エピソード

  • Trust at Machine Speed: AI, DevSecOps, and Zero Trust in National Security Software
    2026/05/04
    Podcast: Exploited: The Cyber Truth
    Episode: Trust at Machine Speed: AI, DevSecOps, and Zero Trust in National Security Software
    Pub date: 2026-04-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Artificial intelligence is moving faster than the policies, security controls, and acquisition processes designed to govern it—especially in national security environments where preventing failure is mission-critical.

    In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by Nicolas Chaillan, the host of In the Nic of Time and Former DAF CSO, to examine a central question: how do you build trust in systems that operate, adapt, and make decisions at machine speed?

    Drawing on his experience deploying DevSecOps across the Department of Defense and building large-scale AI platforms, Chaillan offers a direct perspective on what’s working, what isn’t, and where organizations are falling behind.

    Together, they explore:

    • Why multi-model AI strategies are critical to avoid lock-in and improve outcomes
    • How AI is accelerating software development, testing, and security workflows
    • Where policy and governance are lagging behind technical reality
    • The risks of restricting access to critical AI capabilities
    • What zero trust looks like in systems driven by automation and AI

    From defense systems to software pipelines, this episode examines what it takes to move fast without losing control—and what leaders need to understand as AI becomes embedded across the mission stack.



    The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    34 分
  • #125: OT Cybersecurity Risk Assessments in the Power Industry
    2026/05/03
    Podcast: Energy Talks
    Episode: #125: OT Cybersecurity Risk Assessments in the Power Industry
    Pub date: 2026-04-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Discover methods, findings, and lessons directly from the energy industry

    In this episode of Energy Talks, host **Simon Rommer **speaks with his colleague Jaron Stammler, OT Cybersecurity Consultant at OMICRON, about how OT cybersecurity risk assessments are conducted in the power industry. Drawing from current experiences in substations and battery energy storage systems (BESS), they walk through how assessments are initiated, structured, and executed in practice.

    The discussion also highlights the gap between theory and reality, especially when assessments are performed late in project lifecycles due to regulatory or project constraints. Jaron explains the fundamentals of the IEC 62443-3-2 risk assessment process, including system scoping, risk identification, and zone and conduit modeling, while also addressing common challenges such as missing documentation and limited stakeholder availability.

    Simon and Jaron also emphasize how cybersecurity is an ongoing process and that effective assessments provide actionable insights, prioritized risks, and practical mitigation strategies tailored to each project.

    Get more information about security risk assessments at OMICRON .

    We would really like to know what you think about Energy Talks and which topics you would like to hear more about. To do this, simply send us an email to podcast@omicronenergy.com and be sure to give us a star review on Spotify or Apple Podcast. Thanks for your feedback!

    Please join us to listen to the next episode of Energy Talks 🎙️



    The podcast and artwork embedded on this page are from OMICRON electronics GmbH, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    21 分
  • The Phishing Attack That Could Have Shut Down a Plant Floor
    2026/05/02
    Podcast: Industrial Cybersecurity Insider
    Episode: The Phishing Attack That Could Have Shut Down a Plant Floor
    Pub date: 2026-04-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    A real-world case study shows how a single phishing email led to credential and MFA compromise, creating an urgent question for any industrial organization: Did the attacker reach the OT environment?

    Dino and Jim walk through how OT visibility, secure remote access controls, and continuous monitoring enabled rapid validation of what happened. They were able to prove the breach did not impact control systems and avoid an expensive, safety-driven shutdown of a continuous manufacturing process.

    The episode connects technical controls to executive outcomes, including resilience, duty of care, and the financial reality that “not knowing” can be as costly as an actual compromise.

    Chapters:

    • (00:00:00) Why continuous manufacturing makes “abundance of caution” shutdowns so costly
    • (00:01:00) What “OT continuous monitoring” means and why it matters in real incidents
    • (00:03:00) Safety and connected environments: why “it can go boom” changes the stakes
    • (00:05:00) Baselines: defining “normal” so abnormal behavior is actionable
    • (00:07:00) Incident story: phishing email leads to credential and MFA compromise
    • (00:09:00) What the team validated: tracing access and confirming OT was not impacted
    • (00:10:00) Lessons from Colonial Pipeline: inability to validate can force shutdowns
    • (00:11:00) OT reality check: Windows assets, HMIs, historians, and engineering workstations
    • (00:13:00) Secure OT remote access: why VPN-only access is not sufficient
    • (00:16:00) The payoff: avoided downtime, avoided product loss, and avoided disruption
    • (00:19:00) Executive view: duty of care, liability, compliance, and protecting enterprise value
    • (00:23:00) The “air gap” myth and why defense-in-depth is the only practical path

    Links And Resources:

    • Want to Sponsor an episode or be a Guest? Reach out here.
    • Industrial Cybersecurity Insider on LinkedIn
    • Cybersecurity & Digital Safety on LinkedIn
    • BW Design Group Cybersecurity
    • Dino Busalachi on LinkedIn
    • Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!



    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    26 分
  • Challenges of OT Cybersecurity with NetFoundry CEO Galeal Zino
    2026/05/01
    Podcast: Digital Transformation Viewpoints
    Episode: Challenges of OT Cybersecurity with NetFoundry CEO Galeal Zino
    Pub date: 2026-04-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    In this edition of DTV, ARC vice president of research Larry O'Brien talks to NetFoundry founder and CEO Galeal Zino about the challenges facing end users when it comes to OT cybersecurity in the age of AI and digitalization. NetFoundry was created to address fundamental weaknesses in traditional networking and cybersecurity. We discuss how traditional networking is not designed for today’s digital transformation requirements. Complexity created by layered security tools increases risk and reduces reliability. NetFoundry replaces IP‑centric networking with cryptographically verifiable identities and policy‑based authorization, aligning networking more closely with zero‑trust principles.

    NetFoundry also maintains and actively invests in OpenZiti, its open‑source secure networking platform. The goal is to create a “Linux of secure networking,” supported by a growing global community.

    Would you like to be a guest on our growing podcast?

    Do you have an intriguing or thought provoking topic you'd like to discuss on our podcast? Please contact Our Producer Tom Cabot at: Tcabot@Arcweb.com

    View all the episodes here: https://thedigitaltransformationpodcast.buzzsprout.com



    The podcast and artwork embedded on this page are from ARC Advisory Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    23 分
  • CE-Kennzeichen für Digitales: Wie der CRA die OT-Schieflage korrigiert | OT Security Made Simple
    2026/05/01
    Podcast: OT Security Made Simple
    Episode: CE-Kennzeichen für Digitales: Wie der CRA die OT-Schieflage korrigiert | OT Security Made Simple
    Pub date: 2026-04-28

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Klaus Mochalski und Sarah Fluchs (admeritia) beleuchten den Cyber Resilience Act. Erfahren Sie, warum der CRA eine historische Schieflage beendet, weshalb Hersteller künftig in der Pflicht sind und wie Betreiber das neue Gesetz als mächtigen Hebel für ihre NIS-2-Compliance nutzen können.

    Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an podcast@rhebo.com.



    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    31 分
  • EP 85: From Colonial Pipeline to Agentic AI: What OT Security Actually Requires
    2026/04/30
    Podcast: Error Code (LS 27 · TOP 10% what is this?)
    Episode: EP 85: From Colonial Pipeline to Agentic AI: What OT Security Actually Requires
    Pub date: 2026-04-28

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Let’s face it, the Purdue model's DMZ is gone. Trevor Dearing, Director of Critical Infrastructure Solutions at Illumio, explains how zero trust, micro-segmentation, and explicit policy are now the only reliable defense for critical infrastructure OT.



    The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    37 分
  • Cyber Risk in Construction: Securing AEC Projects in a Digital, AI-Driven World
    2026/04/29
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: Cyber Risk in Construction: Securing AEC Projects in a Digital, AI-Driven WorldPub date: 2026-04-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationConstruction sites are no longer just physical - they’re digital, connected, and increasingly vulnerable. In this episode of Protect It All, host Aaron Crow sits down with Lee Carsten to explore the rising cyber risks across the architecture, engineering, and construction (AEC) industry. As digital transformation accelerates - with AI, digital twins, and connected building systems becoming standard - construction projects are expanding their attack surface in ways many organizations don’t fully understand. Aaron and Lee unpack the unique challenges facing AEC environments, from fragmented systems and evolving workflows to the growing need for integrating cybersecurity into business decisions - not just IT functions. You’ll learn: Why construction and infrastructure projects are becoming prime cyber targetsHow digital transformation and AI are reshaping risk in AEC environmentsThe role of building management systems (BMS) and OT in modern projectsWhy foundational controls and human awareness still matter mostHow to align cybersecurity with real-world construction workflowsPractical strategies to build resilience into projects from day one Whether you’re in construction, engineering, IT, or OT security, this episode delivers real-world insights to help you protect the infrastructure we rely on every day. Tune in to learn how to secure modern construction in a connected world - only on Protect It All. Key Moments: 05:39 Importance of interpersonal skills 08:08 Construction security and recent projects 11:46 Challenges in AEC industry adoption 19:30 Importance of disaster recovery 20:31 Discussing costs of business interruptions 24:06 RFP process and bid management 27:25 Complexity of building projects 32:02 FBI investigation triggers and readiness 36:55 Managing complex building assets 39:37 Choosing durable equipment and future tech 42:01 Understanding OT data for security About the guest : Lee Carsten’s journey in technology began in the era of punch cards - painstakingly sorted and fed into compilers, where a single fumble could mean hours' worth of work undone. Lee studied COBOL in college, envisioning a future as a programmer. That path nearly led to Walmart, where Lee’s mother worked on the company’s pioneering buyer decision support system under Randy Mott. While the family connection and an offer from Kevin Turner to join a new team were tempting, Lee ultimately decided against moving to Bentonville and working for $18,000 annually. This early exposure to large-scale business technology, combined with pivotal career choices, shaped Lee Carsten’s perspective on IT and the evolving world of software development. How to connect Lee: https://www.linkedin.com/in/leecarsten/ Website: https://whitecaprisk.com/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    50 分
  • 4/4 Desenlace en la Fragilidad Digital Industrial
    2026/04/28
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 4/4 Desenlace en la Fragilidad Digital Industrial
    Pub date: 2026-04-27

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Episodio que debate si el futuro consiste en reducir la fragilidad digital o en aprender a convivir con ella de forma consciente, identificando las capacidades necesarias para evitar el colapso ante eventos imprevistos. Finalmente, analiza las nuevas formas de fragilidad que emergerán en los próximos años y que aún no estamos abordando en el sector […]

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    11 分