@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Podcast af Anton Shipulin / Listen Notes

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!

Begrænset tilbud

3 måneder kun 9,00 kr.

Derefter 99,00 kr. / månedIngen binding.

Kom i gang

Alle episoder

2118 episoder
episode Reflections from the Front Lines of Industrial Cyber Failures artwork
Reflections from the Front Lines of Industrial Cyber Failures

Podcast: Industrial Cybersecurity Insider [https://www.listennotes.com/podcasts/industrial-cybersecurity-insider-industrial-lkzZPU8EYci/] Episode: Reflections from the Front Lines of Industrial Cyber Failures [https://www.listennotes.com/e/f6ad70ba091d44608cae4b9c4b749571/] Pub date: 2025-06-12 Get Podcast Transcript → [https://www.listen411.com/?audio_url=https://audio.listennotes.com/e/p/f6ad70ba091d44608cae4b9c4b749571/¬es=Reflections from the Front Lines of Industrial Cyber Failures] powered by Listen411 [https://www.listen411.com/] - fast audio-to-text and summarization [https://cdn-images-3.listennotes.com/podcasts/industrial-cybersecurity-insider-velta-nPobcUYlNwM-lkzZPU8EYci.300x300.jpg] In this rewind episode, cybersecurity leaders revisit some of the hardest-hitting truths about protecting critical infrastructure in an increasingly converged IT/OT world. This conversation explores the disconnect between IT theory and OT reality, from the real-world fallout of the CrowdStrike disruption to the challenges of virtual patching, insider threats, and the cloud’s role on the plant floor. The discussion exposes how legacy systems, poor collaboration, alert fatigue, and vendor dependency continue to sabotage industrial cybersecurity. They discuss tactical strategies for improving, from asset inventory and patching hygiene to choosing the right partners and walking the plant floor. Chapters: * 00:00:00 - Cyber threats are moving faster than your patch cycle * 00:00:47 - Crowdstrike, Virtual Patching and Industrial OT Environments with Debbie Lay, TXOne Networks [https://industrial-cybersecurity-insider.captivate.fm/episode/with-senior-solutions-architect-of-txone-networks-debbie-lay/] * 00:07:48 - The #1 Myth Putting Your Industrial OT Assets at Risk [https://industrial-cybersecurity-insider.captivate.fm/episode/air-gapped-no-more-the-myth-thats-risking-your-ot-assets/] * 00:15:01 - Patch Management and Software Updates: IT versus OT [https://industrial-cybersecurity-insider.captivate.fm/episode/patching-and-updates-a-unified-approach-for-it-and-ot/] Links And Resources: * Industrial Cybersecurity Insider on LinkedIn [https://www.linkedin.com/company/industrial-cybersecurity-insider] * Cybersecurity & Digital Safety on LinkedIn [https://www.linkedin.com/groups/12450584/] * BW Design Group Cybersecurity [https://www.bwdesigngroup.com/sub-capability/cybersecurity] * Dino Busalachi on LinkedIn [https://www.linkedin.com/in/dinobusalachi/] * Craig Duckworth on LinkedIn [https://www.linkedin.com/in/craigaduckworth/] Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify [https://open.spotify.com/show/6y0fvWaYstCG604LYveckc], Apple Podcasts [https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546], and YouTube [https://www.youtube.com/@veltatechnology] to leave us a review! The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

I går - 21 min
episode Modern SCADA: ensuring safety, relevance and convenience artwork
Modern SCADA: ensuring safety, relevance and convenience

Podcast: Control Amplified: The Process Automation Podcast [https://www.listennotes.com/podcasts/control-amplified-the-process-automation-sG3a8Rbdri6/] (LS 25 · TOP 10% what is this? [https://www.listennotes.com/listen-score/]) Episode: Modern SCADA: ensuring safety, relevance and convenience [https://www.listennotes.com/e/be34e2ee587f479c9d44d9496c385375/] Pub date: 2025-06-11 Get Podcast Transcript → [https://www.listen411.com/?audio_url=https://audio.listennotes.com/e/p/be34e2ee587f479c9d44d9496c385375/¬es=Modern SCADA: ensuring safety, relevance and convenience] powered by Listen411 [https://www.listen411.com/] - fast audio-to-text and summarization [https://cdn-images-3.listennotes.com/podcasts/control-amplified-the-process-automation-8-j1TShWtuA-sG3a8Rbdri6.300x300.jpg] SCADA applications are responsible for far more than facilitating real-time process monitoring and alarm management. The process history they compile over time is critical to providing the data-driven insights that industry relies on when optimizing their systems to control costs, maximize uptime and increase the life of infrastructure. Modern SCADA systems must ensure data is safe, relevant and easily shareable with a company’s own team or third-party reporting solutions, business systems and artificial intelligence (AI) platforms. Control Amplified talked to Chris Little, media relations director, Trihedral Engineering, about straightforward principles to ensure that your SCADA data is ready to go to work. The podcast and artwork embedded on this page are from ControlGlobal, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

14. jun. 2025 - 13 min
episode EP 64: Volt Typhoon artwork
EP 64: Volt Typhoon

Podcast: Error Code [https://www.listennotes.com/podcasts/error-code-robert-vamosi-3BP9iDHMO65/] (LS 27 · TOP 10% what is this? [https://www.listennotes.com/listen-score/]) Episode: EP 64: Volt Typhoon [https://www.listennotes.com/e/829a5b2f19d247c1be5e18d5d7d686db/] Pub date: 2025-06-10 Get Podcast Transcript → [https://www.listen411.com/?audio_url=https://audio.listennotes.com/e/p/829a5b2f19d247c1be5e18d5d7d686db/¬es=EP 64: Volt Typhoon] powered by Listen411 [https://www.listen411.com/] - fast audio-to-text and summarization [https://cdn-images-3.listennotes.com/podcasts/error-code-robert-vamosi-G96HYb-qy0_-3BP9iDHMO65.300x300.jpg] While cybersecurity threats targeting critical infrastructure, particularly focusing on the vulnerabilities of operational technology (OT) and industrial control systems (ICS).mostly originate on the business or IT side, there’s increasing concern about attacks crossing into OT, which could result in catastrophic consequences, especially in centralized systems like utilities. Michael Welch,  managing director from MorganFranklin Cyber [https://mfcyber.com/], discusses how Volt Typhoon and other attacks are living off the land, and lying in wait. The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

13. jun. 2025 - 43 min
episode Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing World artwork
Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing World

Podcast: KBKAST [https://www.listennotes.com/podcasts/kbkast-kbimedia-_Q5NZMTR7Fq/] (LS 31 · TOP 5% what is this? [https://www.listennotes.com/listen-score/]) Episode: Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing World [https://www.listennotes.com/e/1ec1ab4262b74df7b7187f3de3c3106a/] Pub date: 2025-06-11 Get Podcast Transcript → [https://www.listen411.com/?audio_url=https://audio.listennotes.com/e/p/1ec1ab4262b74df7b7187f3de3c3106a/¬es=Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing World] powered by Listen411 [https://www.listen411.com/] - fast audio-to-text and summarization [https://cdn-images-3.listennotes.com/podcasts/kbkast-kbimedia-A3wDlkEsbLG-_Q5NZMTR7Fq.300x300.jpg] In this episode, we sit down with Imran Husain, Chief Information Security Officer at MillerKnoll, as he discusses the evolving landscape of cybersecurity threats in the manufacturing sector. Imran explores the challenges that arise as manufacturing increasingly integrates with online technologies and IoT, highlighting the unique vulnerabilities posed by legacy systems and operational technology (OT). He shares insights on high-profile incidents like the Norsk Hydro ransomware attack, emphasizing the importance of cyber resilience, data backup, and incident recovery. Imran also offers a candid look at why critical tasks like backing up data are often neglected, the complexities of securing aging infrastructure, and the need for creative solutions such as network segmentation and IT/OT convergence. A dedicated and trusted senior Cyber security professional, Imran Husain has over 22 years of Fortune 1000 experience that covers a broad array of domains which includes risk management, cloud security, SecDevOps, AI Security and OT Cyber practices. A critical, action-oriented leader Imran brings strategic and technical expertise with a proven ability to build cyber program to be proactive in their threat detection, identifying and engaging in critical areas to the business while upholding their security posture. He specializes in Manufacturing and Supply Chain Distribution focusing on how to best use security controls and processes to maximize coverage and reduce risk in a complex multi-faceted environment. A skilled communicator and change agent with bias to action who cultivates an environment of learning and creative thinking, Imran champions open communication and collaboration to empower and inspire teams to exceed in their respective cyber commitments. He is currently the Global Chief Information Security Officer (CISO) at MillerKnoll, a publicly traded American company that produces office furniture, equipment, and home furnishings. The podcast and artwork embedded on this page are from KBI.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

13. jun. 2025 - 41 min
episode Breaking In to Break Things: Practical Paths to Hardware Hacking and IoT Security artwork
Breaking In to Break Things: Practical Paths to Hardware Hacking and IoT Security

Podcast: IoT Security Podcast [https://www.listennotes.com/podcasts/iot-security-podcast-phosphorus-cybersecurity-fBmDv8uLkay/] (LS 24 · TOP 10% what is this? [https://www.listennotes.com/listen-score/]) Episode: Breaking In to Break Things: Practical Paths to Hardware Hacking and IoT Security [https://www.listennotes.com/e/0bf3c5999f844b64b20ab921ca1cda53/] Pub date: 2025-06-10 Get Podcast Transcript → [https://www.listen411.com/?audio_url=https://audio.listennotes.com/e/p/0bf3c5999f844b64b20ab921ca1cda53/¬es=Breaking In to Break Things: Practical Paths to Hardware Hacking and IoT Security] powered by Listen411 [https://www.listen411.com/] - fast audio-to-text and summarization [https://cdn-images-3.listennotes.com/podcasts/iot-security-podcast-phosphorus-cybersecurity-WOjuNQK67dR-fBmDv8uLkay.300x300.jpg] Hash Salehi, Reserve Engineer and Founder of RECESSIM, joins host Philip Wylie to demystify the world of hardware hacking and security, highlighting niche but critical vulnerability research in IoT and embedded devices. Through recounting his own experiences, from customizing low-cost fault injection attacks on automotive microprocessors to reverse engineering smart meters, Hash shares both successes and frustrations from the front lines of hands-on security assessment. The conversation aims to inspire and equip listeners who want to explore or deepen their understanding of hardware security by surfacing resources, communities, and the mindset necessary to uncover vulnerabilities beyond software. Links: http://www.recessim.com/ [http://www.recessim.com/] https://wiki.recessim.com/ [https://wiki.recessim.com/] https://www.youtube.com/c/RECESSIM [https://www.youtube.com/c/RECESSIM] Let’s connect about IoT Security! Follow Phillip Wylie at https://www.linkedin.com/in/phillipwylie [https://www.linkedin.com/in/phillipwylie] https://youtube.com/@phillipwylie [https://youtube.com/@phillipwylie] The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast [https://phosphorus.io/podcast] The podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

12. jun. 2025 - 33 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Begrænset tilbud

3 måneder kun 9,00 kr.

Derefter 99,00 kr. / månedIngen binding.

Eksklusive podcasts

Uden reklamer

Gratis podcasts

Lydbøger

20 timer / måned

Kom i gang

Kun på Podimo

Populære lydbøger