POPULARITY
Malicious actors are always looking for the “Easy Button” when it comes to breaching your system. This week on Feds At the Edge, we are revisiting our conversation on looking at the protection of Operational Technology (OT), critical hardware on premises. Traditionally separated from IT systems by air gaps, OT is now increasingly managed by IT departments due to the convergence of IT and OT. Few realize that OT has federal compliance regulations, just like IT. The real issue, should an OT systems administrator have to do repetitive work to comply with IT mandates? Marty Edwards, Deputy CTO, OT/IoT from Tenable, noted that he has seen up to 80% similarity between IT and OT compliance standards, prompting efforts to reduce redundancy.
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
While everybody is focusing on Artificial Intelligence, malicious actors are going after the soft underbelly of modern technology: operational technology, or OT. Today, we take a look at the increasing threat of cyber-attacks on operational technology (OT) systems, which are often not built with security in mind. Operational Technology is represented by control systems, logic controllers, and other end points found in critical infrastructure like water and systems that generate energy, like oil, natural gas and even nuclear. Today's experts share ideas on how to mitigate risk through. Collaboration: Throughout the federal government communities are being formed that seek to share information on OT threats. For example, CISA has a Joint Cyber Defense Collaborative that serves as a clearing house for communication between industry and the federal government. Continuous monitoring: Marty Edwards works on several federal committees to try to establish data formats that would allow for interoperability to monitor attacks and update existing operational technology. Proactive measures: Jonathan Feibus from the NRC shares that 90% of the systems he monitors are focused on Information Technology. Vendors seeking solutions to this problem should look at extending methodologies built for IT into the realm of OT. The discussion ended with a discussion of the integration of IT and OT security, the role of AI in enhancing security, and the need for comprehensive asset inventories and risk assessments.
For the video of this podcast: Bringing Agility to the Modern Security Operations Center Follow FedInsider on LinkedIn Today, we look at protecting critical infrastructure called Operational Technology (OT). One might think, what does a sensor in a water filtration plant have to do with my servers? OT can be considered as hardware on premises. Some are old and it is quite expensive to update. For years, IT leaders did not have to worry about security because IT and OT were separated by air gaps. However, today we see a convergence where the IT department is being placed in charge of protecting both IT and OT. The first challenge to overcome is discovering what is on your network. We are looking at physical devices, virtual devices, and virtual devices in the cloud. Inventories need to be tracked, and some will argue the cloud will permit IT/OT systems to be easier to be configured in an automated fashion. During this interview, compliance is a topic that is discussed in depth. We all know about IT compliance like NIST 800-53; few realize that OT has federal compliance regulations as well. The real issue, should an OT systems administrator have to do repetitive work to comply with IT mandates? Marty Edwards from Tenable remarked that he has seen up to 80% similarity in compliance standards. As a result, today, committees are meeting to make sure they can eliminate redundance in compliance for OT vs. IT. Malicious actors are always looking for the “Easy Button” when it comes to system penetration. If federal leaders aren't careful, remote sensors can provide a launch pad for the next cyber event.
Podcast: HOU.SEC.CAST.Episode: World Peace still Requires Changing Default Passwords with Marty EdwardsPub date: 2024-01-21In today's episode Michael and Sam chat with HOU.SEC.CON. speaker and Deputy CTO of Tenable, Marty Edwards. Their conversation revolves around the need for collaboration between IT and OT teams, the importance of implementing cybersecurity fundamentals before investing in products and solutions, and the real-life consequences that result from not protecting critical infrastructure. Things Mentioned:· States and Congress wrestle with cybersecurity after Iran attacks small town water utilities - https://apnews.com/article/water-utilities-hackers-cybersecurity-1c475f5d2ef3b5d52410c93bdeab3aad· HOU.SEC.CON. Tickets - https://www.houstonseccon.com/· OT.SEC.CON. - https://www.otseccon.com/· EXEC.SEC.CON. - https://www.execseccon.com· HSC User Group - https://www.hscusergroup.com· Marty Edwards HOU.SEC.CON. Talk - https://youtu.be/4jFyolZuYEg?si=r0bSyxVr7zFCjVGO· Sponsorship Requests: sponsorwrangler@houstonseccon.comDo you have a question for the hosts? Reach out to us at podcast@houstonseccon.com Keep up with HOU.SEC.CON:· LinkedIn· Twitter· Facebook· Instagram· YouTube Check out our other show:· CyberSundayCheck out our Conferences:· HOU.SEC.CON.· OT.SEC.CON.· EXEC.SEC.CON. Support or apply to our Scholarship Program:· TAB Cyber Foundation In this episode:· Host: Michael Farnum· Host: Sam Van Ryder· Guest: Marty Edwards· Editing by: Lauren Lynch· Music by: August HoneyThe podcast and artwork embedded on this page are from Michael Farnum and Sam Van Ryder, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: HouSecCastEpisode: World Peace still Requires Changing Default Passwords with Marty EdwardsPub date: 2024-01-21In today's episode Michael and Sam chat with HOU.SEC.CON. speaker and Deputy CTO of Tenable, Marty Edwards. Their conversation revolves around the need for collaboration between IT and OT teams, the importance of implementing cybersecurity fundamentals before investing in products and solutions, and the real-life consequences that result from not protecting critical infrastructure. Things Mentioned:· States and Congress wrestle with cybersecurity after Iran attacks small town water utilities - https://apnews.com/article/water-utilities-hackers-cybersecurity-1c475f5d2ef3b5d52410c93bdeab3aad· HOU.SEC.CON. Tickets - https://www.houstonseccon.com/· OT.SEC.CON. - https://www.otseccon.com/· EXEC.SEC.CON. - https://www.execseccon.com· HSC User Group - https://www.hscusergroup.com· Marty Edwards HOU.SEC.CON. Talk - https://youtu.be/4jFyolZuYEg?si=r0bSyxVr7zFCjVGO· Sponsorship Requests: sponsorwrangler@houstonseccon.comDo you have a question for the hosts? Reach out to us at podcast@houstonseccon.com Keep up with HOU.SEC.CON:· LinkedIn· Twitter· Facebook· Instagram· YouTube Check out our other show:· CyberSundayCheck out our Conferences:· HOU.SEC.CON.· OT.SEC.CON.· EXEC.SEC.CON. Support or apply to our Scholarship Program:· TAB Cyber Foundation In this episode:· Host: Michael Farnum· Host: Sam Van Ryder· Guest: Marty Edwards· Editing by: Lauren Lynch· Music by: August HoneyThe podcast and artwork embedded on this page are from Michael Farnum and Sam Van Ryder, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
= = = = What happens if a patch means replacing a $500,000 piece of equipment? Malicious actors are equal-opportunity attackers. Of course, they will go after federal agencies in the cloud; they will also attempt to penetrate systems through good old-fashioned industrial equipment, assets, and processes – what has gotten the label “Operational Technology.” We take it for granted that when an exploit is discovered we can patch our systems, whether in the cloud or on-premises. There is a much different story when we switch from patching Information Technology to Operational Technology. Today's interview brings together observations on reducing risk in operational technology from experts as varied as the NSA, CISA, and industry experts. Tony DiPietro from NSA highlights facts like OT can be widely dispersed geographically. Further, many of these systems are not as flexible as an app in the cloud. In other words, you cannot rule out a patch and correct the patch the next day. Some OT systems take a long time to propagate. Further, because of the high degree of variability, one patch will not work for all OT systems. The good news is that organizations like CISA have teams looking for vulnerabilities in OT. For example, Brandon Tarr discusses the fact that CISA has a five-phase method to seek out OT vulnerabilities. They work with over 3,000 independent researchers and that occurs across six hundred different vendors. Marty Edwards suggests that many software applications are designed to look for vulnerabilities in standard IT systems, but few for OT. He reiterates the assertion that you cannot protect what you cannot see. The idea is one must have a thorough understanding of all aspects of OT in the system you manage. One takeaway from the discussion is the dilemma that some organizations are facing. For example, what if you are in a hospital and have an MRI machine running Windows 95? The system cannot be patched and must be replaced. Can you justify a $500,000 expense for a new MRI?
Podcast: KBKAST (LS 27 · TOP 10% what is this?)Episode: Security Round-up: Marty Edwards | Compliance Costs and Enhanced Protections: Australia's New Cybersecurity ProtocolPub date: 2023-05-29In this episode of KBKast, we take a look into the recent announcement from the Australian government about their new cybersecurity regulations for businesses. The new risk management protocol covers cybersecurity, physical security, personnel security, and supply chain security, all aimed at encouraging companies to enhance overall protection measures rather than punishing directors for noncompliance. Marty points out that Australia's situation with cybersecurity is similar to other countries in the world, with many governments implementing baseline standards to encourage better cybersecurity practices. However, some organizations have made progress in cybersecurity, while others need more government intervention to ensure critical infrastructure security. He also touches on the importance of investing in operational technology systems, including industrial control systems, which have been underinvested in cybersecurity, despite their vital role in operating electricity, gas, water, and transportation systems. As more governments require cybersecurity standards for these systems, both public and private sector organizations should invest in the security of these systems. Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards—a 30‐year industry veteran—served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest‐serving Director of the U.S. Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy's (DOE's) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute's Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its “Federal 100 Awards” as being one of the top IT professionals in the U.S. federal government.The podcast and artwork embedded on this page are from KBI.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Marty Edwards joins Dale Peterson to discuss the big stories of the first quarter of 2023. The US National Cybersecurity Strategy ISA / ISASecure starting an OT Site Assessment Certification Ransomware Affecting Operations (indirectly) Marty and Dale then give their win and fail for Q1 and a prediction.
There were a lot of trends emanating from the mid-1980s that thankfully died out over time, but one of them has not only persisted, but thrived. Although there were numerous samples of malware impacting early computer networks, the one that captured both headlines and the admiration of cyber criminals was the PC-Write Trojan virus. Iterations would follow, with perhaps the best known example of industrial malware – Stuxnet – being introduced about 25 years later. It would be topped by WannaCry Ransomware just seven years after that. In all these cases, bad actors were able to probe vulnerabilities, identify weak spots, and exploit these lapses in erasing data, eliminating access, or promising more extensive damage if their monetary demands were not met. These viruses, worms and malicious coding is still present today, and those armed with this malware have gotten smarter, their attacks more complex, and their search for victims more intense. The industrial sector and municipal utilities, with their combination of lucrative IP, essential production models and lagging security protocols, have become a favorite target. Joining us today to help navigate this minefield of bad actors is Marty Edwards. He's the Vice President of OT Security at Tenable – a leading provider of infrastructure and cloud network software and security solutions. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
On this edition of the podcast, we look at the conversation around operational technology (OT) and attacks on critical infrastructure, as we mark a year since the Colonial Pipeline incident. We're joined by Tenable's VP of operational technology Marty Edwards to talk about lessons learned, what work there is still to be done by practitioners, industry and researchers, and where the problems remain.Tenable blog - Securing Critical Infrastructure its Complicated Amit Yoran TestimonyVideo of the Homeland Security CommitteeJoint Cybersecurity AdvisoryCBS News 60 Minutes Report NCSC blog on Cyber Assessment Framework Follow along for more from Tenable Research:Subscribe to the blogFollow Tenable's Zero Day team on Medium
This week we are celebrating National Farm Animal Day and it's going to be a party. We are talking horses, pigs, cows, goats, and even sheep. Joining us for this celebration is the incredible Dr. Marty Edwards. You may recall from last week's episode she promised us some stories from her time learning about farm animals. So hang on, it's going to be a wild ride. To follow us on social media visit @wildconnectpod and @realDrJen for Twitter & @RealDrJen and www.jenniferverdolin.com for more. Love the show or simply enjoyed this episode? Give us a like and share so others can find us too.
This weeks episode features someone near and dear to me. She was my vet who helped me take care of my beloved Senor Antonio Buttones in his final weeks. In fact I am dedicating this episode to him. As you will hear in the Show veterinarians have one of the highest suicide rates by profession so be sure to check out the show notes for links to help support veterinarians. Dr. Marty Edwards is more than just a veterinarian, shes also a humanitarian as far as I'm concerned. She also is a veterinarian that comes to you which means she has had some experiences. I got to sit down with her to learn more about how she got interested in veterinary medicine, get a sneak peak into some of her home visit adventures, and learn about her volunteer work spaying and neutering cats on Hatteras Island in NC. If you want to support veterinarians please visit Not One More Vet If you want more information on trap, neuter, return projects in NC check out the organizations we talked about on the show Friends of Felines Alleycat Allies To follow us on social media visit @wildconnectpod and @realDrJen for Twitter & @RealDrJen and www.jenniferverdolin.com for more. Love the show or simply enjoyed this episode? Give us a like and share so others can find us too.
Podcast: Control System Cyber Security Association International: CS2AIEpisode: 04: The Pros & Cons of a Narrow Niche in Cybersecurity with Marty EdwardsPub date: 2021-09-14There's a lot more to cyber security than what meets the eye. While many opt for more traditional paths within the industry, there are unique and niche opportunities available. Todays guest, Marty Edwards, is the Vice President of Operational Technology for Tenable, former director of ISC/CERT, an amateur radio operator, and a jack of all trades in many fields. Today Marty discusses his journey of moving through his career, the pro's and con's he's seen from having a narrowed niche, what he's learned along the way, and so much more. Tune into this episode to hear more about Marty's journey, along with an array of insight into his career. Show Highlights: Marty shares what his childhood on a ranch in Canada was like How Marty's education helped him get into his career now What Marty's career looked like directly out of college How Marty got into the position he has now What is INL and what do they do Marty shares what his role as an “industry liaison” looked like How Marty became a Federal Civil Servant What led to going from being in charge of a sector to overseeing the whole program How having mentors impacted Marty's career The pro's and con's of having a really specialized niche The benefits of having industrialized experience Why certifications may or may not help your resume The importance of being present in conversation What excites Marty in his career today Doing a critical analysis to resolve the problem The evolution and movement to cloud based technologies Resources:TenableCS2AIThe podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
There's a lot more to cyber security than what meets the eye. While many opt for more traditional paths within the industry, there are unique and niche opportunities available. Todays guest, Marty Edwards, is the Vice President of Operational Technology for Tenable, former director of ISC/CERT, an amateur radio operator, and a jack of all trades in many fields. Today Marty discusses his journey of moving through his career, the pro's and con's he's seen from having a narrowed niche, what he's learned along the way, and so much more. Tune into this episode to hear more about Marty's journey, along with an array of insight into his career. Show Highlights: Marty shares what his childhood on a ranch in Canada was like How Marty's education helped him get into his career now What Marty's career looked like directly out of college How Marty got into the position he has now What is INL and what do they do Marty shares what his role as an “industry liaison” looked like How Marty became a Federal Civil Servant What led to going from being in charge of a sector to overseeing the whole program How having mentors impacted Marty's career The pro's and con's of having a really specialized niche The benefits of having industrialized experience Why certifications may or may not help your resume The importance of being present in conversation What excites Marty in his career today Doing a critical analysis to resolve the problem The evolution and movement to cloud based technologies Resources: https://tenable.com (Tenable) CS2AI This podcast is brought to you by: https://www.cs2ai.org/sap/waterfall (Waterfall Security Solutions), https://www.cs2ai.org/sap/fortinet (Fortinet), https://www.cs2ai.org/sap/network-perception- (Network Perceptions), https://www.cs2ai.org/sap/industrial--defender (Industrial Defender), https://www.cs2ai.org/sap/tripwire (Tripwire) and https://www.cs2ai.org/sap/q-net (Q-Net Security). Mentioned in this episode: Join CS2AI Join the largest organization for cybersecurity professionals. Membership has its benefits! We keep you up to date on the latest cybersecurity news and education. https://cs2ai.captivate.fm/cs2ai (Preroll Membership) Our Sponsors: We'd like to thank our sponsors for their faithful support of this podcast. Without their support we would not be able to bring you this valuable content. We'd appreciate it if you would support these companies because they support us! Network Perception Waterfall Security Tripwire KPMG Cyber
In this week's Realcomm Live episode, we welcome Marty Edwards, VP, OT security at Tenable, a cyber exposure company that helps more than 30,000 organizations around the world understand and reduce cybersecurity risk. Marty was formerly the longest-serving director of the U.S. government's Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT). He will share his thoughts and insight on this important and extremely critical topic.
Podcast: Unsolicited Response Podcast (LS 28 · TOP 10% what is this?)Episode: Impact to ICS Security Effort with Dir. Krebs FiringPub date: 2020-11-23President Trump fired CISA Director Chris Krebs. The firing was election related, but CISA is also the lead government agency on ICS security. I talked with Marty Edwards about how large changeover like this affects the effort, and what the community should realistically expect from CISA. Marty is now with Tenable, and he is well known as the longest serving Director of ICS-CERT (the predecessor to CISA for ICS security efforts). Marty is more optimistic and appreciative of CISA's efforts than Dale is. So it makes for an interesting conversation. The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
President Trump fired CISA Director Chris Krebs. The firing was election related, but CISA is also the lead government agency on ICS security. I talked with Marty Edwards about how large changeover like this affects the effort, and what the community should realistically expect from CISA. Marty is now with Tenable, and he is well known as the longest serving Director of ICS-CERT (the predecessor to CISA for ICS security efforts). Marty is more optimistic and appreciative of CISA's efforts than Dale is. So it makes for an interesting conversation.
Marty Edwards, vice president for operational technology security at Tenable, discusses how chief information security officers (CISOs) are integrating and converging across all aspects of security, including people, process and technology. The goal: get an enterprise-wide assessment of cyber exposure and overall risk.
Podcast: Unsolicited Response PodcastEpisode: Tenable's OT Strategy with Marty EdwardsPub date: 2020-04-07Marty Edwards has worked for an ICS asset owner, INL, DHS, ISA and late last year he made the move to a security product vendor, Tenable. This happened at the same time that Tenable acquired Indegy for $78M, indicating they are serious about OT security space. I talk with Marty a bit about his past career and then focus on why he moved to Tenable and what Tenable's strategy is for the OT space. Marty’s impressions on what DHS / CISA / ICS-CERT has done since he left. Why Marty even considered working for a cybersecurity version? Did the Tenable acquisition of Indegy play a part in his decision? Is Tenable.OT rebranded Indegy product or something else? What are the plans to integrate the Indegy product into the Tenable.sc (Security Center) system? Is this simply a push of OT to SC? Or will it be bi-directional communication? What is Tenable’s commitment to the ICS security space? Given that Tenable and many others, McAfee, Symantec, Mandiant, …, have invested only to pull back in a bad quarter. Is Tenable an OT asset management solution? If so, what parts of asset management and how does it interact with the missing parts? How do the Tenable products prioritize vulnerabilities discovered in Tenable.OT or Tenable.SC? Links Tenable.OT Product Page Subscribe to Dale's ICS Security: Friday News and Notes The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Marty Edwards has worked for an ICS asset owner, INL, DHS, ISA and late last year he made the move to a security product vendor, Tenable. This happened at the same time that Tenable acquired Indegy for $78M, indicating they are serious about OT security space. I talk with Marty a bit about his past career and then focus on why he moved to Tenable and what Tenable's strategy is for the OT space. Marty’s impressions on what DHS / CISA / ICS-CERT has done since he left. Why Marty even considered working for a cybersecurity version? Did the Tenable acquisition of Indegy play a part in his decision? Is Tenable.OT rebranded Indegy product or something else? What are the plans to integrate the Indegy product into the Tenable.sc (Security Center) system? Is this simply a push of OT to SC? Or will it be bi-directional communication? What is Tenable’s commitment to the ICS security space? Given that Tenable and many others, McAfee, Symantec, Mandiant, …, have invested only to pull back in a bad quarter. Is Tenable an OT asset management solution? If so, what parts of asset management and how does it interact with the missing parts? How do the Tenable products prioritize vulnerabilities discovered in Tenable.OT or Tenable.SC? Links Tenable.OT Product Page Subscribe to Dale's ICS Security: Friday News and Notes
Marty Edwards discusses the need for a standard way to classify the criticality of industrial control systems – eg: safety-critical vs. equipment-critical vs. reliability-critical systems, and what implications such classification should have for industrial security programs.This podcast is produced by P.I. Media for Waterfall Security Solutions.Theme music: Waterfall by Headshock Music
Come have a laugh with Maddie and Kenzie as they talk to their Moms! Michele Dunn and Marty Edwards join us on this special Mother's Day episode to talk about how weird it is to be Mommas to Maddie and Kenzie. Pour yourself some wine as we talk hilarious childhood memories and spooky ghost stories. It'll be a fun stroll down memory lane that you won't wanna miss!
Podcast: Unsolicited Response PodcastEpisode: Cyber Hygiene?Pub date: 2018-05-15The buzzwords "cyber hygiene" is being said and written by many of the guru's in the ICS security community. It's hard to argue that basic hygiene is bad, but what is and isn't cyber hygiene? I recorded a 3-person pod with Marty Edwards of the Automation Federation and Michael Toecker of Context Industrial Security. They were selected because they used the term, and all three of us had different views on what cyber hygiene means and the usefulness of the term. For example is applying security patches cyber hygiene? Is there a difference between cyber hygiene and cyber maintenance. Amazingly, for three experienced and opinionated people, we all ended up changing our viewpoint and reached a basic agreement. Take a listen and see if you agree with where we ended up. ---- This episode was sponsored by CyberX. Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX has developed an end-to-end platform for continuous ICS threat monitoring and risk mitigation. Check out the CyberX Global ICS and IIoT Risk Report and my podcast from last year on the report with Phil Neray.The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
A brief return from our hiatus, lured by the opportunity to interview cricket great Sir Ian Botham about his new winemaking venture, Botham Wines.Celebrity-branded drinks have had a chequered history, to say the least. Look no further than Shane Warne's ill-fated forays into wine (Shane Warne Collection) and craft beer (99 Not Out).It was for this reason that I approached the launch of Sir Ian Botham Wines with a healthy scepticism.But Sir Ian is deadly serious about his new career, as he was at pains to stress when we caught up the SCG for a quick interview.He has spent over 40 years playing and commentating on international cricket. During this time, he has travelled the world and off the field, spent time nurturing his other passion; wine.The new range of Sir Ian Botham Wines were made working closely with Australian winemakers, including Nick Badrice, Chief Winemaker at Dorrien Estate in the Barossa, Marty Edwards, Head Vigneron at The Lane in Adelaide Hills and his old friend, Geoff Merrill of Geoff Merrill wines.The wines also bear homage to Sir Ian’s legendary sporting career, from design – stumps and cricket balls feature on the labels – to the names of the individual wines.I hope you enjoy this short chat with Sir Ian ahead of Drinks Adventures' return to normal programming in 2019.All other Drinks Adventures episodes, show notes, transcripts and many helpful links are available on the podcast website, DrinksAdventures.com.au, and you can contact me here.Follow James Atkinson on Facebook here, Instagram here and Twitter here.Theme music ‘Sandbox’ by Cameo Culture. You can listen to more from Cameo Culture at https://soundcloud.com/cameoculture.
Marty Edwards wanted to go on a fun trip with his girlfriend. But Mother Nature had other plans. Music Credits A Vital Piece of Music for All Your Soundtrack Needs by Steve Combs is licensed under an Attribution License March of the Spoons by Kevin MacLeod is licensed under a Creative Commons: By […]
The buzzwords "cyber hygiene" is being said and written by many of the guru's in the ICS security community. It's hard to argue that basic hygiene is bad, but what is and isn't cyber hygiene? I recorded a 3-person pod with Marty Edwards of the Automation Federation and Michael Toecker of Context Industrial Security. They were selected because they used the term, and all three of us had different views on what cyber hygiene means and the usefulness of the term. For example is applying security patches cyber hygiene? Is there a difference between cyber hygiene and cyber maintenance. Amazingly, for three experienced and opinionated people, we all ended up changing our viewpoint and reached a basic agreement. Take a listen and see if you agree with where we ended up. ---- This episode was sponsored by CyberX. Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX has developed an end-to-end platform for continuous ICS threat monitoring and risk mitigation. Check out the CyberX Global ICS and IIoT Risk Report and my podcast from last year on the report with Phil Neray.
It's Tuesday - be sure to watch AWT TV tonight live at 6:30 PM PT / 9:30 PM ET on https://youtube.com/c/appleworldtoday as Steve Sande and Marty Edwards bring you an hour of iOS and macOS tips! Here's some news for you while you wait: AirPlay 2 disappears from the latest betas of iOS 11.3 and tvOS 11.3 Samsung announces a new line of SSDs for enterprise, one of which has a 30.72 TB capacity Samsung's also seen its smartphone market share drop in the company's home country of South Korea, where Apple and LG keep increasing their share A Pennsylvania woman credits her Apple Watch with possibly saving her life after a drunk driver hit her car, temporarily blinding her That news about Apple filing for a new trademark for the rainbow logo? It's a nothingburger. --- Support this podcast: https://anchor.fm/tangible-tech/support
CSIS senior fellow and Deputy Director of the Strategic Technologies Program, Denise Zheng, talks with Marty Edwards about the "Industrial Internet of Things". Marty Edwards is the Director of the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) at the Department of Homeland Security.
Missionary team Mike and Marty Edwards join us from Honduras to express their gratitude and share the amazing things God has been doing through their ministry over the past several years. Pastor Scott opens the message by reminding us how we have been called to interact with Heaven wherever we are and Mike and Marty give us a stirring account of what that looks like through their experiences.