@BEERISAC: OT/ICS Security Podcast Playlist Podcast Por Anton Shipulin / Listen Notes arte de portada

@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

De: Anton Shipulin / Listen Notes
Escúchala gratis

Acerca de esta escucha

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!Copyright 2025 Anton Shipulin / Listen Notes Economía
Episodios
  • The Truth About OT Vulnerabilities
    May 17 2025
    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)
    Episode: The Truth About OT Vulnerabilities
    Pub date: 2025-05-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Bryson Bort sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, to pull back the curtain on OT threat research. With a background in electrical engineering, Adam’s first job in cybersecurity was at an IT help desk. He now leads a team dedicated to identifying, analyzing, and mitigating cyber threats targeting Operational Technology (OT) environments.

    What are the top threats Adam is seeing in OT attacks? Why is manufacturing such a vulnerable sector? And if he could wave a magic, non-Internet connected wand, what would he change?

    “I really would love to have more experts in OT,” Adam said. “The more knowledge…and the more experts we have, it will fasten this process [of innovation].”

    Join us for this and more on this episode of Hack the Plan[e]t.

    The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers.

    Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.



    The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    34 m
  • Securing the Foundation: Cyber Strategy in the Age of Smart Infrastructure
    May 17 2025
    Podcast: IoT Security Podcast (LS 24 · TOP 10% what is this?)
    Episode: Securing the Foundation: Cyber Strategy in the Age of Smart Infrastructure
    Pub date: 2025-05-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Cybersecurity is redefined as a discipline for the curious and adaptable, with a focus on continuous learning, imagination, and embracing change. On location at the RSA Conference, host Phillip Wylie and Anand Singh discusses the evolving challenges of IoT and OT security, the rapid integration of AI, and how organizations must address overlooked endpoints and fragmented infrastructures. There is an emphasis on practical advice for CISOs and cybersecurity practitioners, underscoring the importance of foundational security practices, data visibility, identity management, and mental well-being in high-stress leadership roles.

    1. The role of curiosity and adaptability in cybersecurity careers
    2. Overlooked risks and challenges in IoT and OT device security
    3. The transformative impact of AI and the importance of securing AI adoption
    4. Practical strategies for asset, identity, and data management
    5. Maintaining work-life balance and resilience for CISOs and security leaders


    Let’s connect about IoT Security!

    Follow John Vecchi at https://www.linkedin.com/in/johnvecchi

    The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast



    The podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    31 m
  • Visibility Revisited: Trends Shaping the Future of OT Cybersecurity
    May 15 2025
    Podcast: Industrial Cybersecurity InsiderEpisode: Visibility Revisited: Trends Shaping the Future of OT CybersecurityPub date: 2025-05-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this special rewind episode we highlight outside influences shaping control system integrity, the impact of AI, emerging technologies, and the dynamics of building a career in OT cybersecurity.Drawing from frontline experiences and industry events like the S4 Conference, the discussion explores the growing organizational shift toward dedicated OT cybersecurity roles.We address the critical need for alignment between capital and operational expenditures, and the importance of selecting technologies that provide actionable visibility across diverse plant environments. Listeners will gain strategic guidance on integrating cybersecurity into capital planning, addressing asset variability across sites, and implementing scalable, non-disruptive security frameworks. From OT-specific IDS deployment to balancing remote access with zero-trust principles, this episode offers practical, forward-looking advice.Whether you're a practitioner or a decision-maker, focused on securing extended IIoT environments while maintaining operational resilience, this episode covers practical and relatable challenges and solutions.Chapters:00:00:00 – A Strategic Rewind: Exploring the Emerging Roles, Budget Realities, and Lessons Learned in OT Cybersecurity00:00:41 - Gartner, DOGE, and the Future of OT Cybersecurity Policy00:12:12 - The Future Looks Bright : Building a Career in OT Cybersecurity00:22:44 - AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with ClarotyLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Más Menos
    35 m
adbl_web_global_use_to_activate_T1_webcro805_stickypopup
Todavía no hay opiniones