

Cybersecurity Outlook 2026: the view from Interpol and the threat to 'OT'
2026-1-15 | 57 min.
Podcast: Radio Davos (LS 38 · TOP 2% what is this?)Episode: Cybersecurity Outlook 2026: the view from Interpol and the threat to 'OT'Pub date: 2026-01-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe Global Cybersecurity Outlook 2026 is an essential report on the state of cyber threats facing the world, and what can be done to tackle them. Akshay Joshi, head of the World Economic Forum's Centre for Cybersecurity joins as co-host as we speak to Interpol Director for Cybercrime Neal Jetton, and Robert Lee, CEO and co-founder of Dragos, a company that specialises in protecting 'OT' - the operational technology that companies rely on. Links: Global Cybersecurity Outlook 2026: https://www.weforum.org/publications/global-cybersecurity-outlook-2026/ Cybercrime Atlas: https://initiatives.weforum.org/cybercrime-atlas/home Centre for Cybersecurity: https://centres.weforum.org/centre-for-cybersecurity/home Partnership against Cybercrime: https://initiatives.weforum.org/partnership-against-cybercrime/home Interpol on cybercrime: https://www.interpol.int/en/Crimes/Cybercrime Dragos: https://www.dragos.com/ Related podcasts: Understanding today's cyber readiness risks: Key questions to stay ahead of the next attack: https://www.weforum.org/podcasts/meet-the-leader/episodes/cybersecurity-vinod-bange-baker-mckenzie/ Superpower rivalry and geopolitics in Trump 2.0: https://www.weforum.org/podcasts/radio-davos/episodes/geopolitics-lynn-kuok-the-national/ Global Cybersecurity Outlook 2025: the risks we all face and how to fight back: https://www.weforum.org/podcasts/radio-davos/episodes/cybersecurity-outlook-2025/ Check out all our podcasts on wef.ch/podcasts: YouTube: https://www.youtube.com/@wef Radio Davos - subscribe: https://pod.link/1504682164 Meet the Leader - subscribe: https://pod.link/1534915560 Agenda Dialogues - subscribe: https://pod.link/1574956552 The podcast and artwork embedded on this page are from World Economic Forum, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

From Controls to Control: The Governance Imperative in OT / Critical Infrastructure Cybersecurity
2026-1-14 | 25 min.
Podcast: CanadianSME Small Business PodcastEpisode: From Controls to Control: The Governance Imperative in OT / Critical Infrastructure CybersecurityPub date: 2026-01-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome to the CanadianSME Small Business Podcast, hosted by SK Uddin. Today we explore the world of Industrial Cybersecurity and how businesses can safeguard critical infrastructure in an increasingly connected environment.Our guest is Denrich Sananda, Managing Partner and Senior Consultant at Arista Cyber, a Harvard Business School alumnus and member of the ISA 62443 standard committee. Denrich and his team specialize in protecting Industrial Control Systems by ensuring cybersecurity, reliability, and uptime work in harmony.Key HighlightsGovernance & Standards: Denrich explains why frameworks like IEC 62443 and NIST CSF 2.0 are essential in OT environments. Leadership & Turnaround: He shares the key mindset shift that drove a major multi million euro corporate turnaround. Cybersecurity & Safety: Denrich breaks down how Arista Cyber unites cybersecurity, reliability, and functional safety. Resilience Roadmaps: He outlines layered security approaches like the Purdue Model and Industrial Threat Detection. Global Vision: Denrich discusses TÜV certification and Arista Cyber’s long term mission to protect global critical infrastructure.Special Thanks to Our Partners:UPS: https://solutions.ups.com/ca-beunstoppable.html?WT.mc_id=BUSMEWAGoogle: https://www.google.ca/A1 Global College: https://a1globalcollege.ca/ADP Canada: https://www.adp.ca/en.aspxFor more expert insights, visit www.canadiansme.ca and subscribe to the CanadianSME Small Business Magazine. Stay innovative, stay informed, and thrive in the digital age!Disclaimer: The information shared in this podcast is for general informational purposes only and should not be considered as direct financial or business advice. Always consult with a qualified professional for advice specific to your situation.The podcast and artwork embedded on this page are from SK Uddin, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

EP257 Beyond the 'Kaboom': What Actually Breaks When OT Meets the Cloud?
2026-1-14 | 27 min.
Podcast: Cloud Security Podcast by Google (LS 36 · TOP 2.5% what is this?)Episode: EP257 Beyond the 'Kaboom': What Actually Breaks When OT Meets the Cloud?Pub date: 2026-01-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationGuest: Chris Sistrunk, Technical Leader, OT Consulting, Mandiant Topics: When we hear "attacks on Operational Technology (OT)" some think of Stuxnet targeting PLCs or even backdoored pipeline control software plot in the 1980s. Is this space always so spectacular or are there less "kaboom" style attacks we are more concerned about in practice? Given the old "air-gapped" mindset of many OT environments, what are the most common security gaps or blind spots you see when organizations start to integrate cloud services for things like data analytics or remote monitoring? How is the shift to cloud connectivity - for things like data analytics, centralized management, and remote access - changing the security posture of these systems? What's a real-world example of a positive security outcome you've seen as a direct result of this cloud adoption? How do the Tactics, Techniques, and Procedures outlined in the MITRE ATT&CK for ICS framework change or evolve when attackers can leverage cloud-based reconnaissance and command-and-control infrastructure to target OT networks? Can you provide an example? OT environments are generating vast amounts of operational data. What is interesting for OT Detection and Response (D&R)? Resources: Video version Cybersecurity Forecast 2026 report by Google Complex, hybrid manufacturing needs strong security. Here's how CISOs can get it done blog "Security Guidance for Cloud-Enabled Hybrid Operational Technology Networks" paper by Google Cloud Office of the CISO DEF CON 23 - Chris Sistrunk - NSM 101 for ICS MITRE ATT&CK for ICS The podcast and artwork embedded on this page are from Anton Chuvakin, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

1/4 Contexto del Gobierno y Gestión de la Ciberseguridad Industrial
2026-1-13 | 13 min.
Podcast: Casos de Ciberseguridad IndustrialEpisode: 1/4 Contexto del Gobierno y Gestión de la Ciberseguridad IndustrialPub date: 2026-01-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se aborda cómo surge en Takasago la necesidad de explorar la telemetría del proceso como herramienta para identificar anomalías, diferenciando entre fallos técnicos y señales de posibles ciberataques. Participa Fernando Manuel Martínez García, Director Técnico, EHS y de Sistemas de la información en TAKASAGO (Europe).The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Small Business Cybersecurity: Practical Steps to Survive Big Threats on a Small Budget
2026-1-12 | 25 min.
Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: Small Business Cybersecurity: Practical Steps to Survive Big Threats on a Small BudgetPub date: 2026-01-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationSmall businesses aren’t too small to be targeted; they're often the first targets. In this episode of Protect It All, host Aaron Crow breaks down what cybersecurity really looks like for small and medium-sized businesses with limited resources. With nearly half of all cyberattacks aimed at SMBs and many companies never recovering, this episode focuses on what actually matters when budgets, time, and teams are tight. Aaron cuts through fear-based messaging and tool overload to share simple, affordable steps that can dramatically reduce risk without requiring a full security team or enterprise spend. You’ll learn: Why small businesses are prime cyber targets The most common mistakes that lead to catastrophic loss How basic policies and employee awareness stop most attacks Why multi-factor authentication, backups, and segmentation are non-negotiable How to prioritize cybersecurity when resources are limited Why resilience not perfection is the real goal Whether you’re a founder, business owner, or IT lead at a growing company, this episode gives you practical guidance you can act on immediately before a cyber incident forces your hand. Tune in to learn how to protect your business, your data, and your future only on Protect It All. Key Moments: 03:37 Cybersecurity Risks for Small Businesses 08:06 System Security and Backup Essentials 12:21 Cybersecurity: Prepare, Monitor, Survive 14:21 Efficient Device Monitoring Simplified 19:31 "Three-Two-One Backup Strategy" 20:20 "Planning Left of Bang" Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: [email protected] Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at [email protected] Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.



@BEERISAC: OT/ICS Security Podcast Playlist