Powered by RND
PoddsändningarNäringsliv@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Senaste avsnittet

Tillgängliga avsnitt

5 resultat 457
  • E38: The Unseen Threats to Critical Infrastructure with Patrick Gillespie
    Podcast: Bad ActorsEpisode: E38: The Unseen Threats to Critical Infrastructure with Patrick GillespiePub date: 2025-10-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Bad Actors, host Rebecca Craddick speaks with Patrick Gillespie, OT Practice Director at GuidePoint Security, about the unique and often misunderstood world of operational technology (OT) and its critical role in many areas, from manufacturing to public utilities.Patrick discusses the increasing threats to critical infrastructure, the challenges of bridging the gap between IT and OT teams, and the importance of adopting a "survivable" security posture. He also explains how GuidePoint's partnership with Armis helps organizations gain visibility into their OT environments and prioritize vulnerabilities. This episode is a must-listen for anyone interested in the evolving landscape of cybersecurity and the protection of our most vital systems.The podcast and artwork embedded on this page are from Armis, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    37:04
  • Angriffserkennung in Umspannwerken nach dem BSI | OT Security Made Simple
    Podcast: OT Security Made SimpleEpisode: Angriffserkennung in Umspannwerken nach dem BSI | OT Security Made SimplePub date: 2025-11-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationKlaus Hunsänger vom BSI gibt Tipps, wie in Umspannwerken eine Angriffserkennung nach BSI-CS 153 “Stationsautomatisierung” umgesetzt werden kann. Der Praktiker aus dem Referat für industrielle Steuerungs- und Automatisierungssysteme beleuchtet die Hintergründe des BSI-Dokuments und an welcher Stelle ein netzbasiertes IDS (NIDS) sinnvoll ist. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an [email protected] podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    26:32
  • When IT Security Meets OT Reality: Why One Size Doesn't Fit All
    Podcast: Industrial Cybersecurity InsiderEpisode: When IT Security Meets OT Reality: Why One Size Doesn't Fit AllPub date: 2025-11-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat happens when IT cybersecurity practices collide with OT operational realities? In this episode, Jim and Dino expose the costly mistakes organizations make when applying IT security playbooks to manufacturing environments.Discover why zero trust architectures can halt production, how shadow IT thrives on every plant floor, and why remote access policies designed for corporate networks fail in industrial settings. Learn the critical importance of OT-tailored asset inventories, the need for IT/OT collaboration, and why digital safety must be treated with the same urgency as physical safety.If you're struggling to bridge the gap between IT security mandates and OT operational needs—or if you've ever watched a well-intentioned security policy bring production to a halt—this episode is your roadmap to getting it right.Chapters:(00:00:00) - Introduction and Episode Overview(00:01:19) - IT vs OT Security Mindsets(00:02:03) - Zero Trust Challenges in OT Environments(00:05:12) - Remote Access and Change Management Conflicts(00:09:00) - Who Should Learn from Whom: IT or OT?(00:10:23) - Asset Inventory: What OT Engineers Don't Know(00:15:00) - Process Integrity and Operational Value(00:21:57) - Shadow IT: The Backdoors Nobody Talks About(00:26:00) - Designing Security Into New Equipment(00:28:00) - Digital Safety vs Physical SafetyLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInJim Cook on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    33:27
  • S2 E7: ICS/OT Security Operations Centers
    Podcast: Simply ICS CyberEpisode: S2 E7: ICS/OT Security Operations CentersPub date: 2025-11-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe growing need for visibility and response in industrial environments is driving more organizations to consider ICS/OT Security Operations Centers — but what does that actually look like for small and medium-sized operations?In this episode of Simply ICS Cyber, Don and Tom sit down with Dan Gunter, CEO and founder of Insane Cyber, to discuss how ICS/OT SOCs function, what data truly matters for monitoring, and how incident response changes when operators have (or don’t have) the right information at hand.Drawing on experience from the Air Force CERT to founding an OT-focused security company, Dan shares a practical look at the realities of SOC implementation across industries — from utilities with limited staff to large-scale enterprises managing thousands of assets.Listeners will gain insight into how to start building visibility, selecting the right MSSP partners, and managing SOC fatigue — all while keeping industrial operations safe and resilient.⚙️ Tune in to learn how data, process, and people come together to make ICS/OT SOCs work in the real world.Connect with Dan on LinkedIn: https://www.linkedin.com/in/dan-gunter👉 Subscribe to Simply ICS Cyber for more expert-driven conversations on ICS/OT security, critical infrastructure protection, and emerging cyber threats.Connect with your hosts on LinkedIn:- Don https://linkedin.com/in/cutaway- Tom https://linkedin.com/in/thomasvannormanLearn about ICS Village: https://www.linkedin.com/company/icsvillage=========================Simply Cyber empowers people who want a rewarding cybersecurity career=========================Presented by Simply Cyber Media Group=========================All the ways to connect with Simply Cyber https://SimplyCyber.io/SocialsThe podcast and artwork embedded on this page are from Simply Cyber Media Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    25:56
  • Open Source Intelligence Exposed: How Hackers Use Public Data to Target People, Passwords, and Critical Systems
    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Open Source Intelligence Exposed: How Hackers Use Public Data to Target People, Passwords, and Critical SystemsPub date: 2025-11-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThink your company’s private data is safe? Think again. In this episode of Protect It All, host Aaron Crow pulls back the curtain on one of cybersecurity’s most underestimated frontiers - Open Source Intelligence. He reveals how attackers leverage publicly available data from LinkedIn profiles to leak passwords, mapping out targets, infiltrating systems, and exploiting the human attack surface. Drawing from real-world incidents and years of experience across IT and OT security, Aaron explains: How Open Source Intelligence fuels social engineering and insider threat campaigns. Why protecting systems isn’t enough - you must protect people. How to use Open Source Intelligence proactively for threat modeling and risk mitigation. Steps to monitor your digital footprint and reduce exposure before it’s too late. Whether you’re a cybersecurity professional, executive, or simply digital-curious, this episode will change how you think about “public information.” Tune in to learn how Open Source Intelligence can both expose and empower your cybersecurity strategy - only on Protect It All. Key Moments:  06:17 Securing Domain Admin Accounts 09:09 Proactive Employee Security Monitoring 12:19 "Protecting Human Attack Surfaces" 16:48 "Enhancing Cybersecurity with Open Source Intelligence” 18:49 Exposed Data Response Process Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: [email protected]  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at [email protected]   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    24:25

Fler podcasts i Näringsliv

Om @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast-webbplats

Lyssna på @BEERISAC: OT/ICS Security Podcast Playlist, Kort & Lång – analyspodden från Di och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner
Sociala nätverk
v7.23.11 | © 2007-2025 radio.de GmbH
Generated: 11/11/2025 - 12:27:36 PM