PoddsändningarNäringsliv@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Senaste avsnittet

601 avsnitt

  • @BEERISAC: OT/ICS Security Podcast Playlist

    Safe AI Automation for Cybersecurity: Practical Workflows Without the Risk

    2026-03-05 | 15 min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: Safe AI Automation for Cybersecurity: Practical Workflows Without the Risk
    Pub date: 2026-03-02

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    AI can accelerate cybersecurity - or accidentally expose it.

    In this solo episode of Protect It All, host Aaron Crow breaks down how cybersecurity professionals can safely integrate AI into their IT and OT workflows. As tools like ChatGPT, Copilot, and enterprise AI platforms become part of daily operations, the question isn’t whether to use AI - it’s how to use it responsibly.

    Aaron moves beyond buzzwords to focus on practical, everyday applications: automating reports, summarizing threat intelligence, drafting policies, enhancing documentation, and streamlining repetitive tasks. At the same time, he tackles the real concerns leaders face - data privacy, compliance, policy alignment, and shadow AI risks.

    You’ll learn:

    Where AI delivers immediate value in cybersecurity workflows

    How to automate without exposing proprietary or regulated data

    The difference between enterprise AI tools and public platforms

    How to align AI usage with corporate security policies

    Practical ways CISOs and analysts can boost productivity safely

    Why governance and awareness matter as much as innovation

    Whether you’re leading a security program or working hands-on in IT or OT environments, this episode delivers actionable strategies to use AI smarter—not riskier.

    Tune in to learn how to automate with confidence and stay ahead of the curve—only on Protect It All.

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast

     

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    4/4 Desenlace de Orquestando de la seguridad OT

    2026-03-04 | 11 min.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 4/4 Desenlace de Orquestando de la seguridad OT
    Pub date: 2026-03-02

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    En este episodio se exploran las capacidades futuras que necesitarán los responsables de ciberseguridad OT para orquestar y no solo reaccionar. Analiza cómo convertir NIS2 e IEC 62443 en motores de madurez y no en una carga. Propone el primer paso realista para avanzar hacia la orquestación de la seguridad OT.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    OT Security/business resilience, lack of incentives for securing software & the news - Ben Worthy - ESW #448

    2026-03-04 | 1 h 54 min.
    Podcast: Security Weekly Podcast Network (Audio) (LS 47 · TOP 1% what is this?)
    Episode: OT Security/business resilience, lack of incentives for securing software & the news - Ben Worthy - ESW #448
    Pub date: 2026-03-02

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Interview - Ben Worthy from Airbus Protect The current state of OT security and business resilience
    In this episode of Enterprise Security Weekly, we sit down with Ben Worthy, OT Security Specialist at Airbus Protect, to explore the evolving landscape of business resilience in safety-critical sectors. With over 25 years of experience across aerospace, nuclear, water, oil & gas, and other industries, Ben shares insights on how organizations are adapting to the surge in disruptive cyberattacks—from ransomware targeting operational technology to GPS spoofing and supply chain incidents. We discuss major cases including the Boeing/LockBit ransom demand, the Jaguar Land Rover production shutdown, and the SITA passenger data breach, examining how aviation and other critical infrastructure sectors are separating safety risk from business continuity risk.
    Ben also breaks down the regulatory changes reshaping the industry, including EASA's October 2025 and February 2026 deadlines that tie cyber assurance directly to safety oversight, and what ENISA's latest numbers reveal about hacktivism and ransomware trends. Whether you're in aviation, nuclear, or any safety-critical sector, this conversation offers practical lessons on building resilience that keeps operations moving while addressing threats in real time.
    This segment is sponsored by Airbus Protect. Visit https://securityweekly.com/airbusprotect to learn more about them!
    Topic: Where are the business incentives to build secure products and software? "It's the right thing to do," so of course businesses will make their products secure, right? Well, it turns out that breaches and vulnerabilities don't traditionally hurt financial performance all that much. Stocks recover, insurance covers the bulks of the losses, fines are paid, and lawsuits are settled. Most businesses can comfortably absorb the impact, so the threat of reputational harm or financial losses just aren't slowing them down.
    In the case of Ivanti, where the reputational harm was extreme, the company's companies continue to get hacked as critical vulnerabilities keep getting discovered in their products.
    https://www.bloomberg.com/news/features/2026-02-19/vpn-used-by-us-government-failed-to-stop-china-state-sponsored-hackers
    In this topic segment, we don't aim to provide solutions to this problem, just the awareness that ethics, doing the right thing, and even signing the Secure by Design pledge don't seem to be enough to change vendor behavior when it comes to securing products.
    The Weekly Enterprise Security News Finally, in the enterprise security news,
    RSA Innovation Sandbox hot takes
    Did AI solve cyber?
    fundings and acquisitions
    a free app to warn you about smart glasses
    deep thoughts about OpenClaw
    replacing US tech with EU equivalents is hard
    should you turn off dependabot?
    accidentally taking over 7000 robot vacuums
    the director of AI Safety at Meta loses her email somehow
    should you go back to using a blackberry?
    All that and more, on this episode of Enterprise Security Weekly.
    Visit https://www.securityweekly.com/esw for all the latest episodes!
    Show Notes: https://securityweekly.com/esw-448

    The podcast and artwork embedded on this page are from Security Weekly Productions, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Dan Gunter on Creating Malicious OT Test Data to Train Security Tools

    2026-03-02 | 27 min.
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Dan Gunter on Creating Malicious OT Test Data to Train Security Tools
    Pub date: 2026-03-01

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Insane Cyber CEO and founder Dan Gunter joins the Nexus Podcast in an episode recorded live at the S4 Conference in Miami. Dan explains a process for generating malicous OT data in order to test the efficacy of an organization's intrusion detection and other security products. Generating such data has its barriers, but it's crucial, he said, in order to train products and security analysts how to spot malicious and anomalous traffic. Dan talks about using emulators and achieving success on a relatively small budget. 
    Subscribe and listen to the Nexus Podcast here. 

    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    From NIST to Nation-State: Securing Embedded Systems through Compliance and Trust

    2026-03-02 | 32 min.
    Podcast: Exploited: The Cyber Truth
    Episode: From NIST to Nation-State: Securing Embedded Systems through Compliance and Trust
    Pub date: 2026-02-26

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Cordell Robinson, CEO of Brownstone Consulting, to explore how security frameworks like NIST 800-53 are evolving from paperwork exercises into real drivers of security maturity.

    From continuous monitoring and secure-by-design development to Software Bills of Materials (SBOMs) and vulnerability transparency, the conversation examines what it takes to build trust in embedded and operational technology (OT) systems, especially as regulators sharpen their focus and nation-state threats grow more sophisticated.

    Together, they explore:

    Why compliance should cover people, processes, and technology—not just policies
    How NIST frameworks are shifting from checklists to operational rigor
    The growing importance of SBOMs in supply chain transparency
    How AI is reshaping both cyber defense and attacker capability
    What new regulatory pressure (including the EU Cyber Resilience Act) means for manufacturers

    Whether you build embedded systems, ship software to government agencies, or manage critical infrastructure, this episode offers practical insight into building compliance programs that strengthen security and earn trust.

    The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Fler podcasts i Näringsliv

Om @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast-webbplats

Lyssna på @BEERISAC: OT/ICS Security Podcast Playlist, Framgångspodden och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner
Sociala nätverk
v8.7.2 | © 2007-2026 radio.de GmbH
Generated: 3/6/2026 - 6:39:42 AM