@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes

About

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!

Available on

Community

1173 episodes

teissTalk: Assessing and mitigating risks in your OT environment

PODCAST: teissPodcast - Cracking Cyber Security https://www.listennotes.com/podcasts/teisspodcast-cracking-cyber-security-teiss-g7SqZrPMnFv/ (LS 31 · TOP 5% what is this? https://www.listennotes.com/listen-score/) EPISODE: teissTalk: Assessing and mitigating risks in your OT environment https://www.listennotes.com/e/0428f3412a6645a091af728a8e98326a/ PUB DATE: 2024-03-29 __ __ This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Syed Ubaid Ali Jafri, Head of Cyber Defence & Offensive Security, HBL - Habib Bank Limited https://www.linkedin.com/in/ubaidjafri Giles Dunn, Partner & OT Cyber Security leader, EY https://www.linkedin.com/in/giles-dunn-6485a2117/ Amir Preminger, VP Research, Claroty https://www.linkedin.com/in/amir-preminger-207a0553/ Max Higginson, Cyber Security Manager (ICS/OT), Dominos UK https://www.linkedin.com/in/max-higginson/ The podcast and artwork embedded on this page are from TEISS, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

45m
Apr 01, 2024
NCF-347 Cyber Physical Security

PODCAST: New Cyber Frontier https://www.listennotes.com/podcasts/new-cyber-frontier-logic-central-online-98ruizq76BG/ (LS 27 · TOP 10% what is this? https://www.listennotes.com/listen-score/) EPISODE: NCF-347 Cyber Physical Security https://www.listennotes.com/e/5cb332bb76d442faaa8d0af46283737c/ PUB DATE: 2024-03-27 Welcome back, everybody, to New Cyber Frontier. In today’s Episode we have guest Eslam Tawfik Ph.D. .Dr Tawfik. studied advanced technology in Egypt. Cybersecurity is frequently used to describe the defense of digital networks, systems, and data against harm, unwanted access, and attacks. On the other hand, protecting the hardware and infrastructure that underpin digital systems is referred to as the physical part of cybersecurity. Securing the Root of Trust is a term you will hear throughout the talk, this is what Dr. Tawfik, explains as the set of underlying credentials that the security in each device depends upon. Cyber Physical security as you will hear also includes defending against different attacks to hardware devices, server rooms, data centers, and network connections, among other physical assets. Organizations can establish a more comprehensive security posture to safeguard their digital assets and infrastructure from various threats by incorporating physical security considerations with traditional cybersecurity procedures. Listen to this fascinating episode where our guest provides some insight that will resonate with many of you interested in the security of IoT and Critical Infrastructure systems. The podcast and artwork embedded on this page are from Logic Central Online, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

36m
Mar 29, 2024
2/4. Análisis del Caso La importancia del contexto en la Ciberseguridad Industrial

PODCAST: Casos de Ciberseguridad Industrial https://www.listennotes.com/podcasts/casos-de-ciberseguridad-industrial-centro-SbQ7diXR6Fq/ EPISODE: 2/4. Análisis del Caso La importancia del contexto en la Ciberseguridad Industrial https://www.listennotes.com/e/d848468a38c64141900af1eb3b150335/ PUB DATE: 2024-03-25 Se analizan cuáles son los riesgos de no considerar el contexto, así como los métodos y herramientas que nos pueden ayudar a identificarlo. The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

13m
Mar 28, 2024
Ep. 44: Lesley Carhart on the the regulations of AI in cybersecurity

PODCAST: ICS Pulse Podcast https://www.listennotes.com/podcasts/ics-pulse-podcast-industrial-cybersecurity-1z9NHMtyaxR/ EPISODE: Ep. 44: Lesley Carhart on the the regulations of AI in cybersecurity https://www.listennotes.com/e/a69b4eae20534bd999b732a1be21ca8b/ PUB DATE: 2024-03-26 There have been a lot of questions surrounding artificial intelligence and how they will be regulated moving forward. In this edition of the ICS Pulse podcast, we talk to Lesley Carhart of Dragos about these implications, as well as exclusive research on AI in cybersecurity. The podcast and artwork embedded on this page are from Industrial Cybersecurity Pulse, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

37m
Mar 27, 2024
1/4. Contexto del Caso La importancia del contexto en la Ciberseguridad Industrial

PODCAST: Casos de Ciberseguridad Industrial https://www.listennotes.com/podcasts/casos-de-ciberseguridad-industrial-centro-SbQ7diXR6Fq/ EPISODE: 1/4. Contexto del Caso La importancia del contexto en la Ciberseguridad Industrial https://www.listennotes.com/e/ba23d4107cf34b9190d15123e3158558/ PUB DATE: 2024-03-25 Se presenta el contexto del caso: datos de la organización, el entrevistado, tecnología, escenario y la importancia del contexto. The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

16m
Mar 26, 2024
Alliance in Action: Industry Collaboration for Safer Food and Agriculture with Scott Algeier

PODCAST: Bites & Bytes Podcast https://www.listennotes.com/podcasts/bites-bytes-podcast-anzensage-Q7MLEOWybmX/ EPISODE: Alliance in Action: Industry Collaboration for Safer Food and Agriculture with Scott Algeier https://www.listennotes.com/e/aac851ff6c034026ad9a9020cbed0a4b/ PUB DATE: 2024-03-21 In this episode of Bites and Bytes Podcast https://www.bitesandbytespodcast.com/, we're joined by Scott Algeier, an influential figure navigating the crucial intersection of cybersecurity, IT, policy, and operations.  As the founder of Conrad, Inc. and the executive director for IT-ISAC and Food and Ag-ISAC (Information Sharing and Analysis Center), Scott brings unparalleled expertise in building bridges between organizations to help fortify their defenses against cyber threats. Holding a Master’s degree in International Relations and European Studies from the University of Kent and an honors graduate from Gettysburg College, Scott’s journey into cybersecurity is as unique as it is inspiring.  This episode explores the foundational stories behind the Food and Ag ISAC and IT-ISAC and highlights the pivotal role of cross-industry information sharing in building a resilient cybersecurity infrastructure. Engage with us in this compelling dialogue that offers a deep dive into the mechanisms of securing our critical agricultural infrastructure through collective effort and strategic partnerships.  Learn about the innovative measures Scott Algeier is spearheading to safeguard our food and agriculture sectors from cyber threats, ensuring a secure future for all.  Join us for an exploration of how thoughtful collaboration and expert leadership are shaping the future of cybersecurity in agriculture, making our world safer, one byte at a time. Key Episode Highlights: __ __ Learn More: __ __ Water Sector discussion information: EPA calls off cyber regulations for water sector https://cyberscoop.com/epa-calls-off-cyber-regulations-for-water-sector/ Cyberattacks are hitting water systems throughout US, Biden officials warn governors https://www.cnn.com/2024/03/19/politics/cyberattacks-water-systems-us/index.html White House Convenes States to Discuss Water Sector Breaches https://www.infosecurity-magazine.com/news/white-house-states-water-sector/   🎉 NEW Bites and Bytes Podcast Website https://www.bitesandbytespodcast.com/!! 🎉 For those who have been asking how to support the show, a donation tip jar is on the main page https://www.bitesandbytespodcast.com/ and about the show https://www.bitesandbytespodcast.com/about-the-show page.  Thank you for all your support!     Wicked6 Cyber Games | 2024 Women's Global Cyber League  Learn more:  https://www.wicked6.com/ Register https://www.wicked6.com/register-2024and use promo code W6SPEAKERVIP to save $5 WICKED6 https://www.wicked6.com/ is back for its fourth year, and it's packed with speaker sessions, career networking, cyber challenges, and a tournament that will have you on the edge of your seat. It's not just an event; it's a community, a learning experience, and a lot of fun! The podcast and artwork embedded on this page are from AnzenSage, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

37m
Mar 26, 2024
OT Security Made Simple | Wie entwickelt sich der OT-Markt (aus Investorensicht)?

PODCAST: OT Security Made Simple Podcast https://www.listennotes.com/podcasts/ot-security-made-simple-podcast-klaus-vE6iLZ2VHfd/ EPISODE: OT Security Made Simple | Wie entwickelt sich der OT-Markt (aus Investorensicht)? https://www.listennotes.com/e/352fc71a8cff4375ba319928f3e11aa9/ PUB DATE: 2024-03-20 In dieser Episode von OT Security Made Simple begrüßen wir den Cybersecurity-Experten Dirk Seewald vom B2B-Investor eCapital. Dirk spricht über die Entwicklung des OT-Sicherheitsmarktes von 2006 bis heute, kommende Trends, warum Cyberversicherungen nicht der Weisheits letzter Schluss sind und die Bedeutung militärischer Forschung für Innovationen. Und er erklärt, warum Internationalisierung deutscher Startups von Tag 1 mitgedacht werden muss. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

38m
Mar 25, 2024
Navigating China's infrastructure risks in the energy sector.

PODCAST: Control Loop: The OT Cybersecurity Podcast https://www.listennotes.com/podcasts/control-loop-the-ot-cybersecurity-podcast-BHufFVeAbsd/ (LS 34 · TOP 3% what is this? https://www.listennotes.com/listen-score/) EPISODE: Navigating China's infrastructure risks in the energy sector. https://www.listennotes.com/e/adbfc56a8c514b87b41cddca056a9a01/ PUB DATE: 2024-03-20 Researchers discover a way to hijack web-based PLCs. Threat actor targets manufacturing entities in North America. US Department of Defense launches CORA program. CISA issues ICS advisories. Guest Aura Sabadus, Senior Journalist at ICIS, joins us to discuss how energy insiders are approaching the renewed risks of China's ramp up toward potential attacks on critical infrastructure and what the energy industry is saying about these risks. The Learning Lab is taking a break and will return soon. Stay tuned. CONTROL LOOP NEWS BRIEF. RESEARCHERS DISCOVER A WAY TO HIJACK WEB-BASED PLCS. Critical Infrastructure Systems Are Vulnerable to a New Kind of Cyberattack https://news.gatech.edu/news/2024/02/29/critical-infrastructure-systems-are-vulnerable-new-kind-cyberattack (Georgia Tech) THREAT ACTOR TARGETS MANUFACTURING ENTITIES IN NORTH AMERICA. Blind Eagle's North American Journey https://www.esentire.com/blog/blind-eagles-north-american-journey (eSentire) APT-C-36 Updates Its Spam Campaign Against South American Entities With Commodity RATs https://www.trendmicro.com/en_us/research/21/i/apt-c-36-updates-its-long-term-spam-campaign-against-south-ameri.html (Trend Micro) US DEPARTMENT OF DEFENSE LAUNCHES CORA PROGRAM. JFHQ-DODIN Officially Launches its New Cyber Operational Readiness Assessment Program https://www.defense.gov/News/News-Stories/Article/Article/3691583/jfhq-dodin-officially-launches-its-new-cyber-operational-readiness-assessment-p/ (US Department of Defense) CISA ISSUES ICS ADVISORIES. CISA Releases Fifteen Industrial Control Systems Advisories https://www.cisa.gov/news-events/alerts/2024/03/14/cisa-releases-fifteen-industrial-control-systems-advisories (CISA) CONTROL LOOP INTERVIEW. Guest Aura Sabadus https://www.linkedin.com/in/aurasabadus/, Senior Journalist at ICIS https://www.icis.com/explore/, joins us to discuss how energy insiders are approaching the renewed risks of China's ramp up toward potential attacks on critical infrastructure and what the energy industry is saying about these risks. CONTROL LOOP LEARNING LAB. The Learning Lab is on break and will return in the near future. Stay tuned. CONTROL LOOP AUDIENCE SURVEY. Please take a moment to fill out our super quick survey https://www.surveymonkey.com/r/CL_Audience_2024. Thanks! CONTROL LOOP OT CYBERSECURITY BRIEFING. A companion monthly newsletter is available through free subscription and on N2K Networks website https://thecyberwire.com/newsletters/control-loop. The podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

28m
Mar 25, 2024
Tipisodes: 7 Steps To Better Cybersecurity

PODCAST: Process Safety with Trish & Traci https://www.listennotes.com/podcasts/process-safety-with-trish-traci-72QZcdk8sKU/ (LS 28 · TOP 10% what is this? https://www.listennotes.com/listen-score/) EPISODE: Tipisodes: 7 Steps To Better Cybersecurity https://www.listennotes.com/e/887e966464c0442782378719c3599795/ PUB DATE: 2024-03-19 In this episode, we offer 7 steps for better cybersecurity. If you are a process control engineer, an IT professional in a company with an automation division, or a business manager responsible for safety or security, you may be wondering how your organization can get moving on more robust cybersecurity practices. View the transcript for links to all the materials mentioned in this podcast. https://www.chemicalprocessing.com/process-safety-w-trish-traci/article/33038811/tipisodes-7-steps-to-better-cybersecurity The podcast and artwork embedded on this page are from chemicalprocessingsafety, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

7m
Mar 24, 2024
Multiple Choice

PODCAST: The OG of OT https://www.listennotes.com/podcasts/the-og-of-ot-the-og-of-ot-tCZJT6orm_s/ EPISODE: Multiple Choice https://www.listennotes.com/e/f58374438cb54b81a96e463db3b9c381/ PUB DATE: 2024-03-15 The story of a pen tester who actually got to put his grubby hands on a real working control system. That never happens! And the things he was able to do will make your head spin. This is unlike any pen test story that most of you have ever heard before, or will likely hear again. The podcast and artwork embedded on this page are from The OG of OT, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

23m
Mar 24, 2024
Securing OT: Strategies for Prioritizing Vulnerabilities

PODCAST: PrOTect It All https://www.listennotes.com/podcasts/protect-it-all-aaron-crow-nHYAjbOusmi/ EPISODE: Securing OT: Strategies for Prioritizing Vulnerabilities https://www.listennotes.com/e/e60f942d18cf4bce8c089f0d29d9129a/ PUB DATE: 2024-03-14 In this conversation, Bryson Bort discusses his background and the creation of Scythe, an offensive security platform. He also talks about the ICS Village and the Vulnerability Management Pavilion, as well as his collaboration with the Department of Energy on a vulnerability management research project. Bryson emphasizes the importance of prioritizing vulnerabilities in operational technology (OT) and understanding the risks in power plants. He also highlights the need to build trust with asset owners and gain leadership buy-in for cybersecurity initiatives. Finally, he discusses the importance of connecting technical expertise to business priorities. The conversation explores the importance of building trust and collaboration in the field of cybersecurity, particularly in the context of power utilities. It emphasizes the need for security professionals to be partners rather than adversaries, and highlights the role of organizations like the ICS Village in fostering collaboration and education. The conversation also delves into the concept of purple team exercises and the importance of starting small and growing in cybersecurity initiatives. Additionally, it discusses the significance of conversations with policymakers and the need for more cybersecurity professionals in the industry.   MORE ABOUT THE EPISODE HOSTED BY: Aaron Crow GUEST: Sevak Avakians   CONNECT WITH BRYSON BORT: __ __ CONNECT WITH AARON CROW: __ __ LEARN MORE ABOUT PROTECT IT ALL: __ __ To be a guest, or suggest a guest/episode please email us at info@protectitall.co — Show notes by NMP. Audio production by NMP. We hear you loud and clear.   The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

42m
Mar 24, 2024
Moty Cristal CEO @NEST on ransomware negotiation with hackers/attack groups: flipping the other side

PODCAST: ICS Cyber Talks Podcast https://www.listennotes.com/podcasts/ics-cyber-talks-podcast-nachshon-pincu-wCayzhJPU4Q/ EPISODE: Moty Cristal CEO @NEST on ransomware negotiation with hackers/attack groups: flipping the other side https://www.listennotes.com/e/6347a677925d4fe5baff53f08ee14ec3/ PUB DATE: 2024-03-18 נחשון פינקו מארח את מוטי קריסטל מנכ"ל חברת אנ.אי.אס.טי. (אסטרטגיות מו"מ) מי שהתחיל את דרכו כנושא ונותן בצוותי המו״מ המדיני של לשכת ראש הממשלה רבין וכיום מבכירי מנהלי המשא ומתן בעולם במשברי סייבר ומפתח תורת המשא ומתן כתחום אקדמאי, בשיחה על ניהול מו"מ במצבי משבר בכלל ומשברי סייבר בפרט. איך מנהלים מו"מ מבלי לדבר (טונציה) או לראות (שפת גוף) את הצד השני ועדיין להבין מי נמצא מולך ומה אפשר להסיק מהודעות בכתב בלבד Nachshon Pincu hosts Moty Cristal, CEO of NEST (negotiation strategies), who started his career as a subject and giver in the Israeli prime minister's office. He is now one of the most senior negotiators in the world and a developer of negotiation theory in an academic field, talking about managing negotiations in crises in general and Cyber in particular. How do you negotiate without speaking (voice tuition) or watching (body language) the other side and still understand who is in front of you and what can be concluded from written messages only? The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

1h 1m
Mar 22, 2024
The Future of AI: Determinism, Security, and Beyond

PODCAST: PrOTect It All https://www.listennotes.com/podcasts/protect-it-all-aaron-crow-nHYAjbOusmi/ EPISODE: The Future of AI: Determinism, Security, and Beyond https://www.listennotes.com/e/0e2336c7b3174304b694fdbac462e252/ PUB DATE: 2024-03-05 Sevak Avakians, CEO of Intelligent Artifacts, discusses the limitations of neural networks and the need for a new approach to artificial intelligence. He introduces Gaius, a platform that replaces underlying neural networks with a transparent and explainable technology. Avakians highlights the challenges of regulating AI and emphasizes the importance of deterministic systems in critical industries. He also discusses the potential applications of AI in cybersecurity and the need for human involvement in AI decision-making. Looking ahead, Avakians is excited about the possibilities of AI but also acknowledges the concerns and risks associated with its implementation. The conversation explores the concerns and potential risks associated with autonomous aircraft and the use of AI and ML in safety-critical systems. Adversarial attacks are discussed as a potential threat, highlighting the need for robust safety regulations. The application of safety standards, such as the DO178C standard, to AI and ML technologies is proposed as a solution. On the positive side, AI is seen as a tool to enhance human capabilities and improve efficiency. The importance of training and wargaming exercises using AI is emphasized. The conversation concludes by discussing the balance between the risks and benefits of AI and providing information on how to learn more about AI. ABOUT SEVAK AVAKIANS As the founder and CEO of Intelligent Artifacts, Inc., Sevak Avakians has been leading the development and commercialization of a groundbreaking information processing and AI/ML/R framework, GAIuS, since 2008. GAIuS is a deterministic, fully explainable, and use-case agnostic symbolic connectionist AI solution that can be applied to mission and safety-critical domains, such as defense, aerospace, healthcare, and law enforcement. With a background in physics, telecommunications, information theory, cybersecurity, and artificial intelligence, Sevak has a unique and comprehensive understanding of the challenges and opportunities in the field of cognitive computing. He is passionate about creating AI solutions that can act, interact, and adapt as information, goals, and requirements evolve while providing full transparency and accountability for their decisions and actions. Sevak's vision is to empower developers, customers, and end- users with the ability to create, deploy, and maintain machine intelligence with ease, efficiency, and confidence. In 2010, Sevak founded Intelligent Artifacts initially as an R&D and consulting service for cognitive computing. Over the years, he built the GAIuS Cognitive Computing Platform as a commercial product launched in 2016. GAIuS Cognitive Computing Platform, allows developers to rapidly create, test, deploy, and maintain machine intelligence, learning, classification, predictions, analytics, etc. into their products. In 2020, the team at Intelligent Artifacts built a reasoning engine into GAIuS, creating the very first modular, repeatable, use-case agnostic, complete, Artificial Intelligence / Machine Learning / Reasoning (AI/ML/R) platform that adheres to ExCITE AI principles. GAIuS handles all the complexity of machine intelligence in 4 API calls. GAIuS agents can be made and deployed in less than 3 minutes. Developers copy-and-paste a GAIuS agent’s API URL into their application. GAIuS agents have DNA and evolve within their environment, eliminating many of the hurdles to achieving true machine intelligence.   MORE ABOUT THE EPISODE HOSTED BY: Aaron Crow GUEST: Sevak Avakians   CONNECT WITH SEVAK AVAKIANS: __ __ CONNECT WITH AARON CROW: __ __ LEARN MORE ABOUT PROTECT IT ALL: __ __ To be a guest, or suggest a guest/episode please email us at info@protectitall.co — Show notes by NMP. Audio production by NMP. We hear you loud and clear. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

51m
Mar 22, 2024
HMI S&M

PODCAST: The OG of OT https://www.listennotes.com/podcasts/the-og-of-ot-the-og-of-ot-tCZJT6orm_s/ EPISODE: HMI S&M https://www.listennotes.com/e/0619862b9d7e47f5bdac4ed5042a8f2c/ PUB DATE: 2024-03-01 The automation systems that control the world's critical infrastructures are pretty neat. Some might even say, sexy. If OT cybersecurity gets you hot, this episode is for you. It has all sorts of implied figurative 'booms' that could cause all sorts of implied literal 'booms'. Plus chickens. My anaconda don't want none if you don't subscribe to OGOFOT, hon! The podcast and artwork embedded on this page are from The OG of OT, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

18m
Mar 22, 2024
5 Ways to Make Your HMI Secure

PODCAST: Automation Chat https://www.listennotes.com/podcasts/automation-chat-the-journal-from-rockwell-p2QGB_P6IdY/ (LS 26 · TOP 10% what is this? https://www.listennotes.com/listen-score/) EPISODE: 5 Ways to Make Your HMI Secure https://www.listennotes.com/e/93ad7bca101e4256a1e0a9ef272fb82a/ PUB DATE: 2024-03-19 In this episode of Automation Chat, written by Rockwell Automation, ’s Executive Editor Theresa Houck discusses how to limit access to networks, processes and intellectual property by using modern human-machine interface software with security features for user authentication, mobile use and more. And as always, get your family-friendly, silly Joke of the Day. Resources from this episode: __ __ Automation Chat is brought to you by https://www.rockwellautomation.com/en-us/company/news/the-journal.html magazine. Find us on LinkedIn https://www.linkedin.com/groups/3024449/. Find us on Facebook http://www.facebook.com/pages/The-Journal-from-Rockwell-Automation-and-Our-Partners/145671337594. Find us on X (Twitter) http://twitter.com/thejournal_ROK. Please leave us a 5-star rating and a review. The podcast and artwork embedded on this page are from The Journal From Rockwell Automation and Our PartnerNetwork, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

5m
Mar 20, 2024
Navigating Cybersecurity Challenges: A Conversation with Ted Gutierrez on Bridging OT and IT

PODCAST: PrOTect It All https://www.listennotes.com/podcasts/protect-it-all-aaron-crow-nHYAjbOusmi/ EPISODE: Navigating Cybersecurity Challenges: A Conversation with Ted Gutierrez on Bridging OT and IT https://www.listennotes.com/e/56503082f1f24daba1aedd2071b53b83/ PUB DATE: 2024-02-27 In this conversation, Ted Gutierrez, the leader of Security Gate, discusses the challenges and strategies in implementing cybersecurity solutions in the critical infrastructure sector. He emphasizes the importance of common language and frameworks to bridge the gap between IT and OT. Ted also highlights the need for asset owners to start slow and focus on key controls, rather than aiming for maturity level 5 in all control frameworks. He discusses the challenges of scaling OT compared to IT and the need for consolidation in the market. Ted concludes by emphasizing the power of saying no and focusing on specific goals. In this conversation, Ted Gutierrez discusses his concerns and excitement for the future of cybersecurity. He expresses concern about the global state of conflict and its impact on cybersecurity. He also discusses the balance between order and freedom in the cyber industry. On the positive side, Gutierrez is excited about the increasing focus on the business side of cybersecurity and the growing understanding of cyber as a business problem. He emphasizes the importance of non-technical leaders understanding cybersecurity. Overall, Gutierrez is confident in the people working to protect the globe. ABOUT TED GUTIERREZ Ted Gutierrez is the CEO and Co-Founder of SecurityGate, the provider of the leading SaaS Platform for OT cyber improvement. He is dedicated to protecting what matters across operational sectors and aligning industrial cyber teams on their cyber improvement journey. With an extensive background as a compliance and risk auditor for critical infrastructure, he understands the pain associated with effectively maturing organizational resilience in a decentralized ecosystem. A United States Military Academy graduate at West Point and a veteran of the US Army as a reconnaissance and surveillance expert.  TAKEAWAYS __ __   HOSTED BY: Aaron Crow GUEST: Ted Gutierrez   CONNECT WITH TED GUTIERREZ: __ __ CONNECT WITH AARON CROW: __ __ LEARN MORE ABOUT PROTECT IT ALL: __ __ To be a guest, or suggest a guest/episode please email us at info@protectitall.co — Show notes by NMP. Audio production by NMP. We hear you loud and clear. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

51m
Mar 20, 2024
The Robot Rat Race

PODCAST: The OG of OT https://www.listennotes.com/podcasts/the-og-of-ot-the-og-of-ot-tCZJT6orm_s/ EPISODE: The Robot Rat Race https://www.listennotes.com/e/927cff8cbaab4dc0a524ffbd91e13a34/ PUB DATE: 2024-02-15 Artificial Intelligence. It’s the golden child of the tech industry right now.  Some say it’s the most disruptive force since the advent of the Internet itself.  And it’s something we personally embrace here at OGOFOT.  But how useful is it in terms of cybersecurity, and specifically for O.T. environments? We have two guests this episode, Murdock and Hannibal. As always, these are not their real names.  Hannibal is going to explain how AI can be used to help detect threats.  Howlin’ Mad Murdock is going to explain how AI can be used to develop new and more effective hacks against industrial control systems. The podcast and artwork embedded on this page are from The OG of OT, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

20m
Mar 20, 2024
4/4. Desenlace del Caso Realizando un test de intrusión en Sistemas de Control Industrial

PODCAST: Casos de Ciberseguridad Industrial https://www.listennotes.com/podcasts/casos-de-ciberseguridad-industrial-centro-SbQ7diXR6Fq/ EPISODE: 4/4. Desenlace del Caso Realizando un test de intrusión en Sistemas de Control Industrial https://www.listennotes.com/e/770f885ab1f54e4699be92e60feb32ed/ PUB DATE: 2024-03-14 Cuarto episodio final en el que se presentan las acciones que implementan después del test de intrusión, como miden su efectividad y valiosas lecciones aprendidas. The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

17m
Mar 19, 2024
Harnessing AI in Cybersecurity: Revolutionizing OT Protection

PODCAST: PrOTect It All https://www.listennotes.com/podcasts/protect-it-all-aaron-crow-nHYAjbOusmi/ EPISODE: Harnessing AI in Cybersecurity: Revolutionizing OT Protection https://www.listennotes.com/e/4e939c75b0774cd4a36918abf600fe27/ PUB DATE: 2024-02-20 HOSTED BY: Aaron Crow GUEST: Clint Bodungen Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 25+ years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook. Clint is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, and Kaspersky Lab, and is currently the co-founder and CEO of a cybersecurity training startup, ThreatGEN. Renowned for his creative approach to cybersecurity education and training, he has been at the forefront of integrating gamification and AI applications into cybersecurity training, creating his flagship product, “ThreatGEN® Red vs. Blue”, the world's first online multiplayer computer designed to teach real-world cybersecurity. His latest innovation is AutoTableTop, which uses the latest generative AI technology to automate, simplify, and revolution IR tabletop exercises. As AI technology continues to evolve, so too does his pursuit to help revolutionize the cybersecurity industry using generative AI and large language models (LLM). SUMMARY In this conversation, Clint and Aaron discuss the value of tabletop exercises in cybersecurity and the development of auto tabletop, an AI-based tool for facilitating incident response tabletop exercises. They highlight the limitations of traditional tabletops and the benefits of using AI to enhance engagement and flexibility. They address concerns about AI in cybersecurity, such as data privacy and security, and emphasize the use of local language models to mitigate risks. They also discuss the future of AI in the industry and the workforce, emphasizing the importance of learning generative AI and prompt engineering for future job prospects. In this conversation, Clint discusses the automation of tasks using AI and the benefits of using AI as a tool to enhance human creativity. He also explores the future of AI and its potential for accelerating technological advancement. Clint acknowledges the concerns about the potential misuse of AI but emphasizes the importance of using it for good. He highlights the role of AI in reducing barriers to innovation and its significance in cybersecurity. Overall, the conversation highlights the transformative power of AI and its impact on various industries.   TAKEAWAYS __ __ CHAPTERS   00:00 Introduction and Background 02:13 The Value of Tabletop Exercises 03:01 The Development of Auto Tabletop 04:27 The Importance of Regular Tabletop Exercises 05:53 Limitations of Traditional Tabletops 07:41 The Benefits of AI-based Tabletops 09:45 Increased Engagement and Flexibility 11:36 Expanding the Reach of Tabletop Exercises 14:43 Addressing Concerns about AI in Cybersecurity 19:32 Using Local Language Models for Enhanced Security 25:15 Misconceptions and Pitfalls of AI in the Industry 30:37 Preparing for the Adoption of AI in OT 37:52 Overcoming Fear of the Unknown  40:38 The Future of AI in Industry and Workforce 46:30 Automating Tasks with AI 48:16 The Future of AI 49:18 Enhancing Human Creativity 52:08 Accelerating Technological Advancement 53:02 The Potential for Good and Bad 55:23 Reducing Barriers to Innovation 57:16 Using AI for Cybersecurity 57:43 The Importance of AI in OT and Cybersecurity CONNECT WITH CLINT BODUNGEN: __ __   CONNECT WITH AARON CROW: __ __ LEARN MORE ABOUT PROTECT IT ALL: __ __ To be a guest, or suggest a guest/episode please email us at info@protectitall.co — Show notes by NMP. Audio production by NMP. We hear you loud and clear. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

58m
Mar 19, 2024
Teaser #3 - The AI are Coming!

PODCAST: The OG of OT https://www.listennotes.com/podcasts/the-og-of-ot-the-og-of-ot-tCZJT6orm_s/ EPISODE: Teaser #3 - The AI are Coming! https://www.listennotes.com/e/0ca371b7c9fa4bda95666c61bec1dcfa/ PUB DATE: 2024-02-08 Our MC is getting fed up with all the anti-AI sentiment. Don't bother apologizing; make it up to her by subscribing today. That way you won't miss the 2nd episode of OGOFOT, which is all about artificial intelligence and how it help protect critical infrastructure ... or not. The podcast and artwork embedded on this page are from The OG of OT, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

1m
Mar 19, 2024
From Segmentation to SOC: a Multilayered Approach to Cybersecurity in Rail Operations

PODCAST: Secure Tracks: Rail Tech Security Conversations https://www.listennotes.com/podcasts/secure-tracks-rail-tech-security-RhPQI60q-TJ/ EPISODE: From Segmentation to SOC: a Multilayered Approach to Cybersecurity in Rail Operations https://www.listennotes.com/e/0e9179dda4ef4bfea2f4c2a357638aab/ PUB DATE: 2024-03-13 In this episode of Secure Tracks, Roark Pollock sits down with Manvendra Singh from the National Capital Region Transport Corporation (NCRTC). From the foundational steps of network segmentation to the sophisticated implementation of SOC, listeners are guided through a comprehensive, multilayered approach to cybersecurity. The discussion emphasizes the importance of integrating IT and OT to protect against vulnerabilities and ensure the safety and reliability of rail operations. The podcast and artwork embedded on this page are from Cylus, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

39m
Mar 18, 2024
Exploring the OT Landscape: Insights from Building Management with Kyle Peters

PODCAST: PrOTect It All https://www.listennotes.com/podcasts/protect-it-all-aaron-crow-nHYAjbOusmi/ EPISODE: Exploring the OT Landscape: Insights from Building Management with Kyle Peters https://www.listennotes.com/e/d720740da006436a8a0e08e979db752c/ PUB DATE: 2024-02-12 Kyle Peters is a recovering building automation and HVAC technician and programmer who was drawn to the dark side of cybersecurity and never looked back.  Today he is the senior consultant for OT Cybersecurity, focusing on building automation systems at Intelligent Buildings.  If you’d like to geek out on such things, reach out to Kyle via LinkedIn or email blackhole@secretdomain.xyz. In this conversation, Kyle discusses the world of building management systems and the importance of cybersecurity in this field. He highlights the diversity of building systems and the interconnectedness of various components. The conversation emphasizes the need for a risk-based approach to security and the importance of policies and standards. Kyle also emphasizes the value of understanding the system and planning ahead to mitigate risks. The conversation concludes with a discussion on securing remote access and implementing segmentation. The conversation explores the lack of cybersecurity preparedness in organizations, the need to translate cybersecurity risks to business risks, the likelihood of attacks and targeting, the challenge of selling likely risks, exciting technological advances in cybersecurity, concerns about AI and rapid technological changes, and closing thoughts and a call to action.   TAKEAWAYS Building management systems encompass a wide range of components, including HVAC systems, fire alarms, and lighting. A risk-based approach to security is crucial in building management, considering the diverse systems and potential vulnerabilities. Policies and standards play a significant role in ensuring the security and reliability of building management systems. Simple solutions, such as proper cable management and backup plans, can greatly enhance the security and availability of building systems. Understanding the system and planning ahead are essential for effective risk mitigation in building management. Securing remote access and implementing segmentation are key measures to protect building management systems from cyber threats. Many organizations are not adequately prepared for cybersecurity threats, either due to limited budgets or lack of expertise. It is important to translate cybersecurity risks into business risks to help organizations understand the potential impact on their operations. Cyber attacks can come from various sources, including nation-state actors, but also from simple human errors or system failures. Selling the importance of cybersecurity can be challenging, as the most likely risks may not be as sensational as nation-state attacks. Exciting technological advances in cybersecurity are on the horizon, but they also bring concerns about the potential risks and implications of AI and rapid technological changes.   CHAPTERS 00:00 Introduction and Background 03:07 Overview of Building Management Systems 12:16 Common Issues in Building Management 23:10 Risk-Based Approach to Security 27:24 Importance of Policies and Standards 32:25 Mitigating Risks with Simple Solutions 35:01 Understanding the System and Planning Ahead 39:29 Securing Remote Access and Segmentation 40:45 Lack of Cybersecurity Preparedness 44:19 Translating Cybersecurity Risks to Business Risks 46:21 The Likelihood of Attacks and Targeting 49:03 The Challenge of Selling Likely Risks 52:35 Exciting Technological Advances in Cybersecurity 54:22 Concerns about AI and Rapid Technological Changes 56:31 Closing Thoughts and Call to Action   — CONNECT WITH KYLE: __ __ CONNECT WITH AARON CROW: __ __ LEARN MORE ABOUT PROTECT IT ALL: __ __ To be a guest, or suggest a guest/episode please email us at info@protectitall.co — Show notes by NMP. Audio production by NMP. We hear you loud and clear. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

58m
Mar 18, 2024
WTF is OT?

PODCAST: The OG of OT https://www.listennotes.com/podcasts/the-og-of-ot-the-og-of-ot-tCZJT6orm_s/ EPISODE: WTF is OT? https://www.listennotes.com/e/982f847bc60c43dfaf9f4eb1343f5b70/ PUB DATE: 2024-02-01 Okay so the grittiest episode, but since so many people don’t really understand WTF the term “OT” really means, I figured I’d hit this first. Think you already know what OT means? Statistically, you’re wrong. Doctors have proven that 5 out of 6 self-proclaimed OT cyber experts are actually idiots. For folks in the industry, this is a different take on OT cyber than your typical "CIA is AIC" tripe. For newcomers, this is a short introduction to "things that can go boom," and why they just might. The podcast and artwork embedded on this page are from The OG of OT, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

18m
Mar 18, 2024
3/4. Acciones en el Caso Realizando un test de intrusión en Sistemas de Control Industrial

PODCAST: Casos de Ciberseguridad Industrial https://www.listennotes.com/podcasts/casos-de-ciberseguridad-industrial-centro-SbQ7diXR6Fq/ EPISODE: 3/4. Acciones en el Caso Realizando un test de intrusión en Sistemas de Control Industrial https://www.listennotes.com/e/6fc45c7db6d246a197ade76e51e1d501/ PUB DATE: 2024-03-14 Tercer episodio en el que se presenta como priorizan en el test, que acciones de mitigación son más efectivas, como se involucra la dirección y la comunicación con los stakeholders. The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

19m
Mar 17, 2024
Bridging the Gap: OT Cybersecurity in the Evolving Landscape of Industry and Recruitment

PODCAST: PrOTect It All https://www.listennotes.com/podcasts/protect-it-all-aaron-crow-nHYAjbOusmi/ EPISODE: Bridging the Gap: OT Cybersecurity in the Evolving Landscape of Industry and Recruitment https://www.listennotes.com/e/14065da432a54b0b80472173fa38ab0d/ PUB DATE: 2024-02-05 HOSTED BY: Aaron Crow GUEST: James Morris, Director, Talent Solutions at NDK Cyber  With a focus on the OT Cyber Security recruitment space James is the Talent Solutions Director at NDK Cyber. NDK Cyber work with high-growth businesses in the USA, UK & EMEA to provide completely tailored cybersecurity talent attraction solutions. Specialising in long-term talent acquisition and strategy, we have mastered a blend of data insights, the latest technology and our own personal network mastered over 20+ years to build 100s of cybersecurity teams across the globe. SUMMARY In this conversation, Aaron Crow and James Morris discuss the transition happening in the field of OT security, with a growing need for dedicated OT security engineers and teams. They explore the challenges of budgeting for OT security and the importance of building trust and collaboration between IT and OT departments. They also emphasize the value of cross-disciplinary skills and the need for apprenticeships and on-the-job training to address the skills gap in OT security. The conversation highlights the importance of translating cybersecurity into business risk and the role of education and community in promoting OT security. The conversation covers various topics related to job descriptions, hiring challenges, helping people enter the OT space, companies being more open to training and transferable skills, excitement for the future of OT security, concerns about AI and ML in cybersecurity, and the importance of OT security in uncertain times.   TAKEAWAYS __ __   Chapters   00:00 Introduction and Background 01:28 Transition in OT Security Roles 03:01 Roles and Responsibilities in OT Security 04:13 Understanding the Risks in OT 05:33 The Need for Cross-Disciplinary Skills 06:32 Determining the Right Department for OT Security 07:45 The Importance of Business Focus in OT Security 08:34 Building Trust and Collaboration between IT and OT 09:08 Challenges in Budgeting for OT Security 10:33 Addressing the Skills Gap in OT Security 11:35 The Value of Apprenticeships and On-the-Job Training 12:22 Building the Business Case for OT Security 14:17 Translating Cybersecurity into Business Risk 15:43 The Likelihood of Attacks in OT 16:47 The Role of Education and Community in OT Security 20:16 Bringing in Transferable Skills to OT Security 25:46 The Importance of Building Relationships in OT Security 29:35 The Need for Collaboration and Open-Mindedness 32:56 Addressing the Skills Gap in OT Security 36:16 Creating Opportunities for Entry into OT Security 39:17 The Diversity of Roles in OT Security 40:31 Job Descriptions and Hiring Challenges 49:28 Helping People Enter the OT Space 51:45 Companies Being More Open to Training and Transferable Skills 56:13 Excitement for the Future of OT Security 57:12 Concerns about AI and ML in Cybersecurity 59:58 The Importance of OT Security in Uncertain Times 01:00:18 Contact Information and Networking — CONNECT WITH JAMES: __ __ CONNECT WITH AARON CROW: __ __ LEARN MORE ABOUT PROTECT IT ALL: __ __ To be a guest, or suggest a guest/episode please email us at info@protectitall.co — Show notes by NMP. Audio production by NMP. We hear you loud and clear. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

1h 2m
Mar 17, 2024
OG of OT Official Teaser

PODCAST: The OG of OT https://www.listennotes.com/podcasts/the-og-of-ot-the-og-of-ot-tCZJT6orm_s/ EPISODE: OG of OT Official Teaser https://www.listennotes.com/e/00f1d99e334b4d57b1c0090a43386c88/ PUB DATE: 2024-01-17 Announcing a new podcast from the OG of OT (Operational Technology). Through secure and anonymous interviews, we're bringing you the stories and conversations that you normally don't get to hear (and that a lot of people probably don't want you to listen to). Because it's 100% anonymous, all egos and agendas are left at the door. New episodes will drop on the 1st and the 15th of every month, starting Feb 1, 2024. The podcast and artwork embedded on this page are from The OG of OT, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

1m
Mar 17, 2024
Dr Chuck Freilich Senior researcher @INSS on Iranian cyber threat & strategy effects on October 7th

PODCAST: ICS Cyber Talks Podcast https://www.listennotes.com/podcasts/ics-cyber-talks-podcast-nachshon-pincu-wCayzhJPU4Q/ EPISODE: Dr Chuck Freilich Senior researcher @INSS on Iranian cyber threat & strategy effects on October 7th https://www.listennotes.com/e/6d6b3ac907354f99a4873e806e4dc2ea/ PUB DATE: 2024-03-13 נחשון פינקו מארח את ד"ר צ'ק פרייליך, לשעבר סגן ראש המועצה לביטחון לאומי וכיום חוקר בכיר במכון למחקרי ביטחון לאומי, בעקבות פרסום מחקרו מזכר 231 על איום הסייבר האירני, בשיחה על אסטרטגיית הסייבר האירנית בכלל ועליית האיום המיידי על מדינת ישראל מאז ה-7 באוקטובר Nachshon Pincu hosts Dr. Chuck Freilich, former deputy head of the Israeli National Security Council and currently a senior researcher at the Institute for National Security Studies (NISS), following the publication of his study Memo 231 on the Iranian cyber threat, in a conversation about the Iranian cyber strategy in general and the rise of the immediate danger to the State of Israel since October 7th The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

52m
Mar 14, 2024
Welcome to PrOTect IT All

PODCAST: PrOTect It All https://www.listennotes.com/podcasts/protect-it-all-aaron-crow-nHYAjbOusmi/ EPISODE: Welcome to PrOTect IT All https://www.listennotes.com/e/7562de4fcfa84c14b083873767048c04/ PUB DATE: 2024-01-23 IN THIS EPISODE, AARON DISCUSSES: __ __ KEY TAKEAWAYS: __ __ CONNECT WITH AARON CROW: __ __ LEARN MORE ABOUT PROTECT IT ALL: __ __ To be a guest, or suggest a guest/episode please email us at info@protectitall.co — Show notes by NMP. Audio production by NMP. We hear you loud and clear. wn4VGg9BZszjBmOwCp3m The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

3m
Mar 14, 2024
Evaluating network segmentation strength [The Industrial Security Podcast]

PODCAST: The Industrial Security Podcast https://www.listennotes.com/podcasts/the-industrial-security-podcast-pi-media-K5gXeFuzZ1S/ (LS 35 · TOP 3% what is this? https://www.listennotes.com/listen-score/) EPISODE: Evaluating network segmentation strength [The Industrial Security Podcast] https://www.listennotes.com/e/2a09e6c288e249c19e594baef482d4e9/ PUB DATE: 2024-03-12 How hard is it for an attacker to dig around in my network? Robin Berthier of Network Perception joins us to look at new network segmentation evaluation and visualization technology that lets us see at a glance how much trouble, or not, we're in. The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

51m
Mar 13, 2024
Ryan Pickren on New Web-Based PLC Malware Research

PODCAST: Nexus: A Claroty Podcast https://www.listennotes.com/podcasts/nexus-a-claroty-podcast-claroty-zCh-SjZqY3A/ (LS 31 · TOP 5% what is this? https://www.listennotes.com/listen-score/) EPISODE: Ryan Pickren on New Web-Based PLC Malware Research https://www.listennotes.com/e/5e16d082a0b74ad4859ef505ee646439/ PUB DATE: 2024-03-06 Ryan Pickren, a Ph.D. student in the School of Electrical and Computer Engineering at the Georgia Institute of Technology, joins the Claroty Nexus podcast to discuss a recently published research paper that explains a new web-based malware attack against programmable logic controllers. Pickren, the lead author, along with colleagues Tohid Shekari, Saman Zonouz, and Raheem Beyah, explains how embedded webservers inside modern PLCs can be attacked to give remote attackers full control over the device. Check out their paper: “Compromising Industrial Processes Using Web-Based Programmable Logic Controller Malware” https://www.ndss-symposium.org/wp-content/uploads/2024-49-paper.pdf The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

35m
Mar 10, 2024