מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
  continue reading
Ot Security Podcasts
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
  continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
  continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
  continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
  continue reading
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
…
  continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
  continue reading
The Critical Assets Podcast covers important OT and ICS security topics with an eye toward standards and regulation to keep you ahead of your adversaries... and your auditors. Ampyx Cyber. Securing your world. See our other content such as blogs, cybersecurity news and more at www.ampyxcyber.com
…
  continue reading
Welcome to Manufacturing Happy Hour, the podcast where we get real about the latest trends and technologies impacting modern manufacturers. Hosted by industry veteran Chris Luecke, each week, we interview makers, founders, and other manufacturing leaders that are at the top of their game and give you the tools, tactics, and strategies you need to take your career and your business to the next level. We go beyond the buzzwords and dissect real-life applications and success stories so that you ...
…
  continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology  ...
…
  continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
  continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
  continue reading
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
…
  continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
  continue reading
Welcome to The OT Life: A careers podcast from the OTs of Cygnet Health Care. We created The OT Life for OTs around the country who are interested in hearing from people who share the same passion for Occupational Therapy.We chat all things OT from our opinions about the profession, our role in health and social care, stories and experiences, and career advice.This is the place to help you make the most of the profession you love.https://join.cygnethealth.co.uk/ot-life/
…
  continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
  continue reading
Tune in to hear thought leaders discuss the latest trends and best practices for IT/OT convergence and industrial connectivity.
…
  continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
  continue reading
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
…
  continue reading
SC Media and F5 are proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
  continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
  continue reading
SC Media and F5 are proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
  continue reading
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
  continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
  continue reading
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott, Garrett O'Hara and Vinh Nguyen will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get  ...
…
  continue reading
Brent Gunning and former Toronto Maple Leafs GM Gord Stellick provide the most insightful Maple Leafs pre- and post-game show with Leafs Nation.
…
  continue reading
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
…
  continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
  continue reading
Royal College of Occupational Therapists is the professional membership body for occupational therapy staff in the UK. This is the home for our podcast series. www.rcot.co.uk/podcasts
…
  continue reading
Welcome to the Methods podcast! Methods are the UK’s leading independent transformation partner for public services. We apply our skills in innovation and collaboration from across the Methods Group, to deliver end-to-end business and technical solutions that are people-centered, safe, and designed for the future. You can find out more about the Methods group at www.methods.co.uk.
…
  continue reading
Dave Kittle, DPT of www.CashBasedPhysicalTherapy.org discuss Physical Therapy and Technology in this podcast. Full VIDEO versions of each episode can be found at https://www.youtube.com/PTTechTalk Dave Kittle also owns www.ConciergePainRelief.com (Home Physical Therapy) serving New York City, Long Island, NJ, and CT.
…
  continue reading
Introducing Left to Our Own Devices - the podcast dedicated to everything product security. Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros. Hosted & produced by: *David Leichner, CMO at Cybellum - https://www ...
…
  continue reading

1
Tatyana Bolton on Cyber Policy, OT Security, and the Speed of Relevance
1:42:02
1:42:02
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:42:02In this episode of The Watchers, Andy Sauer sits down with cybersecurity leader Tatyana Bolton. From her unexpected start in acting to shaping national policy at CISA, Google, and beyond, Tatyana shares her perspective on why U.S. cyber defenses must keep pace with adversaries moving at the “speed of relevance.” They discuss policy gridlock, supply…
…
  continue reading

1
255: How AI is Reshaping Security and OT Network Requirements featuring Felipe Sabino Costa, Sr. Product Manager for Networking & Cybersecurity at Moxa
43:54
43:54
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
43:54It’s been over a year since we’ve talked about cybersecurity on Manufacturing Happy Hour, and with AI changing the game completely, we’re overdue for a refresh. Around 80-85% of the global industry doesn’t have basic defense at the edge of their networks; that’s a sobering statistic. Felipe Sabino Costa, Senior Product Manager for Networking and Cy…
…
  continue reading

1
PP084: Inside the CVE Process With Cisco (Sponsored)
44:50
44:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:50CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that…
…
  continue reading

1
Ep. 233 - From Controls to Full-Scale Robotics Integration How Bright IA Leads in Automation
1:18:25
1:18:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:18:25In this episode of Manufacturing Hub, hosts Vladimir Romanov and Dave Griffith sit down with Davide (David) Pascucci, founder of Bright IA (https://brightiatx.com/), for an in-depth conversation about what it truly takes to build, grow, and succeed in the world of robotics integration and industrial automation. Davide shares his incredible journey …
…
  continue reading

1
Mark Korman Chief Legal & Strategy Officer @Critical-Impact about cyber crises aspects to consider
48:28
48:28
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
48:28Prevention tools are essential, but have their limits; no one can prevent every breach. Readiness determines how quickly and effectively you regain control once it happens. Tabletop exercises, crisis playbooks, and decision-making drills are the true differentiators. Nachshon Pincu hosts Mark Korman, Chief Legal and Strategy Officer at Critical-Imp…
…
  continue reading

1
EP 74: Turning Surveillance Cameras on their Axis
28:36
28:36
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
28:36At Black Hat USA 2025, Noam Moshe from Claroty’s Team 82 revealed several vulnerabilities in Axis Communications’ IP camera systems, including a deserialization flaw that could let attackers run remote code. The team worked with Axis to patch the issues. Moshe says that this case highlights the broader security risks still common in the billions of…
…
  continue reading

1
259: Data Centers, Modularity, and Mission Critical Manufacturing featuring Keith Hutchens of BW Design Group
36:18
36:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
36:18Data centers are popping up all over the country, and for good reason. Capacity is doubling every three to four years, equipment is booked years out, and the race for AI computing power is creating opportunities that didn't exist five years ago. Keith Hutchens from Barry-Wehmiller Design Group joins us to discuss how data centers are driving manufa…
…
  continue reading

1
Ep. 232 - Future of Automation with Siemens: Industrial AI, Virtual PLCs, and Digital Twin Factories
1:48:04
1:48:04
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:48:04At Automate 2025, Vlad and Dave take Manufacturing Hub inside the Siemens booth to explore how one of the world’s largest industrial technology companies is shaping the future of manufacturing. From the latest S7-1200 G2 PLC to industrial copilots powered by AI, digital twins that simulate entire factories, and virtual PLCs redefining automation, t…
…
  continue reading

1
S2 E6: Keeping Up With ICS Threat Intelligence
22:33
22:33
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
22:33The industrial threat landscape never stands still — and neither can defenders. In this episode of Simply ICS Cyber, Don and Tom sit down with Joe Slowik, a globally recognized expert in cyber threat intelligence (CTI), detection engineering, and incident response for ICS, OT, and critical infrastructure environments. With over 15 years of experien…
…
  continue reading

1
Jennifer Ewbank on the CIA, Innovation in AI, and the Race with China
1:08:35
1:08:35
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:08:35Jennifer Ewbank, former Deputy Director of the CIA for Digital Innovation, joins The Watchers to discuss the intersection of espionage and emerging technology. From her decades in the field to leading the Agency’s digital transformation, she shares insights on the race with China in AI, the challenges of intelligence in a sensor-rich world, and the…
…
  continue reading

1
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
44:03
44:03
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:03Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understan…
…
  continue reading

1
258: Mentorship, Mid-Career Entrepreneurship, and Inspiring Women in Manufacturing with Patti Nowak, Owner of Control+M Solutions
1:04:37
1:04:37
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:04:37Patti Nowak is a business leader in tech with stories so inspiring you’ll want to take notes. In this episode of the Manufacturing Happy Hour, we grab a beer with Patti, Owner of Control+M Solutions, to talk about mid-life entrepreneurship, mentoring women in manufacturing, and what it takes to build a thriving tech business. Patti started her care…
…
  continue reading

1
Ep. 222 - Pick AI Pro with Kevin Wu | Faster Picking, Higher Reliability, Digital Twin and Vision AI
16:40
16:40
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
16:40Modern robotic picking is moving beyond neat rows and perfect lighting conditions. In this Automate 2025 conversation, Vlad and Dave sit down with Kevin Wu from Siemens to explore how Simatic Robot Pick AI Pro is tackling the messy reality of warehouses and factories. They discuss how the new edge architecture with the Simatic IPC BX 59 A and an NV…
…
  continue reading

1
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
1:02:01
1:02:01
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:02:01Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
…
  continue reading

1
EP 73: BADBOX 2.0: Blurring the line between bots and human for cybercrime
37:56
37:56
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
37:56Ad fraud driven by both humans and AI agents require new signals beyond traditional bot-vs-human checks. Gavin Reid and Lindsay Kaye from HUMAN Security discuss how monetization includes ad and click fraud (peach pit), selling residential proxy access, and operating botnets for hire and preventing harm requires dismantling criminal infrastructure a…
…
  continue reading

1
257: Thinking Differently About Access to Capital in Manufacturing featuring CLA (CliftonLarsonAllen)
1:05:42
1:05:42
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:05:42What does it really take to help manufacturers grow? It’s not just about cutting costs or chasing margins. It’s about understanding how capital really moves through your business. In this episode, we’re sitting down with Erik Skie, Jon Hughes, and Aaron Traut from CLA (CliftonLarsonAllen) for a roundtable chat over beers (in spirit, if not literall…
…
  continue reading

1
Jack Rhysider on Darknet Diaries, Privacy, and the Future of Cybersecurity
1:20:43
1:20:43
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:20:43Jack Rhysider, creator of Darknet Diaries, joins The Watchers to talk privacy, hacking culture, and the evolving threats shaping our digital lives. From disguises at DEFCON to exploring hacker origins in video games, Jack shares insights on why breaches are inevitable, how underground communities evolve, and where optimism fits in the face of AI, n…
…
  continue reading

1
Security Awareness Through Trust and Influence - Jennifer Selby Long - CSP #217
35:39
35:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
35:39Jennifer Selby Long reframes security awareness as more than training—it's about earning trust and influence with executives and security teams. She shares leadership lessons on how to build stronger alignment and support for security initiatives. Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodca…
…
  continue reading

1
Security Awareness Through Trust and Influence - Jennifer Selby Long - CSP #217
35:39
35:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
35:39Jennifer Selby Long reframes security awareness as more than training—it's about earning trust and influence with executives and security teams. She shares leadership lessons on how to build stronger alignment and support for security initiatives. Show Notes: https://cisostoriespodcast.com/csp-217
…
  continue reading

1
Ep. 231 - Travis Cox on Ignition 8.3 | ICC 2025 Highlights and the Future of Industrial Software
51:00
51:00
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
51:00ICC 2025 was a clear level up for the Ignition community. In this conversation Vlad and Dave share on the ground insights from a week of packed sessions, vendor showcases, and ProveIt demonstrations that brought working integrations to life. They unpack why the move to a larger venue created more chances for deep technical conversations, how the co…
…
  continue reading

1
S2 E5: Evolving Vendor and Integrator Cybersecurity in ICS/OT
2:33:09
2:33:09
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
2:33:09Selecting and managing ICS/OT cybersecurity vendors and integrators isn’t just a procurement step - it’s a strategic decision that shapes resilience, compliance, and long-term security outcomes. The best approach depends on organization size, resources, and security objectives. In this episode, Don and Tom are joined by Saltanat Mashirova, OT Cyber…
…
  continue reading

1
PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
48:26
48:26
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
48:26By Packet Pushers
…
  continue reading

1
256: Timeless Industrial Marketing Strategies and New Ways Manufacturers Can Reach Their Ideal Customer featuring Wendy Covey of TREW Marketing and Joe Sullivan of Gorilla 76
53:17
53:17
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
53:17
…
  continue reading

1
Ophir Oren Cyber & AI sec Innovation squad leader @Bayer on cyber innovation & future challenges
43:57
43:57
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
43:57חדשנות בסייבר היא צורך קיומי, קצב השינוי בראיית התוקפים ומשטחי תקיפה חדשים שנוצרים חדשות לבקרים לא מאפשרים לצוותי ההגנה לנוח על זרי הדפנה מרבית צוותי הסייבר בחברות עסוקים במימושים של הגנות ולעיתים קרובות נותנים היום מענה לאתמול ופחות למחר. הצורך בצוות שיבצע חשיבה ובדיקות לאיומי המחר ומציאת פתרונות טכנולוגים הפך לכורח המציאות נחשון פינקו מארח את אופ…
…
  continue reading

1
BONUS: The State of Robotics in 2025: Investing in the Next Wave of Automation with Sanjay Aggarwal of F-Prime Capital (sponsored by RoboBusiness)
21:39
21:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
21:39
…
  continue reading

1
Adm. Michael Rogers on Deterrence in Cyberspace
34:44
34:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
34:44Retired four-star U.S. Navy Admiral Michael S. Rogers joins the Nexus Podcast for a wide-ranging discussion on deterrence in cyberspace and an examination of adversarial tactics and strategies. Adm. Rogers explains that deterrence relies on having the will to employ tactics that will reshape the choices adversaries are making in the targeting of U.…
…
  continue reading

1
EP 72: Does a CISSP Certification Make Sense For OT?
27:49
27:49
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
27:49Certification exams increasingly reflect the IT OT convergence, acknowledging that many protections apply across both domains requiring holistic security approaches rather than siloed solutions. John France, CISO at ISC2, explains that as threats grow more complex, certifications, continuous learning, and diverse skills are essential to building a …
…
  continue reading

1
PP080: The State of OT Risks in 2025 (and What to Do About Them)
44:32
44:32
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:32What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... …
…
  continue reading

1
Ep. 230 - AI in Manufacturing with Tom Hechtman of Sepasoft | Real ROI, MES on Ignition, Sepa IQ
1:11:57
1:11:57
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:11:57Artificial intelligence is no longer just a buzzword in manufacturing. The pace of adoption has been incredible, yet the reality is far more complex than flashy headlines suggest. In this episode of Manufacturing Hub, Vlad Romanov and Dave Griffith welcome back Tom Hechtman, founder of Sepasoft, to explore how AI is actually being deployed on the p…
…
  continue reading

1
Refael Franco founder & CEO @CodeBlue on the October 7th war cyber-attacks, IR and crisis management
46:36
46:36
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
46:36הפרק מוקדש לזכרו של אריק קראוניק גיבור ישראל, רבש"צ קיבוץ בארי שנרצח ב-7 לאוקטובר בשעה שנלחם להגן על הישוב מפני הפורעים, יהי זכרו ברוך זה עדיין לא הזמן לסיכומים של מלחמת חרבות ברזל שטרם הסתיימה, המלחמה הארוכה ביותר בתולדות מדינת ישראל שהתפצלה בהמשך למלחמות משנה מול החיזבאללה, אירן והחותים בעולם הסייבר אנו חווים את השפעות המלחמה יום יום עם כמות התקפ…
…
  continue reading

1
S2 E4: Industrial Security Alongside a Warzone
21:07
21:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
21:07Industrial control systems (ICS) and operational technology (OT) are the backbone of modern society—powering electricity, water, gas, communications, manufacturing, chemicals, and even medical technology. But what happens when these systems must be secured in the middle of a warzone? On this episode of Simply ICS Cyber, hosts Don C. Weber and Tom V…
…
  continue reading

1
PP079: Rethinking the Architecture of Microsegmentation
57:41
57:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
57:41Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a workin…
…
  continue reading

1
254: From Steel City to Robotics Powerhouse: Pittsburgh’s Industrial Legacy featuring Jay Douglass, COO of ARM Institute
37:42
37:42
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
37:42Before Silicon Valley, there was Pittsburgh in the early 1900s. Young entrepreneurs with serious capital flocked to the city, creating industries from the ground up. Plate glass. Oil drilling. Vulcanized rubber. Steel processes that would literally build America's skyline. But today, something incredible is happening in the Steel City again. The sa…
…
  continue reading

1
Shmulik Yehezkel Founder & CEO @Pryvaxy on the tight coloration between physical & cyber defense
42:49
42:49
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
42:49ביטחון פיזי והגנת סייבר הם שני צדדים של אותה המטבע, כול אחד מהם מהווה השלמה של השני וחשוב למניעת מתקפה על הארגון. ארגונים שאינם ביטחוניים נוטים להפריד ביניהם ושוברים את קו ההגנה הרגיש ממילא נחשון פינקו מארח את אל"מ (מיל'), מייסד ומנכ"ל חברת פריבקסי מבכירי משרד ראש הממשלה לשעבר מקים וראש חטיבת הסייבר המבצעי של משרד הביטחון, ראש בית הספר לסייבר וטכנו…
…
  continue reading

1
EP 71: Meeting Cybersecurity Requirements That Don’t Yet Exist
47:09
47:09
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
47:09The EU’s new Cyber Resilience Act (CRA) sets higher security requirements but leaves many technical details undecided. This puts pressure on vendors of connected or software-based products to either redesign, retrofit, or withdraw from the market. According to Roland Marx, Senior Product Manager at Swissbit, the CRA’s three-year rollout is meant to…
…
  continue reading

1
PP078: Using Free Tools for Detection Engineering
49:25
49:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
49:25You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management…
…
  continue reading

1
253: Rapid Execution in Industrial Automation: From FEED Study to Recommissioning in Five Months featuring Cassy Gardner and Chris Schleich of E Tech Group
35:48
35:48
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
35:48Manufacturers know that automation is table stakes in 2025, and yet it’s still a bit of an afterthought for some. You'd think something that can make or break a facility would be everyone’s number one priority. And as you'll hear in this episode, overlooking automation can sometimes have disastrous consequences. In this episode, we sit down with Ca…
…
  continue reading

1
Bob Maley on Resource Challenges in Cybersecurity
32:41
32:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:41Bob Maley, Chief Security Officer at Black Kite and former CISO for the Commonwealth of Pennsylvania, joins the Nexus Podcast to discuss how critical infrastructure operators and state and local governments are meeting cybersecurity resourcing challenges. Whether it's budgets, workforce shortages, or technical debt, security leaders are facing vola…
…
  continue reading

1
Ep. 228 - How to Start OT Cybersecurity ICS Security Fundamentals, Managed Switches Risk Management
1:06:41
1:06:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:06:41In this episode of Manufacturing Hub Podcast, hosts Vladimir Romanov and Dave Griffith sit down with Gavin Dilworth to explore the evolving world of ICS and OT cybersecurity. This is a topic that impacts every sector of manufacturing and critical infrastructure, yet many organizations still struggle with where to start, how to assess risk, and how …
…
  continue reading

1
Gentry Lane on cyber weapons, national defense, and the race for global cyber power
1:37:22
1:37:22
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:37:22Cybersecurity strategist Gentry Lane joins The Watchers to unpack why cyber weapons should be treated as real weapons of war. She and Andy Sauer dive into the absence of a national cyber strategy, the vulnerabilities of America’s critical infrastructure, and the role of Europe in the global cyber power race. From the dangers of supply chain weaknes…
…
  continue reading

1
Haim Halevy Sela CISO @critical infrastructure power plants on challenges & cyber @Energy industry
46:42
46:42
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
46:42שני סיסויים נכנסים לאולפן.....נשמע כמו התחלה של בדיחה טובה. הגנה על תשתיות קריטיות היא משימה מורכבת, האחריות מחד והצורך ללהטט בין הרגולציה להנהלה מאידך נחשון פינקו מארח את חיים הלוי סלע סיסו מוכר ומוערך באחת מחברות האנרגיה הגדולות בישראל לשיחת סיסויים על תחושת האחריות, ההתמודדות היום יומית עם סייבר בתקופת מלחמה, האם הרגולציה עוזרת או מפריעה, איך בו…
…
  continue reading

1
S2 E3: Maritime Cybersecurity Threats & Critical Infrastructure
17:44
17:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
17:44In this episode of Simply ICS Cyber, co-hosts Don C. Weber and Tom VanNorman are joined by maritime and energy cybersecurity expert Marco (Marc) Ayala — vOT-CISO, Senior Principal Advisor for Energy, Oil, and Gas at the Cyber Infrastructure Protection Innovation Center (CIPIC), President of InfraGard Houston Members Alliance, and National Sector Ch…
…
  continue reading

1
Creating a Cyber Aware Culture for Local Water Utilities
27:50
27:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
27:50Deputy Managing Director at the Cyber Readiness Institute Lessie Skiba joins host Bryson Bort to discuss the CRI’s new program connecting small- and medium-sized water utilities with cyber coaches to strengthen their resilience. What if the most effective cybersecurity solution isn't a new piece of technology, but a human connection? How can we emp…
…
  continue reading

1
PP077: News Roundup–Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program
37:20
37:20
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
37:20Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
…
  continue reading

1
252: Adaptive Production, Resilient Manufacturing, and "Lightbulb Moments" in AI featuring Chris Stevens, SVP and GM of US Automation Business, Siemens Digital Industries
46:18
46:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
46:18Manufacturers (not just the guys on the shop floor, but the C-suite behind them) are on a race to the finish line when it comes to automation. Most of us by now are pretty familiar with how AI and automation can play a role in manufacturing. But it looks like we’re heading to the next stage… In this episode, we hear from Chris Stevens, the SVP & GM…
…
  continue reading

1
OT on the Frontlines: Threat Intelligence You Can't Ignore - Dawn Cappelli - CSP #216
33:18
33:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
33:18Dawn Capelli, Head of OT-CERT at Dragos, unpacks the evolving risks to Operational Technology. From nation-state attacks on Ukraine's infrastructure to hacktivists targeting U.S. water systems, she explains the PIPEDREAM malware, the top five SANS critical OT controls, and how Dragos' OT-CERT program offers free resources to help organizations defe…
…
  continue reading

1
OT on the Frontlines: Threat Intelligence You Can't Ignore - Dawn Cappelli - CSP #216
33:18
33:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
33:18Dawn Capelli, Head of OT-CERT at Dragos, unpacks the evolving risks to Operational Technology. From nation-state attacks on Ukraine's infrastructure to hacktivists targeting U.S. water systems, she explains the PIPEDREAM malware, the top five SANS critical OT controls, and how Dragos' OT-CERT program offers free resources to help organizations defe…
…
  continue reading

1
Yossi Shani Founder & CEO @YazamTech about files inspection, Deep Scan & CDR
53:37
53:37
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
53:37לראייתי כול קובץ שנכנס לארגון דורש בדיקה והלבנה, בעידן שמערכות הלבנה מסוגלות לבצע בדיקה ללא לייטנסי ומבלי לעכב את המשתמש כול קובץ צריך לעבור סניטציה. אחת ולתמיד מה ההבדל בין מערכת הלבנת קבצים לבין בדיקת וירוסים (נוזקות)? בתחילת הדרך המשמעות של הלבנה הייתה בדיקה של הקבצים ע"י מספר מנועי אנטי וירוס בד"כ 3-5 בו זמנית ו"הצבעה" ביניהם על תקינות הקובץ אם…
…
  continue reading

1
EP 70: Securing Medical Devices You Might Not Have Thought to Secure
33:30
33:30
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
33:30Healthcare organizations are prone to the same weaknesses that any other office or manufacturing site may have. Sonu Shankar, Chief Product Officer at Phosphorus Cybersecurity, explains how the devices you might not suspect might be the ones to bring down your organization if they’re not secured. That includes the printer used to print patient wris…
…
  continue reading

1
PP076: RF Risks and How to See Unseen Threats
59:58
59:58
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
59:58Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read mo…
…
  continue reading
 
 
 
