PoddsändningarNäringsliv@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Senaste avsnittet

575 avsnitt

  • @BEERISAC: OT/ICS Security Podcast Playlist

    Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO view

    2026-2-09 | 45 min.
    Podcast: ICS Cyber Talks Podcast
    Episode: Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO view
    Pub date: 2026-02-04

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    ניהול סייבר הוא הרבה דברים שהם מעבר להגנה, היכולת לעבוד מול כלל הגורמים בחברה ממשתמשי הקצה בנושא מודעות סייבר, דרך יצירת מרחב עבודה ושיתוף פעולה של גורמי מקצוע האחרים כגון: ניהול סיכונים, המחלקה המשפטית, מערכות המידע והרשימה עוד ארוכה. כול זה עוד לפני הצורך לתת מענה להיבטים העסקיים ועבודה שוטפת מול הנהלה ודירקטוריון.

    הפעם בקשתי לפתוח את נושא ההנהלה בצורה רחבה יותר, מה קורה שאתה מקבל/לוקח עליך כסמנכ"ל את האחריות הניהולית למערכות המידע של החברה וכפל כפלים בחברה שהיא תשתיות קריטיות תחת רגולציות קשיחות.

    נחשון פינקו מארח את עידן פלק סמנכ"ל הסחר ומערכות המידע של קבוצת אורות אנרגיה בשיחה על ראיית המנהל לאחר שנתיים וחצי מאז שלקח על עצמו את האחריות למערכות המידע ללא שום ידע בתחום. ההתמודדות עם מלחמה שהאתרי הייצור של החברה הם מטרה ברורה לתקיפה פיזית וקיברנטית.

    ניהול סיכונים

    בנית צוות

    העבודה במסגרת ההנהלה הבכירה והדירקטוריון

    גיבוש תקציב תחת "שמיכה קצרה" וסדר עדיפויות

    ועוד

    Cyber management is about much more than just protection. It’s the ability to work with every entity in the company, from end-users on cyber awareness to creating a collaborative workspace with other professionals, such as risk management, legal, IT, and more. All of this is even before addressing business aspects and ongoing work with senior management and the Board of Directors

    This time, I wanted to explore the management aspect more broadly: what happens when you, as a VP, take on the administrative responsibility for the company's information systems, especially in a critical infrastructure company under strict regulation

    Nachshon Pincu hosts Idan Flek, VP Chief Commercial Officer and Information Systems at the Orot Energy Group, for a conversation from a manager's perspective, two and a half years after taking on IT responsibilities with no prior knowledge of the field. Dealing with a war where the company's production sites are clear targets for physical and cyber attacks

    Risk management

    Building a team

    Prioritizing cyber within senior management and the Board

    formulating a budget under a 'short blanket' and shifting priorities

    and more

    The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    131: OT Monitoring & SOC and Incident Response — Lessons from the Field with Cambios Academy

    2026-2-08 | 42 min.
    Podcast: (CS)²AI Podcast Show: Control System Cyber Security
    Episode: 131: OT Monitoring & SOC and Incident Response — Lessons from the Field with Cambios Academy
    Pub date: 2026-02-04

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In this episode of the (CS)²AI Podcast, host Derek Harp is joined by Jonathan Pollet, Marc Visser, and Bryan Singer for a deep-dive Q&A discussion following CS2AI’s January 21st community event on OT Monitoring, SOC operations, and Incident Response. Drawing on decades of hands-on experience across industrial environments worldwide, the panel expands on questions that couldn’t be fully addressed during the live sessions.
    The conversation explores why OT monitoring and SOC capabilities must come before incident response, and how poor network architecture, lack of visibility, and organizational silos continue to undermine response efforts when incidents occur. Jonathan outlines the architectural foundations required to support effective detection, response, and recovery, while Marc emphasizes the practical realities of implementing OT monitoring—from working with factory engineers to reducing alert fatigue and building usable SOC workflows.
    Bryan brings the incident responder’s perspective, sharing real-world insights from global OT incidents, including prolonged dwell times, ransomware impacts on production, and why organizations without proper segmentation and monitoring often experience the most severe and prolonged outages. The discussion also tackles common questions around Fusion SOCs vs. dedicated OT SOCs, the human challenges of translating OT data into actionable intelligence, and what asset owners should realistically expect from incident response retainers.
    This episode is a must-listen for OT practitioners, security leaders, and asset owners looking to move beyond theory and understand what actually works in the field. Whether you are just beginning your OT monitoring journey or refining mature SOC and IR capabilities, this discussion offers practical guidance rooted in real operational experience.

    The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    What’s going on with manufacturing OT security? | OT Security Made Simple

    2026-2-07 | 22 min.
    Podcast: OT Security Made Simple
    Episode: What’s going on with manufacturing OT security? | OT Security Made Simple
    Pub date: 2026-02-03

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    OT security researcher Ben Book takes an unapologetic view on the state of OT security in manufacturing. He doesn’t blame anybody but provides a clear analysis of business dynamics and offers what many lack when talking OT security solutions: the right questions. 

    You can find more information on OT Security Made Simple at rhebo.com or send us your ideas, questions, or guest suggestions at [email protected].

    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The IT-OT Knowledge Gap Costing Organizations Millions

    2026-2-06 | 22 min.
    Podcast: Industrial Cybersecurity Insider
    Episode: The IT-OT Knowledge Gap Costing Organizations Millions
    Pub date: 2026-02-03

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Dino sits down with Adeel Shaikh Muhammad, a Dubai-based cybersecurity expert and researcher with 16+ years in IT and OT security. They dive into why IT and OT teams still can't communicate effectively.
    The conversation reveals why most CISOs struggle to secure manufacturing environments. Adeel shares real-world insights from securing industrial systems across the Middle East, Africa, and Asia.
    They tackle the implementation gap in OT SOCs and why legacy systems remain vulnerable. The discussion covers third-party access risks, OEM warranty restrictions, and system integrator challenges.
    AI might finally solve IT-OT convergence by acting as a translator between these worlds. But first, organizations need to master the fundamentals: asset inventory, vulnerability management, and network segmentation.
    Most companies still haven't nailed these basics in their industrial environments. This conversation cuts through the hype to focus on what actually works.
    Chapters:
    (00:00:00) - 16 Years in Cybersecurity: Why CISOs Don't Know What a PLC Is
    (00:01:48) - Career Journey: From IT to OT Cybersecurity Focus
    (00:02:48) - Books on AI Transforming Security Operations Centers
    (00:04:44) - The Implementation Gap: Challenges Building OT SOCs
    (00:06:40) - The IT-OT Cultural Divide and Missing Communication
    (00:08:40) - Why the OT Ecosystem Must Proactively Bring Cybersecurity Tools
    (00:10:00) - Can IT-OT Convergence Actually Happen?
    (00:11:00) - AI as the Bridge: The Black Box Solution for IT-OT Communication
    (00:12:42) - Legacy Systems Reality: Windows 7 Running $5M Equipment
    (00:14:00) - OT Cybersecurity Conferences: S4, Intersec, and Rockwell Automation Fair
    (00:16:00) - Market Consolidation: Who's Been Acquired in OT Security
    (00:17:48) - Back to Basics: Asset Inventory, Vulnerabilities, and Network Segmentation
    (00:18:40) - Third-Party Access Control and OEM Warranty Restrictions
    (00:20:40) - Why We Can't Ignore Asset Inventory and Segmentation in OT Anymore

    Links And Resources:
    Adeel Shaikh Muhammad on LinkedIn
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    EP 80: The Dangers of White Label Devices

    2026-2-05 | 38 min.
    Podcast: Error Code (LS 27 · TOP 10% what is this?)
    Episode: EP 80: The Dangers of White Label Devices
    Pub date: 2026-02-03

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Many devices on modern networks aren’t what their labels claim. This episode, Rob King, Director of Applied Security Research at runZero, explores white-labeled surveillance and IoT hardware, why some vendors are banned by governments, and how hidden risks can spread across enterprises. Discovery, device fingerprinting, and protocol analysis reveal what’s really connected—and why knowing your true inventory is now essential for security, compliance, and trust.

    The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Fler podcasts i Näringsliv

Om @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast-webbplats

Lyssna på @BEERISAC: OT/ICS Security Podcast Playlist, Kort & Lång – analyspodden från Di och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner
Sociala nätverk
v8.5.0 | © 2007-2026 radio.de GmbH
Generated: 2/10/2026 - 3:27:47 AM