PodcastsZaken en persoonlijke financiën@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

605 afleveringen

  • @BEERISAC: OT/ICS Security Podcast Playlist

    EP 82: Kerberos in OT: RC4 Downgrade Attacks

    09-03-2026 | 26 Min.
    Podcast: Error Code (LS 27 · TOP 10% what is this?)
    Episode: EP 82: Kerberos in OT: RC4 Downgrade Attacks
    Pub date: 2026-03-04

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Kerberos, a decades-old authentication protocol, creates hidden risks in OT environments. Dor Segal, security researcher team lead at Silverfort, discusses delegation abuse, cipher downgrade attacks, and person-in-the-middle threats—highlighting why legacy encryption, patching challenges, and operational constraints make identity security critical in industrial networks.

    The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook

    08-03-2026 | 31 Min.
    Podcast: Industrial Cybersecurity Insider
    Episode: The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook
    Pub date: 2026-03-03

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    LuRae Lumpkin, Producer of Industrial Cybersecurity Insider, sits down with industrial cybersecurity expert Dino Busalachi to break down the 2026 World Economic Forum Global Cybersecurity Outlook Report and what it really means for manufacturers.
    While the report surveyed nearly a thousand CEOs, CIOs, and CISOs, Dino reveals a critical blind spot: industrial control systems and OT environments are being left dangerously exposed.
    They discuss how AI is becoming a double-edged sword for attackers and defenders, why supply chain vulnerabilities remain unaddressed, the shocking lack of cybersecurity skills on plant floors, and why most companies still aren't conducting incident response exercises.
    Dino shares real-world insights from working in nearly 2,000 plants over four decades, explaining why IT and OT remain disconnected, how remote access creates massive security gaps, and why outdated equipment with decades-old vulnerabilities sits unpatched in critical manufacturing environments.
    The conversation reveals that while enterprises focus on IT security, the plant floor—where revenue is actually generated—remains critically vulnerable, with potentially catastrophic consequences for businesses, supply chains, and even national GDP.
    Chapters:
    (00:00:00) - Introduction and Overview of WEF 2026 Cybersecurity Report
    (00:01:00) - Where Cybersecurity Funding Actually Goes: IT vs OT Reality
    (00:03:00) - The Myth of Disconnected Legacy Equipment (00:05:00) - AI as a Double-Edged Sword in Industrial Environments
    (00:08:00) - The Vulnerability Crisis: Thousands of Unpatched Systems
    (00:09:00) - Third-Party and Supply Chain Security Gaps
    (00:12:00) - Remote Access: The Hidden Attack Vector
    (00:14:00) - Critical Supplier Dependencies and Decentralized OT
    (00:15:00) - The Skills Gap: Why Industrial Cybersecurity Expertise is Scarce
    (00:19:00) - The Shocking Truth About Incident Response Exercises
    (00:22:00) - Real-World Impact: When Manufacturers Get Hit
    (00:24:00) - Getting All Stakeholders in the Same Room
    (00:28:00) - Insurance vs Prevention: The True Cost of Cyber Incidents
    (00:29:00) - Final Thoughts: Who Should Own OT Cybersecurity?
    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    NIS-2 kompakt: Was für Unternehmen zählt | OT Security Made Simple

    07-03-2026 | 26 Min.
    Podcast: OT Security Made Simple
    Episode: NIS-2 kompakt: Was für Unternehmen zählt | OT Security Made Simple
    Pub date: 2026-03-03

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Klaus Mochalski und Rechtsanwalt sowie Partner Thomas Schmeding (BBH Consulting) klären die wichtigsten Fragen zu NIS-2: Wer ist durch die neuen Schwellenwerte betroffen? Welche Haftungsrisiken kommen auf die Geschäftsleitung zu und wie gelingt die Umsetzung? Ein Pflicht-Update zur Cybersicherheit.
    Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an [email protected].  

    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    IT SOC vs OT SOC How & Why They’re Different

    06-03-2026 | 26 Min.
    Podcast: Industrial Cybersecurity Insider
    Episode: IT SOC vs OT SOC How & Why They’re Different
    Pub date: 2026-02-25

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Craig and Dino tackle the critical differences between IT and OT Security Operations Centers, revealing why traditional IT-centric SOCs are failing to protect manufacturing environments.
    Drawing from real-world examples, including a global beverage company that discovered they were only monitoring one-third of their OT assets, the hosts expose the fundamental disconnect between IT security teams and operational technology environments.
    They discuss why IT SOCs struggle with OT visibility, the challenges of asset inventory in dynamic manufacturing environments, and the critical importance of localization in security operations.
    The conversation covers practical barriers like line changeovers, PLC modifications, remote access vulnerabilities, and the need for OT-specific incident response protocols.
    Craig and Dino emphasize that effective OT security requires IT teams to become embedded in plant operations, working collaboratively with OEMs and system integrators, and understanding the unique operational context of manufacturing assets.
    This episode is essential listening for CISOs, plant managers, and security professionals trying to bridge the IT-OT security gap.
    Chapters:
    (00:00:00) - The Two-Thirds Problem: When Your SOC Can't See Your Plant Floor
    (00:01:00) - The OT SOC Asset Visibility Problem: A Case Study
    (00:03:00) - Why IT SOCs Can't Manage OT Assets
    (00:05:00) - Line Changeovers and Operational Context
    (00:07:00) - First Responders and Incident Response Challenges
    (00:10:00) - The WannaCry Response Gap
    (00:12:00) - Asset Inventory and Baseline Challenges
    (00:15:00) - Incident Response and Phone Trees
    (00:17:00) - Organizational Accountability Problems
    (00:19:00) - Greenfield Opportunities and Standardization
    (00:22:00) - The IT-OT Collaboration Challenge
    (00:24:00) - Think Global, Act Local: Embedding IT in Plants

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Safe AI Automation for Cybersecurity: Practical Workflows Without the Risk

    05-03-2026 | 15 Min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: Safe AI Automation for Cybersecurity: Practical Workflows Without the Risk
    Pub date: 2026-03-02

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    AI can accelerate cybersecurity - or accidentally expose it.

    In this solo episode of Protect It All, host Aaron Crow breaks down how cybersecurity professionals can safely integrate AI into their IT and OT workflows. As tools like ChatGPT, Copilot, and enterprise AI platforms become part of daily operations, the question isn’t whether to use AI - it’s how to use it responsibly.

    Aaron moves beyond buzzwords to focus on practical, everyday applications: automating reports, summarizing threat intelligence, drafting policies, enhancing documentation, and streamlining repetitive tasks. At the same time, he tackles the real concerns leaders face - data privacy, compliance, policy alignment, and shadow AI risks.

    You’ll learn:

    Where AI delivers immediate value in cybersecurity workflows

    How to automate without exposing proprietary or regulated data

    The difference between enterprise AI tools and public platforms

    How to align AI usage with corporate security policies

    Practical ways CISOs and analysts can boost productivity safely

    Why governance and awareness matter as much as innovation

    Whether you’re leading a security program or working hands-on in IT or OT environments, this episode delivers actionable strategies to use AI smarter—not riskier.

    Tune in to learn how to automate with confidence and stay ahead of the curve—only on Protect It All.

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast

     

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Meer Zaken en persoonlijke financiën podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, The Diary Of A CEO with Steven Bartlett en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies