market need, personal readiness, and strategic opportunity. When corporate priorities shifted through acquisitions, the conditions aligned for his departure.Asimily's founding mission centered on bridging the gap between operational technology and information technology teams. The company wouldn't just build another security tool; it would create a translation layer enabling different organizational departments to collaborate effectively on risk reduction.This approach required understanding multiple stakeholder perspectives within client organizations. Sometimes the primary user would be a Chief Information Security Officer. Other times, it might be a manufacturing operations head managing production floors, or a clinical operations director in healthcare. The platform needed to serve all these perspectives while maintaining technical depth.Somasundaram's product engineering background informed this multi-stakeholder approach. His experience with complex system integration—from telecommunications infrastructure to machine learning algorithms—provided insight into how security platforms could integrate with existing IT infrastructure while addressing operational technology requirements.The vision extended beyond traditional vulnerability management to comprehensive risk analysis considering operational context, business impact, and regulatory requirements. Rather than treating all vulnerabilities equally, Asimily would analyze each device within its specific environment and use case, providing organizations with actionable intelligence for informed decision-making.Somasundaram's entrepreneurial journey illustrates how diverse technical experience, industry knowledge, and strategic timing converge to address complex market problems. His transition from corporate executive to startup founder demonstrates how deep industry exposure can reveal opportunities to solve problems that established players might overlook or underestimate.Today, as healthcare systems, manufacturing facilities, and critical infrastructure become increasingly connected, the vision Somasundaram brought to Asimily's founding has proven both timely and necessary. The company's development reflects not just market demand, but the value of approaching familiar problems from fresh perspectives informed by real operational experience.Learn more about Asimily: itspm.ag/asimily-104921Note: This story contains promotional content. Learn more.Guest: Shankar Somasundaram, CEO & Founder, Asimily  | On LinkedIn: https://www.linkedin.com/in/shankar-somasundaram-a7315b/Company Directory: https://www.itspmagazine.com/directory/asimilyResourcesLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Valuetainment
"Critical Infrastructure Threat" - Russiagate Emails REVEAL Clinton & Obama in SHOCKING Russia HOAX

Valuetainment

Play Episode Listen Later Aug 6, 2025 20:59


Declassified emails and memos reveal the Clinton campaign may have fabricated Trump–Russia collusion to distract from her email scandal. The PBD Podcast crew exposes Obama-era FBI failures, media complicity, and the deeper implications for justice, accountability, and free speech.