PodcastsTechnologie@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

624 afleveringen

  • @BEERISAC: OT/ICS Security Podcast Playlist

    Plot Twist: I Wrote a Book | Kristin King & Securing What Feeds Us

    27-03-2026 | 30 Min.
    Podcast: Bites and Bytes Podcast
    Episode: Plot Twist: I Wrote a Book | Kristin King & Securing What Feeds Us
    Pub date: 2026-03-25

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    She’s back. And she brought a book.
    After a quieter stretch on the feed, Kristin King returnsto the Bites & Bytes Podcast with a solo episode to announce what she’s been building behind the scenes: Securing What Feeds Us: Cybersecurity in Food and Agriculture, published by Wiley and available for pre-order now, with an official release date of September 29, 2026.
    In this episode, Kristin breaks down what’s inside the nearly 500-page book, from precision agriculture and operational technology to aquaculture, agroterrorism, food science innovation, and the human layer that runs through all of it. She makes the case for why food and agriculture deserve the same cybersecurity attention we give to the power grid or financial sector and explains who this book is really for (spoiler: it’s anyone who eats).
    She also talks about where the podcast is headed next andmakes one clear ask of the community that helped get her here.
    Here are the “Securing What Feeds Us: Cybersecurity in Food and Agriculture” book Pre-Order Links:
    📘 US Pre-Order Link (Amazon):
    https://www.amazon.com/Securing-What-Feeds-Cybersecurity-Agriculture/dp/1394391005#detailBullets_feature_div
    📘 UK Pre-Order Link (Amazon): https://www.amazon.co.uk/dp/1394391005?ref=cm_sw_r_ffobk_cp_ud_dp_MFWDKT09AMPZSA86K9NH&ref_=cm_sw_r_ffobk_cp_ud_dp_MFWDKT09AMPZSA86K9NH&social_share=cm_sw_r_ffobk_cp_ud_dp_MFWDKT09AMPZSA86K9NH&bestFormat=true
    📘 Barns & Noble:
    https://www.barnesandnoble.com/w/securing-what-feeds-us-kristin-king/1149440985
    📘 Bookshop.org:
    https://bookshop.org/p/books/securing-what-feeds-us-cybersecurity-in-food-and-agriculture-kristin-king/801d9d7a8eb2741b?ean=9781394391004&next=t
    ⭐ If you prefer to order from a local bookstore, you can give them the ISBN.
    ---------------
    Episode Key Highlights
    00:01:49 The Book Announcement: Securing What Feeds Us
    00:04:52 The Foreword: Dr. Darren Detwiler
    00:09:20 The Gap Between Two Worlds ThatNeeded a Book
    00:11:30 Who This Book Is Really For
    00:14:03 Food Is Critical Infrastructure
    00:15:43 The Real Stakes: Ransomware,Precision Ag & Agroterrorism
    00:23:06 Food Science, 3D Printing & theFuture of Food
    00:25:38 Resilience Over Compliance
    00:28:38 The Quote: Mainstream Urgency
    ---------------
    📘 Sign up for early updates, exclusive previews, and news about Kristin’s book, “Securing What Feeds Us:  Cybersecurity in Food and Agriculture,” here.
    ---------------
    🎤 Book Kristin Demoranville to Speak
    To invite Kristin to speak at your conference, corporate event, webinar, or workshop, visit the website and submit a request.
    ---------------
    🎤 Bites and Bytes Podcast Info:
    Website: Explore all our episodes, articles, and more on our official website.  
    Merch Shop: Show your support with some awesome Bites and Bytes gear!
    Substack: Stay updated with the latest insights and stories from the world of cybersecurity in the food industry.
    Socials: TikTok;Instagram;LinkedIn;BlueSky
    ---------------
    🛡️ About AnzenSage & AnzenOT
    AnzenSage is a cybersecurity advisory firm specializing in security resilience for thefood, agriculture, zoo, and aquarium industries.  AnzenSage offers practical, strategic guidance to help organizations anticipate risks and build resilience.  Learn more about their offerings at anzensage.com.​
    AnzenOThelps organizations understand and prioritize operational risk faster, without slow or static assessments. Subscription access is available, including a student option. Learn more at anzenot.com.

    The podcast and artwork embedded on this page are from AnzenSage, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Adm. Michael Rogers on his time as NSA Director

    27-03-2026 | 26 Min.
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Adm. Michael Rogers on his time as NSA Director
    Pub date: 2026-03-24

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Former NSA Director and Commander of U.S. Cyber Command Adm. Michael S. Rogers (Ret. USN) joins the Nexus Podcast. Rogers spoke in advance of an RSA Conference panel discussion today with the other living NSA directors, Keith Alexander, Paul Nakasone, and Tim Haugh, a rare time when the four can be in the same room. 
    Rogers describes the principles that guided his time as director of these intelligence agencies, how the role changes as administrations change, and some of the core strategies that led to success. 
    Subscribe and listen to the Nexus Podcast here. 

    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon Chassar

    26-03-2026 | 31 Min.
    Podcast: Industrial Cybersecurity Insider
    Episode: Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon Chassar
    Pub date: 2026-03-24

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Dino Busalachi sits down with Simon Chassar, former Chief Revenue Officer at Claroty and current OT cybersecurity advisor and investor, to explore the evolution and future of industrial cybersecurity.
    Simon shares insights from his decade-long journey in the space, discussing how OT asset visibility has become commoditized and why the industry is experiencing two major shifts: moving right toward threat-led SOC services and perimeter protection, and moving left toward secure-by-design approaches and attack simulation.
    They dive into the persistent challenge of self-performing versus partnering with specialized integrators, the critical skills shortage commanding 30-40% salary premiums, and why AI is both accelerating security challenges and offering new solutions.
    Simon reveals how private equity firms are finally prioritizing OT cybersecurity at the board level, discusses the emerging OT SOC landscape, and explains why the traditional IT security budget model is failing operational technology environments.
    The conversation addresses the disconnect between IT leadership and the OT ecosystem, the proliferation of unmanaged remote access technologies, and the urgent need for manufacturers to engage their trusted system integrators and OEMs as cybersecurity partners before the next major incident occurs.
    Chapters:
    (00:00:00) - Meet Simon : From Claroty's Hypergrowth to OT Security's Next Chapter
    (00:02:00) - The Commoditization of OT Asset Visibility
    (00:04:00) - Two Major Industry Shifts: Right and Left
    (00:07:00) - The Self-Performing Problem: Why OT Security Becomes Shelfware
    (00:10:00) - IT/OT Convergence and the Skills Gap Crisis
    (00:13:00) - Secure by Design and the AI Leapfrog
    (00:15:00) - AI Uncovers Hidden OT Vulnerabilities and Risks
    (00:18:00) - Funding Models and Private Equity's Cybersecurity Awakening
    (00:22:00) - Why the OT Ecosystem Must Drive Its Own Security Strategy
    (00:25:00) - M&A Activity and Consolidation in OT Cybersecurity
    (00:27:00) - The Rise of OT SOCs and MSP Partnerships

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter

    25-03-2026 | 32 Min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter
    Pub date: 2026-03-23

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Cyberattacks don’t just test your systems - they test your preparedness.

    In this episode of Protect It All, host Aaron Crow breaks down key lessons from the Striker attack and what it reveals about today’s evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like “living off the land” - blending into normal operations instead of deploying obvious malware.

    Aaron takes this beyond theory, focusing on what organizations must do before an attack happens.

    A major theme? Tabletop exercises. Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can’t catch.

    You’ll learn:

    What the Striker attack teaches about modern cyber warfare

    How living-off-the-land tactics bypass traditional defenses

    Why tabletop exercises are essential for real-world readiness

    The role of threat hunting and collaboration across teams

    How attackers exploit weaknesses in both IT and OT environments

    Why small, consistent actions can dramatically improve resilience

    Whether you’re defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers practical insights you can apply immediately.

    Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All.

    Key Moments: 

    04:59 "Modern Warfare: Cyber and Beyond"

    08:47 "Security Risks of Remote Wipe"

    10:31 "Living Off the Land Tactics"

    13:11 "Balancing Power and Security"

    19:12 "Vulnerabilities Demand Swift Action"

    20:21 Prioritize Risk, Justify Investment

    25:04 Practice Preparedness Before Crisis

    26:48 Weak Links Threaten Cybersecurity

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    3/4 Accionesde Auditoría de seguridad OT

    24-03-2026 | 12 Min.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 3/4 Accionesde Auditoría de seguridad OT
    Pub date: 2026-03-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    En este episodio se propone un rediseño de las auditorías modernas, planteando el uso de simulación de escenarios y «gemelos de incidentes» como evidencias de confianza. Explica la importancia de integrar la seguridad industrial con la seguridad funcional y la continuidad operativa para gestionar el riesgo sistémico de forma integral.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Meer Technologie podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, Search Engine en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies