Conserva #50 con Jose Ramon Coz (AGENCIA ESPACIAL EUROPEA) - Ciberseguridad y sector aeroespacial
Podcast: Conservas Guillén by Trend MicroEpisode: Conserva #50 con Jose Ramon Coz (AGENCIA ESPACIAL EUROPEA) - Ciberseguridad y sector aeroespacialPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn Conservas Guillén abrimos una nueva lata para hablar con José Ramón Coz Fernandez, Director de Auditoría Interna de Ciberseguridad en la Agencia Espacial Europea (European Space Agency - ESA). Hablamos de ciberseguridad en el sector espacial, del sistema Galileo, del sistema EGNOS...
Conservaciones de 30 minutos, aproximadamente, en lenguaje entendible y coloquial.The podcast and artwork embedded on this page are from Trend Micro Iberia, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
--------
30:56
--------
30:56
Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets
Podcast: Industrial Cybersecurity InsiderEpisode: Former U.S. Secret Service Special Agent Shares Cyber Criminal SecretsPub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFormer U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail, how ransomware attacks actually cost organizations millions if not billions beyond the ransom payment itself, and why the timeline between compromise and detection has shrunk from months to minutes. He shares jaw-dropping statistics on vulnerability management failures, explains how adversaries are using AI to become exponentially more dangerous, and provides actionable insights for building resilient security programs that protect what matters most to your business. Whether you're defending critical infrastructure or managing security for a manufacturing organization, this conversation offers a rare insider perspective on the evolving threat landscape and what it takes to stay ahead of increasingly sophisticated cyber criminals.Chapters:(00:00:00) - Meet the Ex-Secret Service Agent Who Infiltrated Underground Cyber Criminal Networks(00:03:00) - Inside Operation Carder Kaos: Going Undercover in the Dark Web(00:06:00) - The Real Price Tag: Why Ransomware Costs Go Far Beyond the Ransom(00:11:00) - When Production Lines Go Dark: The Hidden Costs of Manufacturing Downtime(00:14:00) - Reality Check: How Prepared Is Your Organization for a Cyber Attack?(00:17:00) - The AI Arms Race: How Adversaries Are Weaponizing Artificial Intelligence(00:21:00) - 2027 Threat Landscape: What Keeps a Field CISO Up at Night(00:24:00) - Follow the Bitcoin: How Cyber Criminals Launder Billions Through Cryptocurrency(00:31:00) - Why Speed Matters: The Critical Window for Law Enforcement Notification(00:33:00) - The Security Leader's Playbook: Threat Intelligence + Business ContextLinks And Resources:Richard LaTulip on LinkedInRichard's Book: Operation Carder KaosRecorded FutureWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
--------
38:23
--------
38:23
Demystifying ISA/IEC 62443 with Khalid Ansari | 48
Podcast: ICS Arabia PodcastEpisode: Demystifying ISA/IEC 62443 with Khalid Ansari | 48Pub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPodcast with Khalid Ansari, an expert in ISA/IEC 62443 and a passionate advocate for OT product certification and standardization.Khalid shared incredible insights from his engineering journey—from instrumentation to working with Yokogawa, Qatalum and FM Approvals—and we dove deep into some of the most pressing topics in OT security, including:🔹 Overview of ISA/IEC-62443 🔹 Key parts relevant to product manufacturers 🔹 Secure by Design & Secure by Default principles 🔹 ISASecure certification process & global relevance 🔹 Supply chain security & SDLA 🔹 Role of standards in actual security outcomes 🔹 Is it only for engineers? Can beginners learn for free? 🔹 Risk assessments and where to start 🔹 Can AI/LLMs help in understanding 62443? 🔹 Cyber-Informed Engineering (CIE) 🔹 Hardware/software solutions & reverse engineeringThe podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
--------
1:12:33
--------
1:12:33
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
Podcast: Security Weekly Podcast Network (Audio) (LS 47 · TOP 1% what is this?)Episode: Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359Pub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFor OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359The podcast and artwork embedded on this page are from Security Weekly Productions, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
--------
59:02
--------
59:02
Medical Systems: Cybersecurity Challenges Arabic | 38
Podcast: ICS Arabia PodcastEpisode: Medical Systems: Cybersecurity Challenges Arabic | 38Pub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMedical Systems Cybersecurity Challenges Arabic with Eng Hussain EssayeghThe podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!