

When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy & What’s Next
23-12-2025 | 32 Min.
Podcast: Exploited: The Cyber Truth Episode: When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy & What’s NextPub date: 2025-12-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAs vehicles evolve into always-connected, software-defined systems, cybersecurity decisions increasingly shape privacy, safety, and trust on the road. In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joseph M. Saunders and special guest Sean McKeever, Global Product Cybersecurity Lead at Marelli, for a candid discussion on what it really means to secure modern vehicles. Sean brings deep industry experience to unpack how OEMs and suppliers are navigating data stewardship, autonomous testing, vehicle theft, and diverging global regulations. Together, Paul, Joe, and Sean explore: What constant connectivity means for driver privacy and data stewardshipThe risks of beta-testing autonomous systems on public roadsHow car theft has shifted from physical break-ins to software exploitationWhy U.S. and EU cybersecurity regulations take fundamentally different approachesThe importance of collaboration across OEMs, suppliers, and regulators From RF relay attacks to software-defined vehicles with decade-long lifecycles, this episode highlights why cybersecurity is no longer an add-on but a core design decision shaping the future of mobility.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

How the threat landscape for OT has changed since Colonial Pipeline | OT Security Made Simple
23-12-2025 | 28 Min.
Podcast: OT Security Made SimpleEpisode: How the threat landscape for OT has changed since Colonial Pipeline | OT Security Made SimplePub date: 2025-12-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMike Holcomb, independent OT/ICS security advisor and former Director of OT security at Flour, talks about the shift of cyber threats in the OT space and the struggles of small entities to secure themselves. He proposes the BASIC principle to get started fast despise limited budgets.You can find more information on OT Security Made Simple at rhebo.com or send us your ideas and questions at [email protected] podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Why OT Must Lead the Manufacturing Cybersecurity Conversation
21-12-2025 | 30 Min.
Podcast: Industrial Cybersecurity InsiderEpisode: Why OT Must Lead the Manufacturing Cybersecurity ConversationPub date: 2025-12-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationKatie O'Brien shares her unconventional journey from music teacher to industrial cybersecurity expert, bringing over 25 years of IT experience into the OT world. In this conversation with Dino, Katie discusses the critical gaps in OT cybersecurity—from the lack of university programs teaching industrial security to the disconnect between IT and OT teams. They explore why system integrators and OEMs fail to design cybersecurity into new manufacturing projects from the start, compare it to building cars without safety features, and discuss the emergence of managed services in the OT space. Katie explains how Garland Technology helps organizations get visibility into aging infrastructure with unmanaged switches, and both hosts emphasize the urgent need for the OT ecosystem to drive cybersecurity conversations proactively rather than waiting for IT teams who may never have walked the plant floor.Chapters:(00:00:00) - The Hard Truths About OT Security Nobody Wants to Hear(00:01:06) - Katie's Unconventional Journey: From Music Teacher to OT Cybersecurity Expert(00:04:00) - The Current State of OT Cybersecurity and Future Directions(00:06:00) - The Education Gap: Why Universities Aren't Teaching Industrial Cybersecurity(00:08:00) - The Disconnect Between IT/Security Teams and OT Operations(00:10:00) - Designing Cybersecurity Into New Manufacturing Projects From the Start(00:13:00) - IT Teams Who've Never Walked the Plant Floor(00:16:00) - The Emergence of Managed Services in the OT Space(00:18:00) - Garland Technology: Getting Visibility Into Aging Infrastructure(00:19:00) - Software Defined Automation and the Future of Industrial Control(00:22:00) - Why the OT Ecosystem Must Drive the Cybersecurity Conversation(00:24:00) - The Real Cost of Downtime and Cyber Incidents in ManufacturingLinks And Resources:Katie O'Brien on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

AI and the Future of Maritime Cybersecurity
20-12-2025 | 40 Min.
Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: AI and the Future of Maritime CybersecurityPub date: 2025-12-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Bryson Bort sits down with Gary Kessler, retired cybersecurity professor and co-founder and director of the Maritime Hacking Village. As a maritime cybersecurity researcher, consultant, and practitioner with nearly fifty years of experience, Gary walks us through the ins and outs of cybersecurity at sea, automated identification systems (AIS), and AI’s current and future role in maritime operations. What is AIS spoofing, and why is it dangerous? What are the unique challenges posed by cybersecurity at sea? Is the maritime industry ready for artificial intelligence integrations? “AI is going to [present] really incredible opportunities for us moving forward. I think however, it is a tool that is not well understood in general by people who are not specialists. And particularly in the maritime industry, we're going to have to get a lot better at understanding the capabilities and the pitfalls,” Gary said. Join us for this and more on this episode of Hack the Plan[e]t. The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Secure Deployment in OT | 57
20-12-2025 | 1 u. 2 Min.
Podcast: ICS Arabia PodcastEpisode: Secure Deployment in OT | 57Pub date: 2025-12-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoined by Marco (Marc) Ayala on ICS Arabia Podcast 🎙, a globally recognized ICS/OT security leader, President of InfraGard Houston, and ISA Fellow, with over 30 years of experience securing critical infrastructure across oil & gas, chemicals, and the maritime domain.We’ll explore: ⚓ Secure Deployment in Critical OT Control & Safety ⚓ Maritime cybersecurity challenges in ports and offshore facilities ⚓ Best practices for resilience in high-stakes OT environments ⚓ Marco’s work with the International Society of Automation (ISA) – his history with the organization, contributions to standards, and role as an instructor ⚓ His leadership in InfraGard and how it strengthens collaboration between government and industry to protect critical infrastructure ⚓ Advice for countries building their own OT security standards – lessons learned from global best practices and regional implementationsThe podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.



@BEERISAC: OT/ICS Security Podcast Playlist