PodcastsZaken en persoonlijke financiën@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

573 afleveringen

  • @BEERISAC: OT/ICS Security Podcast Playlist

    What’s going on with manufacturing OT security? | OT Security Made Simple

    07-2-2026 | 22 Min.
    Podcast: OT Security Made Simple
    Episode: What’s going on with manufacturing OT security? | OT Security Made Simple
    Pub date: 2026-02-03

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    OT security researcher Ben Book takes an unapologetic view on the state of OT security in manufacturing. He doesn’t blame anybody but provides a clear analysis of business dynamics and offers what many lack when talking OT security solutions: the right questions. 

    You can find more information on OT Security Made Simple at rhebo.com or send us your ideas, questions, or guest suggestions at [email protected].

    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The IT-OT Knowledge Gap Costing Organizations Millions

    06-2-2026 | 22 Min.
    Podcast: Industrial Cybersecurity Insider
    Episode: The IT-OT Knowledge Gap Costing Organizations Millions
    Pub date: 2026-02-03

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Dino sits down with Adeel Shaikh Muhammad, a Dubai-based cybersecurity expert and researcher with 16+ years in IT and OT security. They dive into why IT and OT teams still can't communicate effectively.
    The conversation reveals why most CISOs struggle to secure manufacturing environments. Adeel shares real-world insights from securing industrial systems across the Middle East, Africa, and Asia.
    They tackle the implementation gap in OT SOCs and why legacy systems remain vulnerable. The discussion covers third-party access risks, OEM warranty restrictions, and system integrator challenges.
    AI might finally solve IT-OT convergence by acting as a translator between these worlds. But first, organizations need to master the fundamentals: asset inventory, vulnerability management, and network segmentation.
    Most companies still haven't nailed these basics in their industrial environments. This conversation cuts through the hype to focus on what actually works.
    Chapters:
    (00:00:00) - 16 Years in Cybersecurity: Why CISOs Don't Know What a PLC Is
    (00:01:48) - Career Journey: From IT to OT Cybersecurity Focus
    (00:02:48) - Books on AI Transforming Security Operations Centers
    (00:04:44) - The Implementation Gap: Challenges Building OT SOCs
    (00:06:40) - The IT-OT Cultural Divide and Missing Communication
    (00:08:40) - Why the OT Ecosystem Must Proactively Bring Cybersecurity Tools
    (00:10:00) - Can IT-OT Convergence Actually Happen?
    (00:11:00) - AI as the Bridge: The Black Box Solution for IT-OT Communication
    (00:12:42) - Legacy Systems Reality: Windows 7 Running $5M Equipment
    (00:14:00) - OT Cybersecurity Conferences: S4, Intersec, and Rockwell Automation Fair
    (00:16:00) - Market Consolidation: Who's Been Acquired in OT Security
    (00:17:48) - Back to Basics: Asset Inventory, Vulnerabilities, and Network Segmentation
    (00:18:40) - Third-Party Access Control and OEM Warranty Restrictions
    (00:20:40) - Why We Can't Ignore Asset Inventory and Segmentation in OT Anymore

    Links And Resources:
    Adeel Shaikh Muhammad on LinkedIn
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    EP 80: The Dangers of White Label Devices

    05-2-2026 | 38 Min.
    Podcast: Error Code (LS 27 · TOP 10% what is this?)
    Episode: EP 80: The Dangers of White Label Devices
    Pub date: 2026-02-03

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Many devices on modern networks aren’t what their labels claim. This episode, Rob King, Director of Applied Security Research at runZero, explores white-labeled surveillance and IoT hardware, why some vendors are banned by governments, and how hidden risks can spread across enterprises. Discovery, device fingerprinting, and protocol analysis reveal what’s really connected—and why knowing your true inventory is now essential for security, compliance, and trust.

    The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    OT Remote Access After COVID: Why IT Tools Fail and What Critical Infrastructure Needs Now

    04-2-2026 | 49 Min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: OT Remote Access After COVID: Why IT Tools Fail and What Critical Infrastructure Needs Now
    Pub date: 2026-02-02

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Remote access transformed overnight - and OT environments are still feeling the impact.

    In this episode of Protect It All, host Aaron Crow is joined by Steve Rutherford, VP of Sales at Hyperport and former military officer, for a candid conversation on how secure remote access in operational technology (OT) has evolved - and where it’s heading next.

    They unpack how COVID accelerated remote connectivity across critical infrastructure, why many traditional IT security tools fall short in OT environments, and what protection really looks like when safety, reliability, and uptime are non-negotiable. Drawing from military discipline and frontline OT experience, Steve shares a grounded perspective on managing risk in environments where failure has physical-world consequences.

    You’ll learn:

    How COVID permanently changed OT remote access expectations

    Why IT-first security approaches don’t translate well to OT

    The role of layered access controls and policy-driven permissions

    How dynamic access and trust scoring are reshaping OT security

    Where IT/OT convergence helps - and where it creates new risk

    What leaders must prioritize to balance access, safety, and resilience

    If you’re responsible for enabling remote access while protecting critical operations, this episode delivers real-world insight, practical guidance, and a forward-looking view of OT cybersecurity.

    Tune in to understand what secure OT access really requires in today’s threat landscape- only on Protect It All.

    Key Moments: 

    00:00 Securing Critical Infrastructure Access

    03:59 "OT Mindset: Defense and Offense"

    07:26 "Remote Access Challenges in Operations"

    11:45 "Challenges in OT-IT Integration"

    16:07 Authority Must Match Responsibility

    18:23 Simplifying OT Authentication Challenges

    21:53 "Dynamic Trust Scoring with AI"

    24:05 "Access Control and Segmentation"

    28:57 "Secure Access Without Overreach"

    33:12 "Left of Boom Awareness"

    35:56 OT Security and Local Control

    39:35 "Driving Early Adoption Awareness"

    41:54 "Proactive Support for Critical Infrastructure"

    45:52 "Remote Work Enhances Team Efficiency"

    47:17 "Exciting Tech for Cybersecurity"

    About the guest :
    Steve Rutherford is a former U.S. Army officer and aviator who transitioned his mission-driven mindset from military service to protecting critical infrastructure through operational technology (OT) security. After exploring multiple industries, Steve found a natural alignment between military operations and OT environments - where safety, reliability, and uptime are non-negotiable. Today, he works in secure user access for OT, helping organizations protect the systems that power modern life.

    How to connect steve : 

    Website : https://hyperport.io/

    Linkedin: https://www.linkedin.com/in/steverutherford1/

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast 

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    4/4 Desenlace en Monitorización de seguridad OT con telemetría del proceso

    04-2-2026 | 10 Min.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 4/4 Desenlace en Monitorización de seguridad OT con telemetría del proceso
    Pub date: 2026-02-02

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Este episodio aborda el impacto real observado en reducción de incidentes y decisiones preventivas, la evolución futura de la seguridad OT basada en señales de proceso y el consejo clave para responsables de ciberseguridad industrial.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Meer Zaken en persoonlijke financiën podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, The Diary Of A CEO with Steven Bartlett en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies