Podcasts about ot security

  • 94PODCASTS
  • 348EPISODES
  • 36mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Feb 2, 2026LATEST

POPULARITY

20192020202120222023202420252026


Best podcasts about ot security

Show all podcasts related to ot security

Latest podcast episodes about ot security

ITSPmagazine | Technology. Cybersecurity. Society
From Cyber Energia to Centrii: Rebranding to Lead the Future of OT Security in Critical Energy Infrastructure | A Brand Story Conversation with Rafael Narezzi, Co-Founder and CEO of Centrii

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 2, 2026 19:40


The renewable energy sector faces a fundamental disconnect. Cybersecurity teams generate endless alerts and vulnerability reports, while operational managers focus on asset performance and site availability. Neither group speaks the other's language, leaving executives struggling to make informed decisions about where to invest limited resources. Rafael Narezzi, Co-Founder and CEO of Centrii, has built his company specifically to bridge this gap, translating technical cyber risks into the financial business outcomes that drive executive decision-making.Centrii, emerging from its predecessor Cyber Energia, represents a new approach to OT security in the energy sector. The name itself carries meaning: the sentinel of industrial intelligence, signified by the double I at the end. Rather than simply identifying vulnerabilities and presenting red alerts, the platform contextualizes risks in terms that matter to the business. How does a potential compromise affect your power purchase agreements? What happens to your revenue when energy prices fluctuate and your site goes offline? These are the questions that Centrii answers.The company prices its services per megawatt hour, demonstrating its commitment to speaking the language of energy rather than traditional IT security. This approach reflects a deeper understanding that renewable energy assets present vastly different risk profiles. A biomass facility with 24/7 personnel on site faces different challenges than an unmanned offshore wind installation. Solar farms, hydrogen facilities, and battery storage systems each require tailored risk assessments that account for their unique operational characteristics and regulatory requirements.Recent attacks on distributed energy resources, including the compromise of Poland's renewable grid, underscore the urgency of this work. With regulations like NERC CIP 15 in the United States, NIS 2.0 in Europe, and the UK Cyber Security Bill now holding asset owners personally accountable for cybersecurity failures, organizations can no longer afford to treat OT security as an afterthought. Narezzi observes that compliance has become the driving force pushing companies to take responsibility for their critical infrastructure assets.What sets Centrii apart is its ability to help executives identify which risks actually matter. When every cybersecurity tool reports critical alerts, organizations face paralysis. Which red is the red that demands immediate attention? Centrii provides clarity by mapping technical findings to financial impact, reputational damage, and operational consequences specific to each asset type and technology.The company's presentation at DistribuTECH 2026 focuses on battery energy storage systems, an area of explosive growth driven by data center demand and the expanding role of AI. Narezzi draws a parallel to Ocean's 11, where coordinated manipulation of power systems creates cascading failures. As batteries become essential for grid balancing, the risks of compromised dispatch commands affecting multiple installations simultaneously represent a scenario that demands serious attention from asset owners and regulators alike.Operating across 16 countries with diverse energy technologies, Centrii provides a unified platform for organizations managing hundreds of sites across different regions and regulatory environments. The goal is straightforward: give every stakeholder, from technical teams to the C-suite, a common language for understanding and acting on cyber risk in the energy sector.This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: https://www.studioc60.com/creation#fullGUESTRafael Narezzi, Co-Founder and CEO, Centriihttps://www.linkedin.com/in/narezzi/RESOURCESCentriihttps://centrii.comCyber Energiahttps://cyberenergia.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSRafael Narezzi, Centrii, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT security, renewable energy cybersecurity, battery energy storage systems, BESS, critical infrastructure protection, energy sector cybersecurity, NERC CIP, NIS 2.0, power purchase agreements, distributed energy resources, industrial intelligence, cyber risk quantification Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Error Code
EP 79: Ignore OT Security At Your Own Peril

Error Code

Play Episode Listen Later Jan 22, 2026 38:25


The growing importance of OT security, highlighting overlooked risks in critical infrastructure, legacy systems, and supply chains. Through real-world examples, Eric Durr, Chief Product Officer at Tenable, shows why OT security differs from IT, emphasizing visibility, resilience, and risk prioritization to protect safety, operations, and business continuity.  

@BEERISAC: CPS/ICS Security Podcast Playlist

Podcast: ICS Arabia PodcastEpisode: Pharma OT Security | 64Pub date: 2025-12-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe're joined by Andre Froneman, OT Solutions Specialist at Datacentrix — a cybersecurity professional with hands-on experience across the pharma, mining, automotive, and energy sectors.In this episode, we dive deep into pharmaceutical OT cybersecurity, exploring how one of the world's most sensitive industries protects its operations, data, and intellectual property from cyber threats.

Cracking Cyber Security Podcast from TEISS
teissTalk: 2026 predictions for OT security and the future of cyber physical systems

Cracking Cyber Security Podcast from TEISS

Play Episode Listen Later Dec 25, 2025 43:18


Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surfaceThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Jordan M. Schroeder, CISOhttps://www.linkedin.com/in/schroederjordan/Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside Universityhttps://www.linkedin.com/in/zia-ush-shamszaman/Elliot Gidley, Field CTO EMEA, Clarotyhttps://www.linkedin.com/in/elliotgidley

@BEERISAC: CPS/ICS Security Podcast Playlist
How the threat landscape for OT has changed since Colonial Pipeline | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 23, 2025 28:25


Podcast: OT Security Made SimpleEpisode: How the threat landscape for OT has changed since Colonial Pipeline | OT Security Made SimplePub date: 2025-12-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMike Holcomb, independent OT/ICS security advisor and former Director of OT security at Flour, talks about the shift of cyber threats in the OT space and the struggles of small entities to secure themselves. He proposes the BASIC principle to get started fast despise limited budgets.You can find more information on OT Security Made Simple at rhebo.com or send us your ideas and questions at podcast@rhebo.com.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

OT Security Made Simple Podcast
How the threat landscape for OT has changed since Colonial Pipeline | OT Security Made Simple

OT Security Made Simple Podcast

Play Episode Listen Later Dec 18, 2025 28:25


Mike Holcomb, independent OT/ICS security advisor and former Director of OT security at Fluor, talks about the shift of cyber threats in the OT space and the struggles of small entities to secure themselves. He proposes the BASIC principle to get started fast despite limited budgets.You can find more information on OT Security Made Simple at rhebo.com or send us your ideas and questions at podcast@rhebo.com.

@BEERISAC: CPS/ICS Security Podcast Playlist
Building an OT Security Company from Scratch (Arabic) | 52

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 15, 2025 71:48


Podcast: ICS Arabia PodcastEpisode: Building an OT Security Company from Scratch (Arabic) | 52Pub date: 2025-12-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, I'm joined by Engineer Ali Laribi, the founder of Fortress Plus, to dive deep into what it takes to build and lead in the OT security space — especially when you're going against the crowd.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cybersecurity ist Chefsache - Der Podcast!
Klarheit schaffen in der OT-Security: Transparenz, Tools und Governance

Cybersecurity ist Chefsache - Der Podcast!

Play Episode Listen Later Dec 15, 2025 43:13


In dieser Folge spreche ich mit Sander Rotmensen, Head of Business Line Cybersecurity Software for OT bei Siemens. Gemeinsam beschäftigen wir uns mit einem Problem, das viel zu oft ignoriert wird: In der Industrie heißt es häufig „Never change a running system“ patchen wäre zu riskant für Produktion und Sicherheit.Sander erklärt, warum genau dieses Mindset in der OT-Welt problematisch ist: Weil Transparenz über Assets, Firmwarestände und Häufigkeit von Updates fehlt, ist es oft unmöglich, Schwachstellen zuverlässig zu identifizieren und zu beheben.Wir gehen dabei folgende Themen durch:Warum klassische IT-Methoden (automatisches Scannen, schnelle Patches) in Industriesteuerungen selten funktionierenWie wichtig eine gründliche Inventarisierung aller OT-Komponenten ist aktiv und auch Geräte, die selten online sindWie man Schwachstellen-Management in der OT pragmatisch angeht: mit Tools, passenden Prozessen oder mit spezialisierten DienstleisternWarum nicht jedes System einfach gepatcht werden kann Zertifizierungen, Safety-Regeln und Produktionszwänge sind entscheidendWie moderne Ansätze aussehen können: Asset-Mapping + Risiko-Analyse + gezielte Updates oder Kompensationsmaßnahmen (Segmentierung, Monitoring, passive Überwachung)Warum OT-Security ein kontinuierlicher Prozess sein muss nicht ein einmaliges ProjektAm Ende geben wir einen pragmatischen Leitfaden: Transparenz schaffen, mit externen Integratoren oder Dienstleistern starten, Prozesse und Tooling etablieren und Sicherheit zur Chefsache machen.____________________________________________

HRM-Podcast
Cybersecurity ist Chefsache: Klarheit schaffen in der OT-Security: Transparenz, Tools und Governance

HRM-Podcast

Play Episode Listen Later Dec 15, 2025 43:13


In dieser Folge spreche ich mit Sander Rotmensen, Head of Business Line Cybersecurity Software for OT bei Siemens. Gemeinsam beschäftigen wir uns mit einem Problem, das viel zu oft ignoriert wird: In der Industrie heißt es häufig „Never change a running system“ patchen wäre zu riskant für Produktion und Sicherheit.Sander erklärt, warum genau dieses Mindset in der OT-Welt problematisch ist: Weil Transparenz über Assets, Firmwarestände und Häufigkeit von Updates fehlt, ist es oft unmöglich, Schwachstellen zuverlässig zu identifizieren und zu beheben.Wir gehen dabei folgende Themen durch:Warum klassische IT-Methoden (automatisches Scannen, schnelle Patches) in Industriesteuerungen selten funktionierenWie wichtig eine gründliche Inventarisierung aller OT-Komponenten ist aktiv und auch Geräte, die selten online sindWie man Schwachstellen-Management in der OT pragmatisch angeht: mit Tools, passenden Prozessen oder mit spezialisierten DienstleisternWarum nicht jedes System einfach gepatcht werden kann Zertifizierungen, Safety-Regeln und Produktionszwänge sind entscheidendWie moderne Ansätze aussehen können: Asset-Mapping + Risiko-Analyse + gezielte Updates oder Kompensationsmaßnahmen (Segmentierung, Monitoring, passive Überwachung)Warum OT-Security ein kontinuierlicher Prozess sein muss nicht ein einmaliges ProjektAm Ende geben wir einen pragmatischen Leitfaden: Transparenz schaffen, mit externen Integratoren oder Dienstleistern starten, Prozesse und Tooling etablieren und Sicherheit zur Chefsache machen.____________________________________________

@BEERISAC: CPS/ICS Security Podcast Playlist
Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 11, 2025 21:27


Podcast: OT Security Made SimpleEpisode: Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made SimplePub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJanka Kreißl von der Agentur Dunkelblau spricht über Krisenprävention und Krisenbewältigung bei Cybervorfällen. Sie erläutert aus Erfahrung, was gute Abläufe brauchen und wer von Anfang involviert sein sollte. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an podcast@rhebo.com. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Engineering OT Security: ISA Standards & Open Source in Action | 62

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 4, 2025 51:46


Podcast: ICS Arabia PodcastEpisode: Engineering OT Security: ISA Standards & Open Source in Action | 62Pub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization

OT Security Made Simple Podcast
Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made Simple

OT Security Made Simple Podcast

Play Episode Listen Later Dec 4, 2025 21:27


Janka Kreißl von der Agentur Dunkelblau spricht über Krisenprävention und Krisenbewältigung bei Cybervorfällen. Sie erläutert aus Erfahrung, was gute Abläufe brauchen und wer von Anfang involviert sein sollte. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an podcast@rhebo.com.

IIoT Use Case Podcast | Industrie
#197 | Passives OT-Monitoring: Angriffe erkennen, bevor es kritisch wird | Rhebo

IIoT Use Case Podcast | Industrie

Play Episode Listen Later Dec 3, 2025 35:32


www.iotusecase.com#OTMonitoring #OTCybersecurity #Anomalieerkennung In Episode 197 des IoT Use Case Podcasts spricht Co-Host Dr. Peter Schopf mit Jan Fischer, Head of Sales bei Rhebo aus Leipzig. Im Mittelpunkt stehen OT-Cybersecurity und der Schutz industrieller Netze in kritischen Infrastrukturen, der Fertigung und der Logistik. Jan erklärt, wie Rhebo Brownfield-Umgebungen passiv überwacht, Anomalien sichtbar macht und warum IT/OT-Konvergenz nicht automatisch bedeutet, beide Welten vollständig zu verheiraten. Es geht um reale Vorfälle aus der Praxis, Social Engineering über LinkedIn, vergessene Assets im Netz und die Frage, welche Rolle KI heute tatsächlich in der OT-Security spielt.Folge 197 auf einen Blick (und Klick):(04:26) Herausforderungen, Potenziale und Status quo – So sieht der Use Case in der Praxis aus(10:01) Lösungen, Angebote und Services – Ein Blick auf die eingesetzten Technologien(27:46) Übertragbarkeit, Skalierung und nächste Schritte – So könnt ihr diesen Use Case nutzenPodcast ZusammenfassungOT-Cybersecurity im Brownfield. Wie Rhebo industrielle Netze passiv absichertIn dieser Folge zeigt Jan Fischer, wie Unternehmen ihre OT-Security pragmatisch auf ein neues Niveau heben, ohne Produktionsnetze oder kritische Infrastrukturen zu gefährden. Die Ausgangslage sind historisch gewachsene Brownfield-Netzwerke mit alten Protokollen wie Profibus oder Modbus, unverschlüsselter HTTP-Kommunikation, vergessenen Druckern oder Raspberry Pis im Netz und verschleppten Updates auf Security-Komponenten.Die Lösung von Rhebo basiert auf passivem Monitoring. Die Software schneidet den OT-Netzwerkverkehr mit, trennt typische von atypischen Musterbildern und meldet Anomalien frühzeitig. Im Rahmen eines Assessments wird die bestehende Infrastruktur durchleuchtet. Auffällig sind etwa ungeplante DHCP-Server, neue Protokolle, Datenströme ins Ausland oder kompromittierte Systeme nach Social-Engineering-Angriffen. Ein Forensik- und Diagnose-Team bewertet die Funde und leitet konkrete Maßnahmen ab, vom Schließen von Einfallstoren bis zum gezielten Nachrüsten von Security.Jan ordnet außerdem aktuelle Entwicklungen wie NIS2, den Cyber Resilience Act und den Wunsch nach europäischen On-Prem-Lösungen ein und erklärt die Grenzen von KI in der OT-Security. Die Episode richtet sich an Betreiber kritischer Infrastrukturen, Fertigungs- und Logistikunternehmen sowie OT-Verantwortliche, die ihre Netze härten und reale Angriffe früh erkennen möchten.-----Relevante Folgenlinks:Peter (https://www.linkedin.com/in/peter-schopf/)Jan (https://www.linkedin.com/in/jan-fischer-a4552b103/)Rhebo Homepage (https://rhebo.com/de/)Jetzt IoT Use Case auf LinkedIn folgen1x monatlich IoT Use Case Update erhalten

@BEERISAC: CPS/ICS Security Podcast Playlist
OT Security Posture & Attack Path Analysis | 59

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 2, 2025 48:00


Podcast: ICS Arabia PodcastEpisode: OT Security Posture & Attack Path Analysis | 59Pub date: 2025-11-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn our latest episodes, we were joined by Vivek Ponnada, SVP at Frenos and a veteran with nearly 30 years in OT, for a deep dive into the future of industrial cybersecurity.We explored:

@BEERISAC: CPS/ICS Security Podcast Playlist
Cybersecurity Journalism & OT Security | 43

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 30, 2025 68:59


Podcast: ICS Arabia PodcastEpisode: Cybersecurity Journalism & OT Security | 43Pub date: 2025-11-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHow does journalism influence OT security? In this episode, Dr Sulaiman talk to Eduard Kovacs, Managing Editor at SecurityWeek, about the impact of cybersecurity journalism, investigative reporting in OT security, and ethical challenges in covering cybercrime.Eduard Kovacs Twitter: https://x.com/eduardkovacsThe podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Cybersicherheit in kommunalen Verwaltungen | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 25, 2025 24:28


Podcast: OT Security Made SimpleEpisode: Cybersicherheit in kommunalen Verwaltungen | OT Security Made SimplePub date: 2025-11-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationProf. Dr. Dennis-Kenji Kipker, Mitgründer des Cyber Intelligence Institute und Berater an allen Fronten, analysiert, warum Cybersicherheit auch mit NIS2 in Deutschland so kompliziert ist, und gibt Einblicke in die Cybersicherheitsrealität in kommunalen Verwaltungen. Der Podcast entstand kurz vor Verabschiedung des NIS2UmsuCG. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an podcast@rhebo.com.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Data Diodes & Remote Access: How Industrial Systems Stay Secure in a Connected World

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 19, 2025 76:43


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Data Diodes & Remote Access: How Industrial Systems Stay Secure in a Connected WorldPub date: 2025-11-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCan your plant stay connected and completely secure? In this episode of Protect It All, host Aaron Crow teams up with Lior Frenkel, CEO and co-founder of Waterfall Security, to explore how industries are rethinking OT cybersecurity in the age of ransomware and AI-powered attacks. Together, they break down why traditional firewalls can't fully protect industrial control systems and how unidirectional gateways (data diodes) are redefining safety for everything from nuclear plants to casinos. You'll learn: What data diodes really are and how they physically block inbound attacks. Why “air gaps” are no longer enough for modern connected environments. How remote-access tools like HERA are enabling secure operations. Real-world stories of industries upgrading defenses without losing efficiency. Whether you manage critical infrastructure, handle OT security, or just want to understand how cyber-physical systems stay safe, this episode will give you a new appreciation for data flow, digital risk, and resilience. Tune in to discover the future of secure connectivity - only on Protect It All. Key Moments:  07:46 Balancing Security and Operational Data 16:25 "One-Way Data Flow Explained" 22:19 "Air Gap for Data Transfer" 27:44 Increasing Awareness of Security Threats 32:05 Challenges of Power Plant Management 35:29 Global Risks Require Local Understanding 44:44 "OT Security and Zero Trust" 48:24 "Remote Access vs On-Site Work" 55:48 "HERA: TPM-Powered Remote Access" 58:43 Encrypted Remote Access Streaming 01:05:32 Secure Remote Control for Infrastructure 01:13:00 "Solving Critical Incident Response Gaps"   About the Guest : Lior Frenkel is a globally recognized OT cybersecurity leader and the CEO/co-founder of Waterfall Security Solutions, the company behind the industry-standard Unidirectional Security Gateways protecting critical infrastructure worldwide. With 25+ years of cybersecurity expertise, multiple patents, and leadership roles across Israel's top technology, industrial, and export organizations, Lior is a key voice shaping the future of industrial cyber defense and national cyber strategy.How to connect Lior: Website: https://waterfall-security.com/LinkdIn: https://www.linkedin.com/in/lior-frenkel-91534/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

OT Security Made Simple Podcast
Cybersicherheit in kommunalen Verwaltungen | OT Security Made Simple

OT Security Made Simple Podcast

Play Episode Listen Later Nov 18, 2025 24:28


Prof. Dr. Dennis-Kenji Kipker, Mitgründer des Cyber Intelligence Institute und Berater an allen Fronten, analysiert, warum Cybersicherheit auch mit NIS2 in Deutschland so kompliziert ist, und gibt Einblicke in die Cybersicherheitsrealität in kommunalen Verwaltungen. Der Podcast entstand kurz vor Verabschiedung des NIS2UmsuCG. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an podcast@rhebo.com.

Paul's Security Weekly
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Paul's Security Weekly

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-432

ai internet struggle mit red flags ot spotting attackers ot security todd peterson enterprise security weekly enterprise news
Enterprise Security Weekly (Audio)
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Enterprise Security Weekly (Audio)

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-432

ai internet struggle mit red flags ot spotting attackers ot security todd peterson enterprise security weekly enterprise news
Paul's Security Weekly TV
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Paul's Security Weekly TV

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-432

ai internet struggle mit red flags ot spotting attackers ot security todd peterson enterprise security weekly enterprise news
Enterprise Security Weekly (Video)
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Enterprise Security Weekly (Video)

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-432

ai internet struggle mit red flags ot spotting attackers ot security todd peterson enterprise security weekly enterprise news
@BEERISAC: CPS/ICS Security Podcast Playlist
Angriffserkennung in Umspannwerken nach dem BSI | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 9, 2025 26:32


Podcast: OT Security Made SimpleEpisode: Angriffserkennung in Umspannwerken nach dem BSI | OT Security Made SimplePub date: 2025-11-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationKlaus Hunsänger vom BSI gibt Tipps, wie in Umspannwerken eine Angriffserkennung nach BSI-CS 153 “Stationsautomatisierung” umgesetzt werden kann. Der Praktiker aus dem Referat für industrielle Steuerungs- und Automatisierungssysteme beleuchtet die Hintergründe des BSI-Dokuments und an welcher Stelle ein netzbasiertes IDS (NIDS) sinnvoll ist. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an podcast@rhebo.com.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
S2 E7: ICS/OT Security Operations Centers

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 7, 2025 25:56


Podcast: Simply ICS CyberEpisode: S2 E7: ICS/OT Security Operations CentersPub date: 2025-11-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe growing need for visibility and response in industrial environments is driving more organizations to consider ICS/OT Security Operations Centers — but what does that actually look like for small and medium-sized operations?In this episode of Simply ICS Cyber, Don and Tom sit down with Dan Gunter, CEO and founder of Insane Cyber, to discuss how ICS/OT SOCs function, what data truly matters for monitoring, and how incident response changes when operators have (or don't have) the right information at hand.Drawing on experience from the Air Force CERT to founding an OT-focused security company, Dan shares a practical look at the realities of SOC implementation across industries — from utilities with limited staff to large-scale enterprises managing thousands of assets.Listeners will gain insight into how to start building visibility, selecting the right MSSP partners, and managing SOC fatigue — all while keeping industrial operations safe and resilient.⚙️ Tune in to learn how data, process, and people come together to make ICS/OT SOCs work in the real world.Connect with Dan on LinkedIn: https://www.linkedin.com/in/dan-gunter

OT Security Made Simple Podcast
Angriffserkennung in Umspannwerken nach dem BSI | OT Security Made Simple

OT Security Made Simple Podcast

Play Episode Listen Later Nov 6, 2025 26:32


Klaus Hunsänger vom BSI gibt Tipps, wie in Umspannwerken eine Angriffserkennung nach BSI-CS 153 “Stationsautomatisierung” umgesetzt werden kann. Der Praktiker aus dem Referat für industrielle Steuerungs- und Automatisierungssysteme beleuchtet die Hintergründe des BSI-Dokuments und an welcher Stelle ein netzbasiertes IDS (NIDS) sinnvoll ist. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an podcast@rhebo.com.

@BEERISAC: CPS/ICS Security Podcast Playlist
Old Windows, New Risks: How End-of-Life Systems Threaten OT Security and What You Can Do

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 28, 2025 20:18


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Old Windows, New Risks: How End-of-Life Systems Threaten OT Security and What You Can DoPub date: 2025-10-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Protect It All, host Aaron Crow takes a hard look at one of the biggest blind spots in OT cybersecurity: legacy Windows environments still running inside plants, refineries, and utilities. From Windows XP to Windows 10's upcoming end of support, Aaron breaks down why these systems persist, the true cost of “doing nothing,” and the high-stakes trade-offs between replacement, isolation, and risk mitigation. You'll discover: Why outdated Windows systems remain critical yet dangerously exposed. The myths of “true air gaps” and why they don't protect you anymore. Practical isolation tactics, segmentation, strict access control, and monitoring. How to manage asset visibility, vendor dependencies, and downtime risks. Whether you're a cybersecurity leader, plant manager, or operations engineer, this episode is your roadmap to making smarter, safer decisions about legacy systems before they cause costly disruptions. Tune in to learn how to balance operations, cost, and security and protect your OT world from old-system vulnerabilities. Key Moments:  01:22 "End-of-Life Systems in OT" 04:15 Upgrading Systems in Regulated Industries 07:35 Reducing Risk with Network Segmentation 12:02 "Firewall Rules and System Security" 15:52 Understanding Risks in End-of-Life Systems 18:54 Securing Legacy Systems Effectively Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Von der Angriffserkennung zum automatisierten Client Management in der OT | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 24, 2025 24:40


Podcast: OT Security Made SimpleEpisode: Von der Angriffserkennung zum automatisierten Client Management in der OT | OT Security Made SimplePub date: 2025-10-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPeter Lukesch, CEO des OT-Clientmanagement-Entwicklers ondeso, erklärt, wie in der OT passive Angriffserkennung und aktives Client Management sinnvoll zusammengeführt werden können. Er erörtert, wie die Handlungsfähigkeit der Verantwortlichen gesteigert, der Zeitaufwand reduziert und zugleich die Verfügbarkeit der sensiblen industriellen Prozesse geschützt werden. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an ⁠podcast@rhebo.com⁠. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Threat Hunting in der OT | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 12, 2025 26:32


Podcast: OT Security Made SimpleEpisode: Threat Hunting in der OT | OT Security Made SimplePub date: 2025-10-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOT-Sicherheitsexperte Oliver Jaeckel-Bender definiert Threat Hunting für OT-Netzwerke. Wie unterscheidet sich die Disziplin zur IT und was genau braucht es mindestens (und vielleicht maximal), um ein OT-Netzwerk sicher betreiben zu können?Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an podcast@rhebo.com.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Wie steht es um die OT-Sicherheit in der Wasserwitschaft? | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 29, 2025 21:52


Podcast: OT Security Made SimpleEpisode: Wie steht es um die OT-Sicherheit in der Wasserwitschaft? | OT Security Made SimplePub date: 2025-08-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationGeschäftsführer des Kompetenzzentrums digitale Wasserwirtschaft (KdW), Ronald Derler, skizziert die besonderen Herausforderungen in der OT-Cybersicherheit in Wasserbetrieben. Als Direktor des Lagezentrums Cybersec@Wasser spricht er über die Entstehung und Herangehensweise der Institution, Best Practices für die Branche und die Bedeutung von CRA und NIS2.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Green Insider Powered by eRENEWABLE
OT Innovation Meets Intelligent Integration

The Green Insider Powered by eRENEWABLE

Play Episode Listen Later Aug 21, 2025 10:22


On this podcast we will explore quantum computing and OT Security along with AI-driven critical infrastructure security.  Hear Shaun Six, CEO of UTSI International talking about everything: cyber security.  Welcome to this week's Follower Friday of The Green Insider, Shaun discusses: To be an Insider Please subscribe to The Green Insider powered … The post OT Innovation Meets Intelligent Integration appeared first on eRENEWABLE.

Enterprise Podcast Network – EPN
Digital Risk, Physical Impact: The OT Security Wake-Up Call

Enterprise Podcast Network – EPN

Play Episode Listen Later Aug 19, 2025 17:14


Tristan Kim, Director of Cyber Risk – Innovation & Strategy at KORE Solutions, a cybersecurity and infrastructure company that specializes in OT cybersecurity services joins … Read more The post Digital Risk, Physical Impact: The OT Security Wake-Up Call appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.

@BEERISAC: CPS/ICS Security Podcast Playlist
Which low-hanging fruits to grab on the OT security journey | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 17, 2025 24:30


Podcast: OT Security Made SimpleEpisode: Which low-hanging fruits to grab on the OT security journey | OT Security Made SimplePub date: 2025-08-14Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationNew Zealand's Peter Jackson from SGS (not ofLord of the Rings fame!) speaks about right-sizing cybersecurity legislature,OT security assessments and the low-hanging fruits in building resilience. Hediscusses with host Klaus Mochalski how an OT security assessment helpsunderstand the risk landscape, how resilience can be hardened fast and easy,what challenges prevail in segmentation and isolation processes and why it isimportant to talk about genuine risks and not the bogeyman.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Bei der OT-Sicherheit ist der Staat in der Pflicht | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 1, 2025 22:58


Podcast: OT Security Made SimpleEpisode: Bei der OT-Sicherheit ist der Staat in der Pflicht | OT Security Made SimplePub date: 2025-07-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCybertech-Influencer und Experte für Cybersicherheit und Maschinenbau Olaf Classen spricht über Cybersicherheit als Wettbewerbs- und Standortvorteil und warum gerade deutsche und europäische Unternehmen ihre Expertise im Engineering Richtung Cybersicherheit ausbauen sollten. Er plädiert für staatliche Förderung (und nicht nur Regulierung) und dafür, Cybersicherheit und digitale Souveränität als gesamtgesellschaftliches und europäisches Projekt zu behandeln.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Lessons Learned in OT Security: Regulation, Collaboration, and the Rise of AI Threats with Kam Chumley-Soltani

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 31, 2025 53:50


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Lessons Learned in OT Security: Regulation, Collaboration, and the Rise of AI Threats with Kam Chumley-SoltaniPub date: 2025-07-28Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow is joined by Kam Chumley-Soltani, Director of OT Security at Armis, for a candid conversation that dives into the ever-evolving landscape of OT (operational technology) and IT cybersecurity. After several rescheduling attempts across time zones and even parking lots, Aaron and Kam finally sit down to share their frontline experiences and insights from the world of critical infrastructure security. From the increasing visibility of OT threats and the surge in regulatory requirements, to the convergence of IT and OT teams, they dig into what's driving organizations to prioritize real-time visibility, risk management, and collaboration. Kam reflects on his diverse background in the military, at Cisco, Dragos, and now Armis, while Aaron draws on decades of experience leading teams across power plants and utilities in Texas. They both underscore the importance of people, process, and technology - reminding us that even the best tools are only as valuable as the teams that wield them. The discussion explores the challenges smaller utilities face, balancing regulation with limited resources, and the need for cyber-informed engineering from the very start. Plus, they look ahead at the role of AI in cybersecurity, the daisy-chain effects of infrastructure attacks, and the importance of community and continuous learning in keeping ahead of the curve. Whether you're a cybersecurity veteran, just breaking into OT, or simply want to understand why your electricity bill matters, this episode is packed with anecdotes, practical advice, and a few laughs. So pull up a chair and get ready to protect it all! Key Moments:  03:18 Cybersecurity Developments and Regulatory Changes 06:33 Demand for Consulting and Assessments 09:51 Future of Regulation and Community 13:06 Regulating Small Utilities Challenges 16:41 Cybersecurity in Critical Infrastructure 19:43 Simplifying Complex Issues for All 26:12 Embracing AI in Cybersecurity 27:39 "Embrace Challenges, Educate Yourself" 30:14 Cybersecurity Threats to Infrastructure 34:29 Evaluating Automated Alerting Systems 39:38 Controlled Network Configuration Risks 42:10 Underfunded Team: Multi-Skill Necessity 45:31 "Collective Progress and Contribution" 48:13 "Geopolitical Threats to Infrastructure" About the guest :  Kam Chumley-Soltani serves as the Director of OT Solutions Engineering for the U.S. Public Sector at Armis, where he specializes in industrial cybersecurity. His expertise lies in designing secure and resilient network architectures for critical infrastructure environments. Previously, Kam led Cisco's OT Solutions Engineering team for the entire U.S. Public Sector, delivering end-to-end solutions across IoT/OT security, network architecture, diverse RF wireless deployments, embedded systems, and edge computing. He has guided numerous global enterprises, federal agencies, and SLED organizations in architecting solutions that incorporate robust networking, cybersecurity controls, advanced threat detection, and proactive vulnerability management. A Navy veteran, Kam served as a flight systems engineer and mission operations planner. He holds a B.S. in Cyber Operations from the United States Naval Academy, an M.S. in Cybersecurity from Brown University, and an M.B.A. from Northwestern University's Kellogg School of Management. He is currently pursuing his Doctor of Engineering (D.Eng.) in AI/ML from George Washington University.  How to connect Kam:  Linkedin: https://www.linkedin.com/in/kam-chumley-soltani/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Unsolicited Response Podcast
Long Conversation: OT and IT - Convergence, Integration, and Separation?

Unsolicited Response Podcast

Play Episode Listen Later Jul 30, 2025 92:33


Few topics get as much heat as the current, future, and ideal relationship between OT and IT. One of the first posts someone just discovering OT makes is how OT is different than IT. As you dig deeper into OT you find an increasing case of the technology, processes, and even the people being similar to IT. In this 90 minute long conversation format, we will try to bring some enlightenment to this question with a specially curated group of 9 S4x25 attendees.   About The Long Conversation Format  Two people begin the discussion on stage. After 10 minutes a third person will tap one of the participants on the shoulder and replace them in the conversation. This continues for the 90 minutes. Participants are on stage for 20 minutes talking to two different people for 10 minutes each.

@BEERISAC: CPS/ICS Security Podcast Playlist
Vivek Ponnada on the Ongoing Maturity of OT Security

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 22, 2025 35:55


Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Vivek Ponnada on the Ongoing Maturity of OT SecurityPub date: 2025-07-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOT cybersecurity veteran Vivek Ponnada, SVP Growth & Strategy at Frenos, joins the Nexus Podcast to lend his expertise on the areas where he is seeing the most maturity and rapid evolution in the practice. Vivek explains the growing demand for contextual information to supplement the data organizations have around their known assets and vulnerabilities, for example. He also explains current risk prioritization and mitigation strategies, and how advanced technologies fit into the OT security landscape. Listen to the Nexus Podcast on your favorite podcast platform. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Aperture: A Claroty Podcast
Vivek Ponnada on the Ongoing Maturity of OT Security

Aperture: A Claroty Podcast

Play Episode Listen Later Jul 21, 2025 35:55


OT cybersecurity veteran Vivek Ponnada, SVP Growth & Strategy at Frenos, joins the Nexus Podcast to lend his expertise on the areas where he is seeing the most maturity and rapid evolution in the practice. Vivek explains the growing demand for contextual information to supplement the data organizations have around their known assets and vulnerabilities, for example. He also explains current risk prioritization and mitigation strategies, and how advanced technologies fit into the OT security landscape. Listen to the Nexus Podcast on your favorite podcast platform. 

@BEERISAC: CPS/ICS Security Podcast Playlist
Können Systeme zur Angriffserkennung zum Sicherheitsrisiko werden? | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 19, 2025 23:49


Podcast: OT Security Made SimpleEpisode: Können Systeme zur Angriffserkennung zum Sicherheitsrisiko werden? | OT Security Made SimplePub date: 2025-07-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationManuel Atug, Geschäftsführer der HiSolutions und Mitgründer der unabhängigen AG Kritis, hinterfragt kritisch und aus eigener Erfahrung, was ein SzA leisten muss, wie gut es um deren eigene Sicherheit steht und wie Anbietern aus dem nichteuropäischen Ausland mit den Daten umgehen. Als Bonus erfahren wir endlich, wo sein Social-Media-Handle HonkHase herkommt.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ITSPmagazine | Technology. Cybersecurity. Society
OT Emergency Preparedness: When Disaster Recovery Meets Real-World Safety | A Conversation with Tobias Halmans | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 17, 2025 49:51


⬥GUEST⬥Tobias Halmans, OT Incident Responder | GIAC Certified Incident Handler | Automation Security Consultant at admeritia GmbH | On LinkedIn: https://www.linkedin.com/in/tobias-halmans/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Business continuity planning is a familiar exercise for most IT and security leaders—but when you move into operational technology (OT), the rules change. In this episode of Redefining CyberSecurity, Sean Martin talks with Tobias Halmans, an incident responder at admeritia, who helps organizations prepare for and respond to incidents in OT environments. Tobias shares why disaster recovery planning in OT requires more than simply adapting IT frameworks. It demands a change in approach, mindset, and communication.OT engineers don't think in terms of “ransomware readiness.” They think in terms of safety, uptime, manual fallback options, and how long a plant can stay operational without a SCADA system. As Tobias explains, while IT teams worry about backup integrity and rapid rebooting, OT teams are focused on whether shutting down a system—even safely—is even an option. And when the recovery plan depends on third-party vendors, the assumptions made on both sides can derail the response before it begins.Tobias walks us through the nuances of defining success in OT recovery. Unlike the IT world's metrics like mean time to recover (MTTR), OT environments often hinge on production impacts and safety thresholds. Recovery Time Objectives (RTOs) still exist—but they must be anchored in real-world plant operations, often shaped by vendor limitations, legacy constraints, and tightly regulated safety requirements.Perhaps most importantly, Tobias stresses that business continuity planning for OT can't just be a cybersecurity add-on. It must be part of broader risk and operational conversations, ideally happening when systems are being designed or upgraded. But in reality, many organizations are only starting these conversations now—often driven more by compliance mandates than proactive risk strategy.Whether you're a CISO trying to bridge the gap with your OT counterparts or an engineer wondering why cyber teams keep showing up with playbooks that don't fit, this conversation offers grounded, real-world insight into what preparedness really means for critical operations.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Article: https://www.linkedin.com/posts/sarah-fluchs_notfallvorsorge-in-der-ot-traut-euch-activity-7308744270453092352-Q8X1⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

Redefining CyberSecurity
OT Emergency Preparedness: When Disaster Recovery Meets Real-World Safety | A Conversation with Tobias Halmans | Redefining CyberSecurity with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Jul 17, 2025 49:51


⬥GUEST⬥Tobias Halmans, OT Incident Responder | GIAC Certified Incident Handler | Automation Security Consultant at admeritia GmbH | On LinkedIn: https://www.linkedin.com/in/tobias-halmans/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Business continuity planning is a familiar exercise for most IT and security leaders—but when you move into operational technology (OT), the rules change. In this episode of Redefining CyberSecurity, Sean Martin talks with Tobias Halmans, an incident responder at admeritia, who helps organizations prepare for and respond to incidents in OT environments. Tobias shares why disaster recovery planning in OT requires more than simply adapting IT frameworks. It demands a change in approach, mindset, and communication.OT engineers don't think in terms of “ransomware readiness.” They think in terms of safety, uptime, manual fallback options, and how long a plant can stay operational without a SCADA system. As Tobias explains, while IT teams worry about backup integrity and rapid rebooting, OT teams are focused on whether shutting down a system—even safely—is even an option. And when the recovery plan depends on third-party vendors, the assumptions made on both sides can derail the response before it begins.Tobias walks us through the nuances of defining success in OT recovery. Unlike the IT world's metrics like mean time to recover (MTTR), OT environments often hinge on production impacts and safety thresholds. Recovery Time Objectives (RTOs) still exist—but they must be anchored in real-world plant operations, often shaped by vendor limitations, legacy constraints, and tightly regulated safety requirements.Perhaps most importantly, Tobias stresses that business continuity planning for OT can't just be a cybersecurity add-on. It must be part of broader risk and operational conversations, ideally happening when systems are being designed or upgraded. But in reality, many organizations are only starting these conversations now—often driven more by compliance mandates than proactive risk strategy.Whether you're a CISO trying to bridge the gap with your OT counterparts or an engineer wondering why cyber teams keep showing up with playbooks that don't fit, this conversation offers grounded, real-world insight into what preparedness really means for critical operations.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Article: https://www.linkedin.com/posts/sarah-fluchs_notfallvorsorge-in-der-ot-traut-euch-activity-7308744270453092352-Q8X1⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

@BEERISAC: CPS/ICS Security Podcast Playlist
The System Integrator's Role in Supporting OT Security

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 4, 2025 32:38


Podcast: Industrial Cybersecurity InsiderEpisode: The System Integrator's Role in Supporting OT SecurityPub date: 2025-07-01Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig Duckworth and Dino Busalachi discuss the critical but often overlooked or misunderstood role of system integrators (SIs) in industrial cybersecurity.Key Issues Identified:Organizations typically work with multiple specialized integrators across different facilities and systemsSome SIs lack cybersecurity expertise, focusing primarily on equipment functionalityEquipment can remain connected to networks for decades, with ownership and oversight changing hands over timeSystem integrators must exercise proper IT coordination to implement remote access solutions effectivelyRecommendations:IT and OT teams should collaborate more closely with system integrators on cybersecurity planningOrganizations need to evaluate their SIs' cybersecurity capabilities and partnershipsConsider standardizing on integrators with demonstrated cybersecurity practices and vendor certificationsApply the same due diligence used for IT vendor selection to OT system integratorsBottom Line: System integrators are essential partners in executing industrial cybersecurity strategies and protection. Organizations must actively engage them in security conversations and ensure they have the necessary skills and partnerships to implement secure solutions for their plant environments from the start.Chapters:00:00:00 - Real-World Ransomware Hits the Plant Floor00:00:52 - Meet the System Integrators Shaping Your OT Plant Floor Security00:01:17 - What System Integrators Really Do (and Don't)00:04:13 - Remote Access: The Hidden Backdoor Nobody Sees00:08:34 - Why Ongoing Monitoring Is Non-Negotiable00:13:30 - How to Pick the Right System Integrator For Your Operations00:26:17 - Building Strong Partnerships with Your IntegratorsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
The Evolution of Procurement in OT Security | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 3, 2025 23:31


Podcast: OT Security Made SimpleEpisode: The Evolution of Procurement in OT Security | OT Security Made SimplePub date: 2025-07-01Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of OT Security Made Simple, Klaus Mochalski and Søren Knudsen discuss the evolving landscape of OT security in light of current geopolitical tensions. They explore how procurement processes have shifted, the importance of evaluating a broader range of security solutions, and the risks associated with relying on specific vendors. The conversation emphasizes the need for organizations to conduct thorough research and consider local providers to mitigate risks effectively.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Driving OT Security Innovation: AI, Risk Reduction, and the Future of Critical Infrastructure

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 26, 2025 68:02


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Driving OT Security Innovation: AI, Risk Reduction, and the Future of Critical InfrastructurePub date: 2025-06-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome back to Protect It All! In this episode, host Aaron Crow sits down with longtime friend and OT cybersecurity veteran Brian Proctor for a deep dive into the current state—and future—of the OT cyber landscape. Together, they trade stories from the front lines, reflecting on how their early experiences as asset owners shaped their passion for innovation and helping critical infrastructure run safely and securely. Brian, whose career spans roles from OT engineer to startup co-founder, opens up about his journey—highlighting his drive to push the boundaries of traditional OT security and the evolution of key industry technologies. The conversation explores everything from the persistent lack of innovation in OT, to AI's growing role in tackling the daunting challenges of risk reduction, visibility, and scaling assessments across sprawling environments. If you've ever wondered how new tech like AI is reshaping industrial cybersecurity, why “we've always done it this way” just doesn't cut it anymore, or how organizations can realistically stay ahead without breaking the bank, this episode delivers honest insights, practical advice, and a look toward an exciting, if sometimes daunting, future. So grab your headphones and settle in as Aaron and Brian share stories, hot takes, and strategies designed to protect it all—because in critical infrastructure, the stakes have never been higher. Key Moments:  06:45 OT Cyber Industry Evolution 11:57 Evolving Challenges in OT Security 19:34 Bridging the OT Security Skills Gap 21:54 Enhancing OT Security Understanding 30:46 AI Model Security Challenges 34:26 Rapid Scaling for Site Assessments 40:56 Simulating Cyber Threat Responses 47:19 Operational Priorities: Equipment vs. Cyber Tools 49:30 Focus on Meaningful Security Metrics 56:30 Rapid AI Adoption vs. Internet 01:02:12 Cybersecurity: Small Targets are Vulnerable About the guest :  Brian Proctor is a cybersecurity leader with over 20 years of experience protecting critical infrastructure across energy, industrial automation, and operational technology sectors. As the co-founder and CEO of Frenos, he empowers critical infrastructure operators to proactively secure their environments against evolving cyber threats. Brian built his foundation in ICS/OT cybersecurity during his 13+ year tenure at two progressive California Investor Owned Utilities, San Diego Gas & Electric and Southern California Edison serving the 2nd and 8th largest cities in the United States. He managed a team of 15 security engineers and researchers across 150+ projects, established OT security roadmaps, and co-invented an R&D Magazine Top 100 award-winning GPS anti-spoofing mitigation technology that earned him a patent. Brian has published IEEE papers on security monitoring, served as Critical Infrastructure Co-Chair for Securing Our eCity, and regularly speaks at conferences to educate and build the ICS/OT cybersecurity community. He holds technical certifications including GICSP, CISSP, and CRISC, along with a Business Administration degree from the University of San Diego. Links:  https://frenos.io/services - Learn more about Optica, the industry's first tech-enabled rapid OT visibility service  https://frenos.io/autonomous-ot-security-assessment-platform - Learn more about how to automate OT security risk assessments Connect Brian : https://www.linkedin.com/in/brianproctor67/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
AI-Native OT Security with FRENOS' Harry Thomas and Colin Murphy

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 23, 2025 38:27


Podcast: Secure Insights with NDK CyberEpisode: AI-Native OT Security with FRENOS' Harry Thomas and Colin MurphyPub date: 2025-06-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationSend us a textThis week on Secure Insights, we're joined by FRENOS Founder Harry Thomas and Chief Hacking Officer Colin Murphy. Frenos is an innovative organisation revolutionising OT security through the use of AI and next-generation tech. In this episode, we shine a light on some of the most overlooked challenges in the OT space, exploring whether the traditional ways of assessing risk still hold up, and how scalable the Frenos approach really is. We dive into what's working, what's not, and where the future of OT security is headed. From critical vulnerabilities to smarter, AI-driven solutions, we unpack it all giving you real insight into where businesses are falling short, where they're leading the charge, and what needs to change to secure our infrastructure for the long haul.Get in touch with host James hereGet in touch with Harry here.Get in touch with Colin here.The podcast and artwork embedded on this page are from NDK Cyber, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Wer ist für die Cybersicherheit der Windparks verantwortlich? | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 22, 2025 25:09


Podcast: OT Security Made SimpleEpisode: Wer ist für die Cybersicherheit der Windparks verantwortlich? | OT Security Made SimplePub date: 2025-06-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMohamed Harrou erklärt als OT-Sicherheitsingenieur beim Energieversorger Amprion den Mehrwert von OT-Sicherheit in Windparks und PV-Anlagen. Mit seinem 12 Jahren Erfahrung im Bereich erneuerbarer Energieanlagen liefert er praxisnahe Einblicke zu den technologischen und organisatorischen Herausforderungen moderner Windparks und gibt eine überraschende und eher beunruhigende Antwort auf die Frage nach den Verantwortlichkeiten. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
What Every CISO Gets Wrong About OT Security

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 6, 2025 20:51


Podcast: Industrial Cybersecurity InsiderEpisode: What Every CISO Gets Wrong About OT SecurityPub date: 2025-06-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dino and Craig tackle one of the most misunderstood topics in industrial cybersecurity: IT/OT convergence. But is it truly convergence or more of a collision? Drawing from real-world experiences, they challenge the idea that OT is a “shadow IT group” and argue that operational technology deserves distinct governance, funding, and strategic influence. From secure-by-design to system integrators' evolving role, this conversation is a call to action for CISOs, CIOs, and engineering leaders to rethink how they build cybersecurity partnerships across the plant floor.Chapters:00:00:00 - Opening Shot: Who's Really in Charge—CIOs or the Plant Floor?00:00:57 - Collision Course: IT and OT Can't Keep Dodging Each Other00:01:52 - Two Worlds, One Mission: Why OT Isn't Just “IT in a Hard Hat”00:04:07 - When Convergence Fails: What's Missing in the Middle00:05:54 - Breaking Silos: Why Cybersecurity Demands True Collaboration00:08:22 - Real Talk: What Cyber Protection Looks Like on the Plant Floor00:10:46 - OT's Tipping Point: Will the Next Move Come from IT, or the Shop Floor?00:17:32 - Your Move: What Leaders Must Do Next (Before It's Too Late)Links And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
What do we need to deter insider threats? | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 5, 2025 27:29


Podcast: OT Security Made SimpleEpisode: What do we need to deter insider threats? | OT Security Made SimplePub date: 2025-06-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMandana White, CEO of Smart Grid Forums, talks about the rise of insider threats to a company's cybersecurity and what it has to do with the cost-of-living crisis as well as the Western Robin Hood mentality. Diving a bit into societal psychology and politics there might even be a bit to learn from – of all places – Dubai to get IT and OT cybersecurity working in both companies and society.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Error Code
EP 62: Defending the Unknown in OT Security

Error Code

Play Episode Listen Later May 13, 2025 31:38


ROI is always a tricky subject in cybersecurity. If you're paying millions of dollars in securing your OT networks, you'd want to be able to show that it was worth it. Andrew Hural of UnderDefense talks about the need for continuous vigilance, risk management, and proactive defense, acknowledging both the human and technological elements in cybersecurity and how just because something didn't happen doesn't mean that it didn't.

Hacking Humans
OT security (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Feb 25, 2025 8:13


Please enjoy this encore episode of Word Notes. Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations.