Episodios

  • OT Patching vs IT Patching: What's Commonly Misunderstood
    Apr 14 2026

    Most cybersecurity teams treat patching like a universal fix. In manufacturing, that assumption can take down a production line, trigger a safety event, or void the warranty on a $2 million piece of equipment.

    In this episode, Dino Busalachi and Craig Duckworth break down why patching in operational technology environments is a fundamentally different problem than patching enterprise IT — and why closing that gap requires more than just pushing an update.

    The bottom line: A firewall is not a patching strategy. Neither is hoping your systems are isolated. Organizations that get this right use risk-based prioritization, lab testing, virtual patching, and real collaboration between IT and OT teams.

    If you are responsible for a plant floor — or for the people who are — this conversation is for you.

    🎙️ Industrial Cybersecurity Insider is where C-suite leaders, plant managers, engineers, and security teams come to close the gap between IT and OT.

    🔔 Subscribe so you never miss an episode.

    Chapters:

    • (00:00:00) Why assessing OT cybersecurity posture and asset visibility is hard
    • (00:01:00) IT patches constantly, OT rarely does, and why that gap matters
    • (00:03:00) Downtime costs: a broken patch in OT can stop the entire plant
    • (00:05:00) OEM “don’t touch it” policies and warranty pressure
    • (00:08:00) M&A due diligence: buying plants without knowing the cyber condition
    • (00:09:00) CrowdStrike outage example and why agent-based tools are risky in OT
    • (00:10:00) Virtual patching: protecting PLCs and legacy assets you cannot patch
    • (00:14:00) Vendor guidance, upgrade rewrites, and “acceptable risk” decisions
    • (00:17:00) Hidden exposure: guest Wi‑Fi, tablets, remote access, and “air gaps”
    • (00:20:00) Best practices: inventory, continuous monitoring, vulnerability metrics, and cross-team alignment

    Links And Resources:

    • Want to Sponsor an episode or be a Guest? Reach out here.
    • Industrial Cybersecurity Insider on LinkedIn
    • Cybersecurity & Digital Safety on LinkedIn
    • BW Design Group Cybersecurity
    • Dino Busalachi on LinkedIn
    • Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    Más Menos
    28 m
  • Who Actually Owns OT Cybersecurity? Not Who You Think
    Apr 6 2026

    Dino and Craig break down what they are seeing in real industrial environments as companies begin the OT cybersecurity journey. They outline why most organizations are still in an “unaware to awareness” phase, what creates the “oh wow” moment after the first pilot, and why ownership and execution often falls to plant-floor teams and their OEM and integrator partners.

    The conversation covers the limits of surface-level visibility, why accurate asset inventory and remote access control are foundational, and how practical constraints like flat networks, legacy switches, warranty concerns, and limited human capital can stall progress.

    They also share cautionary examples of IT-first security tooling causing operational impact, and they close with a clear message: think globally, act locally, and build a defensible OT program that matches how plants actually run.

    Chapters:

    • (00:00:00) Why OT vulnerabilities and remote access are the real “kicker”
    • (00:01:00) The market reality: 60% unaware, 30% starting, 10% operationalized
    • (00:03:00) Who owns remediation: IT vs OT and the plant-floor accountability gap
    • (00:05:00) Why “visibility” often stops at Purdue Level 3 and misses Level 2 assets
    • (00:07:00) OEMs, integrators, and why support models matter in OT cybersecurity
    • (00:09:00) Flat networks, north-south traffic, and why you still miss panel-level devices
    • (00:11:00) The human capital problem and why outsourcing is often unavoidable
    • (00:18:00) A real-world warning: EDR in ICS can create massive operational cost
    • (00:20:00) Safety, quality, and cybersecurity: the three things leaders will fund
    • (00:24:00) Change management failures and why monitoring PLC edits matters

    Links And Resources:

    • Want to Sponsor an episode or be a Guest? Reach out here.
    • Industrial Cybersecurity Insider on LinkedIn
    • Cybersecurity & Digital Safety on LinkedIn
    • BW Design Group Cybersecurity
    • Dino Busalachi on LinkedIn
    • Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    Más Menos
    31 m
  • You Think Your Plant Is Secure. Your Data Says Otherwise.
    Mar 30 2026

    Craig Duckworth sits down with CIO and Chief Enterprise Architect Shellie D'Angelo to address why so many OT and IT modernization efforts stall out at the foundation.

    Shellie explains why data governance must come before “another tool,” how inconsistent data quality quietly sabotages reporting and risk decisions, and why leadership transparency is the fastest path to maturity.

    Craig and Shellie also explore the reality of shadow IT on the plant floor, the growing impact of AI as both a defensive advantage and an attacker accelerator, and the practical steps teams can take to move from reactive chaos to measurable business outcomes.

    Chapters:

    • (00:00:00) Why honest risk conversations are the starting line
    • (00:01:00) Shellie’s background: rebuilding enterprise tech foundations
    • (00:02:00) OT/IT convergence: start with business drivers and data governance
    • (00:05:00) “Tools first” vs business-first security decisions
    • (00:08:00) Knowing what you have before buying more tools
    • (00:11:00) How far along are most organizations, really?
    • (00:15:00) AI as a double-edged sword: defense vs attacker acceleration
    • (00:18:00) Where to start: inventory first vs governance structure
    • (00:22:00) OT tech is often easier prey: PLCs, HMI/SCADA, cameras
    • (00:25:00) Partnering vs going it alone: don’t reinvent the wheel
    • (00:26:00) Tech debt and why technology can’t be an afterthought
    • (00:29:00) Governance should increase speed, not slow it down
    • (00:30:00) Final advice: “turn chaos into cash” and own your impact

    Links And Resources:

    • Shellie D'Angelo on LinkedIn
    • Want to Sponsor an episode or be a Guest? Reach out here.
    • Industrial Cybersecurity Insider on LinkedIn
    • Cybersecurity & Digital Safety on LinkedIn
    • BW Design Group Cybersecurity
    • Dino Busalachi on LinkedIn
    • Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    Más Menos
    33 m
  • Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon Chassar
    Mar 24 2026

    Dino Busalachi sits down with Simon Chassar, former Chief Revenue Officer at Claroty and current OT cybersecurity advisor and investor, to explore the evolution and future of industrial cybersecurity.

    Simon shares insights from his decade-long journey in the space, discussing how OT asset visibility has become commoditized and why the industry is experiencing two major shifts: moving right toward threat-led SOC services and perimeter protection, and moving left toward secure-by-design approaches and attack simulation.

    They dive into the persistent challenge of self-performing versus partnering with specialized integrators, the critical skills shortage commanding 30-40% salary premiums, and why AI is both accelerating security challenges and offering new solutions.

    Simon reveals how private equity firms are finally prioritizing OT cybersecurity at the board level, discusses the emerging OT SOC landscape, and explains why the traditional IT security budget model is failing operational technology environments.

    The conversation addresses the disconnect between IT leadership and the OT ecosystem, the proliferation of unmanaged remote access technologies, and the urgent need for manufacturers to engage their trusted system integrators and OEMs as cybersecurity partners before the next major incident occurs.

    Chapters:

    1. (00:00:00) - Meet Simon : From Claroty's Hypergrowth to OT Security's Next Chapter
    2. (00:02:00) - The Commoditization of OT Asset Visibility
    3. (00:04:00) - Two Major Industry Shifts: Right and Left
    4. (00:07:00) - The Self-Performing Problem: Why OT Security Becomes Shelfware
    5. (00:10:00) - IT/OT Convergence and the Skills Gap Crisis
    6. (00:13:00) - Secure by Design and the AI Leapfrog
    7. (00:15:00) - AI Uncovers Hidden OT Vulnerabilities and Risks
    8. (00:18:00) - Funding Models and Private Equity's Cybersecurity Awakening
    9. (00:22:00) - Why the OT Ecosystem Must Drive Its Own Security Strategy
    10. (00:25:00) - M&A Activity and Consolidation in OT Cybersecurity
    11. (00:27:00) - The Rise of OT SOCs and MSP Partnerships

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on LinkedIn
    6. Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    Más Menos
    31 m
  • The Connected Plant Floor: What S4X26 Revealed
    Mar 16 2026

    Craig and Dino recap their experience at S4X26, the leading global OT cybersecurity conference in Miami.

    They discuss the conference's "connected" theme and how AI is creating an inflection point in industrial cybersecurity, driving unprecedented connectivity between IT and OT environments.

    The hosts explore the challenges of the "silver tsunami" as experienced engineers retire, how AI-powered tools are being embedded directly into edge devices and industrial products from vendors like Cisco and Fortinet, and why the regulatory landscape in Europe is advancing faster than other regions.

    They emphasize the importance of connecting with peers and partners in the OT security community, highlight key vendors and technologies showcased at the event, and explain why both IT and OT professionals should attend S4X together to bridge the knowledge gap.

    The episode concludes with details about next year's expanded conference in Tampa, February 8-11.

    Chapters:

    1. (00:00:00) - Random Encounter with Team USA Hockey in Miami
    2. (00:01:00) - S4X26 Conference Kickoff: The "Connected" Theme
    3. (00:03:00) - AI as the Inflection Point for OT Connectivity
    4. (00:05:00) - AI Embedded in Edge Devices and Vendor Technologies
    5. (00:07:00) - First-Time Attendee Experiences and Key Takeaways
    6. (00:10:00) - Europe's Cyber Resiliency Act and Regulatory Advancements
    7. (00:12:00) - Vendor Presence and the OT Technology Marketplace
    8. (00:14:00) - S4X27 Moving to Tampa: February 8-11, 2027
    9. (00:16:00) - AI's Role in Addressing the Silver Tsunami
    10. (00:18:00) - Final Thoughts: Why IT and OT Teams Should Attend Together

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on LinkedIn
    6. Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    Más Menos
    20 m
  • The Hidden Cost of Siloed OT Security Tools
    Mar 11 2026

    As we look back, Craig and Dino tackle a critical disconnect in industrial cybersecurity: the failure to share OT security tool data with the people who actually need it.

    They explore why IT teams often purchase and deploy OT IDS platforms without engaging plant floor teams, system integrators, and OEMs who are actively working in manufacturing environments.

    The conversation reveals that 85% of data collected by these tools is meant for OT teams to act on, yet it rarely reaches them.

    They discuss the consequences of this siloed approach—including system integrators bringing their own tools to fill the gap—and provide practical advice on achieving true IT/OT convergence.

    The episode emphasizes the importance of working with partners who can "build the car" rather than just "sell the car," and challenges organizations to evaluate whether they're truly practicing IT/OT convergence or just paying lip service to it.

    Chapters:

    1. (00:00:00) - The Data Sharing Problem in OT Cybersecurity
    2. (00:01:00) - Why System Integrators Can't Access Security Tool Data
    3. (00:04:00) - Who's Keeping the Data and Why
    4. (00:08:00) - The IT/OT Oil and Water Problem
    5. (00:11:00) - When System Integrators Bring Their Own Tools
    6. (00:14:00) - Questions to Ask Your Cybersecurity Partners
    7. (00:17:00) - The Car Analogy: Buyers vs. Builders
    8. (00:19:00) - Who Asset Owners Really Trust
    9. (00:21:00) - The Three-Legged Stool of OT Security
    10. (00:23:00) - The Path to True IT/OT Convergence

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on LinkedIn
    6. Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    Más Menos
    25 m
  • The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook
    Mar 2 2026

    LuRae Lumpkin, Producer of Industrial Cybersecurity Insider, sits down with industrial cybersecurity expert Dino Busalachi to break down the 2026 World Economic Forum Global Cybersecurity Outlook Report and what it really means for manufacturers.

    While the report surveyed nearly a thousand CEOs, CIOs, and CISOs, Dino reveals a critical blind spot: industrial control systems and OT environments are being left dangerously exposed.

    They discuss how AI is becoming a double-edged sword for attackers and defenders, why supply chain vulnerabilities remain unaddressed, the shocking lack of cybersecurity skills on plant floors, and why most companies still aren't conducting incident response exercises.

    Dino shares real-world insights from working in nearly 2,000 plants over four decades, explaining why IT and OT remain disconnected, how remote access creates massive security gaps, and why outdated equipment with decades-old vulnerabilities sits unpatched in critical manufacturing environments.

    The conversation reveals that while enterprises focus on IT security, the plant floor—where revenue is actually generated—remains critically vulnerable, with potentially catastrophic consequences for businesses, supply chains, and even national GDP.

    Chapters:

    (00:00:00) - Introduction and Overview of WEF 2026 Cybersecurity Report

    (00:01:00) - Where Cybersecurity Funding Actually Goes: IT vs OT Reality

    (00:03:00) - The Myth of Disconnected Legacy Equipment (00:05:00) - AI as a Double-Edged Sword in Industrial Environments

    (00:08:00) - The Vulnerability Crisis: Thousands of Unpatched Systems

    (00:09:00) - Third-Party and Supply Chain Security Gaps

    (00:12:00) - Remote Access: The Hidden Attack Vector

    (00:14:00) - Critical Supplier Dependencies and Decentralized OT

    (00:15:00) - The Skills Gap: Why Industrial Cybersecurity Expertise is Scarce

    (00:19:00) - The Shocking Truth About Incident Response Exercises

    (00:22:00) - Real-World Impact: When Manufacturers Get Hit

    (00:24:00) - Getting All Stakeholders in the Same Room

    (00:28:00) - Insurance vs Prevention: The True Cost of Cyber Incidents

    (00:29:00) - Final Thoughts: Who Should Own OT Cybersecurity?

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on LinkedIn
    6. Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    Más Menos
    32 m
  • IT SOC vs OT SOC How & Why They’re Different
    Feb 25 2026

    Craig and Dino tackle the critical differences between IT and OT Security Operations Centers, revealing why traditional IT-centric SOCs are failing to protect manufacturing environments.

    Drawing from real-world examples, including a global beverage company that discovered they were only monitoring one-third of their OT assets, the hosts expose the fundamental disconnect between IT security teams and operational technology environments.

    They discuss why IT SOCs struggle with OT visibility, the challenges of asset inventory in dynamic manufacturing environments, and the critical importance of localization in security operations.

    The conversation covers practical barriers like line changeovers, PLC modifications, remote access vulnerabilities, and the need for OT-specific incident response protocols.

    Craig and Dino emphasize that effective OT security requires IT teams to become embedded in plant operations, working collaboratively with OEMs and system integrators, and understanding the unique operational context of manufacturing assets.

    This episode is essential listening for CISOs, plant managers, and security professionals trying to bridge the IT-OT security gap.

    Chapters:

    1. (00:00:00) - The Two-Thirds Problem: When Your SOC Can't See Your Plant Floor
    2. (00:01:00) - The OT SOC Asset Visibility Problem: A Case Study
    3. (00:03:00) - Why IT SOCs Can't Manage OT Assets
    4. (00:05:00) - Line Changeovers and Operational Context
    5. (00:07:00) - First Responders and Incident Response Challenges
    6. (00:10:00) - The WannaCry Response Gap
    7. (00:12:00) - Asset Inventory and Baseline Challenges
    8. (00:15:00) - Incident Response and Phone Trees
    9. (00:17:00) - Organizational Accountability Problems
    10. (00:19:00) - Greenfield Opportunities and Standardization
    11. (00:22:00) - The IT-OT Collaboration Challenge
    12. (00:24:00) - Think Global, Act Local: Embedding IT in Plants

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on LinkedIn
    6. Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    Más Menos
    26 m