PoddsändningarNäringsliv@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Senaste avsnittet

553 avsnitt

  • @BEERISAC: OT/ICS Security Podcast Playlist

    Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security

    2026-1-22 | 30 min.
    Podcast: Industrial Cybersecurity Insider
    Episode: Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security
    Pub date: 2026-01-20

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    This compilation episode brings together the most critical insights from Industrial Cybersecurity Insider conversations about the fundamental challenges plaguing OT security implementation and management.
    Industry experts dissect why traditional IT security approaches fail catastrophically on the plant floor, revealing that the core issue isn't technology—it's ownership, collaboration, and understanding.
    From the dangers of deploying endpoint detection without vendor qualification to the millions lost in unplanned downtime, this episode exposes the gap between security theory and operational reality.
    Listeners will discover why cybersecurity tools are often shelfware, how the "have and have-not" world creates vulnerability gaps across manufacturing facilities, and what "left of boom" thinking means for preventing incidents before they happen.
    Featuring hard-won lessons about shutdown windows, cyber-informed engineering, and the critical importance of building relationships between IT teams and plant floor operations, this episode delivers actionable intelligence for CISOs, plant managers, and anyone responsible for securing industrial control systems.
    Chapters:
    (00:00:00) - Introduction: The Core Problem of Ownership in OT Security
    (00:01:45) - Why IT Security Approaches Fail on the Plant Floor
    (00:04:30) - The Cloud Analogy: Lessons for OT Implementation
    (00:07:15) - The Missing Conversation: Capital Plans and OEMs
    (00:10:20) - IT vs OT Networks: Different Purposes, Different Risks
    (00:13:35) - EDR in OT: The Aftermarket Parts Problem
    (00:16:10) - Cyber-Informed Engineering: Building Security into Design
    (00:19:45) - The Have and Have-Not World of Plant Security
    (00:23:20) - Left of Boom: Visibility Beyond Security
    (00:27:15) - Who Should Lead the OT Security Discussion

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Securing Remote Access in OT: Visibility, Segmentation, and What Compliance Misses

    2026-1-21 | 20 min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: Securing Remote Access in OT: Visibility, Segmentation, and What Compliance Misses
    Pub date: 2026-01-19

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Remote access is no longer optional in OT - but unmanaged connectivity is one of the fastest ways to lose control of critical systems.

    In this episode of Protect It All, host Aaron Crow breaks down the real challenges of securing connectivity across IT and OT environments. As vendors, technicians, and support teams increasingly rely on remote access, many organizations struggle with poor visibility, legacy systems, and unclear network boundaries - creating unnecessary risk.

    Aaron walks through newly released secure connectivity guidance from CISA and the UK National Cyber Security Centre, translating an eight-point framework into practical, real-world steps that security and operations teams can actually implement.

    You’ll learn:

    Why remote access is one of the biggest OT risk multipliers

    How poor visibility creates blind spots attackers love

    Why asset inventory and documentation are foundational - not optional

    How segmentation and least-privilege design shrink the attack surface

    What compliance frameworks get right - and what they don’t

    Best practices for vendor access, MFA, session recording, and monitoring

    How to design secure connectivity without breaking operations

    Whether you’re responsible for OT security, managing vendors, or bridging IT and OT teams, this episode delivers actionable guidance to help you regain control of connectivity and protect critical infrastructure.

    Tune in to learn how to secure access without sacrificing operations - only on Protect It All.

    Key Moments: 

    01:11 "Secure Connectivity in OT"

    05:10 "Reducing Attack Surface Through Access Limits"

    10:02 "Control System Upgrade Failure Impact"

    12:00 Beyond Passwords: Strengthening Security

    17:16 "Strengthening Cybersecurity Basics"

    18:26 "Balancing Compliance and Security"

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast 

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    2/4 Análisis de Monitorización de seguridad OT con telemetría del proceso

    2026-1-20 | 9 min.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 2/4 Análisis de Monitorización de seguridad OT con telemetría del proceso
    Pub date: 2026-01-19

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Este episodio se centra en el análisis: cómo distinguir la variabilidad normal del proceso de eventos sospechosos, qué incidentes se han detectado gracias a la telemetría y los retos técnicos de trabajar con datos industriales reales.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    130: S4’s “Connect” Theme Explained — Dale Peterson on OT Security’s Hyper-Connected Future

    2026-1-19 | 31 min.
    Podcast: (CS)²AI Podcast Show: Control System Cyber Security
    Episode: 130: S4’s “Connect” Theme Explained — Dale Peterson on OT Security’s Hyper-Connected Future
    Pub date: 2026-01-14

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In this episode of the (CS)²AI Podcast, host Derek Harp is joined once again by Dale Peterson, Founder of the S4 Conference and one of the longest-standing voices in OT cybersecurity. As Dale marks 25 years in the industry, the conversation takes a forward-looking turn toward what he believes is the next major inflection point for industrial security: connectivity driven by AI, data, and business systems.
    Dale explains why the 2026 S4 Conference theme, Connect, is not just about networking people, but about the explosive growth of connections between OT systems, enterprise platforms, and analytics driven by AI. From MES, ERP, and PLCs to asset inventories and security telemetry, these connections are accelerating faster than most security teams are prepared for—often driven by business value rather than security design.
    Listeners will hear why manufacturing is emerging as the epicenter of this transformation, how AI is enabling real-time querying across operational systems, and why OT security teams must prepare for a future where their tools become just another data source in larger operational workflows. Dale also shares how this shift will reshape risk, attack surfaces, and even the role of humans in control and response.
    The episode also provides an inside look at S4 2026, including this year’s Proof-of-Concept Pavilion, where vendors will be forced to demonstrate their technologies live on a real manufacturing environment, as well as updates on attendance, ticket availability, and why this will be the final year S4 is held in Miami Beach before moving back to Tampa.
    This is a must-listen for OT security professionals, automation leaders, and anyone trying to understand how AI-driven connectivity will redefine both risk and opportunity across industrial environments in the years ahead.

    The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Beyond Defense: Building Cyber Resilience in Autonomous and Connected Mobility

    2026-1-18 | 25 min.
    Podcast: Exploited: The Cyber Truth
    Episode: Beyond Defense: Building Cyber Resilience in Autonomous and Connected Mobility
    Pub date: 2026-01-15

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Autonomous and connected vehicles are reshaping transportation, but increased software complexity and connectivity introduce serious security and safety challenges that can’t be solved with traditional perimeter defenses.

    In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and Hemanth Tadepalli, Senior Cybersecurity & Compliance SME at May Mobility, for a practical discussion on what cyber resilience looks like inside real-world autonomous vehicle programs.

    Hemanth draws on his experience securing mobility systems at May Mobility, as well as prior work with Mandiant, Google, and AlixPartners, to explain how automotive organizations are adapting to software-defined vehicle architectures, regulatory pressure, and expanding attack surfaces. Joe shares his perspective on why mobility companies increasingly resemble software companies and what that means for engineering, governance, and operational security.

    Together, they explore:

    How connected and autonomous vehicle architectures expand the attack surface
    What cyber resilience means in day-to-day engineering and fleet operations
    How governance, threat intelligence, and software validation reduce risk
    Regulatory pressures shaping automotive security decisions
    How teams balance detection, response, and safety in autonomous systems

    Whether you’re building autonomous platforms, managing connected fleets, or securing safety-critical software, this episode offers a grounded look at what it takes to keep modern mobility systems trustworthy and safe.

    The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Fler podcasts i Näringsliv

Om @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast-webbplats

Lyssna på @BEERISAC: OT/ICS Security Podcast Playlist, Marknaden och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner
Sociala nätverk
v8.3.0 | © 2007-2026 radio.de GmbH
Generated: 1/22/2026 - 10:50:55 PM