Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Ot Security Podcasts

show episodes
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
  continue reading
 
The Critical Assets Podcast covers important OT and ICS security topics with an eye toward standards and regulation to keep you ahead of your adversaries... and your auditors. Ampyx Cyber. Securing your world. See our other content such as blogs, cybersecurity news and more at www.ampyxcyber.com
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cybhttps://dashboard.transistor.fm/shows/simply-ics-cyber/episodeser podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Artwork

1
Unsolicited Response

Dale Peterson: ICS Security Catalyst and S4 Conference Chair

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
  continue reading
 
Artwork

1
ICS Cyber Talks Podcast

Nachshon Pincu

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
  continue reading
 
Artwork

4
Security Voices

Security Voices

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
  continue reading
 
Artwork

1
HOU.SEC.CAST.

Michael Farnum and Sam Van Ryder

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join HOU.SEC.CON Cofounders Michael and Sam each week as they chat with conference speakers about the latest topics and trends in the cybersecurity space.
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Artwork

1
The OT Life

Cygnet Health Care

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to The OT Life: A careers podcast from the OTs of Cygnet Health Care. We created The OT Life for OTs around the country who are interested in hearing from people who share the same passion for Occupational Therapy.We chat all things OT from our opinions about the profession, our role in health and social care, stories and experiences, and career advice.This is the place to help you make the most of the profession you love.https://join.cygnethealth.co.uk/ot-life/
  continue reading
 
Artwork
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Artwork

101
TopCyberPro

TopCyberPro

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
  continue reading
 
Artwork

101
The Security Ledger Podcast

The Security Ledger

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
  continue reading
 
Artwork

1
Bits and Bytes by Byteworks

Matthew P. Scott and Joey Wenzler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A Broad array of topics in the technology space Informative, relevant, and engaging. Without the self-serving narrative. We aim to share industry best practices, drive awareness, and discuss what thought leaders share. Companies or manufacturers often only focus on their area of interest, which is short-sighted, limiting, and siloed. Our diversity and partner network offers substantial, informative value. Similar challenges and growth aspirations exist in the b2b and b2c space. This podcast ...
  continue reading
 
Artwork

1
Cyber Focus

McCrary Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
Artwork

1
The Get Cyber Resilient Show

Get Cyber Resilient

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott, Garrett O'Hara and Vinh Nguyen will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get ...
  continue reading
 
Artwork

1
AWS Industrial Insights

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Welcome to the Methods podcast! Methods are the UK’s leading independent transformation partner for public services. We apply our skills in innovation and collaboration from across the Methods Group, to deliver end-to-end business and technical solutions that are people-centered, safe, and designed for the future. You can find out more about the Methods group at www.methods.co.uk.
  continue reading
 
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
  continue reading
 
Dave Kittle, DPT of www.CashBasedPhysicalTherapy.org discuss Physical Therapy and Technology in this podcast. Full VIDEO versions of each episode can be found at https://www.youtube.com/PTTechTalk Dave Kittle also owns www.ConciergePainRelief.com (Home Physical Therapy) serving New York City, Long Island, NJ, and CT.
  continue reading
 
In just 25 minutes, I deliver concise and thought-provoking conversations with top minds in technology, cybersecurity, business, culture and enterpreneurship. Whether you’re a technologist, executive, culture-enthusiast or someone passionate about growth, each episode explores trends, strategies and ideas that shape success. For those with limited time but unlimited ambition, 25Minutes offers actionable insights and fresh perspectives where they matter most. Your time is valuable. Your 25 mi ...
  continue reading
 
Artwork

1
Left to Our Own Devices

Cybellum Technologies LTD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Introducing Left to Our Own Devices - the podcast dedicated to everything product security. Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros. Hosted & produced by: *David Leichner, CMO at Cybellum - https://www ...
  continue reading
 
Loading …
show series
 
Tristan Kim, Director of Cyber Risk – Innovation & Strategy at KORE Solutions, a cybersecurity and infrastructure company that specializes in OT cybersecurity services joins … Read more The post Digital Risk, Physical Impact: The OT Security Wake-Up Call appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.…
  continue reading
 
Cisco warns of maximum-severity defect in firewall software UK’s Colt Telecom suffers cyberattack CISA implores OT environments to lock down critical infrastructure Huge thanks to our sponsor, Conveyor Have you been personally victimized by portal security questionnaires? Conveyor is here to help. Endless clicks, bad navigation, and expanding quest…
  continue reading
 
Many manufacturing leaders believe they’re seeing 80–85% of their OT environment industrial assets. But in this episode, Dino and Craig reveal the reality that most have visibility into only 30–35% of their industrial control system assets, leaving the hidden 70% vulnerable. In this hard-hitting episode, they dismantle the false sense of OT securit…
  continue reading
 
Forescout CEO Barry Mainz joins host Frank Cilluffo to unpack the evolving cybersecurity threat landscape—from nation-state hacktivism to post-quantum vulnerabilities. Mainz highlights how adversaries are leveraging crowdsourced expertise and agentic AI to target critical infrastructure, especially operational technology (OT) systems in sectors lik…
  continue reading
 
Alex Lanstein, the CTO and head of threat intelligence for StrikeReady, the cybersecurity world’s first AI-powered security command center joins Enterprise Radio. This episode … Read more The post AI & Cybersecurity: Break-Throughs and Must-Knows appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.…
  continue reading
 
Alex Lanstein, the CTO and head of threat intelligence for StrikeReady, the cybersecurity world’s first AI-powered security command center joins Enterprise Radio. This episode … Read more The post AI & Cybersecurity: Break-Throughs and Must-Knows appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.…
  continue reading
 
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
  continue reading
 
A patch today keeps the zero-day away Jailbreaking ChatGPT-5 Pro The thing about vulnerabilities is they stay vulnerable Huge thanks to our sponsor, Conveyor It’s Thursday. Have you been personally victimized by a portal security questionnaire this week? Most solutions just give you a browser extension to copy and paste answers in, still leaving ho…
  continue reading
 
רבות מדובר על ג'וניורים והכניסה הקשה לתחום הסייבר למי שלא הגיע מהיחידות הטכנולוגיות בצבא, מה קורה עם אותם אלו שכבר נמצאים בתחום ומנסים לפלס את דרכם מעלה. מה הדרך להמשיך לרכוש ידע וכלים על מנת להתקדם לתפקידים ניהוליים והאם לימודי המשך מומלצים נחשון פינקו מארח את אליעז ועקנין ראש צוות הנחייה מגזרי וארכיטקט סייבר בשיחה על "מה השלב הבא" של מנהלים מקצוע…
  continue reading
 
Nicole Scuderi, Owner of OCS Art Services, which is a Brooklyn-based art logistics firm known for white-glove crating, packing, and shipping joins Enterprise Radio.… Read more The post From Studio to CEO: How Nicole Scuderi Is Redefining Leadership in the Arts & Culture Industry appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Netwo…
  continue reading
 
Nicole Scuderi, Owner of OCS Art Services, which is a Brooklyn-based art logistics firm known for white-glove crating, packing, and shipping joins Enterprise Radio.… Read more The post From Studio to CEO: How Nicole Scuderi Is Redefining Leadership in the Arts & Culture Industry appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Netwo…
  continue reading
 
In this episode, Michael and Sam are joined by Matt Johansen, founder of Vulnerable U, to discuss his journey in cybersecurity, the importance of networking, and the evolution of technical content creation in the industry. Things Mentioned: · Vulnerable U - https://www.vulnu.com/ · Spain under fire for contracting Huawei to store judicial wiretaps …
  continue reading
 
In this hard-hitting episode of Industrial Cybersecurity Insider, host Dino Busalachi sits down with two battle-tested experts: Debbie Lay from TXOne Networks and Patrick Gillespie from GuidePoint Security. Together, they pull back the curtain on the messy, complex world of operational technology (OT) cybersecurity, where million-dollar cybersecuri…
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
UK agrees to drop 'backdoor' mandate for Apple devices Massive Allianz Life data breach impacts 1.1M people Speed cameras knocked out after cyber attack Huge thanks to our sponsor, Conveyor If portal questionnaires were a person, you’d block them by now. Endless clicks, bad navigation, and expanding questions stacked like russian nesting dolls, all…
  continue reading
 
Tristan Kim, Director of Cyber Risk – Innovation & Strategy at KORE Solutions, a cybersecurity and infrastructure company that specializes in OT cybersecurity services joins … Read more The post Digital Risk, Physical Impact: The OT Security Wake-Up Call appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.…
  continue reading
 
Quantum computers could break today’s encryption, leaving many OT systems—which often lack encryption entirely—at even greater risk. Dave Krauthamer, Field CTO at QuSecure, warns that nation-state attackers may target critical infrastructure like power, water, and food supplies first, making it urgent to adopt quantum-resistant cryptography across …
  continue reading
 
In this episode of Cyber Focus, Frank Cilluffo is joined by Brad Medairy, Executive Vice President at Booz Allen Hamilton, and Dave Forbes, who leads Booz Allen’s physical and cyber practice. Together, they unpack their joint report with the McCrary Institute, Anchored in Zero Trust, examining the cybersecurity vulnerabilities of U.S. ports. The co…
  continue reading
 
In this episode of the podcast, the hosts discuss various topics related to cybersecurity, including the rise of deepfake technology and its implications for fraud, recent law enforcement actions against ransomware groups, and the importance of cybersecurity guidance for operational technology. They also share personal updates and reflections on th…
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
Workday confirms data breach An alliance to unify post-quantum cryptography New Chinese threat actor targeting Taiwan Huge thanks to our sponsor, Conveyor If the thought of logging into a portal questionnaire makes you want to throw your laptop away, you’re not alone. Most solutions just give you a browser extension to copy and paste answers, still…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
Salvatore Gariuolo, a senior threat researcher at Trend Micro, joins the Nexus Podcast to discuss safe EV charging and in particular, the ISO 15118 standard meant to create a trusted environment for electric vehicle charging. Gariuolo contends that while ISO 15118 offers substantial improvements that reduce pressure on the grid, and also introduces…
  continue reading
 
Scott Burgmeyer, the Founder and CEO of BecomeMore Group who has completely transformed and optimized hundreds of companies across the US in the last 30 … Read more The post Leadership Coach on Unlocking Your Organization’s Potential appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.…
  continue reading
 
Scott Burgmeyer, the Founder and CEO of BecomeMore Group who has completely transformed and optimized hundreds of companies across the US in the last 30 … Read more The post Leadership Coach on Unlocking Your Organization’s Potential appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to…
  continue reading
 
At Black Hat USA 2025, artificial intelligence wasn’t the shiny new thing — it was the baseline. Nearly every product launch, feature update, and hallway conversation had an “AI-powered” stamp on it. But when AI becomes the lowest common denominator for security, the questions shift. In this episode, I read my latest opinion piece exploring what ha…
  continue reading
 
Discover how a resilient and dependable network is more than just uptime - it's about enabling innovation, agility, and speed. In this episode, hear from two IT professionals working at the intersection of infrastructure and application development, and how their collaboration ensures performance, productivity, and trust in the systems they support…
  continue reading
 
גישה מאובטחת מרחוק למערכות הארגוניות הפכה לכורח המציאות מאז הקורונה והצורך עלה בישראל ביתר שאת אחרי השביעי באוקטובר. במערכות פיזיות ותפעוליות גישה מאובטחת מרחוק היא צורך קיומי מחד, על מנת לאפשר תפעול תקלות 24 שעות ביממה. מאידך יש צורך בבקרה קפדנית על מי מתחבר, איך ולאן כולל תיעוד של כול הפעילויות שמתבצעות שוק חברות הטכנולוגיה שעוסקות בגישה מרחוק לס…
  continue reading
 
New wave of NFC relay fraud, call hijacking, and root exploits in banking sector Canada’s House of Commons suffers cyberattack Zoom fixes critical Windows client flaw that could enable privilege escalation Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibil…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play