PodcastsZaken en persoonlijke financiën@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

Beschikbare afleveringen

5 van 504
  • AI, Human Behavior & Cybersecurity’s Future: Cutting Complexity and Strengthening Defense
    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: AI, Human Behavior & Cybersecurity’s Future: Cutting Complexity and Strengthening DefensePub date: 2025-12-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe future of cybersecurity won’t be won by tools alone - it will be won by people, process, and smarter use of AI. In this episode of Protect It All, host Aaron Crow sits down with cybersecurity veteran Sharad Rai to explore how IT and OT security teams can reduce complexity, fight alert fatigue, and build stronger defenses through foundational practices and intelligent automation. Sharad brings decades of real-world experience - from early firewall management to leading large-scale security programs at major financial institutions. Together, Aaron and Sharad break down what actually works in cybersecurity today: simplifying policies, understanding user behavior, strengthening basics like patching, and leveraging AI for contextual decision-making. You’ll learn: Why human behavior is the root of both risk and resilience How AI can reduce complexity, noise, and alert fatigue What “good vs bad” looks like through an AI-driven, context-aware lens How policy overload cripples organizations - and how to fix it Why OT and IT security still depend on foundational hygiene The rise of browser-based security and Chrome as an endpoint What’s coming next: AI-driven phishing, contextual controls, and automated response Whether you're a security leader, practitioner, or just navigating modern cyber challenges, this episode will reshape how you think about defending systems and the people using them. Tune in to discover how AI, clarity, and human-centered design are shaping cybersecurity’s next chapter only on Protect It All. Key Moments:  06:21 "Cybersecurity Basics: Know the Layers" 09:49 "Defining Good to Block Bad" 13:03 Alarm Fatigue and Information Overload 14:01 Alarm Tuning and Data Utilization 19:02 RFID Tags and Process Frustration 23:03 Simplifying Cybersecurity for Success 25:18 "AI Optimizing Policy Adjustments" 27:33 "Tech Frustrations Then and Now" 31:46 Cloud Computing Transformed Everyday Work 36:05 Focus on Foundational Basics About the guest :  Sharad Rai is a cybersecurity leader and architect with over 20 years of experience securing some of the world’s most complex financial institutions. As Vice President of Security and Architecture at State Street, he leads regulatory-driven initiatives and delivers enterprise-wide cybersecurity programs across cloud, infrastructure, and endpoint platforms. Sharad has held key security roles at Morgan Stanley, BNP Paribas, Jefferies, and Foundation Medicine, with deep expertise in EDR, PAM, SASE, ZTNA, and cloud-native security. He is known for simplifying complexity, reducing risk, and bridging product, engineering, and executive teams. How to connect Sharad: https://www.linkedin.com/in/sharad-rai-cissp-a951a28 Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: [email protected]  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast  To be a guest or suggest a guest/episode, please email us at [email protected] Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    38:27
  • Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made Simple
    Podcast: OT Security Made SimpleEpisode: Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made SimplePub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJanka Kreißl von der Agentur Dunkelblau spricht über Krisenprävention und Krisenbewältigung bei Cybervorfällen. Sie erläutert aus Erfahrung, was gute Abläufe brauchen und wer von Anfang involviert sein sollte. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an [email protected]. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    21:27
  • The Asymmetric Advantage: How Cybersecurity Can Outpace Adversaries
    Podcast: Exploited: The Cyber Truth Episode: The Asymmetric Advantage: How Cybersecurity Can Outpace AdversariesPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin sits down with RunSafe Founder and CEO Joseph M. Saunders to explore why the future of cyber defense depends on disrupting attacker economics rather than racing to keep up with every new threat. Joe breaks down how organizations can gain an asymmetric advantage by reducing exploitability across entire classes of vulnerabilities, especially persistent memory safety flaws that continue to expose critical systems. He shares why adding lightweight, automated protections at build time is one of the fastest ways to shift the cost curve onto attackers without forcing massive code rewrites or slowing development teams down. Together, Paul and Joe discuss: Why attackers’ resource advantage requires a new defensive mindsetThe power of “patchless” protection in embedded and OT environmentsWhy memory safety flaws persist and how to neutralize them at scaleThe risks of AI-generated code and how to prevent silent vulnerabilitiesHow Secure by Design practices improve resilience for critical infrastructure If you're responsible for securing embedded systems, OT assets, or long-lived devices where patch cycles are slow and risk is high, this episode offers a new mindset that gives defenders the upper hand.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    27:18
  • Conserva #50 con Jose Ramon Coz (AGENCIA ESPACIAL EUROPEA) - Ciberseguridad y sector aeroespacial
    Podcast: Conservas Guillén by Trend MicroEpisode: Conserva #50 con Jose Ramon Coz (AGENCIA ESPACIAL EUROPEA) - Ciberseguridad y sector aeroespacialPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn Conservas Guillén abrimos una nueva lata para hablar con José Ramón Coz Fernandez, Director de Auditoría Interna de Ciberseguridad en la Agencia Espacial Europea (European Space Agency - ESA). Hablamos de ciberseguridad en el sector espacial, del sistema Galileo, del sistema EGNOS... Conservaciones de 30 minutos, aproximadamente, en lenguaje entendible y coloquial.The podcast and artwork embedded on this page are from Trend Micro Iberia, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    30:56
  • Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets
    Podcast: Industrial Cybersecurity InsiderEpisode: Former U.S. Secret Service Special Agent Shares Cyber Criminal SecretsPub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFormer U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail, how ransomware attacks actually cost organizations millions if not billions beyond the ransom payment itself, and why the timeline between compromise and detection has shrunk from months to minutes. He shares jaw-dropping statistics on vulnerability management failures, explains how adversaries are using AI to become exponentially more dangerous, and provides actionable insights for building resilient security programs that protect what matters most to your business. Whether you're defending critical infrastructure or managing security for a manufacturing organization, this conversation offers a rare insider perspective on the evolving threat landscape and what it takes to stay ahead of increasingly sophisticated cyber criminals.Chapters:(00:00:00) - Meet the Ex-Secret Service Agent Who Infiltrated Underground Cyber Criminal Networks(00:03:00) - Inside Operation Carder Kaos: Going Undercover in the Dark Web(00:06:00) - The Real Price Tag: Why Ransomware Costs Go Far Beyond the Ransom(00:11:00) - When Production Lines Go Dark: The Hidden Costs of Manufacturing Downtime(00:14:00) - Reality Check: How Prepared Is Your Organization for a Cyber Attack?(00:17:00) - The AI Arms Race: How Adversaries Are Weaponizing Artificial Intelligence(00:21:00) - 2027 Threat Landscape: What Keeps a Field CISO Up at Night(00:24:00) - Follow the Bitcoin: How Cyber Criminals Launder Billions Through Cryptocurrency(00:31:00) - Why Speed Matters: The Critical Window for Law Enforcement Notification(00:33:00) - The Security Leader's Playbook: Threat Intelligence + Business ContextLinks And Resources:Richard LaTulip on LinkedInRichard's Book: Operation Carder KaosRecorded FutureWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    38:23

Meer Zaken en persoonlijke financiën podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, Dutch Dragons en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies
Social
v8.1.2 | © 2007-2025 radio.de GmbH
Generated: 12/13/2025 - 2:52:45 PM