Infrastructure important to national security
POPULARITY
In this special Cybersecurity Awareness Month episode of the Tech for Business podcast, Todd (COO and CISO) and Nate (Director of Cybersecurity) discuss the importance of critical infrastructure and its relationship to cybersecurity. They provide insights into what constitutes critical infrastructure, the impact of legacy systems, and the foundational best practices for cybersecurity. Key highlights include the significance of multifactor authentication, password security, network segmentation, and the role of culture in cybersecurity measures. Whether you are a private business owner or part of critical infrastructure, this episode offers practical advice and strategies to enhance your cybersecurity posture.00:00 Introduction to Critical Infrastructure and Cybersecurity00:34 Defining Critical Infrastructure01:26 Impact of Critical Infrastructure on Daily Life02:15 Identifying Critical Infrastructure04:23 Cybersecurity Best Practices05:36 Challenges in Securing Legacy Systems07:32 Password Security and Common Mistakes10:02 Approaching Legacy Systems: Patch or Replace?15:51 Barriers to Improving Security19:27 Practical Advice for Dealing with Legacy Systems21:40 Conclusion and Future TopicsSources: https://www.cbsnews.com/news/china-hacking-us-critical-infrastructure-retired-general-tim-haugh-warns-60-minutes-transcript/https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors
The Cyber Security and infrastructure security agency has been sounding the alarm about cyber threats to us critical infrastructure like power and water systems. CISA officials are particularly concerned about hackers targeting so called operational technology or OT systems. Targeting of those systems could pose major health and safety risks. For more on what the agency is doing to combat those threats. Federal News Network's Justin Doubleday spoke with the OT cyber lead at CISA, Matt Rogers.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
This episode focuses on current events and major issues in cybersecurity. The hosts and expert guests discuss recent, high-profile cyber incidents, including a ransomware attack affecting airport systems in Europe and an incident impacting Jaguar Land Rover, emphasizing the significant economic and national security consequences of these events. A considerable portion of the conversation is dedicated to the growing threat of AI-driven identity fraud and deepfakes, particularly their use in financial scams, highlighting the difficulty in distinguishing genuine information from fabrications. Finally, the experts discuss the crucial, yet often lacking, need for greater cybersecurity awareness and cultural change among individuals and organizations to adequately counter evolving digital threats. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
2025-10-21 | Silicon Wafers 036 | DAILY UPDATES | Is Russia's Hybrid War on Europe a precursor to a full incursion on European territory, or even the invasion of a European country? This is Silicon Wafers. Today: why Russia is probing and testing Europe, how hybrid attacks work, and what happens if the Kremlin pushes further escalating to a full invasion — and how we can deter it.Why the probing is intensifying - Moscow is stress-testing Europe's seams, pulling at the threads to see if the fabric of our institutions and resilience will unravel. But it is conducting this below the threshold of open war — because hybrid pressure is cheap, deniable, and strategically useful. Sub-threshold does not trigger a direct armed response but can also achieve Russia's strategic objectives without direct confrontation. It's a war sandbox, for testing and learning. Think of it as a toolkit of rolling lab experiments in limited aggression: sabotage, arson, cyber, GPS jamming, “grey fleet” shenanigans at sea, drones in NATO airspace, and influence operations that launder Kremlin narratives through local proxies, compliant channels and criminal networks.----------Partner on this video: KYIV OF MINE Watch the trailer now: https://www.youtube.com/watch?v=arJUcE1rxY0'Kyiv of Mine' is a documentary series about Ukraine's beautiful capital, Kyiv. The film production began in 2018, and much has changed since then. It is now 2025, and this story is far from over.https://www.youtube.com/@UCz6UbVKfqutH-N7WXnC5Ykg https://www.kyivofmine.com/#theprojectKyiv of Mine is fast paced, beautifully filmed, humorous, fun, insightful, heartbreaking, moving, hopeful. The very antithesis in fact of a doom-laden and worthy wartime documentary. This is a work that is extraordinarily uplifting. My friend Operator Starsky says the film is “Made with so much love. The film series will make you laugh and cry.” ----------SOURCES: IISS — The Scale of Russian Sabotage Operations Against Europe's Critical Infrastructure* (research paper, Aug. 2025). Council of the EU — Statement condemning Russia's persistent hybrid campaigns (July 18, 2025); EU hybrid-threats sanctions framework (Oct. 8, 2024; prolonged Oct. 3, 2025)Reuters — Poland/Romania foil exploding-parcel plot (Oct. 21, 2025); Spanish minister's jet GPS interference near Kaliningrad (Sept. 24, 2025); German CHOD: 5–8 year window (Apr. 18, 2024); Hybrid threat to Europe's energy (Oct. 13, 2025)AP News — Arrests tied to parcel-bomb plot in Poland and Romania (Oct. 21, 2025)The Guardian — Sikorski on drone incursion: “tactically stupid and counterproductive” (Oct. 15, 2025)The Insider — Inside Russia's Latvian Sabotage Squad (July 10, 2024)Meduza - ‘There has to be a cost' — Russian sabotage spiked in Europe last year (Mar. 21, 2025)RFE/RL — Admiral Rob Bauer warning (NATO readiness) (Jan. 19, 2024); IISS sabotage overview (Aug. 20, 2025)UK Government — Condemnation of “malicious cyber activity by the Russian Intelligence Services” (May 3, 2024); UK/US advisory on Star Blizzard spear-phishing (Dec. 7, 2023)ACLED — Suspected Russia-linked hybrid incidents across Europe (2022–Apr. 2025)Estonian Foreign Intelligence Service — International Security and Estonia 2025 (threat horizon)----------SILICON CURTAIN FILM FUNDRAISERA project to make a documentary film in Ukraine, to raise awareness of Ukraine's struggle and in supporting a team running aid convoys to Ukraine's front-line towns.https://buymeacoffee.com/siliconcurtain/extras----------
Get the stories from today's show in THE STACK: https://justinbarclay.comJoin Justin in the MAHA revolution - http://HealthWithJustin.comProTech Heating and Cooling - http://ProTechGR.com New gear is here! Check out the latest in the Justin Store: https://justinbarclay.com/storeKirk Elliott PHD - FREE consultation on wealth conservation - http://GoldWithJustin.comTry Cue Streaming for just $2 / day and help support the good guys https://justinbarclay.com/cueUp to 80% OFF! Use promo code JUSTIN http://MyPillow.com/JustinPatriots are making the Switch! What if we could start voting with our dollars too? http://SwitchWithJustin.com
Every day, critical infrastructure is under siege with about 1.2 million cyberattacks per day. For facility managers, that means cybersecurity isn't just an IT issue, it's a frontline responsibility. In today's episode, Stacey Shepard and E.J. von Schaumburg from Building Cybersecurity, discuss why facility managers must treat digital threats with the same urgency as physical ones and how leaders can use proactive strategies, assessments and insurance awareness to stay prepared. Together, they share how facility managers can build resilience, safeguard their organizations, and lead the way in a world where cyber risk is constant.Sponsor:This episode is sponsored by ODP Business Solutions! 00:00 Introduction: The Growing Threat of Cyber Attacks00:19 Podcast Overview and Guest Introduction01:23 Understanding Cybersecurity in Facility Management02:24 The Importance of Data Management02:54 Building Cybersecurity: Framework and Training03:38 The Role of Facility Managers in Cybersecurity05:01 Cybersecurity Training and Preparedness08:11 Insurance and Risk Management11:11 Leadership and Legal Implications11:48 Resources and Conclusion Connect with Us:LinkedIn: https://www.linkedin.com/company/ifmaFacebook: https://www.facebook.com/InternationalFacilityManagementAssociation/Twitter: https://twitter.com/IFMAInstagram: https://www.instagram.com/ifma_hq/YouTube: https://youtube.com/ifmaglobalVisit us at https://ifma.org
AI is transforming our world, but is its infrastructure secure? In this Robots and Red Tape episode, host Nick Schutt sits down with Matt Wesmiller, a counterintelligence veteran, to explore the unseen risks in critical infrastructure security. Matt reveals the complexity of supply chains, from adversary-controlled rare earth minerals to data poisoning threats in AI models. “The human is always the weakest link,” he warns, citing insider threats like Robert Hanssen. From intellectual property theft to fragile water systems, Matt emphasizes proactive counterintelligence to protect national security. Essential listening for those invested in AI's risks and rewards. Tune in to uncover strategies to safeguard our tech-driven future. Subscribe for more tech-driven insights: / @RobotsandRedTapeAI
Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived."Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear."We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.AISA CyberCon Melbourne runs October 15-17, 2025 Virtual coverage provided by ITSPmagazineGUEST:Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: https://www.linkedin.com/in/amberley-b-a62022353/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More
In this episode of AI with Maribel Lopez, Maribel sits down with Ian Bramson, Vice President of Global Industrial Cybersecurity at Black & Veatch, to explore the growing intersection between artificial intelligence and operational technology (OT) security.From power grids and oil refineries to manufacturing plants, critical infrastructure systems are becoming increasingly connected—and therefore more vulnerable. Ian shares how Black & Veatch is helping industrial organizations rethink cybersecurity from the ground up, integrating protection early in the design and build process rather than bolting it on later.Together, Maribel and Ian discuss the evolution of OT threats, the rise of AI in both defense and attack scenarios, and why cybersecurity must be seen as a core business function, not an afterthought.
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! 2016: The Dawn of Modern Ransomware The debut of Petya and Russian-affiliated groups like CryptoWall, TeslaCrypt, and Locky. Attacks were largely indiscriminate, targeting anyone from Fortune 500 companies to "Grandma's laptop." Early mitigation tactics, like installing Russian language packs to avoid infection, highlighted the state-tolerated nature of these groups. 2017: Ransomware Goes Mainstream A pivotal year with the WannaCry attack (attributed to North Korea's Lazarus Group) and NotPetya (Russian-backed), causing billions in damages to companies in multiple verticals. The SAMSAM attacks hit U.S. cities like Baltimore and Atlanta, marking Iran's brief foray into ransomware. Ransomware became a household name, sparking executive-level discussions in boardrooms. 2020: The Rise of Ransomware-as-a-Service Groups like Ryuk, REvil, and Conti refined ransomware into a business model, outsourcing tasks like initial access and money laundering. Double extortion emerged, with attackers stealing data and threatening to leak it, even if backups were restored. Some groups introduced “terms of service,” avoiding hospitals and schools to dodge law enforcement scrutiny. 2021: Critical Infrastructure in the Crosshairs High-profile attacks on Colonial Pipeline, JBS Foods, and Ireland's National Health Service disrupted daily life, from gas shortages to meat supply issues. These incidents underscored ransomware's real-world impact, elevating cybersecurity to a boardroom priority. 2022: Geopolitical Shifts and New Players Russian-backed groups like Conti and LockBit shifted focus to Ukraine amid the Russia-Ukraine conflict. The rise of Scattered Spider, a Western-based group excelling at social engineering and SIM swapping, marked a shift from Eastern state-tolerated actors. 2023: Trust Breaks Down The ALFV/BlackCat group's $22 million rug pull against affiliates signaled the decline of Russian-backed ransomware dominance. Scattered Spider solidified its reputation, targeting major hospitality and cleaning companies with sophisticated social engineering tactics. 2025: The Western Cybercrime Surge Scattered Spider and affiliates like DragonForce dominate, hitting retailers, insurance, aviation, and automotive sectors. The shift to Western-based actors, often young and operating in Five Eyes nations, makes them more vulnerable to law enforcement. Trends and Takeaways The move from expensive zero-day exploits to cheaper n-day exploits and social engineering highlights attackers' adaptability. Double extortion and even “double dipping” (demanding additional ransoms months later) have become standard tactics. The accessibility of AI tools and open-source platforms like Venice AI has lowered the barrier for creating ransomware, even for non-programmers. Law enforcement's increasing success in arrests and Bitcoin recovery (e.g., DarkSide's downfall) offers hope for curbing cybercrime. Dad Joke of the Week (DJOW) Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Ben - https://www.linkedin.com/in/benjamincorll/
The Cybersecurity and infrastructure Security Agency is hyper focused on its core priorities of defending government networks and critical infrastructure. That's the key message from Nick Anderson, CISA's new Executive Assistant Director for Cybersecurity, Federal News Network's Justin Doubleday spoke with Anderson as part of our Cyber Leaders Exchange 2025.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Mosley-Romero shares common threats towards critical infrastructure and advice for security leaders navigating different challenges.
Enjoying the content? Let us know your feedback!Picture this: You're at London Heathrow, Europe's busiest airport, ready to check in for your flight. But the kiosks aren't working. The screens are blank. Airport staff are scrambling with iPads and even pen and paper to manually check passengers in. Your flight is delayed, maybe canceled. And you're stuck in a long line with thousands of other frustrated travelers.Today we're diving into something that disrupted the travel plans of thousands of people just a few weeks ago - a massive cyberattack that brought some of Europe's busiest airports to a grinding halt.This wasn't a scene from the 1970s - this happened in September 2025. And it wasn't just Heathrow. Brussels, Berlin, Dublin - major airports across Europe were hit simultaneously.Over the next 30 mins or so, we're going to unpack what happened, who was behind it, how the attack unfolded, and what this means for the future of critical infrastructure security. We'll also look back at other major airport attacks from recent years to understand the bigger picture.So whether you're a security analyst, a CISO, or just someone who travels and wants to understand these threats, stick around.Be sure to subscribe! You can also stream from https://yusufonsecurity.comIn there, you will find a list of all previous episodes in there too.
The decision to leave a successful corporate position and start a company requires more than just identifying a market opportunity. For Shankar Somasundaram, it required witnessing firsthand how traditional cybersecurity approaches consistently failed in the environments that matter most to society: hospitals, manufacturing plants, power facilities, and critical infrastructure.Somasundaram's path to founding Asimily began with diverse technical experience spanning telecommunications and early machine learning development. This foundation proved essential when he transitioned to cybersecurity, eventually building and growing the IoT security division at a major enterprise security company.During his corporate tenure, Somasundaram gained direct exposure to security challenges across healthcare systems, industrial facilities, utilities, manufacturing plants, and oil and gas operations. Each vertical revealed the same fundamental problem: existing security solutions were designed for traditional IT environments where confidentiality and integrity took precedence, but operational technology environments operated under entirely different rules.The mismatch became clear through everyday operational realities. Hospital ultrasound machines couldn't be taken offline during procedures for security updates. Manufacturing production lines couldn't be rebooted for patches without scheduling expensive downtime. Power plant control systems required continuous availability to serve communities. These environments prioritized operational continuity above traditional security controls.Beyond technical challenges, Somasundaram observed a persistent communication gap between security and operations teams. IT security professionals spoke in terms of vulnerabilities and patch management. Operations teams focused on uptime, safety protocols, and production schedules. Neither group had effective frameworks for translating their concerns into language the other could understand and act upon.This divide created frustration for Chief Security Officers who understood risks existed but lacked clear paths to mitigation that wouldn't disrupt critical business operations. Organizations could identify thousands of vulnerabilities across their operational technology environments, but struggled to prioritize which issues actually posed meaningful risks given their specific operational contexts.Somasundaram recognized an opportunity to approach this problem differently. Rather than building another vulnerability scanner or forcing operational environments to conform to IT security models, he envisioned a platform that would provide contextual risk analysis and actionable mitigation strategies tailored to operational requirements.The decision to leave corporate security and start Asimily wasn't impulsive. Somasundaram had previous entrepreneurial experience and understood the startup process. He waited for the right convergence of market need, personal readiness, and strategic opportunity. When corporate priorities shifted through acquisitions, the conditions aligned for his departure.Asimily's founding mission centered on bridging the gap between operational technology and information technology teams. The company wouldn't just build another security tool; it would create a translation layer enabling different organizational departments to collaborate effectively on risk reduction.This approach required understanding multiple stakeholder perspectives within client organizations. Sometimes the primary user would be a Chief Information Security Officer. Other times, it might be a manufacturing operations head managing production floors, or a clinical operations director in healthcare. The platform needed to serve all these perspectives while maintaining technical depth.Somasundaram's product engineering background informed this multi-stakeholder approach. His experience with complex system integration—from telecommunications infrastructure to machine learning algorithms—provided insight into how security platforms could integrate with existing IT infrastructure while addressing operational technology requirements.The vision extended beyond traditional vulnerability management to comprehensive risk analysis considering operational context, business impact, and regulatory requirements. Rather than treating all vulnerabilities equally, Asimily would analyze each device within its specific environment and use case, providing organizations with actionable intelligence for informed decision-making.Somasundaram's entrepreneurial journey illustrates how diverse technical experience, industry knowledge, and strategic timing converge to address complex market problems. His transition from corporate executive to startup founder demonstrates how deep industry exposure can reveal opportunities to solve problems that established players might overlook or underestimate.Today, as healthcare systems, manufacturing facilities, and critical infrastructure become increasingly connected, the vision Somasundaram brought to Asimily's founding has proven both timely and necessary. The company's development reflects not just market demand, but the value of approaching familiar problems from fresh perspectives informed by real operational experience.Learn more about Asimily: itspm.ag/asimily-104921Note: This story contains promotional content. Learn more.Guest: Shankar Somasundaram, CEO & Founder, Asimily | On LinkedIn: https://www.linkedin.com/in/shankar-somasundaram-a7315b/Company Directory: https://www.itspmagazine.com/directory/asimilyResourcesLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In 2024, there were 440,000 detected cyber threats to critical infrastructure, and the U.S. Critical Infrastructure experienced a surge in attacks, including the Volt Typhoon and Chinese Telecom Network Infiltration. For 2025, projections indicate 30% of critical infrastructure organizations will experience a security breach, and major attacks on the sector are expected to continue, according to Gartner.As we welcome 2026, what would a maturing artificial intelligence present to critical infrastructure, and how should CISOs strengthen their cybersecurity strategies to reflect the evolving technology, regulatory, geopolitical and business landscape in the coming years.Joining us on PodChats for FutureCISO is Lim Hsin Yin, vice president of sales for ASEAN at Cohesity for her views on the topic of Resilience in Action: Critical Infrastructure Defence.1. What is Cohesity?2. How robust are enterprises' data resilience strategies in Asia—including immutable backups, air-gapped copies, and recovery drills—in ensuring operational continuity after ransomware or destructive cyber-attacks? What KPIs are being used to measure its effectiveness?3. To what extent have enterprises in ASEAN integrated IT and OT security teams, tools, and processes to achieve unified threat visibility and coordinated response across our entire critical infrastructure estates, especially considering legacy systems prevalent in the region?4. How are CISOs continuously re-evaluating and managing third-party and supply chain risks—especially for vendors linked to OT environments—to prevent breaches similar to regional supply chain attacks like MOVEit or airport data centre infiltrations?5. What zero-trust and segmentation measures have CISOs prioritised to protect industrial control systems (ICS) and OT environments against increasingly sophisticated hacktivist and state-backed threat actors targeting ASEAN and Hong Kong critical infrastructure?6. How are enterprises leveraging real-time, cross-border threat intelligence sharing within ASEAN to detect and disrupt pre-positioning and advanced persistent threats (APTs), as exemplified by campaigns like Volt Typhoon?Coming into 2026, what are you expecting as far as critical infrastructure defense, and what should operators of critical infrastructure be taking in terms of their defense structure?
Podcast: Simply ICS CyberEpisode: Maritime Cybersecurity Threats & Critical InfrastructurePub date: 2025-09-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Simply ICS Cyber, co-hosts Don C. Weber and Tom VanNorman are joined by maritime and energy cybersecurity expert Marco (Marc) Ayala — vOT-CISO, Senior Principal Advisor for Energy, Oil, and Gas at the Cyber Infrastructure Protection Innovation Center (CIPIC), President of InfraGard Houston Members Alliance, and National Sector Chief of Energy for InfraGard.Marc has spent his career at the intersection of ICS/OT security, maritime operations, and critical infrastructure protection. His work includes advancing cybersecurity for the energy and oil & gas industries, driving innovation at CIPIC, and building collaborative bridges between public and private sectors to defend against nation-state and criminal threats.If you're interested in the challenges of maritime cyber resilience, industrial control systems, operational technology, or energy sector defense, this episode offers rare insights from one of the field's most active leaders.Connect with Marc on LinkedIn: https://www.linkedin.com/in/marco-marc-ayala-a3b26934Episode Links:InfraGuard: https://www.infragardnational.org/ISA Fellows: https://www.isa.org/membership/recognition/fellowsPort of Corpus Christi, Texas: https://portofcc.com/Port of Galveston, Texas: https://www.portofgalveston.com/Port of Houston, Texas: https://porthouston.com/
Podcast: ICS Cyber Talks PodcastEpisode: Haim Halevy Sela CISO @critical infrastructure power plants on challenges & cyber @Energy industryPub date: 2025-09-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationשני סיסויים נכנסים לאולפן.....נשמע כמו התחלה של בדיחה טובה. הגנה על תשתיות קריטיות היא משימה מורכבת, האחריות מחד והצורך ללהטט בין הרגולציה להנהלה מאידך נחשון פינקו מארח את חיים הלוי סלע סיסו מוכר ומוערך באחת מחברות האנרגיה הגדולות בישראל לשיחת סיסויים על תחושת האחריות, ההתמודדות היום יומית עם סייבר בתקופת מלחמה, האם הרגולציה עוזרת או מפריעה, איך בוחרים טכנולוגיה ואיך מגייסים ההנהלה והדירקטוריון להתמודדות עם סיכוני סייבר Two CISOs enter a studio.... sounds like the start of a good joke. Protecting critical infrastructure is a complex task, a responsibility on the one hand, and the need to juggle regulation and management on the other Nachshon Pincu hosts Haim Halevy Sela, a well-known CISO at one of Israel's largest energy companies, for a CISO conversation about the sense of responsibility, the daily dealings with cyber in times of war, whether regulation helps or hinders, how to choose technology, and how to mobilize management and the board of directors to deal with cyber risks.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: AI, Quantum, and Cybersecurity: Protecting Critical Infrastructure in a Digital WorldPub date: 2025-09-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow is joined by Kathryn Wang, Principal of Public Sector at SandboxAQ, for a wide-ranging and candid conversation about the critical role AI and quantum technology are playing in today's cybersecurity landscape. Kathryn and Aaron break down complex concepts like quantum cryptography and the growing risks of deepfakes, data poisoning, and behavioral warfare - all with real-world examples that hit close to home. They dig into why cryptographic resilience is now more urgent than ever, how AI can both strengthen and threaten our defenses, and why your grandma shouldn't be left in charge of her own data security. From lessons learned in power plants and national defense to the nuances of protecting everything from nuclear codes to family recipes, this episode dives deep into how we can balance innovation with critical risk management. Kathryn shares practical advice on securing the basics, educating your network, and making smart decisions about what truly needs to be connected to AI. Whether you're an IT, OT, or cybersecurity professional—or just trying to keep ahead of the next cyber threat - this episode will arm you with insights, strategies, and a little bit of much-needed perspective. Tune in for a mix of expert knowledge, humor, and actionable takeaways to help you protect it all. Key Moments: 04:02 "Securing Assets in Post-Quantum Era" 07:44 AI and Cybersecurity Concerns 12:26 "Full-Time Job: Crafting LLM Prompts" 15:28 AI Vulnerabilities Exploited at DEFCON 19:30 AI Data Poisoning Concerns 20:21 AI Vulnerability in Critical Infrastructure 23:45 Deepfake Threats and Cybersecurity Concerns 28:34 Question Everything: Trust, Verify, Repeat 33:20 "Digital Systems' Security Vulnerabilities" 35:12 Digital Awareness for Children 39:10 "Understanding Data Privacy Risks" 43:31 "Leveling Up: VCs Embrace Futurism" 45:16 AI-Powered Personalized Medicine About the guest : Kathryn Wang is a seasoned executive with over 20 years of leadership in the technology and security sectors, specializing in the fusion of cutting-edge innovations and cybersecurity strategies. She currently serves as the Public Sector Principal at SandboxAQ, where she bridges advancements in post-quantum cryptography (PQC) and data protection with the mission-critical needs of government agencies. Her work focuses on equipping these organizations with a zero-trust approach to securing sensitive systems against the rapidly evolving landscape of cyber threats. During her 16-year tenure at Google and its incubator Area120, Kathryn drove global efforts to develop and implement Secure by Design principles in emerging technologies, including Large Language Models (LLMs) and Generative AI. How to connect Kathryn : https://www.linkedin.com/in/kathryn-wang/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In this week's Security Sprint, Dave and Andy covered the following topics: Warm Open:• Nerd Out EP 61. The 2/3 of the Year Awards!Main Topics:FBI PSA - Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure. The Federal Bureau of Investigation (FBI) is warning the public, private sector, and international community of the threat posed to computer networks and critical infrastructure by cyber actors attributed to the Russian Federal Security Service's (FSB) Center 16. The FBI detected Russian FSB cyber actors exploiting Simple Network Management Protocol (SNMP) and end-of-life networking devices running an unpatched vulnerability (CVE-2018-0171) in Cisco Smart Install (SMI) to broadly target entities in the United States and globally. Info Ops: • Most Adults in 25 Countries Say Spread of False Information Is a Top National Threat. The findings come from Pew's seventh iteration of its Global Attitudes Survey: International Opinion on Global Threats, which was last published in 2022. • Foreign disinformation enters AI-powered era. At least one China-based technology company, GoLaxy, seems to be using generative AI to build influence operations in Taiwan and Hong Kong… Documents also show that GoLaxy has created profiles for at least 117 members of Congress and over 2,000 American political figures and thought leaders.• Toxic politics and TikTok engagement in the 2024 U.S. election• Why wind farms attract so much misinformation and conspiracy theory UN - Terror threat posed by ISIL ‘remains volatile and complex,' Security Council hears. The threat posed by the terrorist group ISIL – known more widely in the Middle East as Da'esh – remains dynamic and diverse, with Africa currently experiencing the highest level of activity worldwide.• PDF: Remarks by Mr. Vladimir Voronkov, Under-Secretary-General for Counter-Terrorism, United Nations Office of Counter-Terrorism. • PDF: Remarks by Mr. Vladimir Voronkov, Under-Secretary-General, United Nations Office of Counter-Terrorism.• UN Report: ISIS Fighters' Migration to Afghanistan and the Taliban's Failure• ISIS-K poses major threat with 2,000 fighters in Afghanistan, UN saysFEMA Employees Warn That Trump Is Gutting Disaster Response. After Hurricane Katrina, Congress passed a law to strengthen the nation's disaster response. FEMA employees say the Trump administration has reversed that progress. Employees at the Federal Emergency Management Agency wrote to Congress on Monday warning that the Trump administration had reversed much of the progress made in disaster response and recovery since Hurricane Katrina pummeled the Gulf Coast two decades ago. The letter to Congress, titled the “Katrina Declaration,” rebuked President Trump's plan to drastically scale down FEMA and shift more responsibility for disaster response — and more costs — to the states. It came days before the 20th anniversary of Hurricane Katrina, one of the deadliest and costliest storms to ever strike the United States.Quick Hits:• 25% of security leaders replaced after ransomware attack• Gate 15: Hack Yourself First: Pen Testing for Prevention • FB-ISAO: Ransomware Incident Review January to June 2025• Dissecting PipeMagic: Inside the architecture of a modular backdoor framework• Maryland Transit Administration says cybersecurity incident is affecting some of its servicesNevada state government offices closed after network security incident• Audit of Antisemitic Incidents 2024• MIT report: 95% of generative AI pilots at companies are failing• Report: Russian Sabotage Operations In Europe Have Quadrupled Since 2023• CISA Requests Public Comment for Updated Guidance on Software Bill of Materials• Risky Bulletin: NIST releases face-morphing detection guideline• CVE-2025–41688: Bypassing Restrictions in an OT Remote Access Device• Think before you Click(Fix): Analyzing the ClickFix social engineering technique
E131 The Fifth CourtCo-host of the Fifth Court, Peter Leonard, BL, met with Kirk Offel at the Dublin Tech Summit, promoter of the 5th Industrial Revolution.'Data centres are the most important things to be manufactured in the world'. That's Kirk's view and that's just the beginning of this terrific chat about all things AI and Data Centres.Kirk is not your typical tech CEO. From a military family, a former US Navy submariner, nuclear-trained engineer, cancer survivor, and now founder of Overwatch Mission Critical, he brings a mix of discipline, resilience, and purpose to the fast-changing world of digital infrastructure. His company designs and delivers the data centres that make the cloud, AI, and mission-critical systems possible — what he likes to call “the sky for the cloud.”You'll also learn everything you ever wondered about life in a submarine under the ocean...though some of what he's done he can't talk about.Before that, Peter and Mark Tottenham, BL, examine notable recent court decisions featured on Decisis.ie including:A 'Proceeds of Crime' case and whether it should be reopened with new material comes to light?A case full of energy, including a windfarm, a hydrogen plant and turf-cutting.Another planning case, this one regarding an old paint factory that was being used to house migrants. It turned out to be a moot case.Whether you're in practice or just passionate about the law, this episode is a must-listen for its clarity, depth, and practical relevance.Sponsored by Charltons Solicitors and Collaborative Practitioners – family law with a collaborative approach. Hosted on Acast. See acast.com/privacy for more information.
In today's episode of 'Cybersecurity Today,' hosted by Jim Love, we cover several key issues in the cybersecurity landscape. Firstly, a breach involving Workday and social engineering attacks targeting Salesforce customers is discussed. Next, the risks posed by a recent Windows update potentially causing data corruption on SSDs and HDDs are highlighted. We also delve into a critical infrastructure breach where Russian hackers remotely accessed a Norwegian dam's control system. Additionally, the episode covers Google's vulnerabilities in its AI and Gmail services, and finally, Apple's significant privacy victory against the UK's backdoor encryption mandate. The episode concludes with a call for listener support through donations to sustain the program. 00:00 Introduction and Headlines 00:23 Workday Data Breach Explained 02:15 Windows Update Issues 04:05 Norwegian Dam Cyber Attack 05:49 Google's Security Challenges 07:12 Apple's Privacy Victory 08:19 Conclusion and Listener Support
Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Local Infrastructure is Critical InfrastructurePub date: 2025-08-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOur host Bryson sits down with Colin Ahern and Kirk Herath, two of the only cybersecurity experts working in Governors' offices in the United States. Colin was appointed Chief Cyber Officer of the State of New York by Governor Kathy Hochul in June 2022, and Kirk stepped into his role as Cybersecurity Strategic Advisor to Ohio Governor Mike DeWine and Lt. Governor Jon Husted the same year. In their positions, Colin and Kirk are responsible for coordinating their states' cybersecurity capabilities, overseeing threat assessment and response, working with local governments to prepare for and remediate cyber attacks, and more. What were the critical lessons learned in building statewide cybersecurity programs from the ground up? How do states navigate the shifting landscape of federal support? And what are the biggest challenges and opportunities on the horizon for cyber czars and strategic advisors across the country? “You can't replicate these shared services unless you're doing it together. You just can't. We can either succeed together or we can fail separately. There's really not a middle ground where we can all have exactly everything we want all the time. Because like we've said, this is a risk management exercise in a world of limited resources,” Colin explained. Join us for this and more on this episode of Hack the Plan[e]t. The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
The hits just keep on coming Where's the Little Dutch Boy when you need him? I felt the ransomware down in Africa Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines Find the stories behind the headlines at CISOseries.com
Podcast: Simply ICS CyberEpisode: S1 E3: Critical Infrastructure vs. Everything ElsePub date: 2025-03-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Simply ICS Cyber, Don and Tom interview Gus Serino, water sector expert and Owner at I&C Secure, Inc.Listen in as we will answer the following questions:- What is Critical Infrastructure?- What are other types of Industrial and Automation?- Is cybersecurity different between the two?Links from this episode:- Gus Serino LinkedIn: https://www.linkedin.com/in/gusserino/- Instrumentation & Control Secure, Inc.: https://www.iandcsecure.com/- S4Events - Water Sector Cyber Risk with Gus Serino: https://www.youtube.com/watch?v=ScigBpXIjggJoin us every other Wednesday for Season 1 of the Simply ICS Cyber podcast, with your hosts, Don C. Weber and Tom VanNorman.Connect with your hosts on LinkedIn:- Don https://www.linkedin.com/in/cutaway- Tom https://www.linkedin.com/in/thomasvannorman=========================Simply Cyber empowers people who want a rewarding cybersecurity career=========================All the ways to connect with Simply Cyberhttps://SimplyCyber.io/Socials=========================The podcast and artwork embedded on this page are from Simply Cyber Media Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Declassified emails and memos reveal the Clinton campaign may have fabricated Trump–Russia collusion to distract from her email scandal. The PBD Podcast crew exposes Obama-era FBI failures, media complicity, and the deeper implications for justice, accountability, and free speech.
Keywordscybersecurity, military transition, Tampa cybersecurity, mentorship, cyber law, incident response, private sector, cybersecurity misconceptions, legal perspectives, cybersecurity growth SummaryIn this episode of No Password Required, hosts Jack Clabby and Kayley Melton sit down with Kurt Sanger — former Deputy General Counsel at U.S. Cyber Command — to talk about the evolving world of cyber law, the wild ride from government service to private sector strategy, and what keeps him grounded in a field that's constantly shifting. Kurt dives into the fast-growing cybersecurity scene in Tampa, the power of mentorship, and why people still get cyber law so wrong. Plus: insights on responding to incidents under pressure and what role the government should (and shouldn't) play in the digital fight. TakeawaysKurt emphasizes that newcomers to cybersecurity are not as far behind as they think.The transition from military to private sector can be challenging but rewarding.Tampa is becoming a significant hub for cybersecurity talent and companies.Understanding cybersecurity misconceptions is crucial for decision-makers.Mentorship plays a vital role in navigating career challenges in cybersecurity.Military and civilian cyber law have distinct differences in enforcement and flexibility.The stakes in private sector cybersecurity can be incredibly high for clients.Kurt's experience highlights the need for collaboration between government and private sectors.Cybersecurity is an ever-evolving field that requires continuous learning.Kurt finds excitement in helping clients during their most challenging times. Sound bites "You're only six months behind.""We're all in the same boat.""The government needs to step back." Chapters 00:00 NPR S6E7 Kurt Sanger52:53 NPR S6E7 Kurt Sanger01:45:47 Introduction to Cybersecurity Conversations01:48:22 Transitioning from Military to Private Sector Cybersecurity01:51:11 The Growth of Tampa as a Cybersecurity Hub01:54:05 Understanding Cybersecurity Misconceptions01:57:15 The Role of Mentorship in Cybersecurity Careers02:00:24 Military vs. Civilian Cybersecurity Law02:03:07 The Excitement of Cyber Command vs. Private Sector02:13:52 High Stakes in Cybersecurity for Small Organizations02:15:44 The Role of Legal Experts in Cybersecurity02:17:21 Translating Technical Jargon for Clients02:18:57 Challenges of Explaining Cyber Operations to Commanders02:22:43 Lifestyle Polygraph: Fun Questions and Insights02:23:30 The 10,000 Hour Rule in Cybersecurity02:29:34 Creative Freedom with LEGO Bricks02:31:27 Tampa's Culinary Delights and Local Favorites
In the latest Nerd Out, Alec and Dave welcome in Hunter Headapohl to talk about the cyber basics, and why so many threats can be prevented by following appropriate cyber hygiene. Alec and Hunter share their best practices and some of their tools and resources that can be leveraged to mitigate risk.Some of the references from the pod include:Top Cyber Actions for Securing Water Systems - https://www.cisa.gov/resources-tools/resources/top-cyber-actions-securing-water-systemsDefending OT Operations Against Ongoing Pro-Russia Hacktivist Activity - https://www.cisa.gov/resources-tools/resources/defending-ot-operations-against-ongoing-pro-russia-hacktivist-activityIRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including US Water and Wastewater Systems Facilities - https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335aChina Strategically Infiltrates U.S. Critical Infrastructure as Cyberattacks Escalate - https://thesoufancenter.org/intelbrief-2025-january-10/Secure by Design - https://www.cisa.gov/securebydesignCISA Training - https://www.cisa.gov/resources-tools/training
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: The Double-Edged Sword of AI in Cybersecurity and Critical InfrastructurePub date: 2025-07-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this solo episode, host Aaron Crow takes us on a fast-paced journey through the latest critical developments in both IT and OT cybersecurity. Aaron breaks down the month's most pressing zero-day exploits, including high-profile attacks on Microsoft SharePoint and CrushFTP, and explores the implications of rapidly evolving threats - especially as attackers leverage AI for faster, more innovative hacks. But it's not all doom and gloom: Aaron dives into how AI is also becoming a game-changer for defense, from Google's use of AI agents to spot vulnerabilities ahead of attackers, to the promise (and dangers) of deepfake technology. He discusses new policy moves, like the FCC's proposal to ban Chinese tech in undersea internet cables and the US Coast Guard's push for cyber resilience in maritime infrastructure. Throughout the episode, Aaron offers strategic advice for organizations of all sizes - from patch management and digital twins to incident response plans designed for today's AI-driven threat landscape. Whether you're in cyber, tech, critical infrastructure, or just want to stay a step ahead, this episode is packed with actionable insights and timely analysis to boost your cyber resilience. Plug in for a conversation that's equal parts eye-opening and empowering! Key Moments; 01:20 High-Level Tactical Briefing 05:31 Digital Twin for System Security 09:39 Dual Role of Tools 12:00 Emergency Procedures Reminder 14:24 Challenges in OT System Integration 18:32 Deep Fake Detection and Response 20:12 "AI Persistence and Impact" Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Even though the bombs and missiles have stopped falling, that doesn't mean nothing is happening between Iran, Israel, and the United States. In fact, it may mean that certain dangers like cyber attacks are actually increasing. Here to help us understand the threat and how to mitigate it is vice president of global cyber risk at Optiv, James Turgal.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Podcast: Bites & Bytes PodcastEpisode: Hiring for the Frontlines of Critical Infrastructure with Nathaniel SmithPub date: 2025-07-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat does it take to build a cybersecurity workforce capable of protecting the systems that keep the lights on and food on our plates? In this episode, host Kristin Demoranville is joined by Nathaniel Smith, Co-Founder and VP at SR2, a purpose-driven recruitment firm. Nathaniel, who specializes in hiring OT/ICS, brings over 14 years of recruiting experience and a refreshing dose of honesty to the challenges of hiring in critical infrastructure. Together, they explore what makes a strong Operational Technology (OT) candidate, why culture fit matters as much as technical skills, and how broken hiring processes often keep the best people out. For sectors like food and agriculture, where operational technology is directly tied to safety, production, and public trust, getting the right people into the right roles isn't just important. It's essential. --------------- Show Notes: Mike Holcomb's Episode (here) SEC Ruling on Disclosure of Cyber Incidents (here)
Also - row erupts in Belfast City Hall over Pride stained glass window installed in May
Tanya Janca joins the show this week, with unique perspective on building secure software and advocating for better cybersecurity policy.George K and George A talk to Tanya about: Her transition from 14 years as a Canadian public servant to private sector entrepreneurship The core values that guide her work: performing good and moving the industry toward secure software Entrepreneurship since age 19: solving real problems that hurt badly enough for people to pay Civil advocacy for security by design policies and challenging inadequate government cybersecurity practicesTanya's perspective on building businesses around genuine problem-solving rather than just seeking acquisition or wealth creation offers valuable insights for any founder. Whether you're interested in secure coding, entrepreneurship, or how to advocate for better cybersecurity policy, this episode delivers actionable insights from someone who's been in the trenches and made real impact.Mentioned: The Eh List: https://ehlist.org/ Forte Group: forte-group.org/home-our-mission Tanya's petition: https://www.ipetitions.com/petition/secure-canadas-future Tanya's Secure Coding Guideline: newsletter.shehackspurple.ca/c/secure-coding-guideline
What does the future of enterprise networking really look like? In this episode, Extreme Networks' Chief Product & Technology Officer Nabil Bukhari joins Craig to explore how AI, autonomous agents, and platform thinking are transforming the core infrastructure of modern businesses. From managing mission-critical networks to building agentic systems that collaborate, troubleshoot, and scale autonomously - this is a deep dive into how connectivity is being redefined from the ground up. Whether you're a tech leader, CIO, product builder, or simply curious about how infrastructure evolves, this conversation reveals where the enterprise is headed next. Check out Extreme Networks: https://www.extremenetworks.com/ Stay Updated: Craig Smith on X: https://x.com/craigss Eye on A.I. on X: https://x.com/EyeOn_AI (00:00) Preview (01:02) Introducing Nabil Bukhari & Extreme Networks (05:24) Why Global Connectivity Is Still Accelerating (07:54) How Enterprise Data Flows Across Modern Networks (12:34) Networking for AI vs. Built-in AI (14:12) Platform One & Agentic AI Systems Explained (21:20) Human-in-the-Loop, Over-the-Loop, and Above-the-Loop (23:35) Why AI Guardrails Must Be Baked into the Architecture (27:33) Introducing the ARC Framework (31:15) Persona-Based Interfaces for NetOps, CFOs & CMOs (33:25) The Problem with Chatbots (36:06) Enterprise vs. Public Networks (38:38) Global Connectivity Infrastructure & Use Case Variability (44:29) How Secure and Resilient Are Enterprise Networks? (52:24) In-House AI for Critical Infrastructure
CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercriminals abusing Large Language Models. MacOS malware Poseidon Stealer rebrands.Researchers discover multiple vulnerabilities in Bluetooth chips used in headphones and earbuds. The FDA issues new guidance on medical device cybersecurity. Our guest is Debbie Gordon, Co-Founder of Cloud Range, looking “Beyond the Stack - Why Cyber Readiness Starts with People.” An IT worker's revenge plan backfires. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, Debbie Gordon, Co-Founder of Cloud Range, shares insights on looking “Beyond the Stack - Why Cyber Readiness Starts with People.” Learn more about what Debbie discusses in Cloud Range's blog: Bolstering Your Human Security Posture. You can hear Debbie's full conversation here. Selected Reading CISA and Partners Urge Critical Infrastructure to Stay Vigilant in the Current Geopolitical Environment (CISA) Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran (CISA, FBI, DOD Cyber Crime Center, NSA) Prolific cybercriminal group now targeting aviation, transportation companies (Axios) U.S. Cyber Diplomacy at Risk Amid State Department Shakeup (GovInfo Security) Canada Bans Chinese CCTV Vendor Hikvision Over National Security Concerns (Infosecurity Magazine) Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos (Hackread) MacOS malware Poseidon Stealer rebranded as Odyssey Stealer (SC Media) Airoha Chip Vulnerabilities Expose Headphones to Takeover (SecurityWeek) FDA Expands Premarket Medical Device Cyber Guidance (GovInfo Security) 'Disgruntled' British IT worker jailed for hacking employer after being suspended (The Record) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 65: Hacking Critical Infrastructure Through Supply ChainsPub date: 2025-06-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCritical Infrastructure software lacks the strict liability standards found in industries like automotive manufacturing, leading to minimal accountability for insecure products when they get exploited. Alex Santos, CEO of Fortress Information Security, explains how they're typically hired by buyers of ICS equipment—such as utilities—to assess and mitigate supply chain risks, including working with OEMs to improve security.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Driving OT Security Innovation: AI, Risk Reduction, and the Future of Critical InfrastructurePub date: 2025-06-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome back to Protect It All! In this episode, host Aaron Crow sits down with longtime friend and OT cybersecurity veteran Brian Proctor for a deep dive into the current state—and future—of the OT cyber landscape. Together, they trade stories from the front lines, reflecting on how their early experiences as asset owners shaped their passion for innovation and helping critical infrastructure run safely and securely. Brian, whose career spans roles from OT engineer to startup co-founder, opens up about his journey—highlighting his drive to push the boundaries of traditional OT security and the evolution of key industry technologies. The conversation explores everything from the persistent lack of innovation in OT, to AI's growing role in tackling the daunting challenges of risk reduction, visibility, and scaling assessments across sprawling environments. If you've ever wondered how new tech like AI is reshaping industrial cybersecurity, why “we've always done it this way” just doesn't cut it anymore, or how organizations can realistically stay ahead without breaking the bank, this episode delivers honest insights, practical advice, and a look toward an exciting, if sometimes daunting, future. So grab your headphones and settle in as Aaron and Brian share stories, hot takes, and strategies designed to protect it all—because in critical infrastructure, the stakes have never been higher. Key Moments: 06:45 OT Cyber Industry Evolution 11:57 Evolving Challenges in OT Security 19:34 Bridging the OT Security Skills Gap 21:54 Enhancing OT Security Understanding 30:46 AI Model Security Challenges 34:26 Rapid Scaling for Site Assessments 40:56 Simulating Cyber Threat Responses 47:19 Operational Priorities: Equipment vs. Cyber Tools 49:30 Focus on Meaningful Security Metrics 56:30 Rapid AI Adoption vs. Internet 01:02:12 Cybersecurity: Small Targets are Vulnerable About the guest : Brian Proctor is a cybersecurity leader with over 20 years of experience protecting critical infrastructure across energy, industrial automation, and operational technology sectors. As the co-founder and CEO of Frenos, he empowers critical infrastructure operators to proactively secure their environments against evolving cyber threats. Brian built his foundation in ICS/OT cybersecurity during his 13+ year tenure at two progressive California Investor Owned Utilities, San Diego Gas & Electric and Southern California Edison serving the 2nd and 8th largest cities in the United States. He managed a team of 15 security engineers and researchers across 150+ projects, established OT security roadmaps, and co-invented an R&D Magazine Top 100 award-winning GPS anti-spoofing mitigation technology that earned him a patent. Brian has published IEEE papers on security monitoring, served as Critical Infrastructure Co-Chair for Securing Our eCity, and regularly speaks at conferences to educate and build the ICS/OT cybersecurity community. He holds technical certifications including GICSP, CISSP, and CRISC, along with a Business Administration degree from the University of San Diego. Links: https://frenos.io/services - Learn more about Optica, the industry's first tech-enabled rapid OT visibility service https://frenos.io/autonomous-ot-security-assessment-platform - Learn more about how to automate OT security risk assessments Connect Brian : https://www.linkedin.com/in/brianproctor67/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Critical Infrastructure software lacks the strict liability standards found in industries like automotive manufacturing, leading to minimal accountability for insecure products when they get exploited. Alex Santos, CEO of Fortress Information Security, explains how they're typically hired by buyers of ICS equipment—such as utilities—to assess and mitigate supply chain risks, including working with OEMs to improve security.
In this episode of CISO Tradecraft, host G Mark Hardy discusses the ongoing Israel-Iran conflict and its potential cyber implications with cybersecurity expert Nathan Case. They delve into lessons learned from the Russia-Ukraine conflict, discuss the effectiveness of cyber warfare, and evaluate Iran's cyber capabilities. The conversation also covers the ethical implications of cyber attacks, dual-use targets, and the danger of supply chain vulnerabilities. Practical advice is provided on improving cybersecurity measures, including the importance of MFA, network segmentation, and evaluating internal threats. Join us for an in-depth look at how current geopolitical tensions can impact global cybersecurity. Nathan Case - https://www.linkedin.com/in/nathancase/ Chapters 00:00 Introduction to the Israel-Iran Conflict 00:52 Meet the Expert: Nate Case 01:51 Cyber Warfare Insights from Russia-Ukraine Conflict 03:36 The Impact of Cyber on Critical Infrastructure 08:00 Ethics and Rules of Cyber Warfare 15:01 Iran's Cyber Capabilities and Strategies 16:56 Historical Context and Modern Cyber Threats 23:28 Foreign Cyber Threats: The Iranian Example 24:06 Israel's Cyber Capabilities 25:39 The Role of Cyber Command 26:23 Challenges in Cyber Defense 27:11 The Complexity of Cyber Warfare 32:21 Ransomware and Attribution Issues 36:13 Defensive Cyber Operations 39:39 Final Thoughts and Recommendations
In this episode of CISO Tradecraft, host G Mark Hardy discusses the ongoing Israel-Iran conflict and its potential cyber implications with cybersecurity expert Nathan Case. They delve into lessons learned from the Russia-Ukraine conflict, discuss the effectiveness of cyber warfare, and evaluate Iran's cyber capabilities. The conversation also covers the ethical implications of cyber attacks, dual-use targets, and the danger of supply chain vulnerabilities. Practical advice is provided on improving cybersecurity measures, including the importance of MFA, network segmentation, and evaluating internal threats. Join us for an in-depth look at how current geopolitical tensions can impact global cybersecurity. Nathan Case - https://www.linkedin.com/in/nathancase/ Chapters 00:00 Introduction to the Israel-Iran Conflict 00:52 Meet the Expert: Nate Case 01:51 Cyber Warfare Insights from Russia-Ukraine Conflict 03:36 The Impact of Cyber on Critical Infrastructure 08:00 Ethics and Rules of Cyber Warfare 15:01 Iran's Cyber Capabilities and Strategies 16:56 Historical Context and Modern Cyber Threats 23:28 Foreign Cyber Threats: The Iranian Example 24:06 Israel's Cyber Capabilities 25:39 The Role of Cyber Command 26:23 Challenges in Cyber Defense 27:11 The Complexity of Cyber Warfare 32:21 Ransomware and Attribution Issues 36:13 Defensive Cyber Operations 39:39 Final Thoughts and Recommendations
Join us as we sit down with Matt Nicolls, Chief Digital Innovation Officer at Technology Partners, to uncover the unique story behind his creative approach to leadership. Matt shares how his early experiences shaped his passion for visually mapping out solutions, and how this skill has become central to his work in technology. Listeners will hear about the mentors who inspired him, the power of transparency in business, and how bringing “something extra” to the table can make all the difference in driving innovation and building strong teams.Guest Links:Matt's LinkedInTechnology PartnersCredits: Host: Lisa Nichols, Executive Producer: Jenny Heal, Marketing Support: Landon Burke and Joe Szynkowski, Podcast Engineer: Portside Media
In this episode of The New CISO, host Steve Moore speaks with Keith Price, Chief Security Officer at National Highways, about the evolving responsibilities of modern security leaders and the critical role of convergence between cyber, physical, and people security.Keith shares real-world stories from his work protecting England's strategic road network—used by over four million people daily—and explains why understanding both legacy infrastructure and cutting-edge technology is essential for building a resilient security strategy. From managing insider threats and recovering stolen radar equipment to championing mental health and developing junior talent, Keith offers a holistic approach to leadership in critical infrastructure.Key Topics Covered:How converging physical, cyber, and personnel security leads to stronger protectionReal-life insider threat examples—and how sensors helped prevent major damageThe challenge of managing decades-old asset tracking systems across regionsWhy availability and integrity of data now outweigh confidentiality in certain sectorsHow Keith's team detected stolen highway radar for sale on eBayThe importance of empathetic leadership and supporting mental health in security teamsHow "Cyber Coffee" sessions create safe spaces for vulnerability and connectionUpskilling IT staff into cybersecurity roles through “pay-it-forward” learningThe case for offering security-as-a-service to small but critical supply chain partnersKeith's insights reveal why successful security leadership requires more than just technical knowledge—it demands communication, humility, and a deep understanding of human behavior. This conversation is a must-listen for any security professional working to bridge silos and lead with impact.
In this episode of 'Cybersecurity Today', host Jim Love is joined by panelists Laura Payne from White Tuque and David Shipley from Beauceron Security to review significant cybersecurity events over the past month. The discussion covers various impactful stories such as the disappearance of a professor, a data breach at Hertz, and government officials using a commercial app during a conflict. They dive deep into the ransomware attack on PowerSchool and its implications for K-12 schools in North America. The conversation also highlights the vulnerability of critical infrastructures, including the food supply chain and the importance of robust cybersecurity measures. Finally, the panel touches upon the progression towards post-quantum encryption by major tech companies like AWS and Google, signaling advancements in securing future technologies. 00:00 Introduction and Panelist Welcome 00:20 Major Cybersecurity Incidents of the Month 02:04 PowerSchool Data Breach Analysis 04:11 Ransomware and Double Extortion Tactics 12:20 4chan Security Breach and Its Implications 16:31 Hertz Data Loss and Retail Cybersecurity 17:44 Critical Infrastructure and Cyber Regulation 27:03 The Importance of CVE Database 27:54 Debate on Vulnerability Scoring 30:17 Open Source Software and Geopolitical Risks 31:43 The Evolution and Challenges of Open Source 37:17 The Need for Software Regulation 46:50 Signal Gate and Compliance Issues 54:08 Post-Quantum Cryptography 56:10 Conclusion and Final Thoughts
This week on Caveat, Dave and Ben welcome back N2K's own Ethan Cook for our latest policy deep dive segment. As a trusted expert in law, privacy, and surveillance, Ethan is joining the show regularly to provide in-depth analysis on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Please take a moment to fill out an audience survey! Let us know how we are doing! Policy Deep Dive In this Caveat Policy Deep Dive, our conversation and analysis revolve around critical infrastructure policy. Throughout this conversation, we break down how critical infrastructure policy has evolved over the past fifteen years and what policies have been behind some of these advancements. Some key topics focused on during this conversation center on some of the centralization of infrastructure management policies, the creation of CISA, and how the second Trump administration is changing the federal government's approach when managing critical infrastructure. Get the weekly Caveat Briefing delivered to your inbox. Like what you heard? Be sure to check out and subscribe to our Caveat Briefing, a weekly newsletter available exclusively to N2K Pro members on N2K CyberWire's website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more. This week's Caveat Briefing a new bill that is gaining traction in Congress where Senators Merkley and Kennedy are looking to limit the TSA's facial scanning program. This law comes after the DHS announced an audit regarding how the TSA has used this technology. Curious about the details? Head over to the Caveat Briefing for the full scoop and additional compelling stories. Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you. Learn more about your ad choices. Visit megaphone.fm/adchoices
On this episode of Banking on KC, Joe Kessinger, CEO of HCI Energy, joins host Kelly Scanlon to discuss how the Kansas City-based company is revolutionizing energy delivery for telecom, public safety and underserved areas through sustainable hybrid power systems. Tune in to discover:How HCI Energy's technology provides reliable, renewable energy for mission-critical infrastructureThe environmental and economic benefits of hybrid power in remote and disaster-prone areasHow HCI Energy is contributing to social equity through energy access in underserved communitiesCountry Club Bank – Member FDIC
Software Engineering Radio - The Podcast for Professional Software Developers
Steve Summers speaks with SE Radio host Sam Taggart about securing test and measurement equipment. They start by differentiating between IT and OT (Operational Technology) and then discuss the threat model and how security has evolved in the OT space, including a look some of the key drivers. They then examine security challenges associated with a specific device called a CompactRIO, which combines a Linux real-time CPU with a field programmable gate array (FPGA) and some analog hardware for capturing signals and interacting with real-world devices. Brought to you by IEEE Computer Society and IEEE Software magazine.
How prepared is your business for a ransomware attack? Not just to prevent it, but to continue operating when it happens. In this episode, I sit down with Trevor Dearing, Director of Critical Infrastructure at Illumio, to discuss the latest findings from their global ransomware report and what they reveal about cyber resilience. Trevor shares insight from a survey of more than 3,000 organisations across multiple sectors. The most concerning figure is that 58 percent of those impacted by ransomware were forced to halt operations. That number has risen sharply from 43 percent just two years ago. Despite this, many businesses in the UK still avoid reporting attacks, often due to fears around reputational damage or potential retaliation. Trevor explains why that reluctance is misguided and how public support, improved infrastructure, and more explicit government guidance could encourage more transparency. We also explore the rise of containment as a more practical and cost-effective approach than prevention alone. Rather than trying to stop every attack at the perimeter, organisations are learning how to isolate and limit damage quickly. Trevor explains how zero trust architecture, microsegmentation, and one-click containment tools are being used to keep systems operational even during an incident. Only 13 percent of organisations believe their cyber resilience exceeds what is required. Trevor helps us understand why this number remains low and where organisations should focus to shift from vulnerability to resilience. From evolving regulations to future applications of AI in security, this conversation covers what leaders need to know if they prepare for the next generation of cyber threats. To access Illumio's full ransomware report, visit illumio.com. Is your cyber resilience strategy built for recovery, or just defense?
Joshua Steinman is the co-founder and CEO of Galvanick, a cybersecurity company building tools to secure industrial infrastructure and AI systems.In this episode of World of DaaS, Joshua and Auren discuss:Foreign spies in tech companiesVulnerabilities in critical infrastructureLessons from Stuxnet and UkraineBuilding resilience against cyber threatsLooking for more tech, data and venture capital intel? Head to worldofdaas.com for our podcast, newsletter and events, and follow us on X @worldofdaas. You can find Auren Hoffman on X at @auren and Josh Steinman on X at @JoshuaSteinman. Editing and post-production work for this episode was provided by The Podcast Consultant (https://thepodcastconsultant.com)
Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to travel hundreds... Read more »
Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to travel hundreds... Read more »
Michael Lucci is the founder, CEO, and chairman of State Armor. He helps states enact policies and solutions that protect their assets from foreign adversaries like communist China.“They're trying to invade our homeland, and they likely have developed the capacity to make life very difficult, to create crises within the United States—whether it's power, whether it's wastewater treatment, whether it's telecommunications,” he says. “They have laws that require those companies to engage in espionage. So why are we letting them sell connected devices of any type into the United States?”In this episode, we dive deep into how the Chinese regime has managed to infiltrate our critical infrastructure and communications systems at the local, state, and federal levels.“It's the largest military buildup since World War Two is what China is doing right now,” says Lucci. “If they're just in our back doors, listening, reading, following everything we're doing, following the pattern of life for important officials across the country, that's a pretty deep problem.”Views expressed in this video are opinions of the host and the guest, and do not necessarily reflect the views of The Epoch Times.