

From Controls to Control: The Governance Imperative in OT / Critical Infrastructure Cybersecurity
14/1/2026 | 25 mins.
Podcast: CanadianSME Small Business PodcastEpisode: From Controls to Control: The Governance Imperative in OT / Critical Infrastructure CybersecurityPub date: 2026-01-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome to the CanadianSME Small Business Podcast, hosted by SK Uddin. Today we explore the world of Industrial Cybersecurity and how businesses can safeguard critical infrastructure in an increasingly connected environment.Our guest is Denrich Sananda, Managing Partner and Senior Consultant at Arista Cyber, a Harvard Business School alumnus and member of the ISA 62443 standard committee. Denrich and his team specialize in protecting Industrial Control Systems by ensuring cybersecurity, reliability, and uptime work in harmony.Key HighlightsGovernance & Standards: Denrich explains why frameworks like IEC 62443 and NIST CSF 2.0 are essential in OT environments. Leadership & Turnaround: He shares the key mindset shift that drove a major multi million euro corporate turnaround. Cybersecurity & Safety: Denrich breaks down how Arista Cyber unites cybersecurity, reliability, and functional safety. Resilience Roadmaps: He outlines layered security approaches like the Purdue Model and Industrial Threat Detection. Global Vision: Denrich discusses TÜV certification and Arista Cyber’s long term mission to protect global critical infrastructure.Special Thanks to Our Partners:UPS: https://solutions.ups.com/ca-beunstoppable.html?WT.mc_id=BUSMEWAGoogle: https://www.google.ca/A1 Global College: https://a1globalcollege.ca/ADP Canada: https://www.adp.ca/en.aspxFor more expert insights, visit www.canadiansme.ca and subscribe to the CanadianSME Small Business Magazine. Stay innovative, stay informed, and thrive in the digital age!Disclaimer: The information shared in this podcast is for general informational purposes only and should not be considered as direct financial or business advice. Always consult with a qualified professional for advice specific to your situation.The podcast and artwork embedded on this page are from SK Uddin, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

EP257 Beyond the 'Kaboom': What Actually Breaks When OT Meets the Cloud?
14/1/2026 | 27 mins.
Podcast: Cloud Security Podcast by Google (LS 36 · TOP 2.5% what is this?)Episode: EP257 Beyond the 'Kaboom': What Actually Breaks When OT Meets the Cloud?Pub date: 2026-01-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationGuest: Chris Sistrunk, Technical Leader, OT Consulting, Mandiant Topics: When we hear "attacks on Operational Technology (OT)" some think of Stuxnet targeting PLCs or even backdoored pipeline control software plot in the 1980s. Is this space always so spectacular or are there less "kaboom" style attacks we are more concerned about in practice? Given the old "air-gapped" mindset of many OT environments, what are the most common security gaps or blind spots you see when organizations start to integrate cloud services for things like data analytics or remote monitoring? How is the shift to cloud connectivity - for things like data analytics, centralized management, and remote access - changing the security posture of these systems? What's a real-world example of a positive security outcome you've seen as a direct result of this cloud adoption? How do the Tactics, Techniques, and Procedures outlined in the MITRE ATT&CK for ICS framework change or evolve when attackers can leverage cloud-based reconnaissance and command-and-control infrastructure to target OT networks? Can you provide an example? OT environments are generating vast amounts of operational data. What is interesting for OT Detection and Response (D&R)? Resources: Video version Cybersecurity Forecast 2026 report by Google Complex, hybrid manufacturing needs strong security. Here's how CISOs can get it done blog "Security Guidance for Cloud-Enabled Hybrid Operational Technology Networks" paper by Google Cloud Office of the CISO DEF CON 23 - Chris Sistrunk - NSM 101 for ICS MITRE ATT&CK for ICS The podcast and artwork embedded on this page are from Anton Chuvakin, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

1/4 Contexto del Gobierno y Gestión de la Ciberseguridad Industrial
13/1/2026 | 13 mins.
Podcast: Casos de Ciberseguridad IndustrialEpisode: 1/4 Contexto del Gobierno y Gestión de la Ciberseguridad IndustrialPub date: 2026-01-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se aborda cómo surge en Takasago la necesidad de explorar la telemetría del proceso como herramienta para identificar anomalías, diferenciando entre fallos técnicos y señales de posibles ciberataques. Participa Fernando Manuel Martínez García, Director Técnico, EHS y de Sistemas de la información en TAKASAGO (Europe).The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Small Business Cybersecurity: Practical Steps to Survive Big Threats on a Small Budget
12/1/2026 | 25 mins.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Small Business Cybersecurity: Practical Steps to Survive Big Threats on a Small BudgetPub date: 2026-01-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationSmall businesses aren’t too small to be targeted; they're often the first targets. In this episode of Protect It All, host Aaron Crow breaks down what cybersecurity really looks like for small and medium-sized businesses with limited resources. With nearly half of all cyberattacks aimed at SMBs and many companies never recovering, this episode focuses on what actually matters when budgets, time, and teams are tight. Aaron cuts through fear-based messaging and tool overload to share simple, affordable steps that can dramatically reduce risk without requiring a full security team or enterprise spend. You’ll learn: Why small businesses are prime cyber targets The most common mistakes that lead to catastrophic loss How basic policies and employee awareness stop most attacks Why multi-factor authentication, backups, and segmentation are non-negotiable How to prioritize cybersecurity when resources are limited Why resilience not perfection is the real goal Whether you’re a founder, business owner, or IT lead at a growing company, this episode gives you practical guidance you can act on immediately before a cyber incident forces your hand. Tune in to learn how to protect your business, your data, and your future only on Protect It All. Key Moments: 03:37 Cybersecurity Risks for Small Businesses 08:06 System Security and Backup Essentials 12:21 Cybersecurity: Prepare, Monitor, Survive 14:21 Efficient Device Monitoring Simplified 19:31 "Three-Two-One Backup Strategy" 20:20 "Planning Left of Bang" Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: [email protected] Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at [email protected] Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Die 3 grundlegenden Hausaufgaben beim Aufbau eines SzA | OT Security Made Simple
10/1/2026 | 24 mins.
Podcast: OT Security Made SimpleEpisode: Die 3 grundlegenden Hausaufgaben beim Aufbau eines SzA | OT Security Made SimplePub date: 2026-01-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationChristian Breitenstrom vom SOC-Dienstleister uneedsecurity definiert die grundlegenden Hausaufgaben beim Aufbau eines Systems zur Angriffserkennung und beschreibt aus der Praxis die Herausforderungen von KMUs bei der OT-Sicherheit. Für Deutschland wünscht er sich eine staatliche Förderung für OT-Sicherheit nach dem Prinzip des Singapur-Modells. Darüber informiert uneedsecurity auch regelmäßig unter https://www.uneedsecurity.com/blog. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an [email protected]. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.



@BEERISAC: OT/ICS Security Podcast Playlist