The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
Scada Podcasts
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
…
continue reading
Oilfield Strong Webinar Series is proudly sponsored by OTA Environmental Solutions & ESG-Dynamics OTA Environmental Solutions (www.otaenvironmentalsolutions.com) sells and services vapor recovery, wellhead compression, flares, combustors and other environmental solutions throughout the US. Our environmental services group (www.otaenvironmental.com) supports your full array of environmental needs including air permits, regulatory filings, Phase 1's, LDAR, SPPC plans, etc. Our sister company, ...
…
continue reading
The podcast where girls talk industrial automation! We interview people from all walks of life in the Industrial Automation industry. Through a personal narrative/conversational framework we talk about PLCs, SCADA, IIoT, Machine Vision, Industrial Robots, Pneumatics, Control Systems, Process Automation, Factory Automation, Systems Integration, Entrepreneurship, Career Stories, Personal Journeys, Company Culture, and any other interesting and timely topic we want to discuss. Co-Hosted by Nikk ...
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
Join CYBR.SEC.CON. cofounders Michael and Sam each week as they chat with conference speakers about the latest topics and trends in the cybersecurity space.
…
continue reading
The Control Amplified podcast offers in-depth interviews and discussions with industry experts about important topics in the process control and automation field, exploring underlying issues affecting users, system integrators, suppliers and others in these industries.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Diving (Pun Intended) into SCADA and Control Systems with Randy Petersen
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54In this episode, SJRA SCADA Superintendent and HOU.SEC.CON./OT.SEC.CON. speaker Randy Petersen joins Michal and Sam on the podcast to share his expertise on SCADA systems and the unique security challenges facing water facilities. They highlight real-world incidents and vulnerabilities in OT environments, offer practical advice for improving OT sec…
…
continue reading
1
How digital solutions optimize LNG production
16:10
16:10
Play later
Play later
Lists
Like
Liked
16:10Liquified natural gas (LNG) occupies an essential role in the energy transition, and integrated digital solutions--from process technology through advanced control and cybersecurity--are essential to optimizing its production while also minimizing its carbon footprint. In this Solutions Spotlight podcast, Control's Keith Larson talks with Srikanth …
…
continue reading
1
Making the Blogger List with Bill Brenner
36:25
36:25
Play later
Play later
Lists
Like
Liked
36:25Michael and Sam are talking to the new VP and Editor-in-Chief of CYBR.SEC.Media, Bill Brenner! They discuss his extensive 20+ year career journey from traditional journalism to cybersecurity media, the importance of supporting the mental health of cyber defenders, and his vision for CYBR.SEC.Media. Things Mentioned: Bill’s Letter from the Editor - …
…
continue reading
1
The Future Of Proactive Security Before Building an AI Enabled Enterprise - Erik Nost - BSW #430
55:30
55:30
Play later
Play later
Lists
Like
Liked
55:30The three proactive security principles of visibility, prioritization, and remediation have always been the foundation of vulnerability management teams. But these teams face continuous challenges. How do you address these challenges? Erik Nost, Senior Analyst at Forrester, joins Business Security Weekly to break down the six questions that need to…
…
continue reading
1
The Future Of Proactive Security Before Building an AI Enabled Enterprise - Erik Nost - BSW #430
55:30
55:30
Play later
Play later
Lists
Like
Liked
55:30The three proactive security principles of visibility, prioritization, and remediation have always been the foundation of vulnerability management teams. But these teams face continuous challenges. How do you address these challenges? Erik Nost, Senior Analyst at Forrester, joins Business Security Weekly to break down the six questions that need to…
…
continue reading
1
Are you dead?, AI Hellscape, Copilot, Blue Delta, Quishing, Confer, Aaran Leyland... - SWN #546
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35Are you dead? AI Hellscape, Copilot Uninstalled?, Blue Delta, 2026 predictions, Quishing, Confer, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-546
…
continue reading
1
Are you dead?, AI Hellscape, Copilot, Blue Delta, Quishing, Confer, Aaran Leyland... - SWN #546
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35Are you dead? AI Hellscape, Copilot Uninstalled?, Blue Delta, 2026 predictions, Quishing, Confer, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-546
…
continue reading
1
Dr. Yaniv Harel cyber expert & key figure in bridging between cyber industry and academia in Israel
38:51
38:51
Play later
Play later
Lists
Like
Liked
38:51בניגוד להרבה תחומים אחרים בסייבר התעשייה והאקדמיה הולכים יד ביד ולעיתים דווקא האקדמיה היא זו שדוחפת את החדשנות בתעשייה לקצוות. לראיה ה CyberWeek של אוניברסיטת ת"א מצליחה פעם אחר פעם לרכז את מיטב המוחות לדון על הווה ועתיד, למה הפעם זה כן עובד? שמדובר בסייבר הישראלי בצורה מפתיעה (או שלא) תמיד תפגשו את ד"ר יניב הראל. יניב מלווה את הסייבר האזרחי בישראל…
…
continue reading
1
Secure By Design Is Better Than Secure By Myth - Bob Lord - ASW #365
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
…
continue reading
1
Secure By Design Is Better Than Secure By Myth - Bob Lord - ASW #365
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
…
continue reading
1
Episode 423: Pipeliner Stories - By God If I Were In Charge and Now That I Have Your Attention with Jerry Rau
33:40
33:40
Play later
Play later
Lists
Like
Liked
33:40In this episode of the Pipeliners Podcast, Russel Treat talks with pipeline integrity veteran Jerry Rau about how he came to write and publish a multi-author book series designed to capture hard-earned industry lessons in a story-driven format for the next generation of pipeliners. They discuss the intent behind the books—focusing on practical pers…
…
continue reading
1
The State of Cybersecurity Hiring, 2026 content plans, and the weekly news - ESW #441
1:35:49
1:35:49
Play later
Play later
Lists
Like
Liked
1:35:49First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segmen…
…
continue reading
1
The State of Cybersecurity Hiring, 2026 content plans, and the weekly news - ESW #441
1:35:49
1:35:49
Play later
Play later
Lists
Like
Liked
1:35:49First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segmen…
…
continue reading
1
Nudification, Spying, Ni8mare, Cisco, Chat-GPT, Chrome, SaaS, CES, Josh Marpet & More - SWN #545
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11Grok Nudification, Spying, Ni8mare, Cisco, Chat-GPT, Chrome, SaaS, CES, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-545
…
continue reading
1
Nudification, Spying, Ni8mare, Cisco, Chat-GPT, Chrome, SaaS, CES, Josh Marpet & More - SWN #545
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12Grok Nudification, Spying, Ni8mare, Cisco, Chat-GPT, Chrome, SaaS, CES, Josh Marpet, and More on this episode of the Security Weekly News. Show Notes: https://securityweekly.com/swn-545
…
continue reading
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
…
continue reading
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
…
continue reading
1
שיחה עם המייסדים של קוונטימאיז פרופ' עמנואל דלה-טורה המדען ראשי ודניאל פורת מנכ"ל החברה על מחשוב קוונטי ויישומים
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05ושא המחשוב הקוונטי נמצא ברקע כבר מספר לא מועט של שנים, מי שזה לא עיסוקו שמע "שזה שונה" ומאפשר כוח עיבוד באופן אקספוננציאלי גדול יותר מול המחשוב העכשווי. שהנושא עולה בתחום הסייבר תמיד זה מוביל לאותה נקודה, ההצפנות הקיימות יפרצו בין רגע ולא יהוו מחסום לתוקפים, האומנם? נחשון פינקו מארח את מייסדי קוונטימאיז פרופ' עמנואל דלה טורה מאוניברסיטת בר אילן המד…
…
continue reading
1
Ep. 87 - ESA: "Everything Stops All" vs Protection of Species
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02Melinda Taylor brings over three decades of experience to the complex discussion around the Endangered Species Act (ESA), exploring its history, purpose, and the many misconceptions that surround it—especially within the oil and gas industry. In this episode, Grant Swartzwelder and Melinda unpack how the ESA operates, the challenges it poses, and o…
…
continue reading
1
CISO Lessons from a Children's Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
CISO Lessons from a Children’s Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you’re a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
CISO Lessons from a Children's Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Show Notes: https://securityweekly.com/swn-544
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-544
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
1
Episode 422: 2026 Pipeline Predictions with Mark LaCour
37:53
37:53
Play later
Play later
Lists
Like
Liked
37:53In this episode of the Pipeliners Podcast, Russel Treat is joined by returning guest Mark LaCour for a wide-ranging discussion on what the pipeline industry may face in 2026. Together, they reflect on prior-year predictions before exploring forward-looking themes such as infrastructure investment, LNG expansion, workforce constraints, data and digi…
…
continue reading
1
Why are cybersecurity predictions so bad? - ESW #440
1:29:41
1:29:41
Play later
Play later
Lists
Like
Liked
1:29:41For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
…
continue reading
1
Why are cybersecurity predictions so bad? - ESW #440
1:29:41
1:29:41
Play later
Play later
Lists
Like
Liked
1:29:41For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
…
continue reading
1
Defending the Boundaryless Cloud: Understanding Threats That Matter - Cameron Sipes, Steve Stone - SWN #543
36:39
36:39
Play later
Play later
Lists
Like
Liked
36:39Cloud breaches don't always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
…
continue reading
1
Defending the Boundaryless Cloud: Understanding Threats That Matter - Cameron Sipes, Steve Stone - SWN #543
36:39
36:39
Play later
Play later
Lists
Like
Liked
36:39Cloud breaches don't always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
…
continue reading
1
Breaking Into Cybersecurity - PSW #907
1:05:11
1:05:11
Play later
Play later
Lists
Like
Liked
1:05:11Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
…
continue reading
1
Breaking Into Cybersecurity - PSW #907
1:05:11
1:05:11
Play later
Play later
Lists
Like
Liked
1:05:11Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
…
continue reading
We’re wrapping up 2025 with a special episode! Michael and Sam are talking to Jessvin Thomas, CEO of Auguria and winner of CYBR.SEC.CON.’s first pitch competition for cybersecurity startups! They discuss the evolving challenges in cybersecurity, the importance of root cause analysis, and how AI and context are shaping the future of SOC operations. …
…
continue reading
1
Say Easy, Do Hard - Preventing Burnout, Focusing on CISO Health and Wellness - BSW #428
52:24
52:24
Play later
Play later
Lists
Like
Liked
52:24CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
…
continue reading
1
Say Easy, Do Hard - Preventing Burnout, Focusing on CISO Health and Wellness - BSW #428
52:24
52:24
Play later
Play later
Lists
Like
Liked
52:24CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
…
continue reading
1
SentinelOne and AWS Shape the Future of AI Security with Purple AI - Rachel Park, Brian Mendenhall - SWN #542
37:41
37:41
Play later
Play later
Lists
Like
Liked
37:41SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
…
continue reading
1
SentinelOne and AWS Shape the Future of AI Security with Purple AI - Brian Mendenhall, Rachel Park - SWN #542
37:41
37:41
Play later
Play later
Lists
Like
Liked
37:41SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
…
continue reading