PodcastsZaken en persoonlijke financiën@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

594 afleveringen

  • @BEERISAC: OT/ICS Security Podcast Playlist

    Mike Holcomb on the Intersection of Hacktivists, State Actors

    27-02-2026 | 28 Min.
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Mike Holcomb on the Intersection of Hacktivists, State Actors
    Pub date: 2026-02-25

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Mike Holcomb joins the Nexus Podcast to discuss a Converged Actor Framework he developed and presented at the S4 Conference. The framework delineates  groups such as hacktivists and state threat actors based on the impact and frequency of their activity. State actors are leveraging hacktivist groups with greater frequency, and this convergence must be considered as defenders tasked with protecting OT and cyber-physical systems strategize around security. 
    Subscribe and listen to the Nexus Podcast here. 
    Subscribe to Mike Holcomb's YouTube channel here.

    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Brass Tacks S2E01 – Cyber Conflict and the Risk to Critical Infrastructure

    25-02-2026 | 22 Min.
    Podcast: Fortinet Cybersecurity Podcast (LS 25 · TOP 10% what is this?)
    Episode: Brass Tacks S2E01 – Cyber Conflict and the Risk to Critical Infrastructure
    Pub date: 2026-02-24

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Cyber attacks are used to strain states, disrupt power grids, and shake public trust. In this episode, Annita Sciacovelli, Cybersecurity Advisor and Professor of International Law at the University of Bari, explains how digital attacks target essential services, why societies are the pressure point, and how international law draws the line between cyber operations and armed response.

    Watch or listen to the episode, and read the blog to dig deeper into the legal and societal impact.

    Read the Fortinet blog: https://www.fortinet.com/blog/industry-trends/when-cyber-conflict-targets-society
    Watch on YouTube: https://www.youtube.com/watch?v=WGnJHB5NdAw

    The podcast and artwork embedded on this page are from Fortinet Cybersecurity Podcast, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The Danger of IT, OT, Medical Device Cyber Turf Wars

    25-02-2026 | 25 Min.
    Podcast: Government Information Security Podcast (LS 27 · TOP 10% what is this?)
    Episode: The Danger of IT, OT, Medical Device Cyber Turf Wars
    Pub date: 2026-02-23

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    What often appears to be turf wars between healthcare technology management, facilities OT staff, IT departments and security teams are often the result of unclear ownership and accountability for device security. And that presents safety risks to patients, says Mohamed Waqas, CTO of Armis.

    The podcast and artwork embedded on this page are from GovInfoSecurity.com, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Compliance Isn’t Security: NERC CIP 15 and the Real Gaps in OT Network Monitoring

    24-02-2026 | 23 Min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: Compliance Isn’t Security: NERC CIP 15 and the Real Gaps in OT Network Monitoring
    Pub date: 2026-02-23

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Passing an audit doesn’t mean you’re secure.

    In this episode of Protect It All, host Aaron Crow dives into one of the biggest misconceptions in operational technology: the belief that compliance equals protection. Using NERC CIP 15 as a real-world case study, Aaron explores why meeting regulatory requirements is only the starting point - not the finish line.

    A major focus of this conversation is OT network monitoring, especially the often-overlooked east-west traffic inside your environment. Many organizations monitor perimeter traffic while internal blind spots remain wide open.

    You’ll learn:

    Why compliance frameworks don’t automatically create security

    The real challenges of implementing NERC CIP 15 at scale

    Why internal network visibility (east-west monitoring) matters

    How to establish meaningful baselines in legacy OT environments

    The difference between audit success and operational resilience

    Why architecture, tooling, and skilled personnel must work together

    Whether you’re working in utilities, manufacturing, or critical infrastructure, this episode provides practical guidance on how to move beyond checklists and build security programs that truly reduce risk.

    Tune in to learn how to transform compliance requirements into real operational protection - only on Protect It All.

    Key Moments: 

    00:00 OT Security Blind Spots

    05:15 "OT Security and Monitoring Challenges"

    10:41 Aging Switches and Monitoring Challenges

    13:16 OT Protocols and Infrastructure Challenges

    15:42 "IT vs OT: Complexity Challenges"

    18:03 "Balancing Compliance and Security"

    21:57 Securing Critical Infrastructure Spaces

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast

     

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    3/4 Acciones de Orquestando de la seguridad OT

    24-02-2026 | 12 Min.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 3/4 Acciones de Orquestando de la seguridad OT
    Pub date: 2026-02-23

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    En este episodio se abordan retos reales de integrar la seguridad OT y los errores más comunes en ese proceso. Aborda cómo la automatización del cumplimiento libera a los equipos para tareas de mayor valor. Explica cómo la remediación basada en esfuerzo e impacto cambia la forma de trabajar de OT y seguridad.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Meer Zaken en persoonlijke financiën podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, Dutch Dragons en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies