Episodios

  • Plot Twist: I Wrote a Book | Kristin King & Securing What Feeds Us
    Mar 27 2026
    Podcast: Bites and Bytes PodcastEpisode: Plot Twist: I Wrote a Book | Kristin King & Securing What Feeds UsPub date: 2026-03-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationShe’s back. And she brought a book.After a quieter stretch on the feed, Kristin King returnsto the Bites & Bytes Podcast with a solo episode to announce what she’s been building behind the scenes: Securing What Feeds Us: Cybersecurity in Food and Agriculture, published by Wiley and available for pre-order now, with an official release date of September 29, 2026.In this episode, Kristin breaks down what’s inside the nearly 500-page book, from precision agriculture and operational technology to aquaculture, agroterrorism, food science innovation, and the human layer that runs through all of it. She makes the case for why food and agriculture deserve the same cybersecurity attention we give to the power grid or financial sector and explains who this book is really for (spoiler: it’s anyone who eats).She also talks about where the podcast is headed next andmakes one clear ask of the community that helped get her here.Here are the “Securing What Feeds Us: Cybersecurity in Food and Agriculture” book Pre-Order Links: 📘 US Pre-Order Link (Amazon):https://www.amazon.com/Securing-What-Feeds-Cybersecurity-Agriculture/dp/1394391005#detailBullets_feature_div📘 UK Pre-Order Link (Amazon): https://www.amazon.co.uk/dp/1394391005?ref=cm_sw_r_ffobk_cp_ud_dp_MFWDKT09AMPZSA86K9NH&ref_=cm_sw_r_ffobk_cp_ud_dp_MFWDKT09AMPZSA86K9NH&social_share=cm_sw_r_ffobk_cp_ud_dp_MFWDKT09AMPZSA86K9NH&bestFormat=true📘 Barns & Noble: https://www.barnesandnoble.com/w/securing-what-feeds-us-kristin-king/1149440985📘 Bookshop.org:https://bookshop.org/p/books/securing-what-feeds-us-cybersecurity-in-food-and-agriculture-kristin-king/801d9d7a8eb2741b?ean=9781394391004&next=t⭐ If you prefer to order from a local bookstore, you can give them the ISBN. ---------------Episode Key Highlights00:01:49 The Book Announcement: Securing What Feeds Us00:04:52 The Foreword: Dr. Darren Detwiler00:09:20 The Gap Between Two Worlds ThatNeeded a Book00:11:30 Who This Book Is Really For00:14:03 Food Is Critical Infrastructure00:15:43 The Real Stakes: Ransomware,Precision Ag & Agroterrorism00:23:06 Food Science, 3D Printing & theFuture of Food00:25:38 Resilience Over Compliance00:28:38 The Quote: Mainstream Urgency---------------📘 Sign up for early updates, exclusive previews, and news about Kristin’s book, “Securing What Feeds Us: Cybersecurity in Food and Agriculture,” here.---------------🎤 Book Kristin Demoranville to SpeakTo invite Kristin to speak at your conference, corporate event, webinar, or workshop, visit the website and submit a request.---------------🎤 Bites and Bytes Podcast Info:Website: Explore all our episodes, articles, and more on our official website. Merch Shop: Show your support with some awesome Bites and Bytes gear!Substack: Stay updated with the latest insights and stories from the world of cybersecurity in the food industry.Socials: TikTok;Instagram;LinkedIn;BlueSky---------------🛡️ About AnzenSage & AnzenOTAnzenSage is a cybersecurity advisory firm specializing in security resilience for thefood, agriculture, zoo, and aquarium industries. AnzenSage offers practical, strategic guidance to help organizations anticipate risks and build resilience. Learn more about their offerings at anzensage.com.​AnzenOThelps organizations understand and prioritize operational risk faster, without slow or static assessments. Subscription access is available, including a student option. Learn more at anzenot.com.The podcast and artwork embedded on this page are from AnzenSage, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    31 m
  • Adm. Michael Rogers on his time as NSA Director
    Mar 27 2026
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Adm. Michael Rogers on his time as NSA Director
    Pub date: 2026-03-24

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Former NSA Director and Commander of U.S. Cyber Command Adm. Michael S. Rogers (Ret. USN) joins the Nexus Podcast. Rogers spoke in advance of an RSA Conference panel discussion today with the other living NSA directors, Keith Alexander, Paul Nakasone, and Tim Haugh, a rare time when the four can be in the same room.

    Rogers describes the principles that guided his time as director of these intelligence agencies, how the role changes as administrations change, and some of the core strategies that led to success.

    Subscribe and listen to the Nexus Podcast here.



    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    27 m
  • Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon Chassar
    Mar 26 2026
    Podcast: Industrial Cybersecurity InsiderEpisode: Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon ChassarPub date: 2026-03-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino Busalachi sits down with Simon Chassar, former Chief Revenue Officer at Claroty and current OT cybersecurity advisor and investor, to explore the evolution and future of industrial cybersecurity. Simon shares insights from his decade-long journey in the space, discussing how OT asset visibility has become commoditized and why the industry is experiencing two major shifts: moving right toward threat-led SOC services and perimeter protection, and moving left toward secure-by-design approaches and attack simulation. They dive into the persistent challenge of self-performing versus partnering with specialized integrators, the critical skills shortage commanding 30-40% salary premiums, and why AI is both accelerating security challenges and offering new solutions. Simon reveals how private equity firms are finally prioritizing OT cybersecurity at the board level, discusses the emerging OT SOC landscape, and explains why the traditional IT security budget model is failing operational technology environments. The conversation addresses the disconnect between IT leadership and the OT ecosystem, the proliferation of unmanaged remote access technologies, and the urgent need for manufacturers to engage their trusted system integrators and OEMs as cybersecurity partners before the next major incident occurs.Chapters:(00:00:00) - Meet Simon : From Claroty's Hypergrowth to OT Security's Next Chapter(00:02:00) - The Commoditization of OT Asset Visibility(00:04:00) - Two Major Industry Shifts: Right and Left(00:07:00) - The Self-Performing Problem: Why OT Security Becomes Shelfware(00:10:00) - IT/OT Convergence and the Skills Gap Crisis(00:13:00) - Secure by Design and the AI Leapfrog(00:15:00) - AI Uncovers Hidden OT Vulnerabilities and Risks(00:18:00) - Funding Models and Private Equity's Cybersecurity Awakening(00:22:00) - Why the OT Ecosystem Must Drive Its Own Security Strategy(00:25:00) - M&A Activity and Consolidation in OT Cybersecurity(00:27:00) - The Rise of OT SOCs and MSP PartnershipsLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    31 m
  • The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter
    Mar 25 2026
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter
    Pub date: 2026-03-23

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Cyberattacks don’t just test your systems - they test your preparedness.

    In this episode of Protect It All, host Aaron Crow breaks down key lessons from the Striker attack and what it reveals about today’s evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like “living off the land” - blending into normal operations instead of deploying obvious malware.

    Aaron takes this beyond theory, focusing on what organizations must do before an attack happens.

    A major theme? Tabletop exercises. Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can’t catch.

    You’ll learn:

    • What the Striker attack teaches about modern cyber warfare
    • How living-off-the-land tactics bypass traditional defenses
    • Why tabletop exercises are essential for real-world readiness
    • The role of threat hunting and collaboration across teams
    • How attackers exploit weaknesses in both IT and OT environments
    • Why small, consistent actions can dramatically improve resilience

    Whether you’re defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers practical insights you can apply immediately.

    Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All.

    Key Moments:

    04:59 "Modern Warfare: Cyber and Beyond"

    08:47 "Security Risks of Remote Wipe"

    10:31 "Living Off the Land Tactics"

    13:11 "Balancing Power and Security"

    19:12 "Vulnerabilities Demand Swift Action"

    20:21 Prioritize Risk, Justify Investment

    25:04 Practice Preparedness Before Crisis

    26:48 Weak Links Threaten Cybersecurity

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4



    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    32 m
  • 3/4 Accionesde Auditoría de seguridad OT
    Mar 24 2026
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 3/4 Accionesde Auditoría de seguridad OT
    Pub date: 2026-03-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    En este episodio se propone un rediseño de las auditorías modernas, planteando el uso de simulación de escenarios y «gemelos de incidentes» como evidencias de confianza. Explica la importancia de integrar la seguridad industrial con la seguridad funcional y la continuidad operativa para gestionar el riesgo sistémico de forma integral.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    13 m
  • Michael Pyle on Securing Internet-Facing OT and ICS Assets
    Mar 23 2026
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Michael Pyle on Securing Internet-Facing OT and ICS Assets
    Pub date: 2026-03-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Michael Pyle, Director of Product Cybersecurity at Schneider Electric, joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to operational technology and industrial control systems that are insecurely connected to the internet.

    Attackers are adept at enumerating exposed devices and leveraging OT and ICS to access process and corporate networks. Pyle explains that Internet Exposure Prevention drops inbound traffic that the asset did not initiate. Checks are made on the IP address initiating the connection and whether it's a routable source IP, and an allow/deny decision is made.

    Pyle explains the risk to exposed devices, and the need to shut down illicit connections.

    Subscribe and listen to the Nexus Podcast here.



    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    24 m
  • Cyber-Informed Engineering: Moving Beyond the Firewall
    Mar 22 2026
    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)
    Episode: Cyber-Informed Engineering: Moving Beyond the Firewall
    Pub date: 2026-03-18

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    For the last episode of season 5, host Bryson Bort sat down with Andrew Ohrt, Resilience Director at West Yost Associates. A civil engineer specializing in water infrastructure, Andrew bridges the gap between traditional engineering and digital risk. Andrew walks us through the "invisible" nature of water systems, the impact of data centers on utility resilience, and how Cyber-Informed Engineering (CIE) protects our most essential resource.

    How did a drive under a rebuilt bridge in Minneapolis pivot Andrew’s career toward critical infrastructure? Why did a single wastewater release shut down Waikiki Beach for an entire week? And what happens when a cybersecurity team finds a client’s PLC exposed on the open internet?

    “To me, the integration of understanding cyber or digital risk in our critical infrastructure, the engineers picking that understanding up, building awareness, building skill sets, figuring out how to manage that risk, is one of the most important things that we've been working on,” he said.

    Join us for this and more on this episode of Hack the Plan[e]t.

    The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers.

    Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.



    The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    43 m
  • Episode 64: Rob Lee
    Mar 21 2026
    Podcast: CYBR.SEC.CAST (LS 25 · TOP 10% what is this?)
    Episode: Episode 64: Rob Lee
    Pub date: 2026-03-19

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Dragos CEO and U.S. National Guard Lt. Col. Rob Lee joins hosts Michael Farnum and Sam Van Ryder to discuss why he returned to military service, the growing cyber threats to critical infrastructure, and the role exercises like Cyber Fortress play in preparing both government and private sector operators for real-world cyber incidents.

    SHOW NOTES:

    Things Mentioned:

    • Cyber Fortress 2026: https://va.ng.mil/Cyber-Fortress/
    • Upcoming CYBR.SEC.Community events: https://www.cybrsecmedia.com/conference/
    • CYBR.SEC.Careers: https://www.linkedin.com/company/cybr-sec-careers/about/ fundraisers:
      • Cards for a Cause: https://www.linkedin.com/posts/cybr-sec-careers_cybrseccareers-nonprofit-cybersecurity-activity-7436794892787359744-v4Cz
      • CYBR CLAY SHOOT: https://www.linkedin.com/posts/cybr-sec-careers_cybrclayshoot-cybersecurity-cybercareers-activity-7435353518951084033-1iw9
      • Proceeds support CYBR.SEC.Careers mission is to build a strong, diverse workforce by providing career exposure, access to education and certifications, and mentorship for students and veterans pursuing careers in cybersecurity.

    Episode 64 Timestamps:

    6:48 – Why Lee returned to military service
    Lee explains how calls from government and military leaders prompted him to return to the National Guard to help address unresolved questions around defending operational technology (OT) during conflict.

    9:33 – Role in the 91st Cyber Brigade
    Lee describes his position as executive officer and the mission of the Army National Guard’s cyber brigade.

    14:52 – Cyber Fortress exercise explained
    Lee walks through the origins of Cyber Fortress and how it evolved from a state-level exercise into a broader operational technology training environment.

    17:53 – How Cyber Fortress works
    The exercise combines training, red-team simulations, and participation from infrastructure operators to practice responding to real OT cyber incidents.

    20:10 – Cyber conflict and civilian infrastructure
    Lee discusses the growing risk of state actors targeting hospitals, utilities, and other civilian infrastructure.

    24:23 – Cyber attacks that lead to loss of life
    Lee argues the cybersecurity community must acknowledge that cyber operations have already contributed to real-world deaths.

    27:04 – The role of cyber in modern warfare
    The discussion explores how cyber capabilities are increasingly intertwined with traditional military conflict.

    Do you have a question for the hosts? Reach out to us at media@cscgroupllc.com



    The podcast and artwork embedded on this page are from CYBR.SEC.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    33 m