PodcastsTechnologie@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

665 afleveringen

  • @BEERISAC: OT/ICS Security Podcast Playlist

    #125: OT Cybersecurity Risk Assessments in the Power Industry

    03-05-2026 | 20 Min.
    Podcast: Energy Talks
    Episode: #125: OT Cybersecurity Risk Assessments in the Power Industry
    Pub date: 2026-04-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Discover methods, findings, and lessons directly from the energy industry
    In this episode of Energy Talks, host **Simon Rommer **speaks with his colleague Jaron Stammler, OT Cybersecurity Consultant at OMICRON, about how OT cybersecurity risk assessments are conducted in the power industry. Drawing from current experiences in substations and battery energy storage systems (BESS), they walk through how assessments are initiated, structured, and executed in practice.

    The discussion also highlights the gap between theory and reality, especially when assessments are performed late in project lifecycles due to regulatory or project constraints. Jaron explains the fundamentals of the IEC 62443-3-2 risk assessment process, including system scoping, risk identification, and zone and conduit modeling, while also addressing common challenges such as missing documentation and limited stakeholder availability.

    Simon and Jaron also emphasize how cybersecurity is an ongoing process and that effective assessments provide actionable insights, prioritized risks, and practical mitigation strategies tailored to each project.

    Get more information about security risk assessments at OMICRON .

    We would really like to know what you think about Energy Talks and which topics you would like to hear more about. To do this, simply send us an email to [email protected] and be sure to give us a star review on Spotify or Apple Podcast. Thanks for your feedback!

    Please join us to listen to the next episode of Energy Talks 🎙️

    The podcast and artwork embedded on this page are from OMICRON electronics GmbH, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The Phishing Attack That Could Have Shut Down a Plant Floor

    02-05-2026 | 26 Min.
    Podcast: Industrial Cybersecurity Insider
    Episode: The Phishing Attack That Could Have Shut Down a Plant Floor
    Pub date: 2026-04-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    A real-world case study shows how a single phishing email led to credential and MFA compromise, creating an urgent question for any industrial organization: Did the attacker reach the OT environment?
    Dino and Jim walk through how OT visibility, secure remote access controls, and continuous monitoring enabled rapid validation of what happened. They were able to prove the breach did not impact control systems and avoid an expensive, safety-driven shutdown of a continuous manufacturing process.
    The episode connects technical controls to executive outcomes, including resilience, duty of care, and the financial reality that “not knowing” can be as costly as an actual compromise.
    Chapters:
    (00:00:00) Why continuous manufacturing makes “abundance of caution” shutdowns so costly
    (00:01:00) What “OT continuous monitoring” means and why it matters in real incidents
    (00:03:00) Safety and connected environments: why “it can go boom” changes the stakes
    (00:05:00) Baselines: defining “normal” so abnormal behavior is actionable
    (00:07:00) Incident story: phishing email leads to credential and MFA compromise
    (00:09:00) What the team validated: tracing access and confirming OT was not impacted
    (00:10:00) Lessons from Colonial Pipeline: inability to validate can force shutdowns
    (00:11:00) OT reality check: Windows assets, HMIs, historians, and engineering workstations
    (00:13:00) Secure OT remote access: why VPN-only access is not sufficient
    (00:16:00) The payoff: avoided downtime, avoided product loss, and avoided disruption
    (00:19:00) Executive view: duty of care, liability, compliance, and protecting enterprise value
    (00:23:00) The “air gap” myth and why defense-in-depth is the only practical path

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Challenges of OT Cybersecurity with NetFoundry CEO Galeal Zino

    01-05-2026 | 22 Min.
    Podcast: Digital Transformation Viewpoints
    Episode: Challenges of OT Cybersecurity with NetFoundry CEO Galeal Zino
    Pub date: 2026-04-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In this edition of DTV, ARC vice president of research Larry O'Brien talks to NetFoundry founder and CEO Galeal Zino about the challenges facing end users when it comes to OT cybersecurity in the age of AI and digitalization. NetFoundry was created to address fundamental weaknesses in traditional networking and cybersecurity. We discuss how traditional networking is not designed for today’s digital transformation requirements. Complexity created by layered security tools increases risk and reduces reliability. NetFoundry replaces IP‑centric networking with cryptographically verifiable identities and policy‑based authorization, aligning networking more closely with zero‑trust principles.
    NetFoundry also maintains and actively invests in OpenZiti, its open‑source secure networking platform. The goal is to create a “Linux of secure networking,” supported by a growing global community. 
    Would you like to be a guest on our growing podcast?

    Do you have an intriguing or thought provoking topic you'd like to discuss on our podcast? Please contact Our Producer Tom Cabot at: [email protected]

    View all the episodes here: https://thedigitaltransformationpodcast.buzzsprout.com

    The podcast and artwork embedded on this page are from ARC Advisory Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    CE-Kennzeichen für Digitales: Wie der CRA die OT-Schieflage korrigiert | OT Security Made Simple

    01-05-2026 | 30 Min.
    Podcast: OT Security Made Simple
    Episode: CE-Kennzeichen für Digitales: Wie der CRA die OT-Schieflage korrigiert | OT Security Made Simple
    Pub date: 2026-04-28

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Klaus Mochalski und Sarah Fluchs (admeritia) beleuchten den Cyber Resilience Act. Erfahren Sie, warum der CRA eine historische Schieflage beendet, weshalb Hersteller künftig in der Pflicht sind und wie Betreiber das neue Gesetz als mächtigen Hebel für ihre NIS-2-Compliance nutzen können.
    Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an [email protected].  

    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    EP 85: From Colonial Pipeline to Agentic AI: What OT Security Actually Requires

    30-04-2026 | 36 Min.
    Podcast: Error Code (LS 27 · TOP 10% what is this?)
    Episode: EP 85: From Colonial Pipeline to Agentic AI: What OT Security Actually Requires
    Pub date: 2026-04-28

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Let’s face it, the Purdue model's DMZ is gone. Trevor Dearing, Director of Critical Infrastructure Solutions at Illumio, explains how zero trust, micro-segmentation, and explicit policy are now the only reliable defense for critical infrastructure OT.

    The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Meer Technologie podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity podcast episodes in any language, compiled by ICS security enthusiasts. Missing something? Contact Anton Shipulin on LinkedIn. Subscribe for updates!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, All-In with Chamath, Jason, Sacks & Friedberg en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies