Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Scada Podcasts

show episodes
 
Artwork
 
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Artwork
 
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
  continue reading
 
Artwork

4
Oilfield Strong

OTA Environmental Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Oilfield Strong Webinar Series is proudly sponsored by OTA Environmental Solutions & ESG-Dynamics OTA Environmental Solutions (www.otaenvironmentalsolutions.com) sells and services vapor recovery, wellhead compression, flares, combustors and other environmental solutions throughout the US. Our environmental services group (www.otaenvironmental.com) supports your full array of environmental needs including air permits, regulatory filings, Phase 1's, LDAR, SPPC plans, etc. Our sister company, ...
  continue reading
 
Artwork

1
Automation Ladies

Automation Ladies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The podcast where girls talk industrial automation! We interview people from all walks of life in the Industrial Automation industry. Through a personal narrative/conversational framework we talk about PLCs, SCADA, IIoT, Machine Vision, Industrial Robots, Pneumatics, Control Systems, Process Automation, Factory Automation, Systems Integration, Entrepreneurship, Career Stories, Personal Journeys, Company Culture, and any other interesting and timely topic we want to discuss. Co-Hosted by Nikk ...
  continue reading
 
Artwork

1
Unsolicited Response

Dale Peterson: ICS Security Catalyst and S4 Conference Chair

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
  continue reading
 
Artwork

1
Control Amplified

ControlGlobal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Control Amplified podcast offers in-depth interviews and discussions with industry experts about important topics in the process control and automation field, exploring underlying issues affecting users, system integrators, suppliers and others in these industries.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
In this episode, SJRA SCADA Superintendent and HOU.SEC.CON./OT.SEC.CON. speaker Randy Petersen joins Michal and Sam on the podcast to share his expertise on SCADA systems and the unique security challenges facing water facilities. They highlight real-world incidents and vulnerabilities in OT environments, offer practical advice for improving OT sec…
  continue reading
 
Liquified natural gas (LNG) occupies an essential role in the energy transition, and integrated digital solutions--from process technology through advanced control and cybersecurity--are essential to optimizing its production while also minimizing its carbon footprint. In this Solutions Spotlight podcast, Control's Keith Larson talks with Srikanth …
  continue reading
 
Michael and Sam are talking to the new VP and Editor-in-Chief of CYBR.SEC.Media, Bill Brenner! They discuss his extensive 20+ year career journey from traditional journalism to cybersecurity media, the importance of supporting the mental health of cyber defenders, and his vision for CYBR.SEC.Media. Things Mentioned: Bill’s Letter from the Editor - …
  continue reading
 
The three proactive security principles of visibility, prioritization, and remediation have always been the foundation of vulnerability management teams. But these teams face continuous challenges. How do you address these challenges? Erik Nost, Senior Analyst at Forrester, joins Business Security Weekly to break down the six questions that need to…
  continue reading
 
The three proactive security principles of visibility, prioritization, and remediation have always been the foundation of vulnerability management teams. But these teams face continuous challenges. How do you address these challenges? Erik Nost, Senior Analyst at Forrester, joins Business Security Weekly to break down the six questions that need to…
  continue reading
 
בניגוד להרבה תחומים אחרים בסייבר התעשייה והאקדמיה הולכים יד ביד ולעיתים דווקא האקדמיה היא זו שדוחפת את החדשנות בתעשייה לקצוות. לראיה ה CyberWeek של אוניברסיטת ת"א מצליחה פעם אחר פעם לרכז את מיטב המוחות לדון על הווה ועתיד, למה הפעם זה כן עובד? שמדובר בסייבר הישראלי בצורה מפתיעה (או שלא) תמיד תפגשו את ד"ר יניב הראל. יניב מלווה את הסייבר האזרחי בישראל…
  continue reading
 
Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
  continue reading
 
Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
  continue reading
 
In this episode of the Pipeliners Podcast, Russel Treat talks with pipeline integrity veteran Jerry Rau about how he came to write and publish a multi-author book series designed to capture hard-earned industry lessons in a story-driven format for the next generation of pipeliners. They discuss the intent behind the books—focusing on practical pers…
  continue reading
 
First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segmen…
  continue reading
 
First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segmen…
  continue reading
 
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
  continue reading
 
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
  continue reading
 
ושא המחשוב הקוונטי נמצא ברקע כבר מספר לא מועט של שנים, מי שזה לא עיסוקו שמע "שזה שונה" ומאפשר כוח עיבוד באופן אקספוננציאלי גדול יותר מול המחשוב העכשווי. שהנושא עולה בתחום הסייבר תמיד זה מוביל לאותה נקודה, ההצפנות הקיימות יפרצו בין רגע ולא יהוו מחסום לתוקפים, האומנם? נחשון פינקו מארח את מייסדי קוונטימאיז פרופ' עמנואל דלה טורה מאוניברסיטת בר אילן המד…
  continue reading
 
Melinda Taylor brings over three decades of experience to the complex discussion around the Endangered Species Act (ESA), exploring its history, purpose, and the many misconceptions that surround it—especially within the oil and gas industry. In this episode, Grant Swartzwelder and Melinda unpack how the ESA operates, the challenges it poses, and o…
  continue reading
 
Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
  continue reading
 
Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you’re a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
  continue reading
 
Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
  continue reading
 
Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
  continue reading
 
Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
  continue reading
 
In this episode of the Pipeliners Podcast, Russel Treat is joined by returning guest Mark LaCour for a wide-ranging discussion on what the pipeline industry may face in 2026. Together, they reflect on prior-year predictions before exploring forward-looking themes such as infrastructure investment, LNG expansion, workforce constraints, data and digi…
  continue reading
 
For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
  continue reading
 
For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
  continue reading
 
Cloud breaches don't always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
  continue reading
 
Cloud breaches don't always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
  continue reading
 
Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
  continue reading
 
Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
  continue reading
 
We’re wrapping up 2025 with a special episode! Michael and Sam are talking to Jessvin Thomas, CEO of Auguria and winner of CYBR.SEC.CON.’s first pitch competition for cybersecurity startups! They discuss the evolving challenges in cybersecurity, the importance of root cause analysis, and how AI and context are shaping the future of SOC operations. …
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
  continue reading
 
SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play