James McQuiggan brings inspiring stories of cybersecurity practitioners "break-into-industry" stories across all dimensions of cybersecurity.
…
continue reading
Automotive Cyber Security Podcasts
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
…
continue reading
1
From Philosophy to Cybersecurity: An Unexpected Path With Christine Smoley
37:39
37:39
Play later
Play later
Lists
Like
Liked
37:39This week we have a captivating conversation with Christine Smoley, as she shares her journey from an academic background in phenomenology to a successful career in cybersecurity. Key topics include networking at DEFCON, the importance of language acquisition and mental models, challenges of building security teams in startups, and her unique inter…
…
continue reading
1
From Bartender to Cybersecurity: Brent "CodeBrew" Buch's Unique Journey
31:50
31:50
Play later
Play later
Lists
Like
Liked
31:50This week we chat with Brent Buch, also known as Code Brew, to explore his fascinating transition from working in the food and beverage industry to becoming a junior database administrator and aspiring cybersecurity professional. Brent discusses the challenges he faced breaking into the cybersecurity field, the value of transferable skills from bar…
…
continue reading
1
From Culinary Arts to Cybersecurity: The Journey and Humor of Dan 'Haircut Fish' Rearden
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56In this episode of Simply Secured, host James Mcquiggan engages in an insightful and entertaining conversation with Dan “The Haircut Fish” Rearden. Dan shares his unconventional journey from various odd jobs and college culinary arts to becoming a SOC analyst. Dan talks about his love for technology, self-guided learning through TryHackMe, and tran…
…
continue reading
1
From Patent Law to Product Security: A Cybersecurity Journey in the Automotive Industry
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27On this week’s episode we chat with Tyson Benson and explore his diverse career as a senior product cybersecurity analyst for ZFI. With a background in patent law, Benson shares his unique insights on the importance of cybersecurity in the automotive industry, particularly as it pertains to software-defined vehicles. Discover the pivotal moments th…
…
continue reading
1
Harmonizing Cybersecurity: From Trombone to Tech with Debon Grady
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24Today we chat with Debon Grady, an IT Security Specialist with the South Carolina Department of Mental Health. Debon shares his unique path from music education major to cybersecurity expert, discussing key moments, valuable skills learned, and the importance of mentorship. Discover his thoughts on the relationship between red and blue teams, the s…
…
continue reading
1
From Air Force to Cybersecurity A Journey of Leadership and Service With Cristina Pawlica
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31Today we chat with Cristina Pawlica, a distinguished member of the Simply Cyber community with an extensive background in cybersecurity and military service. Cristina shares her unique journey from serving in the Air Force as a Force Support Officer to pursuing a career in cybersecurity. She delves into crucial leadership lessons and discusses the …
…
continue reading
1
AI Security Awareness and Quantum Computing: Insights from a Rising Cybersecurity Star
34:41
34:41
Play later
Play later
Lists
Like
Liked
34:41Welcome back for Season 2! We kickoff with a graduating senior from Rensselaer Polytechnic University as she transitions from academic research to industry applications in the world of cybersecurity. In this episode, we sit down with Shoshana Sugerman, to explore her journey from classroom to conference room. We delve into Shoshana's work on Grover…
…
continue reading
1
Cyber Lessons in Leadership with Fletus Poston III
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09In this episode we delve into the world of cybersecurity with Fleetus Poston III, a dynamic public speaker, passionate mentor, and cybersecurity evangelist. Fleetus shares his journey, including his 'aha' moment in cybersecurity, handling imposter syndrome, the significance of a healthy security culture, and the impact of a recent reduction in forc…
…
continue reading
1
Navigating Cybersecurity and Community Engagement with FedX aka Federico Castro
41:01
41:01
Play later
Play later
Lists
Like
Liked
41:01This week, we chat with Federico Castro, a cybersecurity professional and member of the ISC2 Central Florida chapter, known by his nickname 'FedEx'. We discuss FedX’s transition from physical security and construction into cybersecurity, fueled by his diagnosis of ADHD and his pursuit of education. Federico highlights the importance of networking, …
…
continue reading
1
Airwaves to AI: Education and Innovation from Kathy Chambers
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39In this wonderful episode with Emmy award winning Kathy Chambers, we explore her fascinating journey as a project manager at Antisyphon Training with Black Hills Information Security. Kathy's unique path from broadcast journalism to cybersecurity offers valuable insights for anyone considering a career transition or looking to leverage their existi…
…
continue reading
1
Navigating the SOC Analyst Landscape Insights with Casually Joseph
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24Join us for an exciting episode with Joseph Cadden, aka Casually Joseph, a passionate cybersecurity expert and Palo Alto MDR security analyst. Joseph shares his fascinating journey from building gaming computers in high school to pursuing a master's degree and working in managed detection and response. We explore the importance of certifications, e…
…
continue reading
1
Navigating Cyber Pathways: GRC, Volunteering, and YouTube with Bdubzz
39:03
39:03
Play later
Play later
Lists
Like
Liked
39:03In this episode we chat with Brittany White, also known as Bdubzz, a dynamic content creator who is passionate about cybersecurity. She shares her journey from CAD design to a successful career in cybersecurity, highlighting her pivotal 'aha' moment. Brittany elaborates on her efforts in building a home lab and transitioning towards governance, ris…
…
continue reading
1
Blending Bytes and Barley: Ryan Pearson's Unique Tech Adventure
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13Ever wondered how a passion for home brewing could blend seamlessly with a career in cybersecurity? In this episode, we sit down with Ryan Pearson, known to many as "Brews n' Hacks," to explore the fascinating intersection of these two worlds and the valuable lessons they share. Ryan's journey from biology student to cybersecurity professional is a…
…
continue reading
1
Cyber & Drones: Exploring the Intersection of OSINT and Vulnerabilities
29:52
29:52
Play later
Play later
Lists
Like
Liked
29:52In this episode, James interviews Luke Canfield, as he shares his path into cybersecurity, which started 20 years ago and was reignited by an interest in hardware tinkering and drones. Luke discusses how he prioritizes vulnerabilities in systems, the significance of writing detailed reports, and the challenges faced in vulnerability management. He …
…
continue reading
Elevating Your Cybersecurity Career with Dennis Keefe: From Law Enforcement to OSINT In this week's episode of 'Simply Secured: Elevating Your Cybersecurity Career,' we sit down with Dennis Keefe who transitioned from a decade-long career in law enforcement to becoming a cybersecurity enthusiast with a special focus on open source intelligence (OSI…
…
continue reading
1
Todd Beebe: Beyond IT vs. OT, The Common Ground for Securing Any Environment
1:03:45
1:03:45
Play later
Play later
Lists
Like
Liked
1:03:45About Todd Beebe: Todd Beebe, a cybersecurity veteran since the early 90s, commenced his journey by thwarting attempts to hack his BBS. His expertise led to pivotal roles with an international organization, securing remote access, fortifying websites, and pioneering firewall deployment. Later, at Ernst & Young, he spearheaded the Attack & Penetrati…
…
continue reading
1
Ron Fabela: Secure Access That Makes Sense for Operations
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23About Ron Fabela: Ron Fabela, a seasoned cybersecurity professional with over 20 years of experience, specializes in safeguarding Industrial Control Systems (ICS) and Operations Technology (OT). Currently serving as the Field CTO at XONA, Ron leads initiatives to establish secure industrial access, ensuring safe operations for asset owners globally…
…
continue reading
1
Dan Gunter: Lessons Learned from Real-World Attack on Ukraine’s Critical Infrastructure
58:28
58:28
Play later
Play later
Lists
Like
Liked
58:28About Dan Gunter: Dan Gunter, founder and CEO of Insane Forensics, is a seasoned cybersecurity professional renowned for his extensive expertise in the field. With a background as an officer in the United States Air Force, specifically with the Air Force Computer Emergency Response Team (AFCERT) and operational CYBERCOM teams, Dan has a wealth of e…
…
continue reading
1
Thomas VanNorman: ICS Security Takes a Village - Building an OT Security Community
45:31
45:31
Play later
Play later
Lists
Like
Liked
45:31About Thomas VanNorman: Thomas VanNorman, a seasoned professional with almost three decades of experience in OT, is currently leading the CyPhy Product group at GRIMM. His primary focus involves securing Industrial Control Systems and networking within this domain. Additionally, Tom is a co-founder of the ICS Village, a 501(c)(3) non-profit organiz…
…
continue reading
1
Don C. Weber: The Gray Area Between OT and IT
55:58
55:58
Play later
Play later
Lists
Like
Liked
55:58About Don C. Weber: Don C. Weber is the Principal Consultant and Founder of Cutaway Security, LLC, an information security consulting firm based in Texas. With a master's degree in network security and a Certified Information Systems Security Professional (CISSP) certification, Don has a wealth of expertise gained over two decades. As a seasoned le…
…
continue reading
1
Ron Brash: Understanding the Small Details to Define Risk
55:36
55:36
Play later
Play later
Lists
Like
Liked
55:36About Ron Brash: Ron Brash, a renowned figure in ICS/OT cybersecurity and embedded vulnerability research, garnered acclaim as the recipient of the Top 40 under 40 award for Engineering Leaders 2020 from Plant Engineering. Serving as the VP of Technical Research & Integrations at aDolus Technology Inc., Ron aligns his passion for ICS/OT security by…
…
continue reading
1
Michael Holcomb: The Journey from IT to OT and Strengthening IT-OT Partnership
49:05
49:05
Play later
Play later
Lists
Like
Liked
49:05About Michael Holcomb: Michael Holcomb is the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, a prominent engineering, procurement, and construction company. In his current role, he focuses on securing vast ICS/OT environments, ranging from power plants and commuter rail to manufacturing facilities and refineries. Curren…
…
continue reading
1
Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk
58:58
58:58
Play later
Play later
Lists
Like
Liked
58:58About Kayne McGladrey: Kayne McGladrey, CISSP, is a seasoned cybersecurity expert with over twenty-five years of experience and a senior member of the IEEE. As the field CISO for Hyperproof, he specializes in advising companies on upholding the implicit social contract to protect entrusted data. Kayne's transformative leadership has been instrument…
…
continue reading
1
John Cusimano: Leveraging ISA/IEC 62443 to Quantify OT Risk
45:04
45:04
Play later
Play later
Lists
Like
Liked
45:04About John Cusimano: John Cusimano is a seasoned business and thought leader, boasting over 30 years of expertise in process control, functional safety, and operational technology (OT) and industrial control systems (ICS) cybersecurity. With a track record of conducting numerous OT cybersecurity vulnerability assessments, he has played a pivotal ro…
…
continue reading
1
Eric Smith: The Importance of Physical Security in Protecting Infrastructure
42:50
42:50
Play later
Play later
Lists
Like
Liked
42:50About Eric Smith: Eric Smith is a dedicated Security Management Consultant and the founder of Business Karate, LLC, a Colorado-based company specializing in security planning and strategic development for organizations. With over a decade of experience in law enforcement, Eric is passionate about aligning security measures with business needs and h…
…
continue reading
1
Nick Tsamis: Leveraging MITRE’s Adversary Emulation Platform in OT
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58About Nick Tsamis: Nick currently serves as Department Chief Engineer within the Cybersecurity Infrastructure Protection Innovation Center (CIPIC) at The MITRE Corporation where he works to develop strategies for protection against emerging threats on critical infrastructure. Nick led the technical efforts for the first release of Caldera for OT. H…
…
continue reading
1
Chris Bihary: Tapping Into Packet Level Data in OT
56:38
56:38
Play later
Play later
Lists
Like
Liked
56:38About Chris Bihary: Chris Bihary is the CEO and Co-Founder of Garland Technology, a leading USA-based manufacturer specializing in Network TAPs, Network Packet Brokers, Hardware Data Diodes, and Inline Bypass solutions. With a rich background spanning over 30 years in IT and OT cybersecurity, Chris has fostered collaborative partnerships with tech …
…
continue reading
1
Raphael Arakelian: Beyond the Tools - Maturing Implementation to Reduce Risk
57:08
57:08
Play later
Play later
Lists
Like
Liked
57:08About Raphael Arakelian: Raphael Arakelian is a distinguished figure in the field of cybersecurity, serving as a manager within PwC Canada's OT & IoT cybersecurity team. With a national leadership role, he directs PwC Canada's efforts in OT monitoring implementation services, overseeing proof-of-concept evaluations and implementations across divers…
…
continue reading
1
Jonathan Tubb: Unlocking Business Value at the Intersection of IT, OT, Operations, and Cybersecurity
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08About Jonathan Tubb: Jonathan Tubb is a seasoned cybersecurity expert, renowned for his proficiency in crafting innovative solutions to address the most pressing security issues in the power generation sector. With a background in Computer Engineering from Ohio State University and a Professional Engineer (P.E.) license, he has over 15 years of han…
…
continue reading
1
Josh Varghese: Holistic, Scalable OT Network Design
1:14:12
1:14:12
Play later
Play later
Lists
Like
Liked
1:14:12About Josh Varghese: Josh Varghese, founder of Traceroute, is a seasoned industrial networking expert who has dedicated himself to serving the dynamic industrial/OT market. With nearly a decade of experience as a technical lead at Industrial Networking Solutions, where he established their technical support and application engineering department, J…
…
continue reading
1
Fred Gordy: Protecting the Safety and Resilience of the Buildings We Live and Work In
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12About Fred Gordy: Fred Gordy is a pioneering figure in the SmartBuilding industry, with two decades of expertise in developing and implementing secure control systems for Fortune 500 companies across the globe. A trailblazer in addressing the inherent cybersecurity risks posed by control system technology, he has authored over 100 articles on build…
…
continue reading
1
Matthew Scott: Protecting Legacy OT in Mass Transit
58:18
58:18
Play later
Play later
Lists
Like
Liked
58:18About Matthew Scott: Matthew Scott is a technical leader with over three decades of experience in industrial automation, specializing in the design, deployment, and maintenance of cutting-edge SCADA systems across critical infrastructure sectors such as transit, oil & gas, energy, and water/wastewater. His expertise spans a wide range of hardware a…
…
continue reading
1
Clint Bodungen: Cybersecurity Simulation As A Video Game, With AI Adversaries
1:05:37
1:05:37
Play later
Play later
Lists
Like
Liked
1:05:37About Clint Bodungen: Clint Bodungen is a distinguished industrial cybersecurity expert, celebrated public speaker, accomplished author, and a trailblazer in the realm of cybersecurity gamification. With over 25 years of experience in the field, he has left an indelible mark as the Founder, CEO & Chairman of ThreatGEN® Red vs. Blue. A veteran of th…
…
continue reading
1
Ian Frist: Beyond Buzzwords, Building Effective Programs in OT Security
50:51
50:51
Play later
Play later
Lists
Like
Liked
50:51About Ian Frist: Ian Frist is the Cybersecurity Compliance Program Director at Corning, boasting a MS in Cybersecurity. With a dynamic background spanning both private sector and government roles, Ian's expertise encompasses NIST, CIS, and CMMC frameworks. Currently leading Corning's compliance team within the cybersecurity group, Ian's journey ven…
…
continue reading
1
Michael Weigand: From Planes to Power Plants, Protecting The Intersection of Physical and Digital
53:16
53:16
Play later
Play later
Lists
Like
Liked
53:16About Michael Weigand: Michael Weigand is the visionary co-founder and Chief Growth Officer of Shift5, spearheading the realization of Shift5’s ambitious growth strategies. With a distinguished background, he spent eight years as an innovative leader in the U.S. Army, pioneering cyber operations and commanding specialized cyber units. Michael's piv…
…
continue reading
1
Daniel Bardenstein: Transparency and Trust With SBOM
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15About Daniel Bardenstein: Daniel Bardenstein is the driving force behind Manifest, a pioneering software supply chain company revolutionizing how organizations manage SBOM lifecycles. As CTO and co-founder, he empowers enterprises to automate and streamline their processes. Daniel's remarkable journey includes pivotal roles such as Chief of Tech St…
…
continue reading
1
Terence Gill & Roger Simmons: Bringing Texas Utilities Together to Strengthen The Grid Through Collaboration
41:16
41:16
Play later
Play later
Lists
Like
Liked
41:16About Terence Gill: Terence Gill is a seasoned professional with 26 years of experience in technical roles across various industries. With a background in Computer Science and Finance, he has successfully designed and developed critical systems for organizations like Lockheed Martin, the New York Metropolitan Transportation Authority, and BNY Mello…
…
continue reading
1
Mollie Breen: Accelerating OT Security, Reliability and Efficiency
45:47
45:47
Play later
Play later
Lists
Like
Liked
45:47About Mollie Breen: Mollie Breen is the dynamic CEO and Co-founder of Perygee, a groundbreaking IoT/OT security platform that has garnered significant funding. With a strong background as an Applied Research Mathematician at esteemed organizations such as the Department of Defense and the National Security Agency, Mollie is a recognized expert in n…
…
continue reading
1
Pete Mauro: Designing System Security Before ‘Cyber’ Became Part of Everyday Vocabulary
50:43
50:43
Play later
Play later
Lists
Like
Liked
50:43About Pete Mauro: Pete Mauro is a highly accomplished serial entrepreneur with extensive experience and successful exits in the defense industry. With a background spanning startups, system integrators, procurement, and program management, Pete is the CEO and Founder of DTCUBED, a startup consulting firm specializing in cybersecurity, predictive an…
…
continue reading
1
Danielle Jablanski: Navigating the Multitude of OT Technologies Considering Interoperability, Reliability, and Centralization
46:39
46:39
Play later
Play later
Lists
Like
Liked
46:39About Danielle Jablanski: Danielle Jablanski is an accomplished OT cybersecurity strategist at Nozomi Networks, where she spearheads global research on cybersecurity and drives awareness of operational technology (OT) and industrial control systems (ICS) cybersecurity throughout the industry. She is a nonresident fellow at the Cyber Statecraft Init…
…
continue reading
1
Joy Ditto: The Evolution of Utility Cybersecurity with NERC CIP
1:04:43
1:04:43
Play later
Play later
Lists
Like
Liked
1:04:43About Joy Ditto: Joy Ditto is a dynamic leader and influential figure in the energy sector. As the President and CEO of Joy Ditto Consulting, she advises companies on vital areas such as cyber and physical security, resilience, broadband, and clean energy development. With her strategic prowess, Joy helps organizations shape their engagement with t…
…
continue reading
1
Michael Welch: Tying Resilience, Availability, Compliance and Cybersecurity Together Into a GRC Program
53:59
53:59
Play later
Play later
Lists
Like
Liked
53:59About Michael Welch: Michael Welch is the Director, GRCaaS within T&D Governance, Risk, Cybersecurity & Compliance group at Burns & McDonnell. He has over 25 years of professional experience in risk management, compliance, and critical infrastructure. Michael previously served as global chief information security officer for OSI Group, a privately-…
…
continue reading
1
Matt Wyckhouse: Behind the Cyber Shield: OT Security and the Importance of SBOM
50:37
50:37
Play later
Play later
Lists
Like
Liked
50:37About Matt Wyckhouse: Matt Wyckhouse is a renowned cybersecurity expert with over 15 years of experience in offensive and defensive cyber operations. He is the co-founder and CEO of Finite State, a cybersecurity startup that focuses on illuminating the vulnerabilities and threats within complex software supply chains to protect the devices that pow…
…
continue reading
1
Eric Olden: Managing Identity, Security, and Resiliency in Multi-Cloud Environments
55:33
55:33
Play later
Play later
Lists
Like
Liked
55:33About Eric Olden: Eric Olden is a serial entrepreneur who has made a career out of simplifying and securing enterprise identity management. He is widely respected as a thought leader in identity management and has pioneered three major paradigm shifts in the field. Eric founded, scaled, and successfully exited both Securant/ClearTrust and Symplifie…
…
continue reading
1
Phoenix: OT Security for Smaller Plants and Factories
24:28
24:28
Play later
Play later
Lists
Like
Liked
24:28In this special episode, we are joined by Gabe Authier and Greg Valentine to introduce Industrial Defender's new product, Phoenix, an innovative OT security solution designed specifically for small to medium-sized businesses struggling with limited resources and budget. With the rise of attacks on operational technology and the crippling effects of…
…
continue reading
1
Roya Gordon: Secure Connections - Why Human Interaction is Key to OT Security
50:17
50:17
Play later
Play later
Lists
Like
Liked
50:17About Roya Gordon: Roya Gordon is a trailblazing cybersecurity expert, inspiring young women and people of color to pursue their passions in technology. With an impressive background that includes serving as an intelligence specialist in the U.S. Navy and working at Idaho National Laboratory and Accenture, Roya now holds the position of OT/IoT Secu…
…
continue reading
1
Duane Laflotte: Simulating Real-World Attacks on OT with Red Teaming
52:04
52:04
Play later
Play later
Lists
Like
Liked
52:04About Duane Laflotte: Duane Laflotte is a renowned Chief Technology Officer (CTO) and technology expert, currently leading the charge at Pulsar Security. With a deep understanding of complex technical issues and a constant thirst for staying at the forefront of emerging technologies, Duane is known for his innovative and creative solutions to even …
…
continue reading
1
Bryson Bort: Security Is Defined By The Threat - Contextualizing Cyber Risks To Prioritize Security Efforts
52:40
52:40
Play later
Play later
Lists
Like
Liked
52:40About Bryson Bort: Bryson Bort is a skilled cybersecurity professional with an impressive background as an entrepreneur and former U.S. Army Officer. He founded SCYTHE, a platform for next-generation attack emulation, and GRIMM, a cybersecurity consulting firm. Additionally, he co-founded the ICS Village, a non-profit organization dedicated to rais…
…
continue reading
1
Emilio Salabarria: Building Organizational Resilience through Comprehensive Cybersecurity Assessments for Cyber Florida
49:51
49:51
Play later
Play later
Lists
Like
Liked
49:51About Emilio Salabarria: Emilio Salabarria is a highly accomplished expert in emergency management and cybersecurity. He's been serving as the Deputy Senior Executive Advisor at Cyber Florida since July 2022. Emilio brings a wealth of knowledge and expertise to the table when it comes to cybersecurity education, research, training and development, …
…
continue reading
1
Dan Gunter: How Our Growing Ability To Process Data Affects Cybersecurity
58:23
58:23
Play later
Play later
Lists
Like
Liked
58:23About Dan Gunter: Dan Gunter is an accomplished cybersecurity professional with a wealth of experience in the field. As the founder and CEO of Insane Forensics, he is committed to providing digital forensics and threat-hunting services to help organizations protect themselves from cyber threats. Dan's expertise was honed through years of service in…
…
continue reading