A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading

1
Fortinet ON AIR #5 - Navigating AI, Misinformation & Cyber Resilience with Orange Cyberdefense
21:56
21:56
Play later
Play later
Lists
Like
Liked
21:56Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
…
continue reading
In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people? I recently sat down with Securin's Lead Threat Intelligence Analyst - Aviral Verma. And while I anticipated a conversation focused …
…
continue reading

1
Fortinet ON AIR #4 - Key Insights from WEF's Global Cybersecurity Outlook with Accenture
17:33
17:33
Play later
Play later
Lists
Like
Liked
17:33Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
…
continue reading

1
Fortinet ON AIR #3 - GenAI Isn’t Just a Tool—It’s a New Attack Surface
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
…
continue reading

1
Fortinet ON AIR #2 - How NEC Approaches Strategic Cybersecurity Blueprints for Telcos
13:11
13:11
Play later
Play later
Lists
Like
Liked
13:11Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
…
continue reading

1
Fortinet ON AIR #1 - Building Simplicity, Security, and Scale into the Future of Networking
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
…
continue reading
Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.Hear from leaders at Accenture, NEC, Orange Cyberdefense, Cirion Technologies, and Google Cloud as they tackle the biggest challenges facing telcos—from AI-powered attacks and SecOp…
…
continue reading

1
Why Ransomware, Credential Theft and Phishing Schemes Persist
40:30
40:30
Play later
Play later
Lists
Like
Liked
40:30One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends. The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best …
…
continue reading

1
Insecure Webcam Was All a Ransomware Group Needed
31:53
31:53
Play later
Play later
Lists
Like
Liked
31:53Endpoint security tools worked, but the hackers worked harder for their payday. While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import elements of episodes like this one come from the in-depth conversations about new tactics and strategies that are being used by the bad guys, and simulta…
…
continue reading
We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware. The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web co…
…
continue reading
Breaking down silos while securing the cloud and leveraging secure-by-design advancements. The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarter hacking groups, AI-driven phishing schemes and deceptive malware viruses head the list of concerns. And while these fac…
…
continue reading

1
Observations of an Ethical Hacking Researcher
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats and the evolving network of threat actors. And I can’t think of anyone better to break down the hacker land…
…
continue reading
When we talk about the threat landscape for the industrial sector, the eye-catching, headline-grabbing hacking groups with nefarious names typically lead the list of concerns. And while understanding their well-publicized exploits are important, what is often overlooked are all the little things these groups were able to do before dropping malware,…
…
continue reading
While we’re still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we’re talking about cybersecurity or … other social topics. So, in continuing this trend, we tapped into a unique collection of voices to discuss a topic that has, and will continue to be, vital to indust…
…
continue reading
The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware. We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear our hair out. Well, this episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detec…
…
continue reading
Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.” His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecurity climate. So, in an effort to ensure we repeat as few of 2024’s mistakes in 2025, we’re going to take a look at som…
…
continue reading
As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months. While I’m grateful for everyone we’ve had on the show, and all the support we continue to receive from the industrial cybersecurity community, I felt these comments were worth another listen, with sp…
…
continue reading

1
Brass Tacks #10: Understanding Cybersecurity Regulations: Why You Shouldn't Fear Regulators
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08Some CISOs might see industry regulators as an obstacle to their objectives, but not Jorges Fernandez, CISO & DPO for the Portuguese Securities & Exchange Commission, CMVM, and active participant on multiple regulatory bodies.In this episode of Brass Tacks - Talking Cybersecurity, Jorge shares his unique experience and perspective as both regulator…
…
continue reading

1
AI Is Exposing Your Most Vulnerable Attack Surface
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48According to Fortinet’s 2024 State of Operational Technology and Cybersecurity Report, 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– a number this is up nearly 10 percent from last year. And we all know what happens with this hijacked data. Per the World Economic Forum’s May 2024 whi…
…
continue reading
Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing …
…
continue reading

1
What Cybersecurity Can Learn from Tom Brady
54:34
54:34
Play later
Play later
Lists
Like
Liked
54:34We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats. Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies. While table top exercises are nothing new, we’re goin…
…
continue reading

1
Brass Tacks #9: The Anatomy of Effective Cybersecurity Posture: AI, LLMs, and Beyond
21:06
21:06
Play later
Play later
Lists
Like
Liked
21:06In the latest episode of Brass Tacks - Talking Cybersecurity, #Fortinet's Filippo Cassini delves into the anatomy of effective cybersecurity posture and discuss how increasing network and security complexity is driving a shift from the selection of security components on a best-of-breed basis to an integrated platform approach.Today's SecOps teams …
…
continue reading
For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries res…
…
continue reading
While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true. We know that the frequency of attacks will continue to increase. We know that it’s not if your ICS will be probed, but when. And we also know that asset and connection visibility is an ongoing challenge due to the im…
…
continue reading

1
Brass Tacks #8 - Board Communication Essentials for CISOs: Meeting Exec Expectations
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54The buck stops here—or does it? How much should former US President, Harry S Truman's famous slogan apply to the role of CISO?In this episode of Brass Tacks - Talking Cybersecurity, host Joe Robertson is joined by Raffaele Maresca, Global CISO at AkzoNobel, for an illuminating discussion of the evolving role of the CISO. Rather than pinning ultimat…
…
continue reading

1
Phishing Attack Defense 'Not Rocket Science'
22:22
22:22
Play later
Play later
Lists
Like
Liked
22:22Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a lot of hackers very happy. And based on Proofpoint’s 2024 State of Phish report, protecting against phishi…
…
continue reading

1
Legacy Mindsets Are Helping Hackers Weaponize Networks
43:17
43:17
Play later
Play later
Lists
Like
Liked
43:17So, my daughters like to give me a hard time about growing old. Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines are still in place because they work. While the technology around these assets has evolved, their core functionality and value to the production process …
…
continue reading

1
Brass Tacks #7 - The 'Human Firewall': Building Cybersecurity Into Organizational Culture
17:37
17:37
Play later
Play later
Lists
Like
Liked
17:37How do you securely network a "Smart City" that has to be rebuilt over a hundred times each year in different locations around the world, and with no more than a few days of annual downtime?In this episode of Brass Tacks - Talking Cybersecurity, host Joe Robertson meets with Michael Cole, Chief Technology Officer for the European Tour Group, to dis…
…
continue reading

1
Using Force Multipliers to Protect Against Next-Gen Stuxnet
40:51
40:51
Play later
Play later
Lists
Like
Liked
40:51While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controlling the purse strings. SonicWall’s Mid-Year Cyber Threat Report found that their firewalls were under attack 125 percent of the time during a 40-hour w…
…
continue reading
One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response. O…
…
continue reading
According to Veeam’s 2024 Ransomware Trends Report, cyber victims stated that they were unable to restore 43 percent of whatever data was affected by ransomware attacks. This reaffirms what a number of Security Breach guests have stated about trusting hackers after paying their extortion demands. Another finding shows that 63 percent of ransomware …
…
continue reading

1
Brass Tacks #6 - Building Cyber Resilience: Aligning People, Processes, Tech, & Compliance
17:35
17:35
Play later
Play later
Lists
Like
Liked
17:35In this episode of Brass Tacks - Talking Cybersecurity, Daniele Mancini, Field CISO at #Fortinet explains the three main drivers of change for #cybersecurity and the challenges these present for the #CISO:➡️ The explosion in data volumes➡️ The increasing speed of innovation➡️ The growing interconnection of the digital ecosystemTune in for a discuss…
…
continue reading
The ongoing theme in industrial cybersecurity centers on two competing dynamics – the desire to expand our implementation of automation and Industry 4.0 technologies with the goal of using more and faster connections, along with the decision-making data each generates to improve the efficiency and quality of production. However, these goals now nee…
…
continue reading

1
Inside the Growing Complexity of Ransomware Hacking Groups
32:32
32:32
Play later
Play later
Lists
Like
Liked
32:32We’re back to discuss an all-too-familiar topic – ransomware. Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for industrial organizations dealing with ransomware is that we have to divide our energy and resources between prev…
…
continue reading

1
Time to 'Rip off the Band-Aid' to Ensure Security
40:20
40:20
Play later
Play later
Lists
Like
Liked
40:20A smarter, well-funded hacker community means embracing basic, yet daunting cyber challenges. In manufacturing, regardless of your role, avoiding downtime is an obvious priority, and one of the motivating factors driving investments in cybersecurity. In working to mitigate potential DDoS attacks or malware drops, manufacturers are tapping into more…
…
continue reading

1
Brass Tacks #5 - Quantifying Cyber Risk: A Board-Level Cybersecurity Priority
20:56
20:56
Play later
Play later
Lists
Like
Liked
20:56Welcome to Brass Tacks - Talking Cybersecurity, the latest Fortinet podcast series where we discuss the business implications of cybersecurity. In this predominantly business-focused episode of Brass Tacks - Talking Cybersecurity, our host, Joe Robertson, talks to Mark Child, Associate Research Director for European Security at IDC, about the eleva…
…
continue reading

1
Combating the 20th Century Mafia with a Stronger Human Firewall
47:15
47:15
Play later
Play later
Lists
Like
Liked
47:15Sophos recently reported that 65 percent of manufacturing and production organizations were hit by ransomware last year, which, unlike other sectors, is an increase. Overall, these attacks have increased by 41 percent for manufacturing since 2020. Additionally, the cybersecurity firm found that 44 percent of computers used in manufacturing have bee…
…
continue reading

1
Brass Tacks #4 - Translating Cyber Jargon Into Business Language
21:38
21:38
Play later
Play later
Lists
Like
Liked
21:38Welcome to Brass Tacks - Talking Cybersecurity, the latest Fortinet podcast series where we discuss the business implications of cybersecurity. Cybersecurity can seem like an impenetrable dark art, but it doesn't have to be.Tune in to the latest episode of Brass Tacks as our host, Joe Robertson is joined by Fortinet's Patrick Grillo to distill key …
…
continue reading

1
Tearing Down the 'Set It and Forget It' Mindset
43:02
43:02
Play later
Play later
Lists
Like
Liked
43:02I recently watched an interesting documentary called Turning Point: The Bomb and the Cold War on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-political event since World War II as fallout from the U.S. dropping the nuclear bomb on Japan to end World War II. Similarly, we can look at a number o…
…
continue reading
When I was a kid, we always looked forward to my dad’s work picnic. He was a tool and dye maker for a leading caster manufacturer that would rent out a local park, make a ton of food and put on various games and activities for the families. One of the highlights of this day was a softball game pitting the office versus the shop. The good-natured sh…
…
continue reading

1
'There's No Bulletproof Vest' in Cybersecurity
52:37
52:37
Play later
Play later
Lists
Like
Liked
52:37An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover. When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our …
…
continue reading

1
Brass Tacks #3 - Exploring Software Supply Chain Security: Debunking GenAI and LLMs Hype
21:34
21:34
Play later
Play later
Lists
Like
Liked
21:34Welcome to Brass Tacks - Talking Cybersecurity, the latest Fortinet podcast series where we discuss the business implications of cybersecurity. Half a century since the first computer virus, most of us are familiar with the usual suspects of cyberattack—bots, phishing, ransomware etc. So what's new? Tune in as our host, Joe Robertson, is joined by …
…
continue reading
The landscape of industrial cybersecurity continues to change and evolve, and demands a vigilant monitoring of the next threat, vulnerability or potential soft spot in our defenses. That’s why we continue to produce Security Breach, and, by the way, continue to be so appreciative of the growth and support we’ve received from each of you. That said,…
…
continue reading

1
The $25M 'Wake-Up Call' Supply Chain Hack
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13According to IBM’s Cost of a Data Breach Report, nearly 20 percent of the organizations surveyed stated that they have experienced a breach stemming from a compromise in their supply chain, or a vulnerability related to it. The average cost of these breaches was estimated at just under $4.5 million. Their data also found that attacks emanating from…
…
continue reading

1
Brass Tacks #2 - How Cyber Risk Has Evolved Into Business Risk
22:01
22:01
Play later
Play later
Lists
Like
Liked
22:01Welcome to Brass Tacks - Talking Cybersecurity, the latest Fortinet podcast series where we discuss the business implications of cybersecurity. Tune in as our host, Joe Robertson, is joined by Alain Sanchez, EMEA Field CISO at Fortinet as they discuss how new fiduciary responsibilities and the legal imperative to comply with new regulations such as…
…
continue reading
Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a report entitled Building a Culture of Cyber Resilience in Manufacturing. This initiative not only identified the sector’s primary challenges for developing…
…
continue reading

1
There's No 'Plant the Flag' Moment in Cybersecurity
33:38
33:38
Play later
Play later
Lists
Like
Liked
33:38When looking at industrial cybersecurity, more attention is being paid to how workers are logging in to access critical machinery, software or data. And according to Trustwave Threat Intelligence’s recent Manufacturing Threat Landscape report, 45 percent of attacks experienced by manufacturers stemmed from the bad guys accessing credentials. Whethe…
…
continue reading

1
Brass Tacks #1 - Onboarding the Board with Cybersecurity
17:32
17:32
Play later
Play later
Lists
Like
Liked
17:32Welcome to Brass Tacks - Talking Cybersecurity, the latest Fortinet podcast series where we discuss the business implications of cybersecurity. We're kicking off the first episode as our host, Joe Robertson, is joined by Wolfgang Bitomsky, Chief Information Officer for FCC Environment CEE, a European leader in sustainable waste management services.…
…
continue reading
As we’ve discussed numerous times on Security Breach, terms like change, evolution and constant are more than just buzz terms – they’re a simple reality of working in the industrial OT space. Whether we’re discussing threat actors from Stuxnet to Lockbit, tactics from social engineering to double-extortion ransomware, or vulnerability sources rangi…
…
continue reading

1
The Protection and Productivity of Zero Trust
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17Over the last nearly 100 episodes of Security Breach we’ve discussed a wide range of strategies for protecting the manufacturing enterprise. But perhaps the most polarizing of these has been Zero Trust. While some unwaveringly champion the cause of this approach, others question the ways in which it is typically deployed. Perhaps this dichotomy is …
…
continue reading