PodcastsBusiness@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Latest episode

614 episodes

  • @BEERISAC: OT/ICS Security Podcast Playlist

    OT Under Siege: How to Defend Critical Infrastructure From Nation-State Cyber Threats

    18/03/2026 | 23 mins.
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: OT Under Siege: How to Defend Critical Infrastructure From Nation-State Cyber Threats
    Pub date: 2026-03-16

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Global conflicts are no longer confined to physical battlefields - they’re spilling into cyberspace.

    In this urgent episode of Protect It All, host Aaron Crow breaks down the rising wave of cyber threats targeting critical infrastructure, from energy and water utilities to manufacturing and transportation systems.

    Drawing on recent global events and real-world incidents, Aaron explores how nation-state actors, hacktivists, and advanced adversaries are increasingly targeting operational technology environments. These attacks often rely on “living off the land” techniques - leveraging existing tools and access inside networks rather than deploying obvious malware.

    But this episode isn’t about panic. It’s about practical defense.

    Aaron outlines the immediate steps OT security teams can take to strengthen resilience - even with limited resources and tight budgets.

    In this episode, you’ll learn:

    Why global instability increases cyber risk for critical infrastructure

    How attackers exploit existing tools using living-off-the-land tactics

    The importance of vigilance, monitoring, and patching in OT environments

    Why access control and identity management are critical defenses

    How organizations can improve security posture without massive investments

    The role of collaboration and awareness in defending essential systems

    Whether you operate power systems, water facilities, industrial plants, or transportation infrastructure, this episode provides real-world guidance to help you stay ahead of evolving threats.

    Tune in to learn how OT teams can strengthen defenses and protect the systems society depends on - only on Protect It All.

    Key Moments:

    03:41 "Rising Cyber Threats Amid Tensions"

    08:24 Nation-State Cyber Threats Unveiled

    11:23 "Advanced Cybersecurity and Monitoring"

    14:24 Prioritizing and Addressing Security Risks

    17:24 Practical Steps for Cybersecurity Improvements

    19:34 "Focus on Resources and Action"

    Connect With Aaron Crow:

    Website: www.corvosec.com 

    LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    Email: [email protected] 

    Website: https://protectitall.co/ 

    X: https://twitter.com/protectitall 

    YouTube: https://www.youtube.com/@PrOTectITAll 

    FaceBook:  https://facebook.com/protectitallpodcast

     

    To be a guest or suggest a guest/episode, please email us at [email protected]

    Please leave us a review on Apple/Spotify Podcasts:

    Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    2/4 Análisis de Auditoría de seguridad en OT

    17/03/2026 | 14 mins.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 2/4 Análisis de Auditoría de seguridad en OT
    Pub date: 2026-03-16

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    En este episodio se cuestiona si las organizaciones actuales auditan controles teóricos o su capacidad real de resistir incidentes industriales. Se explora la paradoja de las empresas que, a pesar de superar auditorías, siguen siendo frágiles ante amenazas, y se analiza el peso de la cultura de decisión frente a la arquitectura técnica.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Gus Serino on a Massachusetts Water Cybersecurity Collaborative

    15/03/2026 | 26 mins.
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Gus Serino on a Massachusetts Water Cybersecurity Collaborative
    Pub date: 2026-03-15

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Gus Serino, President of I&C Secure, joins the Nexus Podcast to discuss the formation and evolution of an ongoing water utility cybersecurity collaborative that leans on a collective defense model to share resources and threat intelligence among six water & wastewater companies in the commonwealth. 
    Serino helped put together this coalition, and he explains how a feasibility study came together resulting in a shared grant that member utilities can use to improve their security programs. Gus talks about the origins of this collaborative and how other utilities can follow this model to improve cybersecurity in this struggling, resource-strapped critical infrastructure sector.
    Subscribe and listen to the Nexus Podcast here. 

    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Brass Tacks S2E06 – Fighting Cybercrime at Global Scale

    15/03/2026 | 27 mins.
    Podcast: Fortinet Cybersecurity Podcast (LS 26 · TOP 10% what is this?)
    Episode: Brass Tacks S2E06 – Fighting Cybercrime at Global Scale
    Pub date: 2026-03-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Cybercrime runs like a business, fast, scalable, and hard to stop. Jürgen Stock, Former Secretary General INTERPOL, explains how criminal networks work, why basic cyber hygiene still blocks many attacks, and how police, companies, and governments must share data to keep pace as AI speeds crime up.

    Watch or listen to the episode, and read the blog to understand how cybercrime works at scale.

    https://www.youtube.com/watch?v=NOLgv_a2w6o

    The podcast and artwork embedded on this page are from Fortinet Cybersecurity Podcast, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    The Hidden Cost of Siloed OT Security Tools

    14/03/2026 | 25 mins.
    Podcast: Industrial Cybersecurity Insider
    Episode: The Hidden Cost of Siloed OT Security Tools
    Pub date: 2026-03-11

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    As we lookback, Craig and Dino tackle a critical disconnect in industrial cybersecurity: the failure to share OT security tool data with the people who actually need it.
    They explore why IT teams often purchase and deploy OT IDS platforms without engaging plant floor teams, system integrators, and OEMs who are actively working in manufacturing environments.
    The conversation reveals that 85% of data collected by these tools is meant for OT teams to act on, yet it rarely reaches them.
    They discuss the consequences of this siloed approach—including system integrators bringing their own tools to fill the gap—and provide practical advice on achieving true IT/OT convergence.
    The episode emphasizes the importance of working with partners who can "build the car" rather than just "sell the car," and challenges organizations to evaluate whether they're truly practicing IT/OT convergence or just paying lip service to it.
    Chapters:
    (00:00:00) - The Data Sharing Problem in OT Cybersecurity
    (00:01:00) - Why System Integrators Can't Access Security Tool Data
    (00:04:00) - Who's Keeping the Data and Why
    (00:08:00) - The IT/OT Oil and Water Problem
    (00:11:00) - When System Integrators Bring Their Own Tools
    (00:14:00) - Questions to Ask Your Cybersecurity Partners
    (00:17:00) - The Car Analogy: Buyers vs. Builders
    (00:19:00) - Who Asset Owners Really Trust
    (00:21:00) - The Three-Legged Stool of OT Security
    (00:23:00) - The Path to True IT/OT Convergence

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

More Business podcasts

About @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Listen to @BEERISAC: OT/ICS Security Podcast Playlist, The Curve and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features