PodcastsBusiness@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Latest episode

Available Episodes

5 of 505
  • How OT Managed Services Are Revolutionizing Industrial Cybersecurity
    Podcast: Industrial Cybersecurity InsiderEpisode: How OT Managed Services Are Revolutionizing Industrial CybersecurityPub date: 2025-12-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with industrial automation and industrial cybersecurity expert Kevin Kumpf, fresh off the floor of Rockwell Automation Fair 2025. They discuss why OT managed services are finally becoming viable for manufacturing, the critical 80/20 split between people and technology challenges, and how the industry's "silver tsunami" of retiring talent is forcing a reckoning. Kevin shares insights on building unified platforms that can manage everything from 30-year-old paper tape systems to AI-powered smart factories, why IT's "patch now" mentality fails in OT environments, and how the DG 360 platform is delivering true cyber-physical convergence today - not tomorrow. They discuss the reality that most OT cybersecurity tools only discover 30% of plant assets, the importance of human-in-the-loop decision making, and why the OT ecosystem - not IT - must drive the managed services revolution. This is a must-listen for anyone struggling with the complexity of protecting and managing modern manufacturing facilities.Chapters:(00:00:00) - Introduction and Rockwell Automation Fair Recap(00:01:43) - The OT Managed Services Evolution and Rebranding(00:04:15) - The Three-Legged Stool: IT, OT, and OEMs(00:07:32) - Point Solutions vs. Unified Platforms in Manufacturing(00:10:45) - The DG 360 Vision: 360-Degree Plant Visibility(00:14:28) - The Silver Tsunami and Training Challenges(00:18:22) - Alert Fatigue and Actionable Intelligence(00:22:45) - Software Defined Automation and Legacy Systems(00:26:18) - Why OT Must Drive the Cybersecurity Conversation(00:30:35) - Real-Time Demo and Implementation ReadinessLinks And Resources:Kevin Kumpf on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    34:02
  • AI, Human Behavior & Cybersecurity’s Future: Cutting Complexity and Strengthening Defense
    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: AI, Human Behavior & Cybersecurity’s Future: Cutting Complexity and Strengthening DefensePub date: 2025-12-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe future of cybersecurity won’t be won by tools alone - it will be won by people, process, and smarter use of AI. In this episode of Protect It All, host Aaron Crow sits down with cybersecurity veteran Sharad Rai to explore how IT and OT security teams can reduce complexity, fight alert fatigue, and build stronger defenses through foundational practices and intelligent automation. Sharad brings decades of real-world experience - from early firewall management to leading large-scale security programs at major financial institutions. Together, Aaron and Sharad break down what actually works in cybersecurity today: simplifying policies, understanding user behavior, strengthening basics like patching, and leveraging AI for contextual decision-making. You’ll learn: Why human behavior is the root of both risk and resilience How AI can reduce complexity, noise, and alert fatigue What “good vs bad” looks like through an AI-driven, context-aware lens How policy overload cripples organizations - and how to fix it Why OT and IT security still depend on foundational hygiene The rise of browser-based security and Chrome as an endpoint What’s coming next: AI-driven phishing, contextual controls, and automated response Whether you're a security leader, practitioner, or just navigating modern cyber challenges, this episode will reshape how you think about defending systems and the people using them. Tune in to discover how AI, clarity, and human-centered design are shaping cybersecurity’s next chapter only on Protect It All. Key Moments:  06:21 "Cybersecurity Basics: Know the Layers" 09:49 "Defining Good to Block Bad" 13:03 Alarm Fatigue and Information Overload 14:01 Alarm Tuning and Data Utilization 19:02 RFID Tags and Process Frustration 23:03 Simplifying Cybersecurity for Success 25:18 "AI Optimizing Policy Adjustments" 27:33 "Tech Frustrations Then and Now" 31:46 Cloud Computing Transformed Everyday Work 36:05 Focus on Foundational Basics About the guest :  Sharad Rai is a cybersecurity leader and architect with over 20 years of experience securing some of the world’s most complex financial institutions. As Vice President of Security and Architecture at State Street, he leads regulatory-driven initiatives and delivers enterprise-wide cybersecurity programs across cloud, infrastructure, and endpoint platforms. Sharad has held key security roles at Morgan Stanley, BNP Paribas, Jefferies, and Foundation Medicine, with deep expertise in EDR, PAM, SASE, ZTNA, and cloud-native security. He is known for simplifying complexity, reducing risk, and bridging product, engineering, and executive teams. How to connect Sharad: https://www.linkedin.com/in/sharad-rai-cissp-a951a28 Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: [email protected]  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast  To be a guest or suggest a guest/episode, please email us at [email protected] Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    38:27
  • Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made Simple
    Podcast: OT Security Made SimpleEpisode: Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made SimplePub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJanka Kreißl von der Agentur Dunkelblau spricht über Krisenprävention und Krisenbewältigung bei Cybervorfällen. Sie erläutert aus Erfahrung, was gute Abläufe brauchen und wer von Anfang involviert sein sollte. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an [email protected]. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    21:27
  • The Asymmetric Advantage: How Cybersecurity Can Outpace Adversaries
    Podcast: Exploited: The Cyber Truth Episode: The Asymmetric Advantage: How Cybersecurity Can Outpace AdversariesPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin sits down with RunSafe Founder and CEO Joseph M. Saunders to explore why the future of cyber defense depends on disrupting attacker economics rather than racing to keep up with every new threat. Joe breaks down how organizations can gain an asymmetric advantage by reducing exploitability across entire classes of vulnerabilities, especially persistent memory safety flaws that continue to expose critical systems. He shares why adding lightweight, automated protections at build time is one of the fastest ways to shift the cost curve onto attackers without forcing massive code rewrites or slowing development teams down. Together, Paul and Joe discuss: Why attackers’ resource advantage requires a new defensive mindsetThe power of “patchless” protection in embedded and OT environmentsWhy memory safety flaws persist and how to neutralize them at scaleThe risks of AI-generated code and how to prevent silent vulnerabilitiesHow Secure by Design practices improve resilience for critical infrastructure If you're responsible for securing embedded systems, OT assets, or long-lived devices where patch cycles are slow and risk is high, this episode offers a new mindset that gives defenders the upper hand.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    27:18
  • Conserva #50 con Jose Ramon Coz (AGENCIA ESPACIAL EUROPEA) - Ciberseguridad y sector aeroespacial
    Podcast: Conservas Guillén by Trend MicroEpisode: Conserva #50 con Jose Ramon Coz (AGENCIA ESPACIAL EUROPEA) - Ciberseguridad y sector aeroespacialPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn Conservas Guillén abrimos una nueva lata para hablar con José Ramón Coz Fernandez, Director de Auditoría Interna de Ciberseguridad en la Agencia Espacial Europea (European Space Agency - ESA). Hablamos de ciberseguridad en el sector espacial, del sistema Galileo, del sistema EGNOS... Conservaciones de 30 minutos, aproximadamente, en lenguaje entendible y coloquial.The podcast and artwork embedded on this page are from Trend Micro Iberia, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    30:56

More Business podcasts

About @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Podcast website

Listen to @BEERISAC: OT/ICS Security Podcast Playlist, The Curve and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.1.2 | © 2007-2025 radio.de GmbH
Generated: 12/13/2025 - 10:47:50 PM