PodcastsTechnologie@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

622 afleveringen

  • @BEERISAC: OT/ICS Security Podcast Playlist

    Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon Chassar

    26-03-2026 | 31 Min.
    Podcast: Industrial Cybersecurity Insider
    Episode: Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon Chassar
    Pub date: 2026-03-24

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Dino Busalachi sits down with Simon Chassar, former Chief Revenue Officer at Claroty and current OT cybersecurity advisor and investor, to explore the evolution and future of industrial cybersecurity.
    Simon shares insights from his decade-long journey in the space, discussing how OT asset visibility has become commoditized and why the industry is experiencing two major shifts: moving right toward threat-led SOC services and perimeter protection, and moving left toward secure-by-design approaches and attack simulation.
    They dive into the persistent challenge of self-performing versus partnering with specialized integrators, the critical skills shortage commanding 30-40% salary premiums, and why AI is both accelerating security challenges and offering new solutions.
    Simon reveals how private equity firms are finally prioritizing OT cybersecurity at the board level, discusses the emerging OT SOC landscape, and explains why the traditional IT security budget model is failing operational technology environments.
    The conversation addresses the disconnect between IT leadership and the OT ecosystem, the proliferation of unmanaged remote access technologies, and the urgent need for manufacturers to engage their trusted system integrators and OEMs as cybersecurity partners before the next major incident occurs.
    Chapters:
    (00:00:00) - Meet Simon : From Claroty's Hypergrowth to OT Security's Next Chapter
    (00:02:00) - The Commoditization of OT Asset Visibility
    (00:04:00) - Two Major Industry Shifts: Right and Left
    (00:07:00) - The Self-Performing Problem: Why OT Security Becomes Shelfware
    (00:10:00) - IT/OT Convergence and the Skills Gap Crisis
    (00:13:00) - Secure by Design and the AI Leapfrog
    (00:15:00) - AI Uncovers Hidden OT Vulnerabilities and Risks
    (00:18:00) - Funding Models and Private Equity's Cybersecurity Awakening
    (00:22:00) - Why the OT Ecosystem Must Drive Its Own Security Strategy
    (00:25:00) - M&A Activity and Consolidation in OT Cybersecurity
    (00:27:00) - The Rise of OT SOCs and MSP Partnerships

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter

    25-03-2026 | 32 Min.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter
    Pub date: 2026-03-23

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Cyberattacks don’t just test your systems - they test your preparedness.

    In this episode of Protect It All, host Aaron Crow breaks down key lessons from the Striker attack and what it reveals about today’s evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like “living off the land” - blending into normal operations instead of deploying obvious malware.

    Aaron takes this beyond theory, focusing on what organizations must do before an attack happens.

    A major theme? Tabletop exercises. Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can’t catch.

    You’ll learn:

    What the Striker attack teaches about modern cyber warfare

    How living-off-the-land tactics bypass traditional defenses

    Why tabletop exercises are essential for real-world readiness

    The role of threat hunting and collaboration across teams

    How attackers exploit weaknesses in both IT and OT environments

    Why small, consistent actions can dramatically improve resilience

    Whether you’re defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers practical insights you can apply immediately.

    Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All.

    Key Moments: 

    04:59 "Modern Warfare: Cyber and Beyond"

    08:47 "Security Risks of Remote Wipe"

    10:31 "Living Off the Land Tactics"

    13:11 "Balancing Power and Security"

    19:12 "Vulnerabilities Demand Swift Action"

    20:21 Prioritize Risk, Justify Investment

    25:04 Practice Preparedness Before Crisis

    26:48 Weak Links Threaten Cybersecurity

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    3/4 Accionesde Auditoría de seguridad OT

    24-03-2026 | 12 Min.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 3/4 Accionesde Auditoría de seguridad OT
    Pub date: 2026-03-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    En este episodio se propone un rediseño de las auditorías modernas, planteando el uso de simulación de escenarios y «gemelos de incidentes» como evidencias de confianza. Explica la importancia de integrar la seguridad industrial con la seguridad funcional y la continuidad operativa para gestionar el riesgo sistémico de forma integral.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Michael Pyle on Securing Internet-Facing OT and ICS Assets

    23-03-2026 | 24 Min.
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Michael Pyle on Securing Internet-Facing OT and ICS Assets
    Pub date: 2026-03-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Michael Pyle, Director of Product Cybersecurity at Schneider Electric, joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to operational technology and industrial control systems that are insecurely connected to the internet. 
    Attackers are adept at enumerating exposed devices and leveraging OT and ICS to access process and corporate networks. Pyle explains that Internet Exposure Prevention drops inbound traffic that the asset did not initiate. Checks are made on the IP address initiating the connection and whether it's a routable source IP, and an allow/deny decision is made. 
    Pyle explains the risk to exposed devices, and the need to shut down illicit connections. 
    Subscribe and listen to the Nexus Podcast here. 

    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Cyber-Informed Engineering: Moving Beyond the Firewall

    22-03-2026 | 43 Min.
    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)
    Episode: Cyber-Informed Engineering: Moving Beyond the Firewall
    Pub date: 2026-03-18

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    For the last episode of season 5, host Bryson Bort sat down with Andrew Ohrt, Resilience Director at West Yost Associates. A civil engineer specializing in water infrastructure, Andrew bridges the gap between traditional engineering and digital risk. Andrew walks us through the "invisible" nature of water systems, the impact of data centers on utility resilience, and how Cyber-Informed Engineering (CIE) protects our most essential resource.

    How did a drive under a rebuilt bridge in Minneapolis pivot Andrew’s career toward critical infrastructure? Why did a single wastewater release shut down Waikiki Beach for an entire week? And what happens when a cybersecurity team finds a client’s PLC exposed on the open internet?

    “To me, the integration of understanding cyber or digital risk in our critical infrastructure, the engineers picking that understanding up, building awareness, building skill sets, figuring out how to manage that risk, is one of the most important things that we've been working on,” he said.

    Join us for this and more on this episode of Hack the Plan[e]t. 

    The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. 

    Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. 

    The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Meer Technologie podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, De Nieuwe Wereld volgens de Grannies en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies