POPULARITY
** Named “Best Podcast” for 3 Consecutive Years! 2022-2024 Apex Awards of Publication Excellence. In this episode's news report, The Journal's Executive Editor Theresa Houck reports updates about: The global industrial control & automation market's 5-year forecast A key update to Rockwell Automation FactoryTalk PharmaSuite software. SME's “Ready to Hire” program providing trained workers. Dragos Inc.'s acquisition of Network Perception. Rockwell Automation agreement with Taurob to develop robotics. Fortinet's certification program award. New leadership at packaging OEM The Optima Group's and cable solutions provider icotek Corp. ISA's new position paper. And more. And as always, get your family-friendly, silly Joke of the Day. Resources from this episode: Rockwell Automation FactoryTalk PharmaSuite v. 11.02.00. Connected worker solution from Plex, by Rockwell Automation. For info about the SME “Ready to Hire” program, contact Chad Schron, Senior Director of Tooling U-SME, chad.schron@toolingu.com. Download ISA's position paper, “Automation Shapes Global Economic Growth and Development.” To subscribe to our 4 print magazines (Feb., May, July and Oct.), e-mail Anna Hicks at ahicks@endeavorbusinessmedia.com. Subscribe to our 4 digital magazines at http://rok.auto/thejournal-subscribe. Please share this episode with someone else who would benefit from it. And kindly leave us a 5-star rating and a review. Automation Chat is brought to you by The Journal From Rockwell Automation and Our PartnerNetwork magazine. Find us on YouTube. Find us on LinkedIn. Find us on Facebook. Find us on X (Twitter).
In this episode of “Automation Chat," Executive Editor Theresa Houck reviews news highlights in industrial automation and manufacturing. This month, we cover an impactful robotics and simulation collaboration between READY Robotics, NVIDIA & Toyota for the automaker's aluminum hot forging production. We also report on important cybersecurity reports from Fortinet and Dragos Inc.; a cybersecurity firm acquisition by Rockwell Automation; cybersecurity awards; and sustainability achievements in hydroponics farms, green hydrogen and decarbonization. As always, get your family-friendly, silly Joke of the Day. Resources from this episode: Dragos Inc. 6th Annual “Dragos OT Cybersecurity Year in Review.” Fortinet White Paper: “A Solution Guide to Operational Technology Cybersecurity.” System Integrator Avid Solutions. Learn about the READY Robotics and Toyota & NVIDIA collaboration. To subscribe to our 4 print magazines (Feb., May, July and Oct.), e-mail Anna Hicks at ahicks@endeavorbusinessmedia.com. Subscribe to our 4 digital magazines at http://rok.auto/thejournal-subscribe. Please leave us a 5-star rating and a review — we appreciate it. “Automation Chat" is brought to you by The Journal From Rockwell Automation and Our PartnerNetwork magazine. ** Named Best Podcast 2 Consecutive Years! 2022 & 2023 Apex Awards of Publication Excellence.
Podcast: The PrOTect OT Cybersecurity Podcast (LS 31 · TOP 5% what is this?)Episode: Dan Gunter: Lessons Learned from Real-World Attack on Ukraine's Critical InfrastructurePub date: 2023-12-14About Dan Gunter: Dan Gunter, founder and CEO of Insane Forensics, is a seasoned cybersecurity professional renowned for his extensive expertise in the field. With a background as an officer in the United States Air Force, specifically with the Air Force Computer Emergency Response Team (AFCERT) and operational CYBERCOM teams, Dan has a wealth of experience in protecting critical infrastructure sites. His leadership extends to the private sector, where he served as the Director of Research and Development for Dragos Inc. before founding Insane Forensics. As a prominent speaker at major cybersecurity events, including Black Hat and ShmooCon, Dan shares his insights on incident response, threat hunting, consequence analysis, and security operations. Under his guidance, Insane Forensics provides a cutting-edge cybersecurity automation platform and services, catering to the unique challenges faced by industrial sites with limited cybersecurity resources.In this episode, Aaron and Dan Gunter discuss:Addressing the growing threat of cyber attacks on critical infrastructure, reflecting on Mandiant's report on attacks in UkraineNavigating the complexities, resource limitations, and timely application of threat intelligenceRethinking industrial cybersecurityThe intersection of cybersecurity, AI, and OTKey Takeaways:In the face of escalating cyber threats to critical infrastructure, exemplified by recent attacks like the Ukraine power grid incident, it is evident that a passive approach alone is insufficient; as attackers grow more sophisticated, understanding and actively monitoring both network and host activities become imperative for effective defense strategies.The evolving landscape of OT cybersecurity demands a nuanced approach, addressing the historical lack of understanding, resource constraints, and the critical need for timely threat intelligence application, highlighting the urgency for industry-wide collaboration and the integration of advanced technologies like AI.To navigate the integration of AI and ML in industrial settings, overcoming fear and resistance is key. Scaling incident response, fostering collaboration, and embracing proactive and reactive measures are essential for building a resilient security foundation in critical infrastructure.In the next 5 to 10 years, the increasing scale and sophistication of cyber attacks, especially in critical infrastructure, pose a significant concern, requiring a holistic approach that combines people, processes, and technology to address evolving threats and vulnerabilities, emphasizing the need for proactive design considerations in new environments and fostering collaborative efforts to share knowledge and solutions. "I worry about how we keep up. We're not going to do it by people alone. We won't do it by process or technology alone. It's going to be all three. It's going to be just us being smart about it and being open to the future." — Dan Gunter Connect with Dan Gunter: Website: https://insaneforensics.com/ Email: dan@insaneforensics.comYouTube: https://www.youtube.com/channel/UCSBx8on8ffSm00kqUcTrRPALinkedIn: https://www.linkedin.com/in/dan-gunter/Twitter: https://twitter.com/insaneforensicsConnect with Aaron:LinkedIn: https://www.linkedin.com/in/aaronccrowLearn more about Industrial Defender:Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/Twitter: https://twitter.com/iDefend_ICSYouTube: https://www.youtube.com/@industrialdefender7120Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: The PrOTect OT Cybersecurity Podcast (LS 29 · TOP 10% what is this?)Episode: Dan Gunter: Lessons Learned from Real-World Attack on Ukraine's Critical InfrastructurePub date: 2023-12-14About Dan Gunter: Dan Gunter, founder and CEO of Insane Forensics, is a seasoned cybersecurity professional renowned for his extensive expertise in the field. With a background as an officer in the United States Air Force, specifically with the Air Force Computer Emergency Response Team (AFCERT) and operational CYBERCOM teams, Dan has a wealth of experience in protecting critical infrastructure sites. His leadership extends to the private sector, where he served as the Director of Research and Development for Dragos Inc. before founding Insane Forensics. As a prominent speaker at major cybersecurity events, including Black Hat and ShmooCon, Dan shares his insights on incident response, threat hunting, consequence analysis, and security operations. Under his guidance, Insane Forensics provides a cutting-edge cybersecurity automation platform and services, catering to the unique challenges faced by industrial sites with limited cybersecurity resources.In this episode, Aaron and Dan Gunter discuss:Addressing the growing threat of cyber attacks on critical infrastructure, reflecting on Mandiant's report on attacks in UkraineNavigating the complexities, resource limitations, and timely application of threat intelligenceRethinking industrial cybersecurityThe intersection of cybersecurity, AI, and OTKey Takeaways:In the face of escalating cyber threats to critical infrastructure, exemplified by recent attacks like the Ukraine power grid incident, it is evident that a passive approach alone is insufficient; as attackers grow more sophisticated, understanding and actively monitoring both network and host activities become imperative for effective defense strategies.The evolving landscape of OT cybersecurity demands a nuanced approach, addressing the historical lack of understanding, resource constraints, and the critical need for timely threat intelligence application, highlighting the urgency for industry-wide collaboration and the integration of advanced technologies like AI.To navigate the integration of AI and ML in industrial settings, overcoming fear and resistance is key. Scaling incident response, fostering collaboration, and embracing proactive and reactive measures are essential for building a resilient security foundation in critical infrastructure.In the next 5 to 10 years, the increasing scale and sophistication of cyber attacks, especially in critical infrastructure, pose a significant concern, requiring a holistic approach that combines people, processes, and technology to address evolving threats and vulnerabilities, emphasizing the need for proactive design considerations in new environments and fostering collaborative efforts to share knowledge and solutions. "I worry about how we keep up. We're not going to do it by people alone. We won't do it by process or technology alone. It's going to be all three. It's going to be just us being smart about it and being open to the future." — Dan Gunter Connect with Dan Gunter: Website: https://insaneforensics.com/ Email: dan@insaneforensics.comYouTube: https://www.youtube.com/channel/UCSBx8on8ffSm00kqUcTrRPALinkedIn: https://www.linkedin.com/in/dan-gunter/Twitter: https://twitter.com/insaneforensicsConnect with Aaron:LinkedIn: https://www.linkedin.com/in/aaronccrowLearn more about Industrial Defender:Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/Twitter: https://twitter.com/iDefend_ICSYouTube: https://www.youtube.com/@industrialdefender7120Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
About Dan Gunter: Dan Gunter, founder and CEO of Insane Forensics, is a seasoned cybersecurity professional renowned for his extensive expertise in the field. With a background as an officer in the United States Air Force, specifically with the Air Force Computer Emergency Response Team (AFCERT) and operational CYBERCOM teams, Dan has a wealth of experience in protecting critical infrastructure sites. His leadership extends to the private sector, where he served as the Director of Research and Development for Dragos Inc. before founding Insane Forensics. As a prominent speaker at major cybersecurity events, including Black Hat and ShmooCon, Dan shares his insights on incident response, threat hunting, consequence analysis, and security operations. Under his guidance, Insane Forensics provides a cutting-edge cybersecurity automation platform and services, catering to the unique challenges faced by industrial sites with limited cybersecurity resources.In this episode, Aaron and Dan Gunter discuss:Addressing the growing threat of cyber attacks on critical infrastructure, reflecting on Mandiant's report on attacks in UkraineNavigating the complexities, resource limitations, and timely application of threat intelligenceRethinking industrial cybersecurityThe intersection of cybersecurity, AI, and OTKey Takeaways:In the face of escalating cyber threats to critical infrastructure, exemplified by recent attacks like the Ukraine power grid incident, it is evident that a passive approach alone is insufficient; as attackers grow more sophisticated, understanding and actively monitoring both network and host activities become imperative for effective defense strategies.The evolving landscape of OT cybersecurity demands a nuanced approach, addressing the historical lack of understanding, resource constraints, and the critical need for timely threat intelligence application, highlighting the urgency for industry-wide collaboration and the integration of advanced technologies like AI.To navigate the integration of AI and ML in industrial settings, overcoming fear and resistance is key. Scaling incident response, fostering collaboration, and embracing proactive and reactive measures are essential for building a resilient security foundation in critical infrastructure.In the next 5 to 10 years, the increasing scale and sophistication of cyber attacks, especially in critical infrastructure, pose a significant concern, requiring a holistic approach that combines people, processes, and technology to address evolving threats and vulnerabilities, emphasizing the need for proactive design considerations in new environments and fostering collaborative efforts to share knowledge and solutions. "I worry about how we keep up. We're not going to do it by people alone. We won't do it by process or technology alone. It's going to be all three. It's going to be just us being smart about it and being open to the future." — Dan Gunter Connect with Dan Gunter: Website: https://insaneforensics.com/ Email: dan@insaneforensics.comYouTube: https://www.youtube.com/channel/UCSBx8on8ffSm00kqUcTrRPALinkedIn: https://www.linkedin.com/in/dan-gunter/Twitter: https://twitter.com/insaneforensicsConnect with Aaron:LinkedIn: https://www.linkedin.com/in/aaronccrowLearn more about Industrial Defender:Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/Twitter: https://twitter.com/iDefend_ICSYouTube: https://www.youtube.com/@industrialdefender7120Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.
The Cybercrime Magazine Podcast brings you daily cybercrime news that airs each day on WCYB Digital Radio, the first and only 7x24x365 Internet radio station devoted to cybersecurity. Our host keeps you on the cutting edge of cyber with a rundown of the latest cyberattacks, hacks, data breaches, and more. Don't miss an episode! Airs every half-hour on WCYB and every day on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news
Podcast: The PrOTect OT Cybersecurity Podcast (LS 28 · TOP 10% what is this?)Episode: Dan Gunter: How Our Growing Ability To Process Data Affects CybersecurityPub date: 2023-03-16About Dan Gunter: Dan Gunter is an accomplished cybersecurity professional with a wealth of experience in the field. As the founder and CEO of Insane Forensics, he is committed to providing digital forensics and threat-hunting services to help organizations protect themselves from cyber threats. Dan's expertise was honed through years of service in the United States Air Force, including as an officer in the Air Force Computer Emergency Response Team (AFCERT) and operational CYBERCOM teams. He also served as Director of Research and Development for Dragos Inc, where he oversaw detection engineering and reverse engineering efforts to protect critical infrastructure sites. Dan is a highly-regarded speaker and has presented at numerous events, including Blackhat, Schmoocon, S4, and CS3STHLM, where he has shared his knowledge on incident response, threat hunting, consequence analysis, and security operations. In this episode, Aaron and Dan Gunter discuss:The differences and challenges of incident response in IT vs OT environments, particularly in protecting critical infrastructure in OT systemsWhat a typical engagement looks like in an industrial environment for proactive and reactive security servicesHow asset owners of SMBs can secure their assets when they don't have an OT group, and what resources are available to help themHow different factors impact the response and success of a security incident in OT environments compared to IT environmentsKey Takeaways:OT and IT systems are often built with similar hardware and software, but on the OT side, the consequences of a system going down can be much more severe, so it's important to understand both the technical level and how humans interact with it, to protect and help asset owners and preserve life and safety.Industrial sites can work with security consultants to prevent problems by taking proactive measures like threat assessments, network monitoring, and incident response retainers, but it's important to understand the environment and build trust to develop effective strategies.To keep your business safe from cyber threats, consult with equipment manufacturers and follow their security guidelines, implement network monitoring and testing, and take proactive and reactive measures without overthinking.Adapting IT and OT procedures to your organization's assets and requirements is crucial due to the significant variation across industries and sites, and a lack of accurate data sources and asset inventory can cause issues. "Our ability to consume, to process, to push technology forward continues to grow. Whether you look at smart city stuff, both for security and also for power management and others, or you look at other systems like 5g and other things, we're able to move data around a lot easier. This combination of us being able to get more data but also process the data, I think it's going to have huge implications on the security side." — Dan Gunter Connect with Dan Gunter: Website: https://insaneforensics.com/ YouTube: https://www.youtube.com/channel/UCSBx8on8ffSm00kqUcTrRPALinkedIn: https://www.linkedin.com/in/dan-gunter/ and https://www.linkedin.com/in/dan-gunter/Twitter: https://twitter.com/insaneforensicsCost of a Data Breach 2022 Report: https://www.ibm.com/reports/data-breachConnect with Aaron:LinkedIn: https://www.linkedin.com/in/aaronccrowLearn more about Industrial Defender:Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/Twitter: https://twitter.com/iDefend_ICSYouTube: https://www.youtube.com/@industrialdefender7120Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
About Dan Gunter: Dan Gunter is an accomplished cybersecurity professional with a wealth of experience in the field. As the founder and CEO of Insane Forensics, he is committed to providing digital forensics and threat-hunting services to help organizations protect themselves from cyber threats. Dan's expertise was honed through years of service in the United States Air Force, including as an officer in the Air Force Computer Emergency Response Team (AFCERT) and operational CYBERCOM teams. He also served as Director of Research and Development for Dragos Inc, where he oversaw detection engineering and reverse engineering efforts to protect critical infrastructure sites. Dan is a highly-regarded speaker and has presented at numerous events, including Blackhat, Schmoocon, S4, and CS3STHLM, where he has shared his knowledge on incident response, threat hunting, consequence analysis, and security operations. In this episode, Aaron and Dan Gunter discuss:The differences and challenges of incident response in IT vs OT environments, particularly in protecting critical infrastructure in OT systemsWhat a typical engagement looks like in an industrial environment for proactive and reactive security servicesHow asset owners of SMBs can secure their assets when they don't have an OT group, and what resources are available to help themHow different factors impact the response and success of a security incident in OT environments compared to IT environmentsKey Takeaways:OT and IT systems are often built with similar hardware and software, but on the OT side, the consequences of a system going down can be much more severe, so it's important to understand both the technical level and how humans interact with it, to protect and help asset owners and preserve life and safety.Industrial sites can work with security consultants to prevent problems by taking proactive measures like threat assessments, network monitoring, and incident response retainers, but it's important to understand the environment and build trust to develop effective strategies.To keep your business safe from cyber threats, consult with equipment manufacturers and follow their security guidelines, implement network monitoring and testing, and take proactive and reactive measures without overthinking.Adapting IT and OT procedures to your organization's assets and requirements is crucial due to the significant variation across industries and sites, and a lack of accurate data sources and asset inventory can cause issues. "Our ability to consume, to process, to push technology forward continues to grow. Whether you look at smart city stuff, both for security and also for power management and others, or you look at other systems like 5g and other things, we're able to move data around a lot easier. This combination of us being able to get more data but also process the data, I think it's going to have huge implications on the security side." — Dan Gunter Connect with Dan Gunter: Website: https://insaneforensics.com/ YouTube: https://www.youtube.com/channel/UCSBx8on8ffSm00kqUcTrRPALinkedIn: https://www.linkedin.com/in/dan-gunter/ and https://www.linkedin.com/in/dan-gunter/Twitter: https://twitter.com/insaneforensicsCost of a Data Breach 2022 Report: https://www.ibm.com/reports/data-breachConnect with Aaron:LinkedIn: https://www.linkedin.com/in/aaronccrowLearn more about Industrial Defender:Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/Twitter: https://twitter.com/iDefend_ICSYouTube: https://www.youtube.com/@industrialdefender7120Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.
Podcast: Cyber Security Weekly Podcast (LS 38 · TOP 2.5% what is this?)Episode: Episode 306 - Assessing Risk in ICS EnvironmentsPub date: 2022-01-23Ransomware has captured the attention of many due to its far-reaching impacts on industrial control systems (ICS). Once a problem that only affected IT infrastructure, ransomware that now targets ICS / OT can significantly impact or even shut-down control processing, logistics, distribution, and delivery of critical goods. We speak with Dr. Tom Winston, Director of Intelligence with Dragos Inc, based in Virginia. Dr. Winston is a Cyber Security subject matter expert focused on threats to critical infrastructure (ICS/SCADA) systems, as well as foreign cyber threat intelligence and threat analysis. Tom has extensive public and private sector experience in IT/OT threat environments to include hunting, detection engineering and reverse engineering. Tom has extensive experience in mobile devices, removable/fixed media digital forensics. Tom is also a seasoned manager of people, technology, projects, and programs. Multilingual, and with extensive experience in international relations, intelligence, and foreign policy analysis. Dr Winston has extensive private and public sector experience in IT/OT threat environments to include hunting, detection engineering and reverse engineering. Formerly, a highly sought after and award-winning professor Dr Winston was an undergraduate and graduate student advocate and champion; student success is critical - not just in school, but after graduation as well. He built cyber security engineers one student at a time and continues to assist them even well past their graduation by providing career and other professional guidance.Recorded 18 January 2022 courtesy of Dragos.To view the video version visit https://mysecuritymarketplace.com/av-media/assessing-risk-in-ics-environments/Further readingBlog post – Tom WinstonAssessing Ransomware Risk in IT and OT Environmentshttps://www.dragos.com/blog/industry-news/assessing-ransomware-risk-in-it-and-ot-environments/Blog post – DragosAssessment of Ransomware Event at US Pipeline Operatorhttps://www.dragos.com/blog/industry-news/assessment-of-ransomware-event-at-u-s-pipeline-operator/Blog post – Sergio CaltagironeRecent Ransomware Attacks against Governments and Critical Infrastructurehttps://www.dragos.com/blog/industry-news/recent-ransomware-attacks-against-governments-and-critical-infrastructure/Webinar recording – Tom WinstonProtect your ICS environments from Ransomware with Risk Assessmentshttps://www.dragos.com/resource/protect-your-ics-environment-from-ransomware/#ICS #OTcybersecurity #cybersecurity #insiderthreatThe podcast and artwork embedded on this page are from MySecurity Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Ransomware has captured the attention of many due to its far-reaching impacts on industrial control systems (ICS). Once a problem that only affected IT infrastructure, ransomware that now targets ICS / OT can significantly impact or even shut-down control processing, logistics, distribution, and delivery of critical goods. We speak with Dr. Tom Winston, Director of Intelligence with Dragos Inc, based in Virginia. Dr. Winston is a Cyber Security subject matter expert focused on threats to critical infrastructure (ICS/SCADA) systems, as well as foreign cyber threat intelligence and threat analysis. Tom has extensive public and private sector experience in IT/OT threat environments to include hunting, detection engineering and reverse engineering. Tom has extensive experience in mobile devices, removable/fixed media digital forensics. Tom is also a seasoned manager of people, technology, projects, and programs. Multilingual, and with extensive experience in international relations, intelligence, and foreign policy analysis. Dr Winston has extensive private and public sector experience in IT/OT threat environments to include hunting, detection engineering and reverse engineering. Formerly, a highly sought after and award-winning professor Dr Winston was an undergraduate and graduate student advocate and champion; student success is critical - not just in school, but after graduation as well. He built cyber security engineers one student at a time and continues to assist them even well past their graduation by providing career and other professional guidance.Recorded 18 January 2022 courtesy of Dragos.To view the video version visit https://mysecuritymarketplace.com/av-media/assessing-risk-in-ics-environments/Further readingBlog post – Tom WinstonAssessing Ransomware Risk in IT and OT Environmentshttps://www.dragos.com/blog/industry-news/assessing-ransomware-risk-in-it-and-ot-environments/Blog post – DragosAssessment of Ransomware Event at US Pipeline Operatorhttps://www.dragos.com/blog/industry-news/assessment-of-ransomware-event-at-u-s-pipeline-operator/Blog post – Sergio CaltagironeRecent Ransomware Attacks against Governments and Critical Infrastructurehttps://www.dragos.com/blog/industry-news/recent-ransomware-attacks-against-governments-and-critical-infrastructure/Webinar recording – Tom WinstonProtect your ICS environments from Ransomware with Risk Assessmentshttps://www.dragos.com/resource/protect-your-ics-environment-from-ransomware/#ICS #OTcybersecurity #cybersecurity #insiderthreat
Ramping up for The 2021 National Cyber Summit, Nick focuses on past interviews from Keynote Speakers and Cyber Security Experts such as: Retired Brigadier General Jennifer Buckner, Director of Cyber U.S. ArmyRober Lee, CEO Dragos Inc.Shirley Zhao, Principal Program Manager, Blackberry These interviews give a peek into the vast information available to attendees of the National Cyber Summit. https://www.youtube.com/watch?v=0oR52kWrxD0
This week, we sit down with Twitter royalty @hacks4pancakes (AKA Lesley Carhart) to find out her top rules for incident response, and what can be gained from the online security community.We also take a regretful Uber ride through some Watchtower Weekly, and attempt to conclude the Harry Potter-themed edition of Play Your Passwords Right. Get your wands at the ready for "The Deathly Hallows: Part 2"
Podcast: Risky BusinessEpisode: Feature Podcast: Critical infrastructure security with Eric Rosenbach and Robert M LeePub date: 2019-10-31This podcast is brought to you by the William and Flora Hewlett Foundation, and it’s the second in a series of podcasts we’re doing that are all about cyber policy. The Foundation funds a lot of interesting people and work in the cybersecurity space. So the idea behind this podcast series is pretty simple: we talk to Hewlett’s grant recipients, or experts in Hewlett’s network, about pressing policy issues and turn those conversations into podcasts. The whole idea is to get some policy perspectives out there among the Risky Business audience, which, funnily enough, includes a lot of policymakers. This podcast features both Eric Rosenbach and Robert M Lee talking about ICS security. Eric is the co-director of the Belfer Center for Science and International Affairs at the Harvard Kennedy School. He also heads the Defending Digital Democracy project there. Eric has a very long and somewhat fascinating resume. As United States Assistant Secretary of Defense he led the US Defense Department’s efforts to counter cyberattacks by Iran and North Korea on US critical infrastructure. He’s also worked as a Chief Security Officer in the private sector and served as Pentagon chief of staff from 2015-2017. Robert M Lee is the founder of Dragos Inc, a very well known company in the ICS/OT security space. Rob started out in infosec with the US Air Force as a Cyber Warfare Operations Officer tasked to the NSA, but as you’ll hear, Rob is actually pretty optimistic about the ICT/OT security challenge.The podcast and artwork embedded on this page are from Patrick Gray, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Lesley Carhart is the Principal Threat Analyst at Dragos Inc.. Lesley has been performing digital forensics and incident response on unconventional systems and advanced adversary attacks for over a decade. Lesley will be discussing her transition from IT security to OT security, DFIR in ICS - What is it like doing forensics in this environment? Firmware? Micro-code?, and much more! Full Show Notes: https://wiki.securityweekly.com/Episode603 Follow us on Twitter: https://www.twitter.com/securityweekly
Podcast: Paul's Security Weekly (Podcast-Only)Episode: Billy Ray Built a Meth Lab - Paul's Security Weekly #603Pub date: 2019-05-10Notes from @BEERISAC: CPS/ICS Security Podcast Playlist:DFIR in ICS, and more!This week, we welcome back Lesley Carhart, Principal Threat Analyst at Dragos Inc., to talk about moving from IT security to OT security, DFIR in ICS, and more! In the second segment, we welcome Chris Sanders, Founder of Applied Network Defense & Director of the Rural Technology Fund, to talk about delivering high quality IT training and donating scholarships and equipment to further education in schools! In the Security News, the top 5 mistakes that create field days for hackers, WordPress 5.2 brings new security features, a discontinued Insulin pump with security a security flaw in high demand, and how to communicate privately in the age of digital policing! Full Show Notes: https://wiki.securityweekly.com/Episode603 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweeklyThe podcast and artwork embedded on this page are from Paul Asadoorian, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Lesley Carhart is the Principal Threat Analyst at Dragos Inc.. Lesley has been performing digital forensics and incident response on unconventional systems and advanced adversary attacks for over a decade. Lesley will be discussing her transition from IT security to OT security, DFIR in ICS - What is it like doing forensics in this environment? Firmware? Micro-code?, and much more! Full Show Notes: https://wiki.securityweekly.com/Episode603 Follow us on Twitter: https://www.twitter.com/securityweekly
This week, we welcome back Lesley Carhart, Principal Threat Analyst at Dragos Inc., to talk about moving from IT security to OT security, DFIR in ICS, and more! In the second segment, we welcome Chris Sanders, Founder of Applied Network Defense & Director of the Rural Technology Fund, to talk about delivering high quality IT training and donating scholarships and equipment to further education in schools! In the Security News, the top 5 mistakes that create field days for hackers, WordPress 5.2 brings new security features, a discontinued Insulin pump with security a security flaw in high demand, and how to communicate privately in the age of digital policing! Full Show Notes: https://wiki.securityweekly.com/Episode603 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome back Lesley Carhart, Principal Threat Analyst at Dragos Inc., to talk about moving from IT security to OT security, DFIR in ICS, and more! In the second segment, we welcome Chris Sanders, Founder of Applied Network Defense & Director of the Rural Technology Fund, to talk about delivering high quality IT training and donating scholarships and equipment to further education in schools! In the Security News, the top 5 mistakes that create field days for hackers, WordPress 5.2 brings new security features, a discontinued Insulin pump with security a security flaw in high demand, and how to communicate privately in the age of digital policing! Full Show Notes: https://wiki.securityweekly.com/Episode603 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Podcast: Security ConversationsEpisode: Robert M. Lee, Chief Executive Officer, Dragos Inc.Pub date: 2018-05-10The founder and CEO of Dragos, Inc. Robert M. Lee (RobertMLee) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations. https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3The podcast and artwork embedded on this page are from Ryan Naraine, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
The founder and CEO of Dragos, Inc. Robert M. Lee (RobertMLee) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations. https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3