PoddsändningarNäringsliv@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Senaste avsnittet

556 avsnitt

  • @BEERISAC: OT/ICS Security Podcast Playlist

    EP 79: Ignore OT Security At Your Own Peril

    2026-1-25 | 38 min.
    Podcast: Error Code (LS 27 · TOP 10% what is this?)
    Episode: EP 79: Ignore OT Security At Your Own Peril
    Pub date: 2026-01-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    The growing importance of OT security, highlighting overlooked risks in critical infrastructure, legacy systems, and supply chains. Through real-world examples, Eric Durr, Chief Product Officer at Tenable, shows why OT security differs from IT, emphasizing visibility, resilience, and risk prioritization to protect safety, operations, and business continuity.

     

    The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    NIS2 mit gesundem Menschenverstand umsetzen | OT Security Made Simple

    2026-1-24 | 26 min.
    Podcast: OT Security Made Simple
    Episode: NIS2 mit gesundem Menschenverstand umsetzen | OT Security Made Simple
    Pub date: 2026-01-20

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Klaus Kilvinger von Opexa Advisory zieht dem NIS2UmsuCG den Zahn und nimmt die Angst vor Überregulierung und Überforderung bei der Implementierung von NIS2. Er argumentiert, dass die Grundlagen in den meisten Unternehmen schon existieren und das Management des Cyberrisikos ein natürlicher Bestandteil des regulären Risikomanagements ist, für das die Geschäftsführung seit eh und je verantwortlich ist. 
    Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an [email protected].  

    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Bridging the IT/OT Divide in Oil & Gas

    2026-1-23 | 39 min.
    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)
    Episode: Bridging the IT/OT Divide in Oil & Gas
    Pub date: 2026-01-20

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Bryson Bort is joined by Dd Budiharto, Microsoft’s Customer Security Officer for the Oil, Gas, and Energy sectors, to share her experience bridging the IT/OT divide in the energy sector. Drawing on her background as a former CISO and industry veteran with decades of experience starting security programs at giants like Halliburton and Marathon Oil, Dd breaks down IT vs OT auditing, the cultural divide in oil and gas, and what cybersecurity looks like in the energy sector.   
    How did an early mistake involving a patch reboot change Dd's career forever? What is preventing private companies and the FBI from working together? Why is basic hygiene—like disabling terminated accounts—still the biggest "unsolved" problem in billion-dollar industries? 
    “If you want to upgrade your home, to modernize it, the foundation still needs to be fixed first,” Dd said. 
    Join us for this and more on this episode of Hack the Plan[e]t. 
    The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. 
    Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.

    The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security

    2026-1-22 | 30 min.
    Podcast: Industrial Cybersecurity Insider
    Episode: Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security
    Pub date: 2026-01-20

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    This compilation episode brings together the most critical insights from Industrial Cybersecurity Insider conversations about the fundamental challenges plaguing OT security implementation and management.
    Industry experts dissect why traditional IT security approaches fail catastrophically on the plant floor, revealing that the core issue isn't technology—it's ownership, collaboration, and understanding.
    From the dangers of deploying endpoint detection without vendor qualification to the millions lost in unplanned downtime, this episode exposes the gap between security theory and operational reality.
    Listeners will discover why cybersecurity tools are often shelfware, how the "have and have-not" world creates vulnerability gaps across manufacturing facilities, and what "left of boom" thinking means for preventing incidents before they happen.
    Featuring hard-won lessons about shutdown windows, cyber-informed engineering, and the critical importance of building relationships between IT teams and plant floor operations, this episode delivers actionable intelligence for CISOs, plant managers, and anyone responsible for securing industrial control systems.
    Chapters:
    (00:00:00) - Introduction: The Core Problem of Ownership in OT Security
    (00:01:45) - Why IT Security Approaches Fail on the Plant Floor
    (00:04:30) - The Cloud Analogy: Lessons for OT Implementation
    (00:07:15) - The Missing Conversation: Capital Plans and OEMs
    (00:10:20) - IT vs OT Networks: Different Purposes, Different Risks
    (00:13:35) - EDR in OT: The Aftermarket Parts Problem
    (00:16:10) - Cyber-Informed Engineering: Building Security into Design
    (00:19:45) - The Have and Have-Not World of Plant Security
    (00:23:20) - Left of Boom: Visibility Beyond Security
    (00:27:15) - Who Should Lead the OT Security Discussion

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Securing Remote Access in OT: Visibility, Segmentation, and What Compliance Misses

    2026-1-21 | 20 min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: Securing Remote Access in OT: Visibility, Segmentation, and What Compliance Misses
    Pub date: 2026-01-19

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Remote access is no longer optional in OT - but unmanaged connectivity is one of the fastest ways to lose control of critical systems.

    In this episode of Protect It All, host Aaron Crow breaks down the real challenges of securing connectivity across IT and OT environments. As vendors, technicians, and support teams increasingly rely on remote access, many organizations struggle with poor visibility, legacy systems, and unclear network boundaries - creating unnecessary risk.

    Aaron walks through newly released secure connectivity guidance from CISA and the UK National Cyber Security Centre, translating an eight-point framework into practical, real-world steps that security and operations teams can actually implement.

    You’ll learn:

    Why remote access is one of the biggest OT risk multipliers

    How poor visibility creates blind spots attackers love

    Why asset inventory and documentation are foundational - not optional

    How segmentation and least-privilege design shrink the attack surface

    What compliance frameworks get right - and what they don’t

    Best practices for vendor access, MFA, session recording, and monitoring

    How to design secure connectivity without breaking operations

    Whether you’re responsible for OT security, managing vendors, or bridging IT and OT teams, this episode delivers actionable guidance to help you regain control of connectivity and protect critical infrastructure.

    Tune in to learn how to secure access without sacrificing operations - only on Protect It All.

    Key Moments: 

    01:11 "Secure Connectivity in OT"

    05:10 "Reducing Attack Surface Through Access Limits"

    10:02 "Control System Upgrade Failure Impact"

    12:00 Beyond Passwords: Strengthening Security

    17:16 "Strengthening Cybersecurity Basics"

    18:26 "Balancing Compliance and Security"

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast 

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Fler podcasts i Näringsliv

Om @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast-webbplats

Lyssna på @BEERISAC: OT/ICS Security Podcast Playlist, Börssurr med Mitelman och Mellqvist och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner
Sociala nätverk
v8.3.0 | © 2007-2026 radio.de GmbH
Generated: 1/25/2026 - 11:09:46 PM