PodcastsTechnologie@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

629 afleveringen

  • @BEERISAC: OT/ICS Security Podcast Playlist

    Episode 63: From Research to Reality - Closing OT Security Blind Spots and Strengthening Defenses

    01-04-2026 | 22 Min.
    Podcast: Digitalization Tech Talks
    Episode: Episode 63: From Research to Reality - Closing OT Security Blind Spots and Strengthening Defenses
    Pub date: 2026-03-26

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In Episode 63, we conclude a two‑part series on cybersecurity by shifting from research insights to real‑world operational experience. Building on the findings from the recently released Intelligence‑Driven Active Defense Report 2026, this episode focuses on what those findings mean on the plant floor. We are joined by Marco Ayala, a long‑time cybersecurity practitioner with extensive experience across the process industries. Marco also serves as President of InfraGard’s Houston Chapter and National Sector Chief for Energy, offering a unique perspective at the intersection of industry and critical infrastructure protection.

    The group explores what OT teams are dealing with day to day, where common cybersecurity blind spots exist, and how IT/OT convergence is creating new challenges. They also examine the current of OT defenses, why gaps persist, and what practical first steps organizations can take to strengthen their cybersecurity posture. The episode wraps up with actionable takeaways aimed at helping listeners better understand today’s threat landscape and take meaningful steps toward improving the resilience of their operations.

    Show Notes:
    Website: Welcome to InfraGard (https://infragard.fbi.gov/)

    Website: ISA/IEC 62443 Series of Standards (https://bit.ly/3NUPyfc)

    Website: ISA/IEC 62443 Cybersecurity Certificate Program (https://bit.ly/4t3ySkx)

    Website: ABS Industrial and OT Cybersecurity Solutions (https://bit.ly/4bPohTn)

    Website: Siemens IT/OT Cybersecurity (https://bit.ly/4svqY3z)

    Video: Increased visibility and security level within the OT (https://bit.ly/3O05AV4)

    Whitepaper: Intelligence-Driven Active Defense Report 2026 (https://www.siemens.com/en-us/events/s4/)

    Contact Us:
    Marco Ayala ([email protected] and https://www.linkedin.com/in/marco-marc-ayala-a3b26934/)

    Jonas Norinder ([email protected] and linkedin.com/in/jonasnorinder)

    Don Mack ([email protected] and linkedin.com/in/don-mack)

    The podcast and artwork embedded on this page are from Siemens, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    OT Cybersecurity That Works: Budgets, Soft Skills & AI Reality for Stronger Defense

    31-03-2026 | 51 Min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: OT Cybersecurity That Works: Budgets, Soft Skills & AI Reality for Stronger Defense
    Pub date: 2026-03-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Strong OT cybersecurity programs aren’t built on tools alone, they're built on strategy, communication, and smart investment.

    In this episode of Protect It All, host Aaron Crow is joined by cybersecurity expert Don C. Weber for a candid, real-world discussion on what it actually takes to build and sustain effective security programs across IT and OT environments.

    From CapEx vs OpEx decisions to the growing role of AI in both attack and defense, this conversation cuts through the noise and focuses on what drives real outcomes: understanding business workflows, aligning with leadership, and developing the soft skills needed to turn strategy into action.

    You’ll learn:

    Why budgeting (CapEx vs OpEx) directly impacts security success

    The underrated power of soft skills in driving security programs

    How to connect cybersecurity efforts to business value and operations

    The role of pen testing and assessments in improving maturity

    Where AI adds value and where it introduces new risk

    How training and process understanding strengthen long-term resilience

    Whether you’re building a new security program or scaling an existing one, this episode delivers practical, experience-driven insights to help you make smarter decisions and drive real impact.

    Tune in to learn how to align strategy, people, and investment for stronger OT cybersecurity only on Protect It All.

    Key Moments: 

    05:49 Technical skills and security requirements

    09:10 Understanding data workflows

    12:29 Building a vulnerability management program

    13:26 Understanding organizational decision history

    17:44 Budgeting challenges with CAPEX and OPEX

    21:36 Steps in a security assessment

    24:17 Starting a cybersecurity program

    28:02 Prioritizing remote access security

    31:21 Discussing AI's impact on cybersecurity

    32:55 Using AI in cybersecurity

    38:07 AI simplifying complex knowledge

    40:35 AI tools making data queries easier

    45:02 Detecting and responding faster

    46:05 Networking and shared experiences

    About the guest: 

    Don C. Weber is a visionary cybersecurity leader who helps defenders safely prove security where it matters most in industrial operations. He is a SANS Principal Instructor, Founder of Cutaway Security, co-author of SANS ICS613: ICS/OT Penetration Testing & Assessments, and he also teaches SANS ICS410: ICS/SCADA Security Essentials to SANS student around the world. He brings years of field work into creating step-by-step labs and planning methods teams can use right away.

    How to connect Don: 

    LinkedIn: https://www.linkedin.com/in/cutaway/ 

    Cutaway Security: https://www.linkedin.com/company/cutaway-security-llc 

    CutSec Github: https://github.com/cutaway-security 

    CutSec GasPot HMI Lab: https://github.com/cutaway-security/gaspot-hmi-lab 

    SANS ICS ICS613 ICS/OT Penetration Testing and Assessments: https://www.sans.org/cyber-security-courses/ics-ot-penetration-testing-assessments

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Raphael Arakelian on Operation Grim Beeper

    30-03-2026 | 36 Min.
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Raphael Arakelian on Operation Grim Beeper
    Pub date: 2026-03-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Raphael Arkelian, the OT/IOT cybersecurity manager at Accenture, joins the Nexus Podcast to discuss his research into Operation Grim Beeper, the name given to a two-day attack in 2024 in the Middle East where explosives were introduced into pagers and walkie-talkies favored by Hezbollah. The explosions injured more than 1500 and killed dozens. Raphael’s research looks at several aspects of this attack and shares lessons and security gaps that can be applied across the OT and supply chain ecosystems. 
    Subscribe and listen to the Nexus Podcast here. 

    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    AI vs. Vulnerabilities: Who Really Wins?

    29-03-2026 | 33 Min.
    Podcast: Exploited: The Cyber Truth
    Episode: AI vs. Vulnerabilities: Who Really Wins?
    Pub date: 2026-03-26

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Artificial intelligence is transforming cybersecurity but not in the way many expect. While defenders are using AI to accelerate detection, triage, and threat hunting, adversaries are leveraging the same tools to scale reconnaissance, automate exploit development, and dramatically increase the speed of attack.

    In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Joe Slowik, Director of Cybersecurity Alerting Strategy at Dataminr, to discuss one critical question: Does AI actually reduce vulnerability risk or just accelerate the conflict?

    With a background including MITRE ATT&CK, Dragos, Los Alamos National Laboratory, and U.S. government offensive operations, Slowik offers a dual-lens perspective on how AI is reshaping both sides of cybersecurity.

    Together, they explore:

    How AI is increasing the velocity of vulnerability discovery and exploitation
    Why attackers may benefit from “good enough” AI outputs, while defenders require precision
    The rise in CVEs and why more vulnerabilities doesn’t necessarily mean worse security
    The growing risk in OT, IoT, and unmanaged edge devices
    Why AI is a powerful tool—not a magic bullet—and what that means for defenders

    From enterprise security teams to critical infrastructure operators, this episode breaks down what security leaders must understand to stay ahead in an AI-accelerated threat landscape.

    The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    ICIT’s Val Moon: Fixing Cybersecurity’s Workforce Problem is Essential for National Security

    28-03-2026 | 31 Min.
    Podcast: CYBR.SEC.CAST (LS 25 · TOP 10% what is this?)
    Episode: ICIT’s Val Moon: Fixing Cybersecurity’s Workforce Problem is Essential for National Security
    Pub date: 2026-03-24

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In this episode, hosts Michael Farnum and Sam Van Ryder sit down with Valerie Moon, Executive Director of the Institute for Critical Infrastructure Technology (ICIT) for a wide-ranging discussion about cybersecurity policy, workforce development, and the growing threats facing critical infrastructure.
    Things Mentioned:
    Website for ICIT: https://www.icitech.org/
    Upcoming CYBR.SEC.Community events: https://www.cybrsecmedia.com/conference/
    CYBR.SEC.Careers: https://www.linkedin.com/company/cybr-sec-careers/about/ fundraisers:
    Cards for a Cause: https://www.linkedin.com/posts/cybr-sec-careers_cybrseccareers-nonprofit-cybersecurity-activity-7436794892787359744-v4Cz
    CYBR CLAY SHOOT: https://www.linkedin.com/posts/cybr-sec-careers_cybrclayshoot-cybersecurity-cybercareers-activity-7435353518951084033-1iw9
    Proceeds support CYBR.SEC.Careers mission is to build a strong, diverse workforce by providing career exposure, access to education and certifications, and mentorship for students and veterans pursuing careers in cybersecurity.
    Do you have a question for the hosts? Reach out to us at [email protected] 
    Keep up with CYBR.SEC.CON.:
    LinkedIn
    X
    Facebook
    Instagram
    Keep up with CYBR.SEC.Media:
    LinkedIn
    X
    Facebook
    Instagram
    Check out our Conferences and Events:
    CYBR.SEC.CON.
    OT.SEC.CON.
    CYBR.HAK.CON.
    EXEC.SEC.CON.
    CSC User Group
    Support CYBR.SEC.Careers Non-Profit Efforts
    CYBR.SEC.Careers
    Apply to the CYBR.SEC.Careers Scholarship
    Taylor Austin Broussard Memorial Scholarship
    Listen to our other show:
    CYBR.HAK.CAST
    Thank you to our Media Partners:
    CYBR.SEC.CON. and OT.SEC.CON. 
    OGGN (Oil & Gas Global Network)
    UtilSec
    CYBR.SEC.CON. and CYBR.HAK.CON. 
    BarCode Podcast
    Cyber Distortion Podcast

    The podcast and artwork embedded on this page are from CYBR.SEC.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Meer Technologie podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, AI Report en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies