エピソード

  • Open Source Intelligence Exposed: How Hackers Use Public Data to Target People, Passwords, and Critical Systems
    2025/11/04

    Think your company’s private data is safe? Think again.

    In this episode of Protect It All, host Aaron Crow pulls back the curtain on one of cybersecurity’s most underestimated frontiers - Open Source Intelligence. He reveals how attackers leverage publicly available data from LinkedIn profiles to leak passwords, mapping out targets, infiltrating systems, and exploiting the human attack surface.

    Drawing from real-world incidents and years of experience across IT and OT security, Aaron explains:

    • How Open Source Intelligence fuels social engineering and insider threat campaigns.
    • Why protecting systems isn’t enough - you must protect people.
    • How to use Open Source Intelligence proactively for threat modeling and risk mitigation.
    • Steps to monitor your digital footprint and reduce exposure before it’s too late.

    Whether you’re a cybersecurity professional, executive, or simply digital-curious, this episode will change how you think about “public information.”

    Tune in to learn how Open Source Intelligence can both expose and empower your cybersecurity strategy - only on Protect It All.

    Key Moments:

    06:17 Securing Domain Admin Accounts

    09:09 Proactive Employee Security Monitoring

    12:19 "Protecting Human Attack Surfaces"

    16:48 "Enhancing Cybersecurity with Open Source Intelligence

    18:49 Exposed Data Response Process

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    続きを読む 一部表示
    24 分
  • Old Windows, New Risks: How End-of-Life Systems Threaten OT Security and What You Can Do
    2025/10/27

    In this episode of Protect It All, host Aaron Crow takes a hard look at one of the biggest blind spots in OT cybersecurity: legacy Windows environments still running inside plants, refineries, and utilities. From Windows XP to Windows 10’s upcoming end of support, Aaron breaks down why these systems persist, the true cost of “doing nothing,” and the high-stakes trade-offs between replacement, isolation, and risk mitigation.

    You’ll discover:

    • Why outdated Windows systems remain critical yet dangerously exposed.

    • The myths of “true air gaps” and why they don’t protect you anymore.

    • Practical isolation tactics, segmentation, strict access control, and monitoring.

    • How to manage asset visibility, vendor dependencies, and downtime risks.

    Whether you’re a cybersecurity leader, plant manager, or operations engineer, this episode is your roadmap to making smarter, safer decisions about legacy systems before they cause costly disruptions.

    Tune in to learn how to balance operations, cost, and security and protect your OT world from old-system vulnerabilities.

    Key Moments:

    01:22 "End-of-Life Systems in OT"

    04:15 Upgrading Systems in Regulated Industries

    07:35 Reducing Risk with Network Segmentation

    12:02 "Firewall Rules and System Security"

    15:52 Understanding Risks in End-of-Life Systems

    18:54 Securing Legacy Systems Effectively

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook:
    続きを読む 一部表示
    20 分
  • OT Cybersecurity Wake-Up Call: How Airports and Power Grids Expose the Gaps We Can’t Ignore
    2025/10/20

    In this solo episode of Protect It All, host Aaron Crow delivers a straight-talk reality check on the widening IT–OT cybersecurity gap and what it really takes to protect the systems that keep the world running. With decades of experience defending critical infrastructure, Aaron exposes why many OT environments are still years behind in resilience and visibility - and how we can finally fix that.

    You’ll learn:

    • The real incidents prove why OT cybersecurity can’t afford to lag.

    • Why visibility and segmentation are non-negotiable for industrial systems.

    • How to build an incident-response plan that works when the stakes are highest.

    • Practical steps to strengthen resilience and recovery across critical operations.

    This episode isn’t about fear - it’s about preparation. If your work touches energy, transportation, manufacturing, or utilities, this one’s your wake-up call to act before disaster hits.

    Listen now and learn how to protect what truly keeps our world moving - only on Protect It All.

    Key Moments:

    05:06 "Real Risks of Critical Disruptions"

    06:16 Redefining OT System Boundaries

    11:42 Troubleshooting Unknown System Issues

    14:09 "Secure Remote Access Best Practices"

    18:28 "Planning for Worst-Case Scenarios"

    19:36 Critical Infrastructure Under Cyber Threat

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube:
    続きを読む 一部表示
    23 分
  • Why “One Size Fits All” Fails in OT Cybersecurity: Real-World Fixes for IT–OT Gaps
    2025/10/06

    OT cybersecurity isn’t about installing more firewalls - it’s about adapting your entire mindset.

    In this episode of Protect It All, host Aaron Crow breaks down why IT security tools often fall short in industrial environments and what it really takes to protect operational systems. Drawing from 25+ years of hands-on experience, Aaron explores the differences between IT and OT priorities, why “silver bullet” solutions don’t exist, and how to build defense-in-depth strategies that actually work on the plant floor.

    You’ll discover:

    • Why IT tools struggle in OT environments - and where they can help.

    • How to balance availability, safety, and security in critical systems.

    • Practical ways to manage legacy hardware, vendor dependencies, and remote access.

    • The key to uniting IT and OT teams for stronger resilience.

    If you’re navigating the evolving world of industrial cybersecurity, this episode will change how you think about tools, processes, and protection.

    Tune in to learn how to bridge the IT–OT divide and build a smarter, safer security culture.

    Key Moments:

    03:31 "Adapting IT Products for OT Use"

    08:53 IT and OT Crossover Tools

    11:05 Balancing OT Risk in Cybersecurity

    13:37 Cybersecurity and Remote Secure Access

    18:25 Designing Resilient, Independent Systems

    21:40 Unified Cybersecurity Through Training & Collaboration

    24:24 "IT and OT Integration Challenges"

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X:
    続きを読む 一部表示
    28 分
  • How to Protect Kids in a Digital World: Online Safety, AI Dangers, and Parental Guidance
    2025/09/22

    In this episode, host Aaron Crow welcomes cybersecurity expert John Schimanski Jr., Chief Information Security Officer at Trivigil, for an eye-opening conversation that every parent, educator, and technologist needs to hear. Together, they delve into the escalating dangers children face online - from the alarming rise of cyber predators and social media manipulation, to the misuse of AI and increasingly sophisticated scams targeting families.

    John shares powerful stories from his work with educational institutions and law enforcement, highlighting how digital threats are evolving far faster than most parents can keep up with. Aaron reflects on personal challenges as a parent navigating device safety and digital boundaries, and the two discuss practical strategies for protecting kids in today’s hyper-connected world.

    This episode doesn’t just explore the risks - it offers hope and tangible action, including details about cybersecurity education initiatives like the MASK Next Gen Shield game, designed to give kids and parents the knowledge they need to stay safe online. Whether you’re a concerned parent, a teacher, or someone working in the cybersecurity field, this discussion is packed with real-world advice and resources you can use right now.

    Tune in for a timely conversation on the front lines of digital safety—and learn why, when it comes to protecting our kids, awareness and action are more important than ever.

    Key Moments:

    05:00 Digital Image Blacklist Management

    08:08 Parental Cybersecurity and Tech Awareness

    10:06 Fake Arrest Warrant Scam Alert

    13:27 AI Development Concerns and Future

    21:13 Online Predator Alert & Teen Safety

    25:33 Limits of Facebook Moderation

    27:29 Managing Digital Challenges for Parents

    30:46 Teen Sextortion Crisis Emerges

    33:44 "Saving Kids Amidst Social Media"

    42:23 Broken Graphics Card Issue Resolved

    45:33 Internet Safety Tips for Parents

    49:43 Pause Before Reacting

    51:17 Future Concerns and Optimism

    56:46 "Essential Curriculum for Schools"

    About the guest :

    John Schimanski Jr. brings more than three decades of experience in physical and cybersecurity, spanning private and public sectors. Beginning his career in 1994, he worked as a physical security specialist protecting super-regional shopping centers in high-crime areas, focusing on stolen vehicles and safety operations. During this time, he earned two master’s degrees—one in Criminal Justice and Security Administration and another in Managing Information Systems—along with a bachelor’s in Business Administration.

    He transitioned into cybersecurity in 2007, when ransomware was still a $5,000 payment on a green dot credit card. While working in a small data center, he developed customized web services and interfaces for organizations such as the Las Vegas Motor Speedway and Electric Daisy Carnival (EDC).

    続きを読む 一部表示
    59 分
  • Bridging Military and Civilian Cybersecurity: Leadership, Skills, and Lifelong Learning with Christopher Ross
    2025/09/15

    In this episode, host Aaron Crow sits down with cybersecurity leader and National Guard threat hunt team lead Christopher Ross, diving into the real-world experiences that shape careers in the intersecting worlds of IT and OT security. Chris shares his 18-year journey from joining the military with a passion for computers to leading critical infrastructure cybersecurity efforts - both in uniform and in the private sector. Together, Aaron and Chris break down myths about gatekeeping, discuss the unique challenges of military versus civilian roles, and highlight lessons learned along the way.

    From imposter syndrome to servant leadership, the conversation unpacks how effective communication, continuous training, and the willingness to learn from failure fuel professional growth. Chris also reflects on how military training instills risk mitigation and teamwork, and how those skills can translate - and sometimes clash - with civilian cybersecurity cultures. They talk certifications, hands-on learning, the importance of meaningful tabletop exercises, and the evolving landscape as AI powers both attackers and defenders.

    Whether you’re a veteran, a fresh analyst, or just passionate about cybersecurity, this honest and energetic exchange will leave you motivated to keep learning, keep growing, and keep protecting it all. So grab your energy drink and tune in for a conversation that proves everyone in cyber, no matter their path, has wisdom worth sharing.

    Key Moments:

    05:30 Military Adventures Surpass Civilian Opportunities

    07:28 Military vs. Civilian Leadership Dynamics

    10:42 Clarifying Civilian vs Military Missions

    12:22 Leadership: Addressing Miscommunication & Misalignment

    15:45 Toxic Leadership and Military Transition

    20:01 Reliance on Tools vs. Core Skills

    22:29 "Forgotten Skills Fade Over Time"

    25:13 Boosting Confidence in New Roles

    29:42 Interactive Training and Environmental Protection

    32:37 Purple Teaming Strategy Insights

    36:15 Persistence in Skill Development

    39:04 Soft Skills Matter for Career Growth

    42:44 "Technical & Business Acumen Fusion"

    44:41 Military: Career Value and Benefits

    48:09 "Cyber Education for K-12"

    Resources Mentioned :

    https://www.ransomware.live/

    • comprehensive resource that tracks and monitors ransomware groups and their activities.

    https://ransomwhe.re/

    • tracks ransomware payments by collecting and analyzing cryptocurrency addresses associated with ransomware attacks.

    https://www.ransom-db.com/

    • real-time ransomware tracking platform that collects, indexes, and centralizes information on ransomware groups and their victims.

    About the Gu...

    続きを読む 一部表示
    56 分
  • AI, Quantum, and Cybersecurity: Protecting Critical Infrastructure in a Digital World
    2025/09/08

    In this episode, host Aaron Crow is joined by Kathryn Wang, Principal of Public Sector at SandboxAQ, for a wide-ranging and candid conversation about the critical role AI and quantum technology are playing in today's cybersecurity landscape.

    Kathryn and Aaron break down complex concepts like quantum cryptography and the growing risks of deepfakes, data poisoning, and behavioral warfare - all with real-world examples that hit close to home. They dig into why cryptographic resilience is now more urgent than ever, how AI can both strengthen and threaten our defenses, and why your grandma shouldn’t be left in charge of her own data security.

    From lessons learned in power plants and national defense to the nuances of protecting everything from nuclear codes to family recipes, this episode dives deep into how we can balance innovation with critical risk management.

    Kathryn shares practical advice on securing the basics, educating your network, and making smart decisions about what truly needs to be connected to AI. Whether you’re an IT, OT, or cybersecurity professional—or just trying to keep ahead of the next cyber threat - this episode will arm you with insights, strategies, and a little bit of much-needed perspective. Tune in for a mix of expert knowledge, humor, and actionable takeaways to help you protect it all.

    Key Moments:

    04:02 "Securing Assets in Post-Quantum Era"

    07:44 AI and Cybersecurity Concerns

    12:26 "Full-Time Job: Crafting LLM Prompts"

    15:28 AI Vulnerabilities Exploited at DEFCON

    19:30 AI Data Poisoning Concerns

    20:21 AI Vulnerability in Critical Infrastructure

    23:45 Deepfake Threats and Cybersecurity Concerns

    28:34 Question Everything: Trust, Verify, Repeat

    33:20 "Digital Systems' Security Vulnerabilities"

    35:12 Digital Awareness for Children

    39:10 "Understanding Data Privacy Risks"

    43:31 "Leveling Up: VCs Embrace Futurism"

    45:16 AI-Powered Personalized Medicine

    About the guest :

    Kathryn Wang is a seasoned executive with over 20 years of leadership in the technology and security sectors, specializing in the fusion of cutting-edge innovations and cybersecurity strategies.

    She currently serves as the Public Sector Principal at SandboxAQ, where she bridges advancements in post-quantum cryptography (PQC) and data protection with the mission-critical needs of government agencies. Her work focuses on equipping these organizations with a zero-trust approach to securing sensitive systems against the rapidly evolving landscape of cyber threats.

    During her 16-year tenure at Google and its incubator Area120, Kathryn drove global efforts to develop and implement Secure by Design principles in emerging technologies, including Large Language Models (LLMs) and Generative AI.

    How to connect Kathryn :

    https://www.linkedin.com/in/kathryn-wang/



    <...

    続きを読む 一部表示
    57 分
  • Bridging IT and OT Cybersecurity: Lessons from the Field with Patrick Gillespie
    2025/09/01

    Welcome to another episode of Protect It All, where we dive deep into the world of IT and OT cybersecurity! In this episode, host Aaron Crow sits down with Patrick Gillespie, OT Practice Director at GuidePoint Security, for a candid conversation that's as insightful as it is relatable. Patrick, whose journey has taken him from working in manufacturing and building freight trains to leading OT security initiatives, shares real-world stories about the challenges and realities of protecting operational technology.

    Together, Aaron and Patrick discuss the blurred lines between IT and OT, the importance of understanding business priorities in security, and why collaboration rather than heavy-handed mandates makes all the difference in securing critical infrastructure.

    Whether you’re a seasoned professional or just getting started in cyber, you’ll come away with practical insights on risk management, building trust with operations teams, and the vital role of mentorship in developing the next generation of OT security experts.

    Stay tuned for a grounded, actionable conversation that reminds us all: when it comes to securing the intersection of IT and OT, it’s about more than just technology -it’s about people, process, and the bigger business picture.

    Key Moments:

    05:53 IT and OT System Confusion

    07:43 Implementing Fortigate and Managing Risks

    11:21 Outdated Systems and Patch Challenges

    15:43 Comprehensive Onsite Assessment Toolkit

    17:56 AI or Traditional? Balancing Approaches

    21:16 "Securing OT: Remote Access and Training"

    25:47 Cybersecurity Skill Growth Forecast

    26:38 "Mentorship in Cybersecurity Careers"

    30:22 Understanding Your Network Setup

    35:39 Balancing Security and Accessibility

    36:09 Leveraging Operational Team Buy-In

    39:27 IT Budget Prioritization for OT Needs

    42:44 Challenges in OT Security Adoption

    46:56 Tech Growth & Infrastructure Expansion

    About the Guest :

    Patrick Gillespie has spent over 15 years immersed in the world of cybersecurity, with the last three and a half years serving as the OT Practice Director at GuidePoint, a leading value-added reseller specializing in cybersecurity products.

    At GuidePoint, Patrick leads a dedicated team of OT engineers focused on securing both operational technology (OT) environments and the rapidly growing array of IoT devices. Recognizing that clients often CISOs may not directly own OT assets or remediation processes, Patrick excels at bridging the gap between IT security leaders and their operational counterparts, such as plant managers and controls engineers.

    Through his work, Patrick guides organizations to understand and address the unique challenges of OT security, helping them build collaboration across teams to strengthen their overall cyber defenses.

    How to connect Patrick :

    GuidePoint Security University: https://www.guidep...

    続きを読む 一部表示
    48 分