PodcastsBusiness@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Latest episode

669 episodes

  • @BEERISAC: OT/ICS Security Podcast Playlist

    1/4 Contexto de la Resiliencia Colectiva en el Sector Ferroviario

    06/05/2026 | 11 mins.
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 1/4 Contexto de la Resiliencia Colectiva en el Sector Ferroviario
    Pub date: 2026-05-04

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    En este episodio se analiza por qué la ciberseguridad ferroviaria es un reto sistémico y no solo organizacional. Se exploran las claves de su interdependencia estructural y se definen los requisitos de seguridad innegociables para el material rodante actual.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Rob King on OT Asset Exposures, Mitigations

    06/05/2026 | 24 mins.
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Rob King on OT Asset Exposures, Mitigations
    Pub date: 2026-05-03

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Rob King, Director of Applied Research at RunZero, joins the Nexus Podcast to discuss the security risks and exposures introduced by digital transformation to operational technology environments. 
    As many OT and cyber-physical systems assets are connected online, there could be signification exposures introduced to these internet-facing devices and systems. Rob also discusses the effectiveness of popular mitigations such as segmentation and other controls.  
    Subscribe and listen to the Nexus Podcast here. 

    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Cracking the Fast16 sabotage malware mystery

    05/05/2026 | 1h 47 mins.
    Podcast: Three Buddy Problem (LS 39 · TOP 2% what is this?)
    Episode: Cracking the Fast16 sabotage malware mystery
    Pub date: 2026-05-01

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 96: We're joined by WIRED writer Andy Greenberg to dig into SentinelLabs' bombshell FAST16 research, a newly deciphered piece of sabotage malware that predates Stuxnet by five years and quietly tampered with physics modeling software likely tied to Iran's nuclear program.

    We discuss the attribution rabbit hole (NSA? Israel? someone else?), the eerie "spiritual warfare" implications of corrupting scientific calculations, and Antiy Labs' very dialectical Chinese rebuttal. Plus, what AI reverse-engineering means for the next decade of cyber paleontology.

    Cast: Andy Greenberg, Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:

    0:00 - WIRED’s Andy Greenberg joins the show

    1:53 - How the FAST16 scoop landed in Andy's lap

    6:45 - JAGS sat on this sample for 7 years

    10:33 - How Costin and the Kaspersky team missed the sabotage routine

    15:20 - The "holy moly" moment: what FAST16 actually does

    18:26 - Territorial Dispute, Shadow Brokers, and the driver list

    24:11 - The targets: MOHID, PKPM, and LS-DYNA's link to Iran

    28:13 - No C&C, no victims: a worm built for air-gapped networks

    34:45 - Was this part of a larger anti-Iran toolkit?

    37:55 - Attribution: NSA, Israel, or someone else entirely?

    51:39 - What was the actual sabotage? Unanswered questions

    55:48 - "Spiritual warfare": the psychological angle and trust in computers

    1:20:05 - Equities, going public, and the case for AI-powered reversing

    1:32:19 - Antiy Labs' Chinese rebuttal and the apparatchik tone

    1:43:04 - Shoutouts: Sergey Mineev, LabsCon CFP, PivotCon, and Ekoparty
    Links:
    Transcript
    fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
    Flame: A complex malware for targeted attacks
    Territorial Dispute – NSA's perspective on APT landscape
    Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program - and Predates Stuxnet
    Kim Zetter's Countdown to Zero Day
    An Unprecedented Look at Stuxnet, the World's First Digital Weapon
    The Flame: Questions and Answers (Kaspersky)
    SentinelLabs
    Andy Greenberg on X
    TLPBLACK
    Antiy Labs: “Psychological Warfare” to Show Off Cyber Capabilities
    Who’s Really Spreading through the Bright Star?
    LABScon 2026 CFP
    Ekoparty Miami 2026 (Agenda)
    PIVOTcon Agenda

    The podcast and artwork embedded on this page are from Security Conversations, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    Trust at Machine Speed: AI, DevSecOps, and Zero Trust in National Security Software

    04/05/2026 | 34 mins.
    Podcast: Exploited: The Cyber Truth
    Episode: Trust at Machine Speed: AI, DevSecOps, and Zero Trust in National Security Software
    Pub date: 2026-04-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Artificial intelligence is moving faster than the policies, security controls, and acquisition processes designed to govern it—especially in national security environments where preventing failure is mission-critical.

    In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by Nicolas Chaillan, the host of In the Nic of Time and Former DAF CSO, to examine a central question: how do you build trust in systems that operate, adapt, and make decisions at machine speed?

    Drawing on his experience deploying DevSecOps across the Department of Defense and building large-scale AI platforms, Chaillan offers a direct perspective on what’s working, what isn’t, and where organizations are falling behind.

    Together, they explore:

    Why multi-model AI strategies are critical to avoid lock-in and improve outcomes
    How AI is accelerating software development, testing, and security workflows
    Where policy and governance are lagging behind technical reality
    The risks of restricting access to critical AI capabilities
    What zero trust looks like in systems driven by automation and AI

    From defense systems to software pipelines, this episode examines what it takes to move fast without losing control—and what leaders need to understand as AI becomes embedded across the mission stack.

    The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
  • @BEERISAC: OT/ICS Security Podcast Playlist

    #125: OT Cybersecurity Risk Assessments in the Power Industry

    03/05/2026 | 20 mins.
    Podcast: Energy Talks
    Episode: #125: OT Cybersecurity Risk Assessments in the Power Industry
    Pub date: 2026-04-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization

    Discover methods, findings, and lessons directly from the energy industry
    In this episode of Energy Talks, host **Simon Rommer **speaks with his colleague Jaron Stammler, OT Cybersecurity Consultant at OMICRON, about how OT cybersecurity risk assessments are conducted in the power industry. Drawing from current experiences in substations and battery energy storage systems (BESS), they walk through how assessments are initiated, structured, and executed in practice.

    The discussion also highlights the gap between theory and reality, especially when assessments are performed late in project lifecycles due to regulatory or project constraints. Jaron explains the fundamentals of the IEC 62443-3-2 risk assessment process, including system scoping, risk identification, and zone and conduit modeling, while also addressing common challenges such as missing documentation and limited stakeholder availability.

    Simon and Jaron also emphasize how cybersecurity is an ongoing process and that effective assessments provide actionable insights, prioritized risks, and practical mitigation strategies tailored to each project.

    Get more information about security risk assessments at OMICRON .

    We would really like to know what you think about Energy Talks and which topics you would like to hear more about. To do this, simply send us an email to [email protected] and be sure to give us a star review on Spotify or Apple Podcast. Thanks for your feedback!

    Please join us to listen to the next episode of Energy Talks 🎙️

    The podcast and artwork embedded on this page are from OMICRON electronics GmbH, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

More Business podcasts

About @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity podcast episodes in any language, compiled by ICS security enthusiasts. Missing something? Contact Anton Shipulin on LinkedIn. Subscribe for updates!
Podcast website

Listen to @BEERISAC: OT/ICS Security Podcast Playlist, The Diary Of A CEO with Steven Bartlett and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features