PodcastsTechnologie@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

628 afleveringen

  • @BEERISAC: OT/ICS Security Podcast Playlist

    OT Cybersecurity That Works: Budgets, Soft Skills & AI Reality for Stronger Defense

    31-03-2026 | 51 Min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: OT Cybersecurity That Works: Budgets, Soft Skills & AI Reality for Stronger Defense
    Pub date: 2026-03-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Strong OT cybersecurity programs aren’t built on tools alone, they're built on strategy, communication, and smart investment.

    In this episode of Protect It All, host Aaron Crow is joined by cybersecurity expert Don C. Weber for a candid, real-world discussion on what it actually takes to build and sustain effective security programs across IT and OT environments.

    From CapEx vs OpEx decisions to the growing role of AI in both attack and defense, this conversation cuts through the noise and focuses on what drives real outcomes: understanding business workflows, aligning with leadership, and developing the soft skills needed to turn strategy into action.

    You’ll learn:

    Why budgeting (CapEx vs OpEx) directly impacts security success

    The underrated power of soft skills in driving security programs

    How to connect cybersecurity efforts to business value and operations

    The role of pen testing and assessments in improving maturity

    Where AI adds value and where it introduces new risk

    How training and process understanding strengthen long-term resilience

    Whether you’re building a new security program or scaling an existing one, this episode delivers practical, experience-driven insights to help you make smarter decisions and drive real impact.

    Tune in to learn how to align strategy, people, and investment for stronger OT cybersecurity only on Protect It All.

    Key Moments: 

    05:49 Technical skills and security requirements

    09:10 Understanding data workflows

    12:29 Building a vulnerability management program

    13:26 Understanding organizational decision history

    17:44 Budgeting challenges with CAPEX and OPEX

    21:36 Steps in a security assessment

    24:17 Starting a cybersecurity program

    28:02 Prioritizing remote access security

    31:21 Discussing AI's impact on cybersecurity

    32:55 Using AI in cybersecurity

    38:07 AI simplifying complex knowledge

    40:35 AI tools making data queries easier

    45:02 Detecting and responding faster

    46:05 Networking and shared experiences

    About the guest: 

    Don C. Weber is a visionary cybersecurity leader who helps defenders safely prove security where it matters most in industrial operations. He is a SANS Principal Instructor, Founder of Cutaway Security, co-author of SANS ICS613: ICS/OT Penetration Testing & Assessments, and he also teaches SANS ICS410: ICS/SCADA Security Essentials to SANS student around the world. He brings years of field work into creating step-by-step labs and planning methods teams can use right away.

    How to connect Don: 

    LinkedIn: https://www.linkedin.com/in/cutaway/ 

    Cutaway Security: https://www.linkedin.com/company/cutaway-security-llc 

    CutSec Github: https://github.com/cutaway-security 

    CutSec GasPot HMI Lab: https://github.com/cutaway-security/gaspot-hmi-lab 

    SANS ICS ICS613 ICS/OT Penetration Testing and Assessments: https://www.sans.org/cyber-security-courses/ics-ot-penetration-testing-assessments

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Raphael Arakelian on Operation Grim Beeper

    30-03-2026 | 36 Min.
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Raphael Arakelian on Operation Grim Beeper
    Pub date: 2026-03-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Raphael Arkelian, the OT/IOT cybersecurity manager at Accenture, joins the Nexus Podcast to discuss his research into Operation Grim Beeper, the name given to a two-day attack in 2024 in the Middle East where explosives were introduced into pagers and walkie-talkies favored by Hezbollah. The explosions injured more than 1500 and killed dozens. Raphael’s research looks at several aspects of this attack and shares lessons and security gaps that can be applied across the OT and supply chain ecosystems. 
    Subscribe and listen to the Nexus Podcast here. 

    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    AI vs. Vulnerabilities: Who Really Wins?

    29-03-2026 | 33 Min.
    Podcast: Exploited: The Cyber Truth
    Episode: AI vs. Vulnerabilities: Who Really Wins?
    Pub date: 2026-03-26

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Artificial intelligence is transforming cybersecurity but not in the way many expect. While defenders are using AI to accelerate detection, triage, and threat hunting, adversaries are leveraging the same tools to scale reconnaissance, automate exploit development, and dramatically increase the speed of attack.

    In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Joe Slowik, Director of Cybersecurity Alerting Strategy at Dataminr, to discuss one critical question: Does AI actually reduce vulnerability risk or just accelerate the conflict?

    With a background including MITRE ATT&CK, Dragos, Los Alamos National Laboratory, and U.S. government offensive operations, Slowik offers a dual-lens perspective on how AI is reshaping both sides of cybersecurity.

    Together, they explore:

    How AI is increasing the velocity of vulnerability discovery and exploitation
    Why attackers may benefit from “good enough” AI outputs, while defenders require precision
    The rise in CVEs and why more vulnerabilities doesn’t necessarily mean worse security
    The growing risk in OT, IoT, and unmanaged edge devices
    Why AI is a powerful tool—not a magic bullet—and what that means for defenders

    From enterprise security teams to critical infrastructure operators, this episode breaks down what security leaders must understand to stay ahead in an AI-accelerated threat landscape.

    The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    ICIT’s Val Moon: Fixing Cybersecurity’s Workforce Problem is Essential for National Security

    28-03-2026 | 31 Min.
    Podcast: CYBR.SEC.CAST (LS 25 · TOP 10% what is this?)
    Episode: ICIT’s Val Moon: Fixing Cybersecurity’s Workforce Problem is Essential for National Security
    Pub date: 2026-03-24

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In this episode, hosts Michael Farnum and Sam Van Ryder sit down with Valerie Moon, Executive Director of the Institute for Critical Infrastructure Technology (ICIT) for a wide-ranging discussion about cybersecurity policy, workforce development, and the growing threats facing critical infrastructure.
    Things Mentioned:
    Website for ICIT: https://www.icitech.org/
    Upcoming CYBR.SEC.Community events: https://www.cybrsecmedia.com/conference/
    CYBR.SEC.Careers: https://www.linkedin.com/company/cybr-sec-careers/about/ fundraisers:
    Cards for a Cause: https://www.linkedin.com/posts/cybr-sec-careers_cybrseccareers-nonprofit-cybersecurity-activity-7436794892787359744-v4Cz
    CYBR CLAY SHOOT: https://www.linkedin.com/posts/cybr-sec-careers_cybrclayshoot-cybersecurity-cybercareers-activity-7435353518951084033-1iw9
    Proceeds support CYBR.SEC.Careers mission is to build a strong, diverse workforce by providing career exposure, access to education and certifications, and mentorship for students and veterans pursuing careers in cybersecurity.
    Do you have a question for the hosts? Reach out to us at [email protected] 
    Keep up with CYBR.SEC.CON.:
    LinkedIn
    X
    Facebook
    Instagram
    Keep up with CYBR.SEC.Media:
    LinkedIn
    X
    Facebook
    Instagram
    Check out our Conferences and Events:
    CYBR.SEC.CON.
    OT.SEC.CON.
    CYBR.HAK.CON.
    EXEC.SEC.CON.
    CSC User Group
    Support CYBR.SEC.Careers Non-Profit Efforts
    CYBR.SEC.Careers
    Apply to the CYBR.SEC.Careers Scholarship
    Taylor Austin Broussard Memorial Scholarship
    Listen to our other show:
    CYBR.HAK.CAST
    Thank you to our Media Partners:
    CYBR.SEC.CON. and OT.SEC.CON. 
    OGGN (Oil & Gas Global Network)
    UtilSec
    CYBR.SEC.CON. and CYBR.HAK.CON. 
    BarCode Podcast
    Cyber Distortion Podcast

    The podcast and artwork embedded on this page are from CYBR.SEC.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Plot Twist: I Wrote a Book | Kristin King & Securing What Feeds Us

    27-03-2026 | 30 Min.
    Podcast: Bites and Bytes Podcast
    Episode: Plot Twist: I Wrote a Book | Kristin King & Securing What Feeds Us
    Pub date: 2026-03-25

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    She’s back. And she brought a book.
    After a quieter stretch on the feed, Kristin King returnsto the Bites & Bytes Podcast with a solo episode to announce what she’s been building behind the scenes: Securing What Feeds Us: Cybersecurity in Food and Agriculture, published by Wiley and available for pre-order now, with an official release date of September 29, 2026.
    In this episode, Kristin breaks down what’s inside the nearly 500-page book, from precision agriculture and operational technology to aquaculture, agroterrorism, food science innovation, and the human layer that runs through all of it. She makes the case for why food and agriculture deserve the same cybersecurity attention we give to the power grid or financial sector and explains who this book is really for (spoiler: it’s anyone who eats).
    She also talks about where the podcast is headed next andmakes one clear ask of the community that helped get her here.
    Here are the “Securing What Feeds Us: Cybersecurity in Food and Agriculture” book Pre-Order Links:
    📘 US Pre-Order Link (Amazon):
    https://www.amazon.com/Securing-What-Feeds-Cybersecurity-Agriculture/dp/1394391005#detailBullets_feature_div
    📘 UK Pre-Order Link (Amazon): https://www.amazon.co.uk/dp/1394391005?ref=cm_sw_r_ffobk_cp_ud_dp_MFWDKT09AMPZSA86K9NH&ref_=cm_sw_r_ffobk_cp_ud_dp_MFWDKT09AMPZSA86K9NH&social_share=cm_sw_r_ffobk_cp_ud_dp_MFWDKT09AMPZSA86K9NH&bestFormat=true
    📘 Barns & Noble:
    https://www.barnesandnoble.com/w/securing-what-feeds-us-kristin-king/1149440985
    📘 Bookshop.org:
    https://bookshop.org/p/books/securing-what-feeds-us-cybersecurity-in-food-and-agriculture-kristin-king/801d9d7a8eb2741b?ean=9781394391004&next=t
    ⭐ If you prefer to order from a local bookstore, you can give them the ISBN.
    ---------------
    Episode Key Highlights
    00:01:49 The Book Announcement: Securing What Feeds Us
    00:04:52 The Foreword: Dr. Darren Detwiler
    00:09:20 The Gap Between Two Worlds ThatNeeded a Book
    00:11:30 Who This Book Is Really For
    00:14:03 Food Is Critical Infrastructure
    00:15:43 The Real Stakes: Ransomware,Precision Ag & Agroterrorism
    00:23:06 Food Science, 3D Printing & theFuture of Food
    00:25:38 Resilience Over Compliance
    00:28:38 The Quote: Mainstream Urgency
    ---------------
    📘 Sign up for early updates, exclusive previews, and news about Kristin’s book, “Securing What Feeds Us:  Cybersecurity in Food and Agriculture,” here.
    ---------------
    🎤 Book Kristin Demoranville to Speak
    To invite Kristin to speak at your conference, corporate event, webinar, or workshop, visit the website and submit a request.
    ---------------
    🎤 Bites and Bytes Podcast Info:
    Website: Explore all our episodes, articles, and more on our official website.  
    Merch Shop: Show your support with some awesome Bites and Bytes gear!
    Substack: Stay updated with the latest insights and stories from the world of cybersecurity in the food industry.
    Socials: TikTok;Instagram;LinkedIn;BlueSky
    ---------------
    🛡️ About AnzenSage & AnzenOT
    AnzenSage is a cybersecurity advisory firm specializing in security resilience for thefood, agriculture, zoo, and aquarium industries.  AnzenSage offers practical, strategic guidance to help organizations anticipate risks and build resilience.  Learn more about their offerings at anzensage.com.​
    AnzenOThelps organizations understand and prioritize operational risk faster, without slow or static assessments. Subscription access is available, including a student option. Learn more at anzenot.com.

    The podcast and artwork embedded on this page are from AnzenSage, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Meer Technologie podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, Bright Podcast en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies