『Security Breach』のカバーアート

Security Breach

Security Breach

著者: Eric Sorensen
無料で聴く

このコンテンツについて

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

© 2025 Security Breach
政治・政府
エピソード
  • You Think You Know Me
    2025/07/02

    Who are you?

    This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management.

    My conversation with Brandon Traffanstedt, Sr. Director and Global Technology Officer at CyberArk, took us in two equally important directions. The first deals with individuals and how to properly manage those accessing your systems and networks. The second, equally as challenging, but potentially more complex, focused on machine or asset identities and understanding how to keep this sprawling attack landscape more secure.

    Perhaps most interestingly, Brandon also offers some insight on cookies-based attacks and how, like so many cybersecurity challenges, the answers doesn’t lie in the tech stack.

    Watch/listen as we also discuss:

    • Solving identify management strategies by finding baseline controls.
    • The unique dynamics of manufacturing when it comes to risk analysis and establishing these baselines.
    • The role of asset visibility when it comes to identity management strategies.
    • How to prevent those age-old turf battles between IT and OT.
    • Why machine identities might pose the greatest cybersecurity risk.
    • The importance of empathy in getting people to buy in to cybersecurity strategies and training.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Digital Disruption with Geoff Nielson
    Discover how technology is reshaping our lives and livelihoods.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    続きを読む 一部表示
    36 分
  • Avoiding the Ostrich Approach
    2025/06/20

    I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again.

    The difference is that Howard Grimes, the CEO of the Cybersecurity Manufacturing Innovation Institute (CyManII) is looking to help provide a lot of solutions for manufacturers. As we discuss workforce challenges, secure-by-design, an evolving threat landscape and the ongoing struggles with legacy OT infrastructure, I’ll challenge you to find something that the Institute couldn’t help you and your organization jumpstart, solve or streamline.

    Watch/listen as we discuss:

    • The most significant vulnerabilities still impacting manufacturing.
    • Why the industrial sector struggles to find OT cybersecurity specialists, and strategies that are helping to fill this gap.
    • The growing prominence of secure-by-design and how the responsibilities for these strategies are shifting.
    • The areas where legacy OT technology are hampering cybersecurity efforts the most.
    • Why the "Ostrich Approach" can no longer be tolerated.
    • The new focal points of attackers and how these are shifting based on hacker resources.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Digital Disruption with Geoff Nielson
    Discover how technology is reshaping our lives and livelihoods.

    Listen on: Apple Podcasts Spotify

    Inspiring Tech Leaders - The Technology Podcast
    Interviews with Tech Leaders and insights on the latest emerging technology trends.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    続きを読む 一部表示
    52 分
  • 'We've Made Our Own Prison'
    2025/06/02

    Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge.

    Regardless of the situation or dynamic, everyone likes to think that they’re special. However, with experience we learn that appreciating both the shared similarities, as well as some of those unique traits, are how we can best solve problems.

    A great example is a recent conversation I had with Umaimah Khan, founder and CEO of Opal Security – she goes by UK for short. Her firm focuses on the identify management sector of cybersecurity.

    What UK constantly reinforced is that the industrial sector is not alone in trying to figure out the best ways to manage and secure human, equipment and asset identification. So, while some of the application challenges are unique, there’s a lot of strategies to draw from in determining what might be best for your enterprise.

    Listen as we discuss:

    • The challenges of identify management at both the human and machine levels.
    • The need for fluid change management when it comes to determining who can access what, and at what level.
    • Why the success of any cybersecurity initiative will be about what the human can or can't do, not the machine.
    • How many security vulnerabilities are created by a "perfect storm of poor communication."
    • Breaking down silos, which have created "security by obscurity."
    • The new attack vectors poor identity management is creating.
    • The evolving role of agentic AI in industrial cybersecurity.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Digital Disruption with Geoff Nielson
    Discover how technology is reshaping our lives and livelihoods.

    Listen on: Apple Podcasts Spotify

    Inspiring Tech Leaders - The Technology Podcast
    Interviews with Tech Leaders and insights on the latest emerging technology trends.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    続きを読む 一部表示
    43 分

Security Breachに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。