エピソード

  • EP 67: Collateral Damage
    2025/07/26
    Podcast: Error Code (LS 27 · TOP 10% what is this?)
    Episode: EP 67: Collateral Damage
    Pub date: 2025-07-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Operational technology (OT) systems are no longer limited to nation-states; criminal groups and hacktivists now actively target these systems, often driven by financial or ideological motives. Kurt Gaudette, Vice President of Intelligence and Services at Dragos, explains why these systems might not even be the primary targets.



    The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    23 分
  • The Double-Edged Sword of AI in Cybersecurity and Critical Infrastructure
    2025/07/24
    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)
    Episode: The Double-Edged Sword of AI in Cybersecurity and Critical Infrastructure
    Pub date: 2025-07-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    In this solo episode, host Aaron Crow takes us on a fast-paced journey through the latest critical developments in both IT and OT cybersecurity. Aaron breaks down the month’s most pressing zero-day exploits, including high-profile attacks on Microsoft SharePoint and CrushFTP, and explores the implications of rapidly evolving threats - especially as attackers leverage AI for faster, more innovative hacks.

    But it’s not all doom and gloom: Aaron dives into how AI is also becoming a game-changer for defense, from Google’s use of AI agents to spot vulnerabilities ahead of attackers, to the promise (and dangers) of deepfake technology. He discusses new policy moves, like the FCC’s proposal to ban Chinese tech in undersea internet cables and the US Coast Guard’s push for cyber resilience in maritime infrastructure.

    Throughout the episode, Aaron offers strategic advice for organizations of all sizes - from patch management and digital twins to incident response plans designed for today’s AI-driven threat landscape. Whether you’re in cyber, tech, critical infrastructure, or just want to stay a step ahead, this episode is packed with actionable insights and timely analysis to boost your cyber resilience. Plug in for a conversation that’s equal parts eye-opening and empowering!

    Key Moments;

    01:20 High-Level Tactical Briefing

    05:31 Digital Twin for System Security

    09:39 Dual Role of Tools

    12:00 Emergency Procedures Reminder

    14:24 Challenges in OT System Integration

    18:32 Deep Fake Detection and Response

    20:12 "AI Persistence and Impact"

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4



    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    22 分
  • Plant-Level Cyber Risk: Who’s Actually Responsible?
    2025/07/23
    Podcast: Industrial Cybersecurity Insider
    Episode: Plant-Level Cyber Risk: Who’s Actually Responsible?
    Pub date: 2025-07-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    In this episode, Dino Busalachi and Craig Duckworth tackle one of the most overlooked threats in cybersecurity: the number of industrial vendors and system integrators in manufacturing environments.

    The conversation addresses the relationship and communication gap between IT and the teams responsible for designing and supporting industrial control systems. They emphasize the need for improved governance, enhanced vendor accountability, and clear ownership of cyber risk.

    Whether you're a CISO, CIO, or VP of Engineering, this episode offers actionable insight into bridging the IT/OT divide, securing plant floors, and building a cybersecurity strategy that works at the edge of your business.

    Chapters:

    • 00:00:00 - Kicking Off: Why Transparency in Cyber Matters
    • 00:00:43 - Who’s Talking? Meet Craig & Dino
    • 00:01:05 - The Big Question: What’s IT’s Role in Industrial Security?
    • 00:01:35 - When Too Many Vendors = Chaos
    • 00:02:37 - How to Actually Secure OT Environments
    • 00:03:46 - Choosing the Right Partners (and Asking the Right Questions)
    • 00:12:37 - Why Cyber Teams Need Plant Floor Time
    • 00:14:24 - Getting Smarter: Use External Experts & Vendor Summits
    • 00:18:22 - IT Meets OT: Closing the Culture Gap
    • 00:30:03 - What Now? Practical Next Steps for CISOs

    Links And Resources:

    • Want to Sponsor an episode or be a Guest? Reach out here.
    • Industrial Cybersecurity Insider on LinkedIn
    • Cybersecurity & Digital Safety on LinkedIn
    • BW Design Group Cybersecurity
    • Dino Busalachi on LinkedIn
    • Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!



    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    31 分
  • Vivek Ponnada on the Ongoing Maturity of OT Security
    2025/07/22
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Vivek Ponnada on the Ongoing Maturity of OT Security
    Pub date: 2025-07-21

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    OT cybersecurity veteran Vivek Ponnada, SVP Growth & Strategy at Frenos, joins the Nexus Podcast to lend his expertise on the areas where he is seeing the most maturity and rapid evolution in the practice. Vivek explains the growing demand for contextual information to supplement the data organizations have around their known assets and vulnerabilities, for example. He also explains current risk prioritization and mitigation strategies, and how advanced technologies fit into the OT security landscape.

    Listen to the Nexus Podcast on your favorite podcast platform.



    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    36 分
  • Vulnerability Overload: Making Prioritization Work in the Real World
    2025/07/21
    Podcast: Critical Assets Podcast
    Episode: Vulnerability Overload: Making Prioritization Work in the Real World
    Pub date: 2025-07-20

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    In this episode, Patrick Miller speaks with Kylie McClanahan, CTO at Bastazo, about the practical (and often messy) realities of patch and vulnerability management in operational technology (OT) environments. Kylie shares grounded insights into patching challenges, the gaps between IT and OT remediation cycles, and the real-world implications of relying too heavily on scoring systems like CVSS.

    The conversation covers CISA’s Known Exploited Vulnerabilities (KEV) catalog, exploring how it’s being used (and possibly misused) in prioritization workflows, and where the disconnects lie between policy directives and operational feasibility. Kylie also critiques the current state of vendor responsiveness, machine-readable vulnerability disclosure (CSAF), and the importance of asset and exposure awareness.

    This episode is essential listening for practitioners wrestling with patching fatigue, program prioritization, and the tradeoffs between theoretical vulnerability data and applied security outcomes in critical infrastructure environments.

    Links:

    CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities

    CISA vulnrichment: https://github.com/cisagov/vulnrichment

    Vulnrichment, Year One: https://www.youtube.com/watch?v=g5pSVMnWD7k

    CISA SSVC: https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc

    Carnegie Mellon SSVC: https://certcc.github.io/SSVC/

    CSAF: https://www.csaf.io/

    VulnCheck KEV: https://vulncheck.com/kev

    Kylie McLanahan on LinkedIn: https://www.linkedin.com/in/kyliemcclanahan/

    Bastazo: https://bastazo.com



    The podcast and artwork embedded on this page are from Patrick Miller, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    36 分
  • Können Systeme zur Angriffserkennung zum Sicherheitsrisiko werden? | OT Security Made Simple
    2025/07/19
    Podcast: OT Security Made Simple
    Episode: Können Systeme zur Angriffserkennung zum Sicherheitsrisiko werden? | OT Security Made Simple
    Pub date: 2025-07-17

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Manuel Atug, Geschäftsführer der HiSolutions und Mitgründer der unabhängigen AG Kritis, hinterfragt kritisch und aus eigener Erfahrung, was ein SzA leisten muss, wie gut es um deren eigene Sicherheit steht und wie Anbietern aus dem nichteuropäischen Ausland mit den Daten umgehen. Als Bonus erfahren wir endlich, wo sein Social-Media-Handle HonkHase herkommt.



    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    24 分
  • The C-Suite's Role in Industrial Cybersecurity
    2025/07/18
    Podcast: Industrial Cybersecurity InsiderEpisode: The C-Suite's Role in Industrial CybersecurityPub date: 2025-07-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Craig Duckworth and Dino Busalachi discuss the critical role of the C-suite in fortifying manufacturing environments against cyber threats. They discuss the unique challenges that manufacturing organizations face. Their conversation reinforces the importance of executive teams understanding and actively engaging in industrial OT cybersecurity strategies. With compelling arguments for a more involved C-suite, Craig and Dino explore the intersection of cybersecurity and operational efficiency. They emphasize the need for leadership to understand and lead the charge to ensure security for industrial control systems. This episode serves as a wake-up call for executives to embrace their role in protecting their companies from potential adverse events. This episode highlights the fact that cybersecurity is not just an IT issue but a foundational aspect of modern business resilience.Chapters:00:00:00 - Meet Dino and Craig00:01:47 - Deciphering Cybersecurity's Extensive Influence on Manufacturing Dynamics00:03:29 - Unpacking the Costs: The Stark Reality of Ignoring Cybersecurity00:04:08 - The Interplay Between Cyber Insurance, Liability, and Organizational Security00:05:07 - Charting the Course: Fundamental Actions for Cyber Resilience00:07:35 - Implementing Cybersecurity Measures: A Tactical Overview for Manufacturing Leaders00:10:54 - The Imperative of Continuous Monitoring in Mitigating Cyber Risks00:14:11 - Bridging the Divide: Fostering Collaboration Between IT and OT Teams00:17:06 - Cultivating Cyber-Aware Culture: Integrating Security into the Manufacturing DNA00:20:01 - Forward Momentum: Strategic Insights for Executive Leadership on Cybersecurity00:24:28 - Reflecting on the Imperatives of Cybersecurity in the Manufacturing SectorLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    25 分
  • Gil Groskop VP Technology & Digital Transformation @Mekorot on moving tech forward & cyber by design
    2025/07/17
    Podcast: ICS Cyber Talks Podcast
    Episode: Gil Groskop VP Technology & Digital Transformation @Mekorot on moving tech forward & cyber by design
    Pub date: 2025-07-17

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    פעמים אנחנו שוכחים שמים הם חלק מתעשיית המזון, האחריות של אספקת מים היא לא רק ברציפות האספקה בכול תנאי אלא גם עמידה בדרישות האיכות. בישראל קיימות שתי חברות תשתית גדולות כאשר מקורות היא אחת מהן עם אלפי אתרים ומערכות בקרה שפרוסות על פני כול המדינה. הצורך לאחד בין ביטחון פיזי לביטחון סייבר יחד עם הזרמת מידע בזמן אמת עד לאחרון העובדים היא אתגר שדורש תכנון ארוך טווח ומשאבים

    נחשון פינקו מארח את גיל גרוסקופ סמנכ"ל הטכנולוגיות והטרנספורמציה הדיגיטלית של חברת מקורות בשיחה על השינוי המז'ורי תפיסתי בכול הקשור לטכנולוגיה והגנת הסייבר בחברה בשנים האחרונות מה האתגר הטכנולוגי והאנושי שבהחלפת מערכות ישנות באלפי אתרים

    איך מגייסים את ההנהלה והדירקטוריון לתמוך בנושא הסייבר וההשקעות הנדרשות

    איך מנהלים עשרות פרויקטים גדולים בו זמנית והחשיבות של הגישה שיש לתת ביטוי לסייבר בכול שלב

    ועוד



    The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    54 分