PoddsändningarNäringsliv@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Senaste avsnittet

679 avsnitt

  • @BEERISAC: OT/ICS Security Podcast Playlist

    EP 86: The Trusted Channel: AT Command Exploits and Cellular IoT Security

    2026-05-15 | 32 min.
    Podcast: Error Code (LS 27 · TOP 10% what is this?)
    Episode: EP 86: The Trusted Channel: AT Command Exploits and Cellular IoT Security
    Pub date: 2026-05-12

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Cellular modules in your IoT devices are trusted and that trust can be an insecure  pivot point into your network for attackers. Deral Heiland, Principal Security Research for IoT at Rapid 7 discusses his presentation at RSAC 2026 on AT command exploits and supply chain risk.

    The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Das digitale Nervensystem: Warum Gebäudeautomation echte OT ist | OT Security Made Simple

    2026-05-15 | 26 min.
    Podcast: OT Security Made Simple
    Episode: Das digitale Nervensystem: Warum Gebäudeautomation echte OT ist | OT Security Made Simple
    Pub date: 2026-05-12

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Klaus Mochalski und Tim Bauer (ak-itsga) diskutieren den blinden Fleck in Smart Buildings. Erfahren Sie, warum Gebäudeautomation knallharte OT ist, weshalb die Branche der Industrie-Security um Jahre hinterherhinkt und warum Auftraggeber das Thema ab sofort zwingend in ihre Lastenhefte schreiben müssen.
    Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an [email protected].  

    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Policy Pulse: Regulatory Roundtable - Cyber Strategy, Large Loads, AI & CISA in Flux

    2026-05-14 | 1 h
    Podcast: Critical Assets Podcast
    Episode: Policy Pulse: Regulatory Roundtable - Cyber Strategy, Large Loads, AI & CISA in Flux
    Pub date: 2026-05-11

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Patrick Miller reconvenes with Joy Ditto (Joy Ditto Consulting) and Earl Shockley (INPOWERD) for a tour of the past two months in critical infrastructure policy. The episode opens on the administration's new National Cybersecurity Strategy and its six pillars, with focus on the openly offensive "shape adversary behavior" posture and the asymmetric risk it creates for asset owners likely to absorb retaliation.
    The panel then digs into the pressures reshaping the bulk electric system: data center designation, cloud-hosted control centers running NERC standards while the underlying compute is unregulated, and the physics of computational loads that behave nothing like traditional load. Earl walks through the recent NERC Level 3 alert on large load connections, an unusually serious signal that industry processes are behind.
    The discussion also covers April infrastructure executive orders that release funding but ignore cybersecurity, hyperscalers displacing utilities as the top buyers of bulk electrical equipment, the multi-agency zero trust in OT guidance, and CISA's leadership uncertainty after Sean Plankey withdrew his nomination. On the AI front, the group unpacks what Anthropic's Mythos and the Glasswing response mean for vulnerability discovery at scale, and why no OT vendors are on the Glasswing list.
    Closing thoughts include Joy's note on satellite cybersecurity and a rare bipartisan Senate trip to China, Earl's emphasis that computational load is now an enterprise governance issue rather than a technical one, and Patrick's plea to stop making the adversary's job easy.
    Topics covered
    The new National Cybersecurity Strategy and its six pillars
    Offensive cyber posture and the asymmetric risk to asset owners
    Data center designation as critical infrastructure
    Cloud control centers and the NERC 100-series standards
    Computational load, grid stability, and loss of system inertia
    NERC Level 3 alert on large load connections
    April infrastructure executive orders and the missing cyber language
    Supply chain shifts and hyperscalers as the top equipment buyers
    Zero trust principles for OT environments
    CISA Fortify guidance and CISA's current leadership status
    Anthropic's Mythos, the Glasswing response, and the OT vendor gap
    Satellite cybersecurity and bipartisan engagement on China policy
    Basic hygiene: get exposed devices off the internet

    The podcast and artwork embedded on this page are from Patrick Miller, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    AI Agents & Cybersecurity: Identity, Compliance, and the New Risks Facing IT and OT

    2026-05-13 | 1 h 6 min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: AI Agents & Cybersecurity: Identity, Compliance, and the New Risks Facing IT and OT
    Pub date: 2026-05-11

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    AI agents are changing cybersecurity faster than most organizations can adapt.

    In this episode of Protect It All, host Aaron Crow welcomes back cybersecurity veteran Ken Foster for a deep dive into how AI is reshaping risk, identity, and resilience across IT and OT environments.

    With more than 30 years of experience spanning the Navy, manufacturing, fintech, government programs, and startups, Ken brings a grounded, real-world perspective on what organizations are getting right and dangerously wrong about AI adoption.

    Together, Aaron and Ken explore the growing challenges around AI agents, identity governance, shadow AI, compliance, and attribution in highly regulated industries. As AI tools become embedded into workflows and decision-making, organizations must rethink how they manage access, monitor activity, and maintain resilience against rapidly evolving threats.

    You’ll learn:

    Why AI agents introduce new identity and governance risks

    The dangers of shadow AI inside enterprise environments

    How AI impacts compliance, attribution, and accountability

    Why foundational practices like patching, segmentation, and documentation still matter

    The role of continuous monitoring in AI-driven environments

    How organizations can balance innovation with resilience and control

    Whether you’re leading cybersecurity strategy, managing critical infrastructure, or navigating AI adoption inside regulated environments, this episode delivers practical insights for securing the next generation of digital operations.

    Tune in to learn how AI is transforming cybersecurity - and what leaders must do to stay ahead - only on Protect It All.

    Key Moments: 

    07:47 AI guardrails discussion

    12:02 Patching and network segmentation

    20:44 AI changing job roles

    24:24 FISMA and FedRAMP concerns

    29:18 Emergency response planning

    35:36 Choosing the right tech team

    37:14 Discussing accountability and risk

    46:31 Developer access problems

    51:50 AI Dependence Risks

    57:36 AI in pen testing

    58:55 AI in risk prevention

    About the guest :

    Ken Foster is a veteran cybersecurity leader with 25+ years of experience in enterprise security, risk governance, and global infrastructure strategy. Currently Head of Global Architecture at Adient, Ken has previously led cybersecurity and compliance programs at Fleetcor and Fiserv, specializing in IAM, cloud security, regulatory compliance, and risk-based cybersecurity strategy. He is known for helping organizations balance innovation, resilience, and operational execution in highly regulated environments.

    How to connect Ken: http://linkedin.com/in/kennethfoster/

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast

     

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    2/4 Análisis de la Resiliencia Colectiva en el Sector Ferroviario

    2026-05-13 | 11 min.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 2/4 Análisis de la Resiliencia Colectiva en el Sector Ferroviario
    Pub date: 2026-05-11

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    En este episodio se analiza los riesgos sistémicos derivados de la disparidad en la madurez de ciberseguridad entre operadores, fabricantes y proveedores. Se examina el impacto de las brechas regulatorias en la cadena de suministro y se evalúan las prácticas europeas de cooperación, intercambio de inteligencia y armonización normativa como pilares para alcanzar una resiliencia […]

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Fler podcasts i Näringsliv
Om @BEERISAC: OT/ICS Security Podcast Playlist
A curated playlist of Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity podcast episodes in any language, compiled by ICS security enthusiasts. Missing something? Contact Anton Shipulin on LinkedIn. Subscribe for updates!
Podcast-webbplats

Lyssna på @BEERISAC: OT/ICS Security Podcast Playlist, Börslunch och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner
Sociala nätverk
v6.9.1| © 2007-2026 radio.de GmbH
Generated: 5/15/2026 - 1:50:06 PM