Episodios

  • Almog Apirion CEO & Co-Founder @Cyolo on Remote Privileged Access for OT & Cyber-Physical Systems
    Aug 17 2025
    Podcast: ICS Cyber Talks Podcast
    Episode: Almog Apirion CEO & Co-Founder @Cyolo on Remote Privileged Access for OT & Cyber-Physical Systems
    Pub date: 2025-08-15

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    גישה מאובטחת מרחוק למערכות הארגוניות הפכה לכורח המציאות מאז הקורונה והצורך עלה בישראל ביתר שאת אחרי השביעי באוקטובר. במערכות פיזיות ותפעוליות גישה מאובטחת מרחוק היא צורך קיומי מחד, על מנת לאפשר תפעול תקלות 24 שעות ביממה. מאידך יש צורך בבקרה קפדנית על מי מתחבר, איך ולאן כולל תיעוד של כול הפעילויות שמתבצעות

    שוק חברות הטכנולוגיה שעוסקות בגישה מרחוק לסביבות תפעוליות התפתח מאוד בשנים האחרונות עם מגוון אפשריות ומתן מענה לצרכים שונים של הלקוחות.

    נחשון פינקו מארח את אלמוג אפיריון מנכ"ל ומייסד-שותף בסיולו בשיחה על ההתקדמות הטכנולוגית של פתרונות המאובטחים לגישה מרחוק במערכות פיזיות וסביבות תפעוליות והשילוב של יכולות פאם (גישה מועדפת)

    ועוד

    Secure remote access to corporate systems has become a necessity since the COVID-19 pandemic, and the need has increased in Israel even more after October 7th, in physical and operational systems.

    Secure remote access is an existential necessity, enabling 24-hour fault management. On the other hand, there is a need for strict control over who connects, how, and where, including documentation of all activities carried out.

    The market for technology companies that deal with remote access to operational environments has significantly developed in recent years, with a variety of options and solutions to different customer needs.

    Nachshon Pincu hosts Almog Apirion, CEO and co-founder of Cyolo, in a conversation about the technological advancement of secure solutions for remote access to physical systems and operational environments and the integration of PAM (privilege access management) capabilities.

    And more



    The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    47 m
  • Which low-hanging fruits to grab on the OT security journey | OT Security Made Simple
    Aug 17 2025
    Podcast: OT Security Made Simple
    Episode: Which low-hanging fruits to grab on the OT security journey | OT Security Made Simple
    Pub date: 2025-08-14

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    New Zealand’s Peter Jackson from SGS (not ofLord of the Rings fame!) speaks about right-sizing cybersecurity legislature,OT security assessments and the low-hanging fruits in building resilience. Hediscusses with host Klaus Mochalski how an OT security assessment helpsunderstand the risk landscape, how resilience can be hardened fast and easy,what challenges prevail in segmentation and isolation processes and why it isimportant to talk about genuine risks and not the bogeyman.



    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    25 m
  • From Shelfware to Security: Operationalizing OT Industrial Cybersecurity Tools
    Aug 16 2025
    Podcast: Industrial Cybersecurity Insider
    Episode: From Shelfware to Security: Operationalizing OT Industrial Cybersecurity Tools
    Pub date: 2025-08-10

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Many manufacturing leaders believe they’re seeing 80–85% of their OT environment industrial assets. But in this episode, Dino and Craig reveal the reality that most have visibility into only 30–35% of their industrial control system assets, leaving the hidden 70% vulnerable.

    In this hard-hitting episode, they dismantle the false sense of OT security. They explore why million-dollar cybersecurity tool investments aren't fully utilized, and expose the costly disconnect between corporate IT, plant-floor teams, and third-party vendors.

    From debunking the air gap myth to stressing the need to trust but verify every connection, they show how to turn underutilized tools into proactive defenses that improve both security and operational efficiency.

    If you think your ICS is fully protected, this conversation might change your mind.

    Chapters:

    • 00:00:00 - Introduction: When Inefficiency Becomes Expensive
    • 00:00:59 - The Hidden Danger of Feeling Secure in Manufacturing
    • 00:03:58 - Why True Visibility and Accurate Data Change Everything
    • 00:07:18 - Real-World Roadblocks: Missteps and Mixed Messages
    • 00:10:24 - Who Holds the Power vs. Who Bears the Blame in Cybersecurity
    • 00:21:47 - Charting a Smarter Path to Stronger Cyber Defenses
    • 00:25:27 - Conclusion: Actionable Moves to Level Up Your Security

    Links And Resources:

    • Want to Sponsor an episode or be a Guest? Reach out here.
    • Industrial Cybersecurity Insider on LinkedIn
    • Cybersecurity & Digital Safety on LinkedIn
    • BW Design Group Cybersecurity
    • Dino Busalachi on LinkedIn
    • Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!



    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    28 m
  • Local Infrastructure is Critical Infrastructure
    Aug 15 2025
    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)
    Episode: Local Infrastructure is Critical Infrastructure
    Pub date: 2025-08-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Our host Bryson sits down with Colin Ahern and Kirk Herath, two of the only cybersecurity experts working in Governors’ offices in the United States. Colin was appointed Chief Cyber Officer of the State of New York by Governor Kathy Hochul in June 2022, and Kirk stepped into his role as Cybersecurity Strategic Advisor to Ohio Governor Mike DeWine and Lt. Governor Jon Husted the same year. In their positions, Colin and Kirk are responsible for coordinating their states’ cybersecurity capabilities, overseeing threat assessment and response, working with local governments to prepare for and remediate cyber attacks, and more.

    What were the critical lessons learned in building statewide cybersecurity programs from the ground up? How do states navigate the shifting landscape of federal support? And what are the biggest challenges and opportunities on the horizon for cyber czars and strategic advisors across the country?

    “You can't replicate these shared services unless you're doing it together. You just can't. We can either succeed together or we can fail separately. There's really not a middle ground where we can all have exactly everything we want all the time. Because like we've said, this is a risk management exercise in a world of limited resources,” Colin explained.

    Join us for this and more on this episode of Hack the Plan[e]t.

    The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers.

    Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.



    The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    51 m
  • S2 E1: Vulnerability Management and Feeds
    Aug 15 2025
    Podcast: Simply ICS Cyber
    Episode: S2 E1: Vulnerability Management and Feeds
    Pub date: 2025-08-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Join Don Weber and Tom VanNorman for the Season 2 premiere of Simply ICS Cyber!

    In this episode, your hosts interview special guest and ICS professional, Dan Ricci.

    Dan is a Power Systems Engineer and Researcher with Idaho National Labs and sits down with the hosts to explore vulnerability management, feeds, and learn more about ICS Advisory Board Project.

    Episode Links:
    - https://www.icsadvisoryproject.com/
    - https://www.icsadvisoryproject.com/ics-advisory-dashboards/cisa-kev-for-cisa-ics-advisories

    Connect with Dan Ricci on LinkedIn:
    https://www.linkedin.com/in/danricci14

    Connect with your hosts on LinkedIn:
    - Don linkedin.com/in/cutaway
    - Tom linkedin.com/in/thomasvannorman
    =========================
    Simply Cyber empowers people who want a rewarding cybersecurity career
    =========================
    All the ways to connect with Simply Cyber
    https://SimplyCyber.io/Socials



    The podcast and artwork embedded on this page are from Simply Cyber Media Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    22 m
  • Cybersecurity for SMMs: A Conversation with CyManII & Michigan Tech
    Aug 14 2025
    Podcast: Advanced Manufacturing Now (LS 35 · TOP 3% what is this?)
    Episode: Cybersecurity for SMMs: A Conversation with CyManII & Michigan Tech
    Pub date: 2025-08-05

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    In this episode of Advanced Manufacturing Now, Editor-in-Chief Steve Plumb dives into how small and mid-sized manufacturers can build cybersecurity into their digital transformation efforts. Gabriela Ciocarlie and Curtis Taylor from CyManII are joined by Vinh Nguyen from Michigan Tech to explore a groundbreaking cybersecurity project.



    The podcast and artwork embedded on this page are from SME Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    46 m
  • Protecting the Core: Securing Protection Relays in Modern Substations
    Aug 13 2025
    Podcast: The Defender's Advantage Podcast (LS 36 · TOP 2.5% what is this?)
    Episode: Protecting the Core: Securing Protection Relays in Modern Substations
    Pub date: 2025-07-28

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Host Luke McNamara is joined by members of Mandiant Consulting's Operational Technology team (Chris Sistrunk, Seemant Bisht, and Anthony Candarini) to discuss their latest blog on securing assets in the energy grid.

    https://cloud.google.com/blog/topics/threat-intelligence/securing-protection-relays-modern-substations



    The podcast and artwork embedded on this page are from Mandiant, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    43 m
  • S1 E7: TSA Security Directives and OT
    Aug 12 2025
    Podcast: Simply ICS Cyber
    Episode: S1 E7: TSA Security Directives and OT
    Pub date: 2025-05-14

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Don and Tom jump into the TSA Directives in this episode with their special guest Mike Holcomb, the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, one of the world’s largest engineering, procurement, and construction companies. He also founded the BSides ICS/OT and BSides Greenville cons.

    In this episode, our expert guest helps us answer the questions below:
    - What are TSA Directives?
    - Where do we find them?
    - Who do they apply to?
    - How are sites checked?

    Connect with Mike:
    - Mike Holcomb LinkedIn: https://www.linkedin.com/in/mikeholcomb/

    Learn more about BSides ICS/OT:
    - BSides ICS/OT: https://www.bsidesics.org/

    =========================
    Join us every other Wednesday for Season 1 of the Simply ICS Cyber podcast, with your hosts, Don C. Weber and Tom VanNorman.

    Connect with your hosts on LinkedIn:
    - Don linkedin.com/in/cutaway
    - Tom linkedin.com/in/thomasvannorman

    =========================
    Simply Cyber empowers people who want a rewarding cybersecurity career
    =========================
    All the ways to connect with Simply Cyber
    https://SimplyCyber.io/Socials



    The podcast and artwork embedded on this page are from Simply Cyber Media Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    20 m