Powered by RND
PodcastsEconomía y empresa@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Último episodio

Episodios disponibles

5 de 453
  • Open Source Intelligence Exposed: How Hackers Use Public Data to Target People, Passwords, and Critical Systems
    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Open Source Intelligence Exposed: How Hackers Use Public Data to Target People, Passwords, and Critical SystemsPub date: 2025-11-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThink your company’s private data is safe? Think again. In this episode of Protect It All, host Aaron Crow pulls back the curtain on one of cybersecurity’s most underestimated frontiers - Open Source Intelligence. He reveals how attackers leverage publicly available data from LinkedIn profiles to leak passwords, mapping out targets, infiltrating systems, and exploiting the human attack surface. Drawing from real-world incidents and years of experience across IT and OT security, Aaron explains: How Open Source Intelligence fuels social engineering and insider threat campaigns. Why protecting systems isn’t enough - you must protect people. How to use Open Source Intelligence proactively for threat modeling and risk mitigation. Steps to monitor your digital footprint and reduce exposure before it’s too late. Whether you’re a cybersecurity professional, executive, or simply digital-curious, this episode will change how you think about “public information.” Tune in to learn how Open Source Intelligence can both expose and empower your cybersecurity strategy - only on Protect It All. Key Moments:  06:17 Securing Domain Admin Accounts 09:09 Proactive Employee Security Monitoring 12:19 "Protecting Human Attack Surfaces" 16:48 "Enhancing Cybersecurity with Open Source Intelligence” 18:49 Exposed Data Response Process Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: [email protected]  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at [email protected]   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    24:25
  • 2/4 Análisis del Gobierno y Gestión de la Ciberseguridad Industrial
    Podcast: Casos de Ciberseguridad IndustrialEpisode: 2/4 Análisis del Gobierno y Gestión de la Ciberseguridad IndustrialPub date: 2025-11-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se profundiza en los niveles de responsabilidad en la ciberseguridad industrial, analizando dónde se producen más desviaciones, cómo se manifiestan los desequilibrios entre gobierno y gestión en las organizaciones actuales, y el rol clave del ICSO como puente entre estrategia y operación para alinear a todos los actores implicados en la protección […]The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    12:48
  • Mark Korman Chief Legal & Strategy Officer @Critical-Impact about cyber crises aspects to consider
    Podcast: ICS Cyber Talks PodcastEpisode: Mark Korman Chief Legal & Strategy Officer @Critical-Impact about cyber crises aspects to considerPub date: 2025-10-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPrevention tools are essential, but have their limits; no one can prevent every breach. Readiness determines how quickly and effectively you regain control once it happens. Tabletop exercises, crisis playbooks, and decision-making drills are the true differentiators. Nachshon Pincu hosts Mark Korman, Chief Legal and Strategy Officer at Critical-Impact, an incident response company, in a conversation about cyber crisis Investing in Readiness, Not Just Prevention The Paradox: Tech Is Better, Attacks Are Worse, and the AI game changer for good and for bad Data Leaks and Privacy with the 13th Amendment and moreThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    48:28
  • Dispelling IT/OT Convergence Challenges and Myths
    Podcast: Industrial Cybersecurity InsiderEpisode: Dispelling IT/OT Convergence Challenges and MythsPub date: 2025-10-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig and Dino tackle IT/OT convergence, operational technology security, and manufacturing cybersecurity challenges head-on. They challenge the notion of OT being a "shadow IT group" and explore the fundamental differences between IT and OT operations in industrial environments. The discussion emphasizes that OT focuses on safety and physical outcomes, while IT prioritizes data security. They stress the importance of collaboration between IT and OT teams, highlighting how system integrators, OEMs, and plant operators must work together to improve cybersecurity posture. The conversation covers practical issues like Overall Equipment Effectiveness (OEE), incident response, and the need for proper funding and governance. Both advocate for CISOs and CIOs to actively engage with OT teams and system integrators, visit manufacturing facilities, and understand the unique challenges of industrial control systems to achieve true convergence and protect manufacturing plants and critical infrastructure.Chapters:00:00:00 - Opening Shot: Who’s Really in Charge—CIOs or the Plant Floor?00:00:57 - Collision Course: IT and OT Can’t Keep Dodging Each Other00:01:52 - Two Worlds, One Mission: Why OT Isn’t Just “IT in a Hard Hat”00:04:07 - When Convergence Fails: What’s Missing in the Middle00:05:54 - Breaking Silos: Why Cybersecurity Demands True Collaboration00:08:22 - Real Talk: What Cyber Protection Looks Like on the Plant Floor00:10:46 - OT’s Tipping Point: Will the Next Move Come from IT, or the Shop Floor?00:17:32 - Your Move: What Leaders Must Do Next (Before It’s Too Late)Links And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    22:21
  • EP 74: Turning Surveillance Cameras on their Axis
    Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 74: Turning Surveillance Cameras on their AxisPub date: 2025-10-28Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAt Black Hat USA 2025, Noam Moshe from Claroty’s Team 82 revealed several vulnerabilities in Axis Communications’ IP camera systems, including a deserialization flaw that could let attackers run remote code. The team worked with Axis to patch the issues. Moshe says that this case highlights the broader security risks still common in the billions of common IoT devices in the world today.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    28:36

Más podcasts de Economía y empresa

Acerca de @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Sitio web del podcast

Escucha @BEERISAC: OT/ICS Security Podcast Playlist, IQ POTENCIADO y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app
Aplicaciones
Redes sociales
v7.23.11 | © 2007-2025 radio.de GmbH
Generated: 11/7/2025 - 3:18:11 PM