PodcastsBusiness@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Latest episode

667 episodes

  • @BEERISAC: OT/ICS Security Podcast Playlist

    Cracking the Fast16 sabotage malware mystery

    05/05/2026 | 1h 47 mins.
    Podcast: Three Buddy Problem (LS 39 · TOP 2% what is this?)
    Episode: Cracking the Fast16 sabotage malware mystery
    Pub date: 2026-05-01

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 96: We're joined by WIRED writer Andy Greenberg to dig into SentinelLabs' bombshell FAST16 research, a newly deciphered piece of sabotage malware that predates Stuxnet by five years and quietly tampered with physics modeling software likely tied to Iran's nuclear program.

    We discuss the attribution rabbit hole (NSA? Israel? someone else?), the eerie "spiritual warfare" implications of corrupting scientific calculations, and Antiy Labs' very dialectical Chinese rebuttal. Plus, what AI reverse-engineering means for the next decade of cyber paleontology.

    Cast: Andy Greenberg, Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:

    0:00 - WIRED’s Andy Greenberg joins the show

    1:53 - How the FAST16 scoop landed in Andy's lap

    6:45 - JAGS sat on this sample for 7 years

    10:33 - How Costin and the Kaspersky team missed the sabotage routine

    15:20 - The "holy moly" moment: what FAST16 actually does

    18:26 - Territorial Dispute, Shadow Brokers, and the driver list

    24:11 - The targets: MOHID, PKPM, and LS-DYNA's link to Iran

    28:13 - No C&C, no victims: a worm built for air-gapped networks

    34:45 - Was this part of a larger anti-Iran toolkit?

    37:55 - Attribution: NSA, Israel, or someone else entirely?

    51:39 - What was the actual sabotage? Unanswered questions

    55:48 - "Spiritual warfare": the psychological angle and trust in computers

    1:20:05 - Equities, going public, and the case for AI-powered reversing

    1:32:19 - Antiy Labs' Chinese rebuttal and the apparatchik tone

    1:43:04 - Shoutouts: Sergey Mineev, LabsCon CFP, PivotCon, and Ekoparty
    Links:
    Transcript
    fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
    Flame: A complex malware for targeted attacks
    Territorial Dispute – NSA's perspective on APT landscape
    Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program - and Predates Stuxnet
    Kim Zetter's Countdown to Zero Day
    An Unprecedented Look at Stuxnet, the World's First Digital Weapon
    The Flame: Questions and Answers (Kaspersky)
    SentinelLabs
    Andy Greenberg on X
    TLPBLACK
    Antiy Labs: “Psychological Warfare” to Show Off Cyber Capabilities
    Who’s Really Spreading through the Bright Star?
    LABScon 2026 CFP
    Ekoparty Miami 2026 (Agenda)
    PIVOTcon Agenda

    The podcast and artwork embedded on this page are from Security Conversations, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Trust at Machine Speed: AI, DevSecOps, and Zero Trust in National Security Software

    04/05/2026 | 34 mins.
    Podcast: Exploited: The Cyber Truth
    Episode: Trust at Machine Speed: AI, DevSecOps, and Zero Trust in National Security Software
    Pub date: 2026-04-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Artificial intelligence is moving faster than the policies, security controls, and acquisition processes designed to govern it—especially in national security environments where preventing failure is mission-critical.

    In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by Nicolas Chaillan, the host of In the Nic of Time and Former DAF CSO, to examine a central question: how do you build trust in systems that operate, adapt, and make decisions at machine speed?

    Drawing on his experience deploying DevSecOps across the Department of Defense and building large-scale AI platforms, Chaillan offers a direct perspective on what’s working, what isn’t, and where organizations are falling behind.

    Together, they explore:

    Why multi-model AI strategies are critical to avoid lock-in and improve outcomes
    How AI is accelerating software development, testing, and security workflows
    Where policy and governance are lagging behind technical reality
    The risks of restricting access to critical AI capabilities
    What zero trust looks like in systems driven by automation and AI

    From defense systems to software pipelines, this episode examines what it takes to move fast without losing control—and what leaders need to understand as AI becomes embedded across the mission stack.

    The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    #125: OT Cybersecurity Risk Assessments in the Power Industry

    03/05/2026 | 20 mins.
    Podcast: Energy Talks
    Episode: #125: OT Cybersecurity Risk Assessments in the Power Industry
    Pub date: 2026-04-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Discover methods, findings, and lessons directly from the energy industry
    In this episode of Energy Talks, host **Simon Rommer **speaks with his colleague Jaron Stammler, OT Cybersecurity Consultant at OMICRON, about how OT cybersecurity risk assessments are conducted in the power industry. Drawing from current experiences in substations and battery energy storage systems (BESS), they walk through how assessments are initiated, structured, and executed in practice.

    The discussion also highlights the gap between theory and reality, especially when assessments are performed late in project lifecycles due to regulatory or project constraints. Jaron explains the fundamentals of the IEC 62443-3-2 risk assessment process, including system scoping, risk identification, and zone and conduit modeling, while also addressing common challenges such as missing documentation and limited stakeholder availability.

    Simon and Jaron also emphasize how cybersecurity is an ongoing process and that effective assessments provide actionable insights, prioritized risks, and practical mitigation strategies tailored to each project.

    Get more information about security risk assessments at OMICRON .

    We would really like to know what you think about Energy Talks and which topics you would like to hear more about. To do this, simply send us an email to [email protected] and be sure to give us a star review on Spotify or Apple Podcast. Thanks for your feedback!

    Please join us to listen to the next episode of Energy Talks 🎙️

    The podcast and artwork embedded on this page are from OMICRON electronics GmbH, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The Phishing Attack That Could Have Shut Down a Plant Floor

    02/05/2026 | 26 mins.
    Podcast: Industrial Cybersecurity Insider
    Episode: The Phishing Attack That Could Have Shut Down a Plant Floor
    Pub date: 2026-04-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    A real-world case study shows how a single phishing email led to credential and MFA compromise, creating an urgent question for any industrial organization: Did the attacker reach the OT environment?
    Dino and Jim walk through how OT visibility, secure remote access controls, and continuous monitoring enabled rapid validation of what happened. They were able to prove the breach did not impact control systems and avoid an expensive, safety-driven shutdown of a continuous manufacturing process.
    The episode connects technical controls to executive outcomes, including resilience, duty of care, and the financial reality that “not knowing” can be as costly as an actual compromise.
    Chapters:
    (00:00:00) Why continuous manufacturing makes “abundance of caution” shutdowns so costly
    (00:01:00) What “OT continuous monitoring” means and why it matters in real incidents
    (00:03:00) Safety and connected environments: why “it can go boom” changes the stakes
    (00:05:00) Baselines: defining “normal” so abnormal behavior is actionable
    (00:07:00) Incident story: phishing email leads to credential and MFA compromise
    (00:09:00) What the team validated: tracing access and confirming OT was not impacted
    (00:10:00) Lessons from Colonial Pipeline: inability to validate can force shutdowns
    (00:11:00) OT reality check: Windows assets, HMIs, historians, and engineering workstations
    (00:13:00) Secure OT remote access: why VPN-only access is not sufficient
    (00:16:00) The payoff: avoided downtime, avoided product loss, and avoided disruption
    (00:19:00) Executive view: duty of care, liability, compliance, and protecting enterprise value
    (00:23:00) The “air gap” myth and why defense-in-depth is the only practical path

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Challenges of OT Cybersecurity with NetFoundry CEO Galeal Zino

    01/05/2026 | 22 mins.
    Podcast: Digital Transformation Viewpoints
    Episode: Challenges of OT Cybersecurity with NetFoundry CEO Galeal Zino
    Pub date: 2026-04-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    In this edition of DTV, ARC vice president of research Larry O'Brien talks to NetFoundry founder and CEO Galeal Zino about the challenges facing end users when it comes to OT cybersecurity in the age of AI and digitalization. NetFoundry was created to address fundamental weaknesses in traditional networking and cybersecurity. We discuss how traditional networking is not designed for today’s digital transformation requirements. Complexity created by layered security tools increases risk and reduces reliability. NetFoundry replaces IP‑centric networking with cryptographically verifiable identities and policy‑based authorization, aligning networking more closely with zero‑trust principles.
    NetFoundry also maintains and actively invests in OpenZiti, its open‑source secure networking platform. The goal is to create a “Linux of secure networking,” supported by a growing global community. 
    Would you like to be a guest on our growing podcast?

    Do you have an intriguing or thought provoking topic you'd like to discuss on our podcast? Please contact Our Producer Tom Cabot at: [email protected]

    View all the episodes here: https://thedigitaltransformationpodcast.buzzsprout.com

    The podcast and artwork embedded on this page are from ARC Advisory Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

More Business podcasts

About @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity podcast episodes in any language, compiled by ICS security enthusiasts. Missing something? Contact Anton Shipulin on LinkedIn. Subscribe for updates!
Podcast website

Listen to @BEERISAC: OT/ICS Security Podcast Playlist, The Curve and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features