PodcastsTechnologie@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Nieuwste aflevering

620 afleveringen

  • @BEERISAC: OT/ICS Security Podcast Playlist

    3/4 Accionesde Auditoría de seguridad OT

    24-03-2026 | 12 Min.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 3/4 Accionesde Auditoría de seguridad OT
    Pub date: 2026-03-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    En este episodio se propone un rediseño de las auditorías modernas, planteando el uso de simulación de escenarios y «gemelos de incidentes» como evidencias de confianza. Explica la importancia de integrar la seguridad industrial con la seguridad funcional y la continuidad operativa para gestionar el riesgo sistémico de forma integral.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Michael Pyle on Securing Internet-Facing OT and ICS Assets

    23-03-2026 | 24 Min.
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Michael Pyle on Securing Internet-Facing OT and ICS Assets
    Pub date: 2026-03-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Michael Pyle, Director of Product Cybersecurity at Schneider Electric, joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to operational technology and industrial control systems that are insecurely connected to the internet. 
    Attackers are adept at enumerating exposed devices and leveraging OT and ICS to access process and corporate networks. Pyle explains that Internet Exposure Prevention drops inbound traffic that the asset did not initiate. Checks are made on the IP address initiating the connection and whether it's a routable source IP, and an allow/deny decision is made. 
    Pyle explains the risk to exposed devices, and the need to shut down illicit connections. 
    Subscribe and listen to the Nexus Podcast here. 

    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Cyber-Informed Engineering: Moving Beyond the Firewall

    22-03-2026 | 43 Min.
    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)
    Episode: Cyber-Informed Engineering: Moving Beyond the Firewall
    Pub date: 2026-03-18

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    For the last episode of season 5, host Bryson Bort sat down with Andrew Ohrt, Resilience Director at West Yost Associates. A civil engineer specializing in water infrastructure, Andrew bridges the gap between traditional engineering and digital risk. Andrew walks us through the "invisible" nature of water systems, the impact of data centers on utility resilience, and how Cyber-Informed Engineering (CIE) protects our most essential resource.

    How did a drive under a rebuilt bridge in Minneapolis pivot Andrew’s career toward critical infrastructure? Why did a single wastewater release shut down Waikiki Beach for an entire week? And what happens when a cybersecurity team finds a client’s PLC exposed on the open internet?

    “To me, the integration of understanding cyber or digital risk in our critical infrastructure, the engineers picking that understanding up, building awareness, building skill sets, figuring out how to manage that risk, is one of the most important things that we've been working on,” he said.

    Join us for this and more on this episode of Hack the Plan[e]t. 

    The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. 

    Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. 

    The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Episode 64: Rob Lee

    21-03-2026 | 33 Min.
    Podcast: CYBR.SEC.CAST (LS 25 · TOP 10% what is this?)
    Episode: Episode 64: Rob Lee
    Pub date: 2026-03-19

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Dragos CEO and U.S. National Guard Lt. Col. Rob Lee joins hosts Michael Farnum and Sam Van Ryder to discuss why he returned to military service, the growing cyber threats to critical infrastructure, and the role exercises like Cyber Fortress play in preparing both government and private sector operators for real-world cyber incidents. 
    SHOW NOTES:
    Things Mentioned:
    Cyber Fortress 2026: https://va.ng.mil/Cyber-Fortress/
    Upcoming CYBR.SEC.Community events: https://www.cybrsecmedia.com/conference/
    CYBR.SEC.Careers: https://www.linkedin.com/company/cybr-sec-careers/about/ fundraisers:Cards for a Cause: https://www.linkedin.com/posts/cybr-sec-careers_cybrseccareers-nonprofit-cybersecurity-activity-7436794892787359744-v4Cz
    CYBR CLAY SHOOT: https://www.linkedin.com/posts/cybr-sec-careers_cybrclayshoot-cybersecurity-cybercareers-activity-7435353518951084033-1iw9
    Proceeds support CYBR.SEC.Careers mission is to build a strong, diverse workforce by providing career exposure, access to education and certifications, and mentorship for students and veterans pursuing careers in cybersecurity.

    Episode 64 Timestamps:
    6:48 – Why Lee returned to military service
    Lee explains how calls from government and military leaders prompted him to return to the National Guard to help address unresolved questions around defending operational technology (OT) during conflict.
    9:33 – Role in the 91st Cyber Brigade
    Lee describes his position as executive officer and the mission of the Army National Guard’s cyber brigade.
    14:52 – Cyber Fortress exercise explained
    Lee walks through the origins of Cyber Fortress and how it evolved from a state-level exercise into a broader operational technology training environment.
    17:53 – How Cyber Fortress works
    The exercise combines training, red-team simulations, and participation from infrastructure operators to practice responding to real OT cyber incidents.
    20:10 – Cyber conflict and civilian infrastructure
    Lee discusses the growing risk of state actors targeting hospitals, utilities, and other civilian infrastructure.
    24:23 – Cyber attacks that lead to loss of life
    Lee argues the cybersecurity community must acknowledge that cyber operations have already contributed to real-world deaths.
    27:04 – The role of cyber in modern warfare
    The discussion explores how cyber capabilities are increasingly intertwined with traditional military conflict.
    Do you have a question for the hosts? Reach out to us at [email protected] 

    The podcast and artwork embedded on this page are from CYBR.SEC.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The Hard Reality of Patch Management in OT Networks | OT Security Made Simple

    20-03-2026 | 25 Min.
    Podcast: OT Security Made Simple
    Episode: The Hard Reality of Patch Management in OT Networks | OT Security Made Simple
    Pub date: 2026-03-17

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Join Klaus Mochalski and Westermo’s CISO Niklas Mörth to explore why OT patch management differs from IT. Discover the challenges of safety, the importance of system baselines, and alternative mitigations like zero trust to keep your critical infrastructure secure.
    You can find more information on OT Security Made Simple at rhebo.com or send us your ideas, questions, or guest suggestions at [email protected].

    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Meer Technologie podcasts

Over @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Luister naar @BEERISAC: OT/ICS Security Podcast Playlist, Acquired en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies