PoddsändningarNäringsliv@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Senaste avsnittet

613 avsnitt

  • @BEERISAC: OT/ICS Security Podcast Playlist

    2/4 Análisis de Auditoría de seguridad en OT

    2026-03-17 | 14 min.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 2/4 Análisis de Auditoría de seguridad en OT
    Pub date: 2026-03-16

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    En este episodio se cuestiona si las organizaciones actuales auditan controles teóricos o su capacidad real de resistir incidentes industriales. Se explora la paradoja de las empresas que, a pesar de superar auditorías, siguen siendo frágiles ante amenazas, y se analiza el peso de la cultura de decisión frente a la arquitectura técnica.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Gus Serino on a Massachusetts Water Cybersecurity Collaborative

    2026-03-15 | 26 min.
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Gus Serino on a Massachusetts Water Cybersecurity Collaborative
    Pub date: 2026-03-15

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Gus Serino, President of I&C Secure, joins the Nexus Podcast to discuss the formation and evolution of an ongoing water utility cybersecurity collaborative that leans on a collective defense model to share resources and threat intelligence among six water & wastewater companies in the commonwealth. 
    Serino helped put together this coalition, and he explains how a feasibility study came together resulting in a shared grant that member utilities can use to improve their security programs. Gus talks about the origins of this collaborative and how other utilities can follow this model to improve cybersecurity in this struggling, resource-strapped critical infrastructure sector.
    Subscribe and listen to the Nexus Podcast here. 

    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Brass Tacks S2E06 – Fighting Cybercrime at Global Scale

    2026-03-15 | 27 min.
    Podcast: Fortinet Cybersecurity Podcast (LS 26 · TOP 10% what is this?)
    Episode: Brass Tacks S2E06 – Fighting Cybercrime at Global Scale
    Pub date: 2026-03-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Cybercrime runs like a business, fast, scalable, and hard to stop. Jürgen Stock, Former Secretary General INTERPOL, explains how criminal networks work, why basic cyber hygiene still blocks many attacks, and how police, companies, and governments must share data to keep pace as AI speeds crime up.

    Watch or listen to the episode, and read the blog to understand how cybercrime works at scale.

    https://www.youtube.com/watch?v=NOLgv_a2w6o

    The podcast and artwork embedded on this page are from Fortinet Cybersecurity Podcast, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The Hidden Cost of Siloed OT Security Tools

    2026-03-14 | 25 min.
    Podcast: Industrial Cybersecurity Insider
    Episode: The Hidden Cost of Siloed OT Security Tools
    Pub date: 2026-03-11

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    As we lookback, Craig and Dino tackle a critical disconnect in industrial cybersecurity: the failure to share OT security tool data with the people who actually need it.
    They explore why IT teams often purchase and deploy OT IDS platforms without engaging plant floor teams, system integrators, and OEMs who are actively working in manufacturing environments.
    The conversation reveals that 85% of data collected by these tools is meant for OT teams to act on, yet it rarely reaches them.
    They discuss the consequences of this siloed approach—including system integrators bringing their own tools to fill the gap—and provide practical advice on achieving true IT/OT convergence.
    The episode emphasizes the importance of working with partners who can "build the car" rather than just "sell the car," and challenges organizations to evaluate whether they're truly practicing IT/OT convergence or just paying lip service to it.
    Chapters:
    (00:00:00) - The Data Sharing Problem in OT Cybersecurity
    (00:01:00) - Why System Integrators Can't Access Security Tool Data
    (00:04:00) - Who's Keeping the Data and Why
    (00:08:00) - The IT/OT Oil and Water Problem
    (00:11:00) - When System Integrators Bring Their Own Tools
    (00:14:00) - Questions to Ask Your Cybersecurity Partners
    (00:17:00) - The Car Analogy: Buyers vs. Builders
    (00:19:00) - Who Asset Owners Really Trust
    (00:21:00) - The Three-Legged Stool of OT Security
    (00:23:00) - The Path to True IT/OT Convergence

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    AI Wrote the Code—Who Owns the Risk?

    2026-03-13 | 31 min.
    Podcast: Exploited: The Cyber Truth
    Episode: AI Wrote the Code—Who Owns the Risk?
    Pub date: 2026-03-12

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and embedded systems expert Jacob Beningo to explore how AI is changing the software development lifecycle for embedded and firmware teams.

    Together, they unpack the risks and responsibilities that come with AI-generated code. While AI can accelerate development and automate tedious tasks, it can also introduce defects, expand the attack surface, and create a dangerous illusion of completeness. Unlike human engineers, AI cannot explain intent, reason about long-term system behavior, or take accountability when systems fail.

    Joe and Jacob discuss how engineering teams can safely integrate AI into development workflows without sacrificing security, reliability, or accountability, especially in systems that must operate safely for years in the field.

    In this episode, they explore:

    Why AI-generated code can introduce hidden vulnerabilities and complexity
    The accountability challenge: who owns the risk when AI writes the code?
    How AI output should be treated as untrusted code by default
    Why rigorous testing, validation, and security reviews still matter
    Practical ways engineering teams can use AI responsibly in embedded development

    For engineers, security leaders, and product teams navigating AI adoption in embedded systems, this episode offers practical insights into how to move faster with AI without weakening trust in the systems you build.

    The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Fler podcasts i Näringsliv

Om @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast-webbplats

Lyssna på @BEERISAC: OT/ICS Security Podcast Playlist, RikaTillsammans | Om privatekonomi & rikedom i livet och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner
Sociala nätverk
v8.8.0 | © 2007-2026 radio.de GmbH
Generated: 3/17/2026 - 10:04:28 PM