Podcasts about supervisory control

  • 18PODCASTS
  • 22EPISODES
  • 34mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 14, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about supervisory control

Latest podcast episodes about supervisory control

The Cybersecurity Defenders Podcast
#202 - Intel Chat: CISA, BianLian (not), Crafty Camel, Github malvertising & SCADA

The Cybersecurity Defenders Podcast

Play Episode Listen Later Mar 14, 2025 38:28


In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of the LimaCharlie community.The Cybersecurity and Infrastructure Security Agency (CISA) is facing significant operational challenges as budget constraints force it to scale back key cybersecurity programs.Scammers are taking a new approach to extortion by mailing physical ransom letters to victims, claiming to be the operators of the BianLian ransomware group.A newly identified advanced persistent threat (APT) group, dubbed "Crafty Camel," has been targeting aviation operational technology (OT) systems using a sophisticated technique involving polyglot files. A new malvertising campaign is leveraging deceptive online ads to distribute information-stealing malware hosted on GitHub, highlighting an ongoing evolution in cybercriminal tactics.Security researchers have disclosed details of multiple vulnerabilities in Supervisory Control and Data Acquisition (SCADA) systems that could be exploited to facilitate attacks on industrial environments.

The Industry 4.0 Podcast with Grantek
Doug Yerger of Grantek - The Industry 4.0 Podcast with Grantek

The Industry 4.0 Podcast with Grantek

Play Episode Listen Later Mar 20, 2024 45:10


Doug Yerger is a Principal Engineer at Grantek. Doug's 30-plus years of experience includes the architecting, design, implementation, commissioning, and support of PLC Control Systems, Robotic Applications, Vision Applications, Database Applications, MES Implementations, Warehouse Management Systems, Supervisory Control and Data Acquisition Systems, and HMIs. Doug serves as a leader within the organization, providing governance, technical direction, and facilitating knowledge propagation, Doug also helps advance the manufacturing industry through his membership on HMI and SCADA standards committees (ISA 101 and 112 respectively) with the International Society of Automation (ISA). Doug has been driving Grantek's adoption of new design tools, shortening and improving the design cycle. The Industry 4.0 Podcast with Grantek delivers a look into the world of manufacturing, with a focus on stories and trends that lead to better solutions. Our guests will share tips and outcomes that will help improve your productivity. You will hear from leading providers of Industrial Control System hardware and software, Grantek experts and leaders at best-in-class industry associations that serve Life Sciences and Food & Beverage manufactures.

Nexus

Nexus

Play Episode Listen Later Jan 23, 2024 57:35


Episode 160 features Nathan Morris from KIPP, Stephen Dawson from Normal Software, and Terry Herr from Intellimation and is our 8th episode in the Case Study series looking at real-life, large-scale deployments of smart building technologies. These are not marketing fluff stories, these are lessons from leaders that others can put into use in their smart buildings programs. This conversation explores KIPPs partnerships between Normal Software and Intellimation to better manage school facilities and increase savings to bring money back into the classrooms. Enjoy!Find full show notes and episode transcript on The Nexus Podcast: Episode 160 webpage.Sign-up (or refer a friend!) to the Nexus Newsletter.Learn more about The Smart Building Strategist Course and the Nexus Courses Platform.Check out the Nexus Labs Marketplace.Learn more about Nexus Partnership Opportunities.

schools case study autonomy cmms nathan morris stephen dawson supervisory control
InfosecTrain
How to Secure an OT Network?

InfosecTrain

Play Episode Listen Later Sep 27, 2023 4:48


In our increasingly interconnected world, the convergence of Operational Technology (OT) and Information Technology (IT) has brought significant advancements and efficiencies. However, this integration has also exposed critical infrastructure to new cybersecurity threats. Securing OT networks has become a paramount concern for industries such as manufacturing, energy, transportation, and healthcare. This article will delve into essential measures and best practices for safeguarding OT networks against potential cyber threats. The OT network landscape Operational Technology or OT refers to the hardware and software used to control and monitor physical devices and processes in industrial environments. Unlike traditional IT networks, which primarily deal with data, OT networks handle the operation of critical infrastructure, e.g., ICS (Industrial Control Systems), SCADA systems (Supervisory Control and Data Acquisition), and PLCs (Programmable Logic Controllers). View More: How to Secure an OT Network?

Wilson County News
Council considers SCADA system to better control city's water utilities

Wilson County News

Play Episode Listen Later May 23, 2023 2:39


[Video below] Management and control. A Supervisory Control and Data Acquisition (SCADA) computer system, which would help the city to better manage its municipal water system, was the subject of a presentation by Data Flow Systems Inc. (DFS) during a special called meeting May 18 of the Floresville City Council. The SCADA system uses hardware and software manufactured by DFS specifically for water, wastewater, and stormwater utilities, and the city staff is recommending the city purchase the system. More information on the cost and an opportunity for the council to vote on the proposal will be provided in future meetings....Article Link

Manufacturing Hub
Ep. 85 - [David Schultz] Supervisory Control & Data Acquisition SCADA Systems Industrial Automation

Manufacturing Hub

Play Episode Listen Later Nov 24, 2022 79:10


Guest BioMy passion is using current and emerging technologies to overcome challenges and solve problems in manufacturing. With a background in business development, I am both commercially savvy and technically proficient. This combination enables me to articulate a value proposition and demonstrate the application of the underlying technology. I help companies develop and execute digital transformation and asset management strategies. I enable manufacturers to create a competitive advantage through data and information and the greater availability of assets. I am interested in working with organizations that share my values of honesty, integrity, and empathy. Together we endeavor to create the best versions of all people.Join us as David Schultz shares over 20 years of SCADA experience!What is a SCADA System?When should you replace a legacy system?Is there one protocol to rule them all?Manufacturing Hub Episode 85. Recommended MaterialsThe Second MountainConnect with Us David Schultz Vlad Romanov Dave Griffith Manufacturing Hub Let Us Know What You ThinkIf you enjoyed the show, it would mean the world to us if you could leave us a review: https://podcasts.apple.com/us/podcast/manufacturing-hub/id1546805573#SCADA #Manufacturing #Automation

Let's Talk Robotics
Let's talk robotics with Associate Prof Elena Sitnikova

Let's Talk Robotics

Play Episode Listen Later Jun 15, 2022


Eps 84: Joining me today is Elena Sitnikova, Associate Professor of Cybersecurity and Networking, College of Science and Engineering, Flinders University. A Certified Secure Software Lifecycle Professional, Elena leads cutting-edge research in Critical Infrastructure protection, focusing on intrusion detection for Supervisory Control and Data Acquisition systems cybersecurity and the Industrial Internet of Things.

CERIAS Security Seminar Podcast
Chen-Ching Liu, Cyber-Physical System Security of the Power Grid

CERIAS Security Seminar Podcast

Play Episode Listen Later Feb 23, 2022 55:43


The electric power grid is a complex cyber-physical system that forms the lifeline of a modern society. Its reliable and secure operation is of paramount importance to national security and economic well-being. The power grid today is a highly automated network, wherein a variety of communication networks and information systems are interconnected to the physical grid for the purpose of monitoring, protection, control, and market functions. The increased reliance on information and communications technology in the smart gird significantly increases the vulnerabilities, which further underscores the importance of cyber security. As a result, cyber-physical system security of the power grid is a critical area encompassing vulnerability assessment, anomaly detection, and mitigation for substations and the Supervisory Control and Data Acquisition systems. The purpose of this presentation is to provide new concepts and testbed-based methodologies for the integrated cyber-power systems. Future research directions will be discussed. About the speaker: Chen-Ching Liu is American Electric Power Professor and Director, Power and Energy Center, at Virginia Tech. During 1983-2017, he was on the faculty of University of Washington, Iowa State University, University College Dublin (Ireland), and Washington State University. Professor Liu received an IEEE Third Millennium Medal in 2000 and the Power and Energy Society Outstanding Power Engineering Educator Award in 2004. In 2013, Dr. Liu received a Doctor Honoris Causa from Polytechnic University of Bucharest, Romania. He chaired the IEEE Power and Energy Society Fellow Committee, Technical Committee on Power System Analysis, Computing and Economics, and Outstanding Power Engineering Educator Award Committee. Chen-Ching is the U.S. Representative on the CIGRE Study Committee D2, Information Systems and Telecommunication. Professor Liu is a Fellow of the IEEE, Member of Virginia Academy of Science, Engineering, and Medicine, and Member of the U.S. National Academy of Engineering.

Industrial Automation – It Doesn’t Have To…
Industrial Automation - It Doesn't Have To... Be Like Colonial Pipeline

Industrial Automation – It Doesn’t Have To…

Play Episode Listen Later Jun 1, 2021 55:52 Transcription Available


What happened with Colonial Pipeline and could it have been prevented?This episode isn't a dig at Colonial Pipeline. It's a cautionary tale for businesses, and their cybersecurity preparedness efforts.The reason Colonial shut down their pipeline was they were uncertain. They were unsure what systems were going to be affected over and above the accounting systems. They lacked confidence in the separation of their Business/IT Networks and their Operational Technology (OT) Networks.Listen to hear a simple solution!We discuss the philosophical conflict between IT and OT and the marriage between the two. Both play important roles. We applaud each. This episode is dedicated to the hard working IT professionals who we only think about when something isn't working properly. Learn how a Supervisory Control and Data Acquisition (SCADA) system works. Yes, there are problems with OPC. We overcome those problems with Native Drivers. People use elliTek's IIoTA™ MES platform for many reasons. For brevity sake, we talk about just two of the reasons in this episode.Native DriversSeparation of the NetworksDiscover how a SCADA system and an IIoTA™ MES platform can work together.Learn the differences between an appliance and a Windows PC and why that is important. Why is Windows the problem?Stay tuned to hear some basic things that businesses can do to protect themselves and their customers data.We quote Kiersten E. Todt, managing director of the nonprofit Cyber Readiness Institute. Her insights are spot-on! Here's the link to her quotes in the New York Times article. The Cyber Readiness Institute offers free, online programs to help SMBs protect themselves from cyber risks.Cybersecurity doesn't have to be complicated! Reach out for a FREE online demo, FreeDemo@elliTek.com.Let's get to know each other! Connect with elliTek on your social platforms.LinkedIn:  www.linkedin.com/company/ellitek-incInstagram:  www.instagram.com/ellitekFacebook:  www.facebook.com/ellitekTwitter:  www.twitter.com/elliTek_Inc/media

Light 'Em Up
You are 1 click away from being wiped out. Information Security Expert Paul Hugenberg III provides critical insight on how to prevent from being a victim of a cyber attack and being hacked out of business.

Light 'Em Up

Play Episode Play 60 sec Highlight Listen Later Dec 8, 2020 66:21


Today we have reached a momentous milestone, our final episode of the year! We focus on leadership, the criminal justice system and crime scene investigation. We enlighten, educate and empower others with the truth. Like it or not … the truth disturbs, the truth divides, but ultimately the truth delivers. We want to thank you for being with us every step of the way on this exciting journey. Today on

Nexus

Nexus

Play Episode Listen Later Oct 15, 2020 40:54


“When you come in and try to take control… or transparency and ownership of the system away from somebody, that's when you start running into problems. I think you have to not just replace a process, but data-enrich the process… It has to be able to engage with people onsite.”—Tyson SoutterYou can find our panelists on LinkedIn: Keith Gipson, Tyson Soutter, Terry Herr, and Jean-Simon Venne.Watch on YouTube or read on the web.Get full access to Nexus.

unpacking nexus supervisory control
Buildings of Tomorrow
#92 Supervisory Control

Buildings of Tomorrow

Play Episode Listen Later Oct 6, 2020 18:47


In this week's episode we're joined by James Dice, professional engineer, energy efficiency innovator and the brains behind "Nexus" (https://nexus.substack.com/). In today's episode James discusses what meant when we mention "Supervisory Control". Tune in!

nexus supervisory control
Buildings of Tomorrow
#92 Supervisory Control

Buildings of Tomorrow

Play Episode Listen Later Oct 6, 2020 18:47


In this week's episode we're joined by James Dice, professional engineer, energy efficiency innovator and the brains behind "Nexus" (https://nexus.substack.com/). In today's episode James discusses what meant when we mention "Supervisory Control". Tune in!

nexus supervisory control
Buildings of Tomorrow
#92 Supervisory Control

Buildings of Tomorrow

Play Episode Listen Later Oct 6, 2020 18:48


In this week’s episode we’re joined by James Dice, professional engineer, energy efficiency innovator and the brains behind "Nexus" (https://nexus.substack.com/). In today's episode James discusses what meant when we mention "Supervisory Control". Tune in!

Intellic Podcast
PLC vs SCADA vs DCS

Intellic Podcast

Play Episode Listen Later Mar 3, 2020 7:13


What's the difference between PLC SCADA & DCS? A PLC, Programmable Logic Controller, reads inputs, executes logic, and writes to outputs. A SCADA, Supervisory Control and Data Acquisition connects to a group of PLC's and provides remote monitoring, control, and alarming. A DCS, distributed control system, has both SCADA and PLC functionality. The PLCs are sometimes called RIO or RTU units often run proprietary or application-specific code, such as a rolling mill DCS. SCADA can then connect to a DCS using drivers such as Kepware Technologies to integrate the DCS system with other applications across your plant/enterprise. Hope this answers your question! Thanks for watching! Subscribe!

Intellic Podcast
PLC vs SCADA vs DCS

Intellic Podcast

Play Episode Listen Later Mar 3, 2020 7:13


What's the difference between PLC SCADA & DCS? A PLC, Programmable Logic Controller, reads inputs, executes logic, and writes to outputs. A SCADA, Supervisory Control and Data Acquisition connects to a group of PLC's and provides remote monitoring, control, and alarming. A DCS, distributed control system, has both SCADA and PLC functionality. The PLCs are sometimes called RIO or RTU units often run proprietary or application-specific code, such as a rolling mill DCS. SCADA can then connect to a DCS using drivers such as Kepware Technologies to integrate the DCS system with other applications across your plant/enterprise. Hope this answers your question! Thanks for watching! Subscribe!

RunAs Radio
When IoT and SCADA Meet with Niall Merrigan

RunAs Radio

Play Episode Listen Later Oct 31, 2018 40:17


The Internet of Things and Industrial SCADA controls are colliding - what happens next? Richard chats with Niall Merrigan about the security issues around industrial plants - factories, power stations, refineries and so on. There has been automation there for years in the form of Supervisory Control and Data Acquisition (SCADA) systems - but their security models are pretty primitive, often relying on air-gap networks to keep hackers out. Meantime, inexpensive and powerful IoT devices offer new capabilities - they have their own security issues, but there are solutions. What happens when the two meet?

AWS re:Invent 2017
EUT303: Modernizing the Energy and Utilities Industry with IoT: Moving SCADA to the Cloud

AWS re:Invent 2017

Play Episode Listen Later Nov 30, 2017 56:41


Supervisory Control and Data Acquisition (SCADA) systems are critical real-time software applications used to manage nearly any form of upstream, midstream, and downstream processes in the energy industry. Traditionally, these technologies have been deployed on premises and managed separately from core IT, to ensure security, availability and consistent performance.  As energy and utility companies expand geographically, and the number and types of sensors in each location grow, disparate and growing data streams are becoming increasingly complex and challenging to manage. It is estimated that up to 95% of valuable device and sensor information is left stranded in the field, information that could prove valuable to machine learning, predictive analytics, and process optimization.    In this session, energy and utility customers will learn how easy it is to implement IIoT on AWS, so they can easily extract value from additional devices and sensors, and innovate faster. We will dive into a reference architecture for accessing current mission critical SCADA data as well as previously stranded data into AWS using Kinesis and DynamoDB, ultimately enabling customers to reduce downtime, increase efficiencies, improve reliability, and gain more business insights through connected data.

Seginfocast - Segurança da Informação - podcast
SegInfocast #33 - Segurança de Automação Industrial e SCADA

Seginfocast - Segurança da Informação - podcast

Play Episode Listen Later May 14, 2016 28:41


Paulo Sant’anna recebe pela primeira vez Marcelo Branquinho, fundador e CEO da TI Safe Segurança da Informação, para uma conversa sobre SCADA e automação industrial. Qual o significado do termo SCADA? SCADA é o acrônimo para Supervisory Control and Data Acquisition, ou seja, sistemas de controle e supervisão e aquisição de dados, que embora não estejam visíveis ao grande publico são utilizados na gerência de infraestruturas críticas muito importantes para as cidades como energia elétrica, purificação de água, sinalização de trânsito, tráfego aéreo e outros. Qual a importância da preocupação com segurança em sistemas SCADA? Esses sistemas controlam serviços fundamentais e muitos deles são antigos, criados nos anos 90, sem a preocupação com segurança lógica, somente com a física. Porém com o advento da internet, os riscos de ataques se tornaram mais visíveis, aumentando a preocupação com a segurança. Há um outro agravante: aqueles que deveriam ser os sistemas mais protegidos, são os mais negligenciados, colocando em risco a vida de milhares de pessoas, em caso de comprometimento. Alguns exemplos reais de ataque dados por Marcelo Branquinho: o incidente em uma usina de energia, que deixou milhares de pessoas sem luz na Ucrânia durante seis horas e o envenenamento de água de uma cidade norte-americana através da invasão do sistema de distribuição. Seguranca-de-Automacao-Industrial-e-SCADA Quais foram as motivações para escrever o livro “Segurança de Automação Industrial e SCADA”? Branquinho diz que o livro procura descrever o que são esses sistemas de automação e a sua importância para a sociedade. Hoje, os sistemas SCADA são vitais para o funcionamento das grandes cidades, porém o nível de segurança ainda precisa melhorar, especialmente em tempos de guerra cibernética – que já foi tema do episódio 21 do SegInfocast, através do livro “Guerra Cibernética – A próxima ameaça à segurança e o que fazer a respeito“. Quem deveria ler esse livro? Security Officers, profissionais de TI, Segurança da Informação e de Tecnologia de Automação são o público alvo do livro. Marcelo Branquinho é Engenheiro Eletricista com especialização em sistemas de computação e MBA em Gestão de Negócios. É fundador e CEO da TI Safe Segurança da Informação, além de ser especialista em sistemas SCADA com mais de 15 anos de experiência no ramo de infraestruturas críticas. É também o coordenador da formação em segurança em automação industrial. Membro sênior da ISSA Internacional.

DEF CON 23 [Audio] Speeches from the Hacker Convention
Aditya K Sood - Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities

DEF CON 23 [Audio] Speeches from the Hacker Convention

Play Episode Listen Later Oct 21, 2015


Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Aditya K Sood Architect - Threat Research Labs, Elastica inc. Human Machine Interfaces (HMIs) are the subsets of the Supervisory Control and Data Acquisition (SCADA) systems. HMIs are control panels that provide interfaces for humans to interact with machines and to manage operations of various types of SCADA systems. HMIs have direct access to SCADA databases including critical software programs. The majority of SCADA systems have web-based HMIs that allow the humans to control the SCADA operations remotely through Internet. This talk unveils various flavors of undisclosed vulnerabilities in web-based SCADA HMIs including but not limited to remote or local file inclusions, insecure authentication through clients, weak password hashing mechanisms, firmware discrepancies, hardcoded credentials, insecure web-services, weak cryptographic design, cross-site request forgery, and many others. This talk digs deeper into the design models of various SCADA systems to highlight security deficiencies in the existing SCADA HMI deployments. The research is driven with a motivation to secure SCADA devices and to build more intelligent solutions by hunting vulnerabilities in SCADA HMIs. The vulnerabilities presented in this talk are completely undisclosed and will be revealed for the first time with live demonstrations. Aditya K Sood (Ph.D) is a senior security researcher and consultant. Dr. Sood has research interests in malware automation and analysis, application security, secure software design and cybercrime. He has worked on a number of projects pertaining to penetration testing specializing in product/appliance security, networks, mobile and web applications while serving Fortune 500 clients for IOActive, KPMG and others. He is also a founder of SecNiche Security Labs, an independent web portal for sharing research with security community. He has authored several papers for various magazines and journals including IEEE, Elsevier, CrossTalk, ISACA, Virus Bulletin, Usenix and others. His work has been featured in several media outlets including Associated Press, Fox News, Guardian, Business Insider, CBC and others. He has been an active speaker at industry conferences and presented at BlackHat, DEF CON, HackInTheBox, RSA, Virus Bulletin, OWASP and many others. Dr. Sood obtained his Ph.D from Michigan State University in Computer Sciences. Dr. Sood is also an author of "Targeted Cyber Attacks" book published by Syngress. Company Website: http://www.elastica.net Personal website: http://adityaksood.secniche.org Twitter: @AdityaKSood

Excelsior Life
Today in Cybersecurity: Derek Smith on SCADA

Excelsior Life

Play Episode Listen Later Sep 26, 2014 6:48


This podcast provides a brief overview of security issues related to Supervisory Control and Data Systems, or SCADA, security.  Derek Smith of the  provides a brief overview of what SCADA is, why it needs securing, and introduce a new SCADA network protocol for communicating and protecting SCADA controlled communications. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications:  Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.