Powered by RND
PodcastsTecnología@BEERISAC: OT/ICS Security Podcast Playlist
Escucha @BEERISAC: OT/ICS Security Podcast Playlist en la aplicación
Escucha @BEERISAC: OT/ICS Security Podcast Playlist en la aplicación
(898)(249 730)
Favoritos
Despertador
Sleep timer

@BEERISAC: OT/ICS Security Podcast Playlist

Podcast @BEERISAC: OT/ICS Security Podcast Playlist
Anton Shipulin / Listen Notes
A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin ...

Episodios disponibles

5 de 300
  • Special, Special, Special Guest – Marco Ayala
    Podcast: HOU.SEC.CAST.Episode: Special, Special, Special Guest – Marco AyalaPub date: 2025-02-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMichael and Sam are gearing up for OT.SEC.CON. with keynote speaker, Marco Ayala! Marco is an ISA Fellow, and President of InfraGard Houston with over 30 years of experience in industrial automation controls and OT/IT security. They chat about some exciting OT Cybersecurity initiatives in Texas, the incident that led him to cybersecurity, and what to expect at his talk in April. Things Mentioned:·      Governor Abbott Announces Texas Cyber Command An Emergency Item - https://gov.texas.gov/news/post/governor-abbott-announces-texas-cyber-command-an-emergency-item·      Marco’s Talk at S4: Normalization of Deviance - https://youtu.be/u1xmyJmGsS0?si=UrSlqVVfvyasvz68·      Marco’s panel at OTCEP in Singapore - https://www.linkedin.com/pulse/2023-otcep-embracing-new-perspectives-strengthening-ayala/?trackingId=OyeuSlWZQBSNUKgxBl%2BZmQ%3D%3DDo you have a question for the hosts? Reach out to us at [email protected] Keep up with HOU.SEC.CON:·      LinkedIn·      Twitter·      Facebook·      Instagram·      YouTube·      BlueskyCheck out our other show:·      CyberSundayCheck out our Conferences and Events:·      HOU.SEC.CON.·      OT.SEC.CON.·      EXEC.SEC.CON.·      HSC User Group Support or apply to our Scholarship Program:·      TAB Cyber Foundation In this episode:·      Host: Michael Farnum·      Host: Sam Van Ryder·      Guest: Marco Ayala·      Production and editing: Lauren Lynch·      Music by: August HoneyThe podcast and artwork embedded on this page are from Michael Farnum and Sam Van Ryder, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    31:01
  • How to Secure OT Environments Without Disruptions with Dan Cartmill, TXOne Networks
    Podcast: Industrial Cybersecurity InsiderEpisode: How to Secure OT Environments Without Disruptions with Dan Cartmill, TXOne NetworksPub date: 2025-02-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe cybersecurity challenges of industrial environments are unique and complex, requiring a shift in mindset from traditional IT security strategies. Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, joins Dino Busalachi for this episode. They discuss the critical divide between IT and OT security, why collaboration is essential, and how organizations can take the first steps toward securing their industrial control systems (ICS). Drawing from his experience in the Royal Australian Navy, IT security, and product marketing, Dan shares key insights on the operational risks of cybersecurity tools, the importance of ownership in security decisions, and why companies must move beyond fear-based approaches to focus on practical, incremental solutions. If your organization struggles with securing legacy systems, aligning IT and OT teams, or justifying cybersecurity investments, this episode offers real-world strategies and actionable takeaways.Chapters:00:00:00 - The First Step to Securing OT: Why You Can’t Afford to Wait00:01:00 - Meet Dino and Dan: A Conversation on Industrial Cybersecurity00:01:51 - From the Navy to Cybersecurity: Dan’s Journey into Protecting Industrial Systems00:05:30 - The Biggest Cybersecurity Challenges Facing Industrial Environments Today00:09:00 - IT vs. OT: Who Owns Cybersecurity and Why It Matters00:14:01 - Breaking Down Silos: How Collaboration Can Make or Break Your Security Strategy00:22:35 - Cybersecurity is a Team Sport: How the Right Partners Can Make All the Difference00:25:00 - Think Globally, Act Locally: Why OT Security Must Be Customized for Each Plant00:29:15 - Who Owns OT Security? Why IT and OT Leaders Need a Unified Strategy00:33:00 - The Power of Collaboration: Bringing IT, OT, and Vendors to the Same Table00:36:10 - The Cost of Cybersecurity: Why Companies Struggle to Justify OT Security Investments00:38:45 - Legacy Systems & Cyber Risk: Why Ignoring the Problem is Not an Option00:40:53 - The Takeaway: Why Action Beats Perfection in OT SecurityLinks And Resources:Dan Cartmill on LinkedInTXOne NetworksDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Velta Technology, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    41:41
  • 126: Shifting Left: Why Secure Software Starts at the Design Stage
    Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: 126: Shifting Left: Why Secure Software Starts at the Design StagePub date: 2025-02-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of the (CS)²AI Podcast, host Derek Harp welcomes Mehdi Tarratt Miracorley, Associate Professor at the University of Hawaii and cybersecurity expert, to discuss Secure by Design—a fundamental shift in how we develop and deploy software in industrial control systems (ICS) and operational technology (OT). With over 15 years of R&D experience for DARPA, the Air Force, and DHS, Mehdi shares why modern software is inherently vulnerable and how we can learn from aviation, medical, and safety-critical industries to build resilient systems from the ground up.The conversation dives deep into the risks of insecure by design software, the challenges of implementing true security practices, and the role of government policies in shifting liability from users to vendors. Mehdi explains the importance of threat modeling, attack surface analysis, and secure architecture frameworks to mitigate cyber threats before they arise. He also highlights how software development must evolve beyond rapid deployment cycles to integrate security as a core design principle.If you’re an ICS professional, cybersecurity engineer, or software developer, this episode provides actionable insights on reducing vulnerabilities at scale, implementing proactive security measures, and preparing for the future of cyber threats. Subscribe now and stay ahead in the ever-evolving world of industrial cybersecurity!The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    35:00
  • Protecting Critical Infrastructure for Rural Electric Cooperatives
    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Protecting Critical Infrastructure for Rural Electric CooperativesPub date: 2025-02-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationBryson is joined by Carter Manucy, Director of Cybersecurity at the National Rural Electric Cooperative Association to discuss rural electric cooperatives, the importance of collaboration, and the state of cybersecurity in the energy sector. With over two decades of experience in the sector, Carter was recently awarded E-ISAC’s prestigious Michael J. Assante Award for his leadership on initiatives to protect the grid and electric co-ops. How are cooperatives fostering a stronger cybersecurity culture? What are the unique challenges faced by rural electric cooperatives in the cybersecurity landscape? And what does Carter see in his crystal ball for the future of cybersecurity in the energy sector?“I think as a country, we’ve really got to pull together or else we're going to be behind the eight ball in a few years, and that could really look bad for everybody...power runs all of our lives,” Carter said. “If I had that magic wand, I think I would get rid of a lot of the politics that are there so that we can focus on getting funding to help in the areas that it really is needed, and move that needle forward.” Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    31:09
  • Bridging the Gap: IT vs. OT Challenges and Solutions in Cybersecurity with Chris Robertson
    Podcast: PrOTect It All (LS 25 · TOP 10% what is this?)Episode: Bridging the Gap: IT vs. OT Challenges and Solutions in Cybersecurity with Chris RobertsonPub date: 2025-02-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow welcomes Chris Robertson, CISO at Apogee Defense, to discuss the evolving landscape of cybersecurity, focusing on the distinction and strategy behind Virtual CISO (vCSO) roles.  Chris shares insights from his dual roles at Apogee Defense and as a virtual chief security officer for various companies. The conversation dives into the intricacies and responsibilities of vCSOs, the importance of understanding IT and OT risks, and the necessity of integrating cybersecurity deeply into business practices.  Chris and Aaron explore practical solutions for businesses, emphasizing adaptability and continuous improvement in security measures, drawing parallels between accounting a century ago and cybersecurity today.  They also touch on future trends, the impact of AI on security, and the importance of setting aside egos to foster a culture of learning and collaboration.  Join them as they navigate the challenges and opportunities at the intersection of IT and OT cybersecurity, offering actionable advice and anecdotes from their extensive experience in the field. Key Moments:  00:00 Outsourcing Risk Management Expertise 08:22 Hiring External Experts: Cost-Effective Strategy 12:04 Understanding OT Risks in Cyber Leadership 20:36 MBA Curriculum Needs Security Focus 23:31 Integrating Security in Legacy Systems 27:47 Tech Efficiency and Shadow IT Challenges 35:56 Optimizing Inefficient Appointment Systems 39:08 Bridging Tech and Business Worlds 45:43 Simplifying Risk Communication 51:52 Joe Rogan's Impact and Risks 57:09 AI Evolution: Professionals Riding the Wave 01:05:53 "Embrace Vulnerability, Seek Help" About the guest :  Chris Robertson is a seasoned cybersecurity expert, currently serving as the Chief Information Security Officer (CISO) at Apogee Defense. In addition to this role, Chris extends his expertise as a virtual CISO for various companies across multiple sectors. He specializes in implementing robust security solutions that Apogee Defense delivers to its clients, predominantly within the Small and Medium Business (SMB) space.  With a keen focus on the defense industrial base, Chris's work also spans various other industries, enabling businesses to strengthen their cybersecurity frameworks. He is highly regarded in the industry for facilitating vital connections and contributing to advancing cybersecurity practices. How to connect Chris: https://www.linkedin.com/in/christophersrobertson/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: [email protected]  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at [email protected] Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    1:07:40

Más podcasts de Tecnología

Acerca de @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Sitio web del podcast

Escucha @BEERISAC: OT/ICS Security Podcast Playlist, Big Data e Inteligencia Artificial y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app
Aplicaciones
Redes sociales
v7.6.0 | © 2007-2025 radio.de GmbH
Generated: 2/10/2025 - 6:55:33 AM