PoddsändningarNäringsliv@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Senaste avsnittet

566 avsnitt

  • @BEERISAC: OT/ICS Security Podcast Playlist

    FAT/SAT for ICS/OT: Break Early, Build Secure | 70

    2026-2-02 | 1 h 11 min.
    Podcast: ICS Arabia Podcast
    Episode: FAT/SAT for ICS/OT: Break Early, Build Secure | 70
    Pub date: 2026-01-31

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    We’re excited to host Dieter Sarrazyn , Industrial Security Advisor and Founder of Secudea — a specialist in SCADA/ICS/OT cybersecurity, IEC 62443, and FAT/SAT security validation.In this episode, we dive into:
    🔹 Dieter’s background and his journey in OT security
    🔹 FAT & SAT and why they matter for secure system delivery 🔹 How IEC 62443 fits across the project lifecycle
    🔹 Cybersecurity validation steps during FAT & SAT
    🔹 Common challenges and practical lessons from the field
    🔹 Best practices for vendors, integrators, and asset owners

    The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    A destructive cyberattack in Poland raises NATO 'red-line' questions

    2026-2-01 | 2 h 53 min.
    Podcast: Three Buddy Problem (LS 39 · TOP 2% what is this?)
    Episode: A destructive cyberattack in Poland raises NATO 'red-line' questions
    Pub date: 2026-01-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    (Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.)

    Three Buddy Problem - Episode 83: Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war.

    Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account.

    Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
    Links:
    Transcript (unedited, AI-generated)
    Material Security (Use Cases)
    ESET DynoWiper update: Technical analysis and attribution
    Poland CERT on Russian wiper attacks
    Poland blames two Ukrainians allegedly working for Russia for railway blast
    Britain’s New Spy Chief Has a New Mission
    Two New Ivanti 0days Exploited
    Microsoft ships emergency Office patch to thwart attacks
    Analysis of Single Sign-On Abuse on FortiOS
    Fortinet PSIRT: Administrative FortiCloud SSO authentication bypass
    Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
    WhatsApp Strict Account Settings
    China Executes 11 People Linked to Cyberscam Centers in Myanmar
    Singapore to start caning for scammers
    Germany on hacking attacks: "We will strike back, including abroad"
    Acting CISA chief uploaded sensitive files into a public version of ChatGPT
    TLP BLACK
    LABScon 2026
    KasperSekrets

    The podcast and artwork embedded on this page are from Security Conversations, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Embedded Industrial Security: The Network-Native Advantage

    2026-1-31 | 27 min.
    Podcast: SecurityWeek Podcast Series - Cybersecurity Insights
    Episode: Embedded Industrial Security: The Network-Native Advantage
    Pub date: 2026-01-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Andrew McPhee, Industrial IoT Security Solution Manager at Cisco, joins the SecurityWeek podcast and dives into why traditional monitoring and SPAN-based approaches fail to deliver true visibility in industrial environments, and how network-native security embeds inspection, segmentation, and protection directly into the network. We discuss real-world implementation challenges, economic tradeoffs, and how to move from visibility to action without disrupting operations.  (Want to continue the discussion? Contact Cisco.)

    Follow SecurityWeek on LinkedIn

    The podcast and artwork embedded on this page are from SecurityWeek, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Ramy Nahum CEO & owner @Triple C veteran of Israeli IT infrastructure industry on BCP, recovery & backup

    2026-1-31 | 45 min.
    Podcast: ICS Cyber Talks Podcast
    Episode: Ramy Nahum CEO & owner @Triple C veteran of Israeli IT infrastructure industry on BCP, recovery & backup
    Pub date: 2026-01-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    נושא ההתאוששות מכשל מערכות ו/או אירוע סייבר דורש הכנה אפקטיבית שמתחילה בגיבוש תוכנית המשכיות עסקית (ביי.סיי.פיי) ותוכנית להתאוששות מאסון (דיי. אר. פיי) המגדירות תפקידים ושלבי פעולה ברורים בזמן אמת. נדבך מרכזי בהכנה הוא יישום מערך גיבויים אוטומטי ומבוזר (כולל גיבויים "קרים" המנותקים מהרשת הראשית) ובדיקת תקינותם באופן תקופתי. בנוסף, על הארגון לקיים תרגולים המדמים תרחישי קיצון בקנה מידה משמעותי

    ממפגשים עם ארגונים רבים נראה שיש חוסר הבנה על ההבדל בין דיי.אר וגיבוי, תרומה משמעותית לבלבול הזה מגיע מכיוון יצרני תוכנות הגיבוי והמעבר להתאוששות וגיבוי בענן. הפרק הזה הוא חובה לכול מנכ"ל, מנהל מערכות מידע ומנהל אבטחת מידע ונועד לעשות סדר במונחים והפעולות השונות

    נחשון פינקו מארח את רמי נחום המנכ"ל והבעלים של חברת טריפל סי מוותיקי התחום בישראל, בשיחה על התאוששות, גיבוי וכול מה שביניהם.

    מה ההבדל בין אתר התאוששות לבין מערכת גיבויים

    מתי מספיק גיבוי באמצעי איחסון אלקטרונים ומתי מומלץ להוסיף גם קלטות כגיבוי קר (מבחינתי תמיד!) למה נדרש לבצע תרגולים בקנה מידה גדול ולא רק ע"ג שרת או שניים ומספר קטן של משתמשים

    למה נדרש לבדוק גיבויים באופן שוטף ועוד

    The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Opportunistic by Default: How OT gets pulled into the blast radius

    2026-1-30 | 34 min.
    Podcast: Safe Mode Podcast (LS 25 · TOP 10% what is this?)
    Episode: Opportunistic by Default: How OT gets pulled into the blast radius
    Pub date: 2026-01-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In this episode of Safe Mode, we look at how opportunistic campaigns—often starting as loud disruption like DDoS—can probe for weak points and, in some cases, move closer to operational technology and industrial control systems. Using a recent Justice Department case tied to pro‑Russia hacktivist groups as a jumping-off point, we discuss what this pattern says about the OT threat landscape in 2025, from remote access and trust boundaries to engineering workflows and data integrity risk. Chris Grove, Director of Cybersecurity Strategy at Nozomi Networks, joins to explain what defenders should prioritize now to keep “noise” from becoming real-world operational impact.

    The podcast and artwork embedded on this page are from Safe Mode Podcast, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Fler podcasts i Näringsliv

Om @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast-webbplats

Lyssna på @BEERISAC: OT/ICS Security Podcast Playlist, Framgångspodden och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner
Sociala nätverk
v8.4.0 | © 2007-2026 radio.de GmbH
Generated: 2/3/2026 - 2:56:21 AM