PodcastsBusiness@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Latest episode

611 episodes

  • @BEERISAC: OT/ICS Security Podcast Playlist

    Brass Tacks S2E06 – Fighting Cybercrime at Global Scale

    15/03/2026 | 27 mins.
    Podcast: Fortinet Cybersecurity Podcast (LS 26 · TOP 10% what is this?)
    Episode: Brass Tacks S2E06 – Fighting Cybercrime at Global Scale
    Pub date: 2026-03-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Cybercrime runs like a business, fast, scalable, and hard to stop. Jürgen Stock, Former Secretary General INTERPOL, explains how criminal networks work, why basic cyber hygiene still blocks many attacks, and how police, companies, and governments must share data to keep pace as AI speeds crime up.

    Watch or listen to the episode, and read the blog to understand how cybercrime works at scale.

    https://www.youtube.com/watch?v=NOLgv_a2w6o

    The podcast and artwork embedded on this page are from Fortinet Cybersecurity Podcast, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The Hidden Cost of Siloed OT Security Tools

    14/03/2026 | 25 mins.
    Podcast: Industrial Cybersecurity Insider
    Episode: The Hidden Cost of Siloed OT Security Tools
    Pub date: 2026-03-11

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    As we lookback, Craig and Dino tackle a critical disconnect in industrial cybersecurity: the failure to share OT security tool data with the people who actually need it.
    They explore why IT teams often purchase and deploy OT IDS platforms without engaging plant floor teams, system integrators, and OEMs who are actively working in manufacturing environments.
    The conversation reveals that 85% of data collected by these tools is meant for OT teams to act on, yet it rarely reaches them.
    They discuss the consequences of this siloed approach—including system integrators bringing their own tools to fill the gap—and provide practical advice on achieving true IT/OT convergence.
    The episode emphasizes the importance of working with partners who can "build the car" rather than just "sell the car," and challenges organizations to evaluate whether they're truly practicing IT/OT convergence or just paying lip service to it.
    Chapters:
    (00:00:00) - The Data Sharing Problem in OT Cybersecurity
    (00:01:00) - Why System Integrators Can't Access Security Tool Data
    (00:04:00) - Who's Keeping the Data and Why
    (00:08:00) - The IT/OT Oil and Water Problem
    (00:11:00) - When System Integrators Bring Their Own Tools
    (00:14:00) - Questions to Ask Your Cybersecurity Partners
    (00:17:00) - The Car Analogy: Buyers vs. Builders
    (00:19:00) - Who Asset Owners Really Trust
    (00:21:00) - The Three-Legged Stool of OT Security
    (00:23:00) - The Path to True IT/OT Convergence

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    AI Wrote the Code—Who Owns the Risk?

    13/03/2026 | 31 mins.
    Podcast: Exploited: The Cyber Truth
    Episode: AI Wrote the Code—Who Owns the Risk?
    Pub date: 2026-03-12

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and embedded systems expert Jacob Beningo to explore how AI is changing the software development lifecycle for embedded and firmware teams.

    Together, they unpack the risks and responsibilities that come with AI-generated code. While AI can accelerate development and automate tedious tasks, it can also introduce defects, expand the attack surface, and create a dangerous illusion of completeness. Unlike human engineers, AI cannot explain intent, reason about long-term system behavior, or take accountability when systems fail.

    Joe and Jacob discuss how engineering teams can safely integrate AI into development workflows without sacrificing security, reliability, or accountability, especially in systems that must operate safely for years in the field.

    In this episode, they explore:

    Why AI-generated code can introduce hidden vulnerabilities and complexity
    The accountability challenge: who owns the risk when AI writes the code?
    How AI output should be treated as untrusted code by default
    Why rigorous testing, validation, and security reviews still matter
    Practical ways engineering teams can use AI responsibly in embedded development

    For engineers, security leaders, and product teams navigating AI adoption in embedded systems, this episode offers practical insights into how to move faster with AI without weakening trust in the systems you build.

    The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Poland’s Power Grid Cyberattack What It Teaches Us About OT Security and Renewable Energy Risks

    12/03/2026 | 34 mins.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: Poland’s Power Grid Cyberattack What It Teaches Us About OT Security and Renewable Energy Risks
    Pub date: 2026-03-09

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    What happens when attackers target the systems that keep the lights on?

    In this episode of Protect It All, host Aaron Crow breaks down the December 2025 cyberattack on Poland’s energy infrastructure, where coordinated attackers disrupted wind farms, solar installations, and heat and power plants - impacting nearly half a million people.

    This real-world incident highlights the growing risks facing distributed energy resources (DER) and modern power grids. As energy systems become more connected and decentralized, the attack surface expands - often faster than security programs can adapt.

    Aaron walks through what actually went wrong: default passwords, unpatched devices, and weak network segmentation that allowed attackers to brick OT equipment and blind operators to what was happening in their own systems.

    You’ll learn:

    How attackers targeted renewable energy infrastructure at scale

    Why edge devices and distributed assets create new vulnerabilities

    The importance of eliminating default credentials and poor configurations

    Why network segmentation and secure remote access are essential

    What grid operators and OT teams must prioritize immediately

    How lessons from Poland apply to power grids worldwide

    For engineers, operators, and cybersecurity leaders responsible for critical infrastructure, this episode delivers practical insights on defending modern energy systems before attackers strike again.

    Tune in to understand what Poland’s grid attack reveals about the future of OT security - only on Protect It All.

    Key Moments: 

    04:57 "Corrupted Firmware Disables System Control"

    10:01 DER Risks and Scaling Threats

    10:55 Risks of Expanding Energy Grids

    16:30 OT Security Vulnerabilities and Risks

    18:34 Prioritize OT Security Systems

    23:06 Change Default Passwords Immediately

    24:49 "Critical ICS Security Measures"

    30:15 "OT Cyber-Physical Response Plan"

    32:56 "Critical Security Steps for Resilience"

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast

     

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    1/4 Contexto de Auditoría de seguridad en OT

    11/03/2026 | 16 mins.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 1/4 Contexto de Auditoría de seguridad en OT
    Pub date: 2026-03-09

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    En este episodio se aborda la transición necesaria de la auditoría documental clásica a la evaluación del comportamiento real de los sistemas industriales. Analiza los errores críticos al intentar aplicar metodologías IT en plantas de producción y cómo cambiar la perspectiva cuando el activo a proteger no es un servidor, sino el proceso físico que […]

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

More Business podcasts

About @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Listen to @BEERISAC: OT/ICS Security Podcast Playlist, The Happy Saver Podcast - Personal Finance in New Zealand and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.7.2 | © 2007-2026 radio.de GmbH
Generated: 3/15/2026 - 8:25:51 PM