Powered by RND
PodcastsZaken en persoonlijke financiën@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

Beschikbare afleveringen

5 van 494
  • EP 76: Why Security Certs for New Medical Devices Might Just Work
    Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 76: Why Security Certs for New Medical Devices Might Just WorkPub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDiversity in healthcare devices complicates segmentation, security controls, and zero-trust approaches. New certifications aim to help. Bob Lyle, CRO of Medcrypt, identifies how layered defenses, rigorous cybersecurity requirements for new devices, continuous monitoring, and dark-web credential surveillance can reduce risk.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    36:50
  • Engineering OT Security: ISA Standards & Open Source in Action | 62
    Podcast: ICS Arabia PodcastEpisode: Engineering OT Security: ISA Standards & Open Source in Action | 62Pub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization🎙️ New Episode Recap | ICS Arabia Podcast #62 Engineering OT Security: ISA Standards & Open Source in ActionIn this episode, SZ Lin (林上智) , an experienced OT cybersecurity consultant and ISA Taiwan Section leader, shares his journey from industrial software engineering to advancing OT cybersecurity across sectors like semiconductors, oil & gas, and manufacturing.🔹 Key takeaways: • The growing importance of cybersecurity in semiconductor manufacturing, guided by Relevant standard • The pivotal role of open-source software and Industrial Linux in ensuring long-term system security and resilience. • Taiwan’s strong adoption of 62443 standards, supported by government policies and industry collaboration. • Why certification is only the beginning — true security lies in continuous improvement and integration into daily operations.A must-listen for professionals exploring the intersection of engineering, standards, and open-source innovation in OT cybersecurity.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    51:46
  • Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You Think
    Podcast: Industrial Cybersecurity InsiderEpisode: Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You ThinkPub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this eye-opening conversation, Dino and Craig address a critical issue facing manufacturing organizations today: the dangerous gap between perceived and actual cybersecurity preparedness in operational technology (OT) environments.They discuss why many organizations "don't know what they don't know" when it comes to securing industrial control systems, the myth of isolated manufacturing equipment, and why 25% of companies still lack comprehensive OT asset monitoring. Drawing powerful parallels to safety protocols, they explain why cybersecurity must become as ingrained in plant culture as wearing a hard hat on the factory floor.Their bottom line: Back up your beliefs with data, treat every system as if it's connected, and verify, don't just trust, your security posture. In OT cybersecurity, perception isn't reality, and that gap could cost not only millions but also brand perception and even human life.This episode is a must-listen for anyone serious about protecting their industrial environments.Chapters:00:00:00 - Kicking Off: Are You Truly Secure or Just Comfortable?00:01:15 - OT Security Reality Check: Do You Really Know Your Risks?00:01:45 - The Hidden Challenges Holding OT Security Back00:03:15 - Lack of Skilled Resources: The Biggest Barrier to Security00:05:30 - Security Frameworks: Are They Reaching the Plant Floor?00:06:15 - The Dangerous Myth of “Isolated” OT Systems00:07:58 - From Theory to Action: Winning Strategies for OT Security00:12:13 - Leadership’s Role in Cybersecurity: Who’s Driving the Change?00:19:55 - No More Blind Spots: Key Takeaways for a Secure FutureLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    22:46
  • OT Incident Response Explained | 68
    Podcast: ICS Arabia PodcastEpisode: OT Incident Response Explained | 68Pub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode 🎙️, we sit down with Tobias Halmans, an OT Incident Responder , to dive deep into one of the most critical topics in industrial cybersecurity — Incident Response in OT environments.Together, we explore: ⚙️ Why incident response in OT is different from IT 🚨 The unique challenges of detecting incidents in industrial networks 📋 Frameworks and best practices for effective OT response 🧩 How disaster recovery and business continuity planning intersect in OT 🧠 The importance of tabletop exercises for readiness and coordinationA special thanks to Sarah Fluchs for recommending Tobias — much appreciated! 🙏🎧 Watch now on YouTube: https://lnkd.in/dy3Ncfp3 The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    1:09:54
  • Realities in the Systems That Produce Our Food with James Slaby
    Podcast: Bites & Bytes PodcastEpisode: Realities in the Systems That Produce Our Food with James SlabyPub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat does a deep fake phone call scamming your grandma have to do with food manufacturing? More than you think. In this episode of Bites and Bytes Podcast, host Kristin King and James Slaby discuss the operational technology challenges in food production—from legacy systems running Windows XP to ransomware threats when production lines go down. James is Director of OT Solutions GTM at Acronis and brings over 20 years of cybersecurity and industry analyst experience from Forrester Research, HFS Research, and technology companies. The conversation covers why food plants can't update their systems, the growing threat of social engineering and deep fakes, and practical strategies like the family password defense. Topics include: Why food manufacturers still run ancient operating systems Deep fake threats and how to protect yourself Air-gapped systems and OT security challenges Social engineering targeting industrial operations Legacy technology in food production environments Whether you’re in food manufacturing, cybersecurity, or just curious about the systems behind your food supply, this episode reveals the realities of keeping production running while managing cyber threats. --------------- Guest Contact Information: James Slaby’s LinkedIn Company: Acronis Role: Director of OT Solutions GTM at Acronis --------------- Episode Key Highlights --------------- 📘 Sign up for early updates, exclusive previews, and launch news of Kristin’s book, “Securing What Feeds Us:  Cybersecurity in Food and Agriculture” here. --------------- 🎤 Book Kristin Demoranville to Speak To invite Kristin to speak at your conference, corporate event, webinar, or workshop, visit the website and submit a request. --------------- 🎤 Bites and Bytes Podcast Info: Website: Explore all our episodes, articles, and more on our official website.   Merch Shop: Show your support with some awesome Bites and Bytes gear! Substack: Stay updated with the latest insights and stories from the world of cybersecurity in the food industry. Schedule a Call with Kristin: Share Your Thoughts Socials:  TikTok; Instagram; LinkedIn; BlueSky --------------- 🛡️ About AnzenSage & AnzenOT AnzenSage is a cybersecurity advisory firm specializing in security resilience for the food, agriculture, zoo, and aquarium industries.  AnzenSage offers practical, strategic guidance to help organizations anticipate risks and build resilience.  Learn more about their offerings at anzensage.com.​ AnzenOT:  Industrial Cyber Risk — Simple.  Smart.  Swift. AnzenOT is the SaaS risk management platform built to bring clarity and control to Operational Technology (OT) cybersecurity.  Designed for critical infrastructure sectors, AnzenOT translates technical risk into clear, actionable insight for decision-makers.  Explore the platform at anzenot.com. For demo requests or inquiries, email [email protected] or [email protected] podcast and artwork embedded on this page are from AnzenSage, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    38:41

Meer Zaken en persoonlijke financiën podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, The Diary Of A CEO with Steven Bartlett en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies
Social
v8.0.7 | © 2007-2025 radio.de GmbH
Generated: 12/5/2025 - 1:36:07 AM