@BEERISAC: OT/ICS Security Podcast Playlist artwork

@BEERISAC: OT/ICS Security Podcast Playlist

1,314 episodes - English - Latest episode: 6 days ago - ★★★★★ - 2 ratings

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!

Technology Business listen notes listen later
Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

IoT Trojectory Podcast - Episode 10 - IoT Trends with IIOT World

May 17, 2019 21:09 - 19 minutes

Podcast: IoT Trojectory Podcast Series Episode: IoT Trojectory Podcast - Episode 10 - IoT Trends with IIOT World Pub date: 2019-05-16 In this episode, Mike Trojecki is joined by Lucian Fogoros, co-founder of IIOT World, the first digital publication focused 100 percent on the industrial IOT. In just nine months, IIOT World became the No. 1 global influencer on topics such as industrial IOT, smart manufacturing, ICS security, SCADA, predictive analytics and maintenance. Mike and Lucian discu...

Truth or Consequences?

May 15, 2019 20:58 - 38 minutes

Podcast: Unsolicited Response Podcast (LS 30 · TOP 10% what is this?) Episode: Truth or Consequences? Pub date: 2019-05-14 This recording is from a panel discussion on understanding and reducing the consequence side of the risk equation (risk = consequence * likelihood). Joining me in this discussion are: John Cusimano of aeSolutions and their CyberPHA Andy Bochman of INL and their Consequence Driven Cyber Informed Engineering (CCE) The two gentleman begin by explaining their respectiv...

Billy Ray Built a Meth Lab - Paul's Security Weekly #603

May 11, 2019 14:58 - 2 hours

Podcast: Paul's Security Weekly (Podcast-Only) (LS 29 · TOP 10% what is this?) Episode: Billy Ray Built a Meth Lab - Paul's Security Weekly #603 Pub date: 2019-05-10 Notes from @BEERISAC: OT/ICS Security Podcast Playlist: DFIR in ICS, and more! This week, we welcome back Lesley Carhart, Principal Threat Analyst at Dragos Inc., to talk about moving from IT security to OT security, DFIR in ICS, and more! In the second segment, we welcome Chris Sanders, Founder of Applied Network Defense & D...

Foundations for a Winning Operational Technology (OT) Security Strategy

May 08, 2019 01:45 - 22 minutes

Podcast: Security Intelligence Podcast (LS 37 · TOP 3% what is this?) Episode: Foundations for a Winning Operational Technology (OT) Security Strategy Pub date: 2019-05-07 Conversations about operational technology (OT) security have been bubbling up more and more, and justifiably so. The term may not be as well known as it should be — or even entirely settled upon yet — but the consequences of risk in operational technology environments impact our daily lives. As Rob Dyson, OT Security Se...

Israeli Cybersecurity – Dr. Gabi Siboni

May 07, 2019 00:10 - 42 minutes

Podcast: The Industrial Security Podcast (LS 32 · TOP 5% what is this?) Episode: Israeli Cybersecurity – Dr. Gabi Siboni Pub date: 2019-05-06 Gabi Siboni joins us to talk about standards, challenges and current initiatives in Israel - perhaps most thoroughly-cyber-protected nation on the planet. The podcast and artwork embedded on this page are from Ran Levi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Deep Learning threatens 3D medical imaging integrity.

April 27, 2019 14:21 - 21 minutes

Podcast: The CyberWire Daily (LS 59 · TOP 0.5% what is this?) Episode: Deep Learning threatens 3D medical imaging integrity. Pub date: 2019-04-27 Researchers at Ben Gurion University in Israel have developed techniques to infiltrate medical imaging system networks and alter 3D medical scans within, fooling both human and automated examiners with a high rate of success.  Yisroel Mirsky is a cybersecurity researcher and project manager at Ben Gurion University, and he joins us to share what ...

Deep Learning threatens 3D medical imaging integrity. [Research Saturday]

April 27, 2019 14:21 - 24 minutes

Podcast: The CyberWire Daily (LS 60 · TOP 0.5% what is this?) Episode: Deep Learning threatens 3D medical imaging integrity. [Research Saturday] Pub date: 2019-04-27 Researchers at Ben Gurion University in Israel have developed techniques to infiltrate medical imaging system networks and alter 3D medical scans within, fooling both human and automated examiners with a high rate of success.  Yisroel Mirsky is a cybersecurity researcher and project manager at Ben Gurion University, and he joi...

Deep Learning threatens 3D medical imaging integrity — Research Saturday

April 27, 2019 14:21 - 21 minutes

Podcast: The CyberWire Daily Episode: Deep Learning threatens 3D medical imaging integrity — Research Saturday Pub date: 2019-04-27 Researchers at Ben Gurion University in Israel have developed techniques to infiltrate medical imaging system networks and alter 3D medical scans within, fooling both human and automated examiners with a high rate of success.  Yisroel Mirsky is a cybersecurity researcher and project manager at Ben Gurion University, and he joins us to share what his team disc...

IT vs OT – Challenges and Opportunities

April 25, 2019 20:48 - 32 minutes

Podcast: The Industrial Security Podcast (LS 32 · TOP 5% what is this?) Episode: IT vs OT – Challenges and Opportunities Pub date: 2019-04-25 The differences between IT and OT teams and approaches both make life difficult and represent opportunities to improve industrial operations. The podcast and artwork embedded on this page are from Ran Levi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Cybersecurity Pros and Cons of Smart Instruments: Part 2

April 19, 2019 09:58 - 28 minutes

Podcast: Automation World Gets Your Questions Answered Episode: The Cybersecurity Pros and Cons of Smart Instruments: Part 2 Pub date: 2019-04-11 The “Automation World Gets Your Questions Answered” podcast series launches with this two-part podcast exploring the differences between smart and traditional instruments and how those factors impact industrial cybersecurity. The podcast and artwork embedded on this page are from Automation World, which is the property of its owner and not affili...

The Cybersecurity Pros and Cons of Smart Instruments: Part 1

April 19, 2019 09:58 - 22 minutes

Podcast: Automation World Gets Your Questions Answered Episode: The Cybersecurity Pros and Cons of Smart Instruments: Part 1 Pub date: 2019-04-11 The “Automation World Gets Your Questions Answered” podcast series launches with this two-part podcast exploring the differences between smart and traditional instruments and how those factors impact industrial cybersecurity. The podcast and artwork embedded on this page are from Automation World, which is the property of its owner and not affili...

Classifying Control Systems, Consequences and Criticality

April 11, 2019 13:13 - 32 minutes

Podcast: The Industrial Security Podcast (LS 32 · TOP 5% what is this?) Episode: Classifying Control Systems, Consequences and Criticality Pub date: 2019-04-11 Marty Edwards discusses the need for a standard way to classify the criticality of industrial control systems - eg: safety-critical vs. equipment-critical vs. reliability-critical systems, and what implications such classification should have for industrial security programs. The podcast and artwork embedded on this page are from Ra...

Rick Kaun of Verve Industrial - Episode 24

April 03, 2019 09:53 - 27 minutes

Podcast: Talking Industrial Automation (LS 34 · TOP 5% what is this?) Episode: Rick Kaun of Verve Industrial - Episode 24 Pub date: 2019-04-02 In this episode of Talking Industrial Automation, Rick Kaun, VP of solutions for Verve Industrial Protection, shares his take on the unique role cybersecurity plays in a control system or operational environment.  He also breaks down the current guidelines and standards surrounding cybersecurity, including the pros and cons of several of the most p...

Maritime Cybersecurity

April 03, 2019 07:50 - 52 minutes

Podcast: Unsolicited Response Podcast (LS 30 · TOP 10% what is this?) Episode: Maritime Cybersecurity Pub date: 2019-04-02 In a recent article a researcher proclaimed it's "not hard for a hacker to capsize a ship at sea". This was quickly followed by the Viking Sky cruise ship having its engines shut off due to a sensor reading. Not knowing much about maritime control systems I brought two experts from Moran Cyber on the podcast to discuss the issue: Captain Alex Soukhanov (a Master Marine...

Alarming vulnerabilities in automotive security systems — Research Saturday

March 31, 2019 00:00 - 18 minutes

Podcast: The CyberWire Daily Episode: Alarming vulnerabilities in automotive security systems — Research Saturday Pub date: 2019-03-30 Notes from @BEERISAC: OT/ICS Security Podcast Playlist: NB: In some cases, the car engine could be ‘killed’ whilst it was driving Researchers at Pen Test Partners recently examined a variety of third-party automotive security systems and found serious security issues, potentially giving bad actors the ability to locate, disable or meddle with multiple vehi...

Alarming vulnerabilities in automotive security systems. [Research Saturday]

March 31, 2019 00:00 - 22 minutes

Podcast: The CyberWire Daily (LS 60 · TOP 0.5% what is this?) Episode: Alarming vulnerabilities in automotive security systems. [Research Saturday] Pub date: 2019-03-30 Notes from @BEERISAC: OT/ICS Security Podcast Playlist: NB: In some cases, the car engine could be ‘killed’ whilst it was driving Researchers at Pen Test Partners recently examined a variety of third-party automotive security systems and found serious security issues, potentially giving bad actors the ability to locate, di...

Alarming vulnerabilities in automotive security systems.

March 31, 2019 00:00 - 18 minutes

Podcast: The CyberWire Daily (LS 59 · TOP 0.5% what is this?) Episode: Alarming vulnerabilities in automotive security systems. Pub date: 2019-03-30 Notes from @BEERISAC: OT/ICS Security Podcast Playlist: NB: In some cases, the car engine could be ‘killed’ whilst it was driving Researchers at Pen Test Partners recently examined a variety of third-party automotive security systems and found serious security issues, potentially giving bad actors the ability to locate, disable or meddle with...

Steve Newcomer of Phoenix Contact - Episode 22

March 29, 2019 09:16 - 36 minutes

Podcast: Talking Industrial Automation (LS 34 · TOP 5% what is this?) Episode: Steve Newcomer of Phoenix Contact - Episode 22 Pub date: 2018-08-13 Steve Newcomer is the Strategic Channel Manager Phoenix Contact USA which is located near Harrisburg, Pennsylvania. Steve shares his thoughts on cybersecurity within the industrial automation industry, and he shares a few best practices consumers can take to better protect themselves from external threats. Steve also describes how he became i...

DtSR Episode 339 - Insuring Against Acts of Cyber War

March 28, 2019 22:37 - 47 minutes

Podcast: Down the Security Rabbithole Podcast (LS 43 · TOP 1.5% what is this?) Episode: DtSR Episode 339 - Insuring Against Acts of Cyber War Pub date: 2019-03-28 Notes from @BEERISAC: OT/ICS Security Podcast Playlist: Confectionary giant Mondelez is suing Zurich after the insurer refused to pay out over $100m on its insurance policy to cover losses incurred during the NotPetya ransomware campaign This week, driven by the news cycle, and an interesting story... Rafal & James invite George...

Critical Infrastructure Security In Israel – Buki Carmeli

March 28, 2019 22:35 - 55 minutes

Podcast: The Industrial Security Podcast (LS 32 · TOP 5% what is this?) Episode: Critical Infrastructure Security In Israel – Buki Carmeli Pub date: 2019-03-28 Buki Carmeli walks us through the evolution of government programs and legislation for securing Israel's critical infrastructure. The podcast and artwork embedded on this page are from Ran Levi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Threatpost Podcast: The Norsk Hydro Cyberattack and Manufacturing Security

March 22, 2019 18:42 - 22 minutes

Podcast: The Threatpost Podcast (LS 34 · TOP 5% what is this?) Episode: The Threatpost Podcast: The Norsk Hydro Cyberattack and Manufacturing Security Pub date: 2019-03-19 Notes from @BEERISAC: OT/ICS Security Podcast Playlist: Threatpost talks to Phil Neray with CyberX about Tuesday’s ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more. Norway-based Norsk Hydro announced on Tuesday morning it was victim to a...

RSA Conference / ICS Village Report

March 21, 2019 11:57 - 25 minutes

Podcast: Unsolicited Response Podcast (LS 30 · TOP 10% what is this?) Episode: RSA Conference / ICS Village Report Pub date: 2019-03-20 I went back to the RSA Conference for the first time in over a decade. Here is my 25-minute report on the event for those considering attending or participating in the future. Includes: the first RSA Conferences and when cybersecurity first looked like a real market tips on working the massive RSA Expo Floor interview with Thomas Van Norman on the IC...

EP041: Cybersecurity, reliability, and safety in an industrial environment - An Interview with Jesus Molina of Waterfall Security

March 18, 2019 12:49 - 54 minutes

Podcast: Industrial IoT Spotlight (LS 35 · TOP 5% what is this?) Episode: EP041: Cybersecurity, reliability, and safety in an industrial environment - An Interview with Jesus Molina of Waterfall Security Pub date: 2018-10-17 *This episode of the Industrial IoT Spotlight Podcast is sponsored by the Industrial Internet Consortium   We discuss the IIC's approach to security in an industrial context.  What are the differences between consumer-facing and industrial applications of IoT when...

EP038 - Security and Trustworthiness in IoT Deployments - An Interview with Sven Schrecker of Intel

March 18, 2019 12:49 - 49 minutes

Podcast: Industrial IoT Spotlight (LS 35 · TOP 5% what is this?) Episode: EP038 - Security and Trustworthiness in IoT Deployments - An Interview with Sven Schrecker of Intel Pub date: 2018-10-04 *This episode of the Industrial IoT Spotlight Podcast is sponsored by the Industrial Internet Consortium What are the differences between Greenfield and Brownfield IoT deployment environments in terms of security? How does security relate to trustworthiness? What are the best practices for IoT dep...

German Initiatives and Progress in Cybersecurity

March 17, 2019 01:03 - 34 minutes

Podcast: The Industrial Security Podcast (LS 32 · TOP 5% what is this?) Episode: German Initiatives and Progress in Cybersecurity Pub date: 2019-03-14 We caught Jens Weisner at S4 and he talks about cybersecurity in Germany - progress, challenges and a little comparing of the German approach to what he sees happening in North America. The podcast and artwork embedded on this page are from Ran Levi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Säkerhetspodcasten #146 - CS3 Stockholm 2018 #2

March 17, 2019 00:59 - 1 hour

Podcast: Säkerhetspodcasten (LS 38 · TOP 3% what is this?) Episode: Säkerhetspodcasten #146 - CS3 Stockholm 2018 #2 Pub date: 2019-03-11 I dagens avsnitt låter vi vår flygande reporter Robin von Post ta över rodret för att göra intervjuer under CS3 i Stockholm 2018. Intervjuer med Joe Slowik, Kai Thomsen och Patrick Miller. The podcast and artwork embedded on this page are from Säkerhetspodcastpanelen, which is the property of its owner and not affiliated with or endorsed by Listen Notes, ...

#49 Control Systems Cybersecurity: A Grim Gap - A Conversation with Joe Weiss

March 17, 2019 00:59 - 54 minutes

Podcast: Momenta Edge Episode: #49 Control Systems Cybersecurity: A Grim Gap - A Conversation with Joe Weiss Pub date: 2019-03-06 Joe Weiss works as the Managing Partner of Applied Control Solutions and Managing Director of the ISA99 standards organization. He has a deep background in control systems security, and has been active in the cyber security community around control systems for decades. Control systems are everywhere in every type of power generation, substation, pipeline, manufac...

ICS Penetration Testing with Jonathan Pollet

March 17, 2019 00:58 - 38 minutes

Podcast: The Industrial Security Podcast (LS 32 · TOP 5% what is this?) Episode: ICS Penetration Testing with Jonathan Pollet Pub date: 2019-02-28 Jonathan Pollet, CEO of Red Tiger Security, walks us through how his crew does control system penetration testing, often with live, running systems as a target, with examples of findings and how customers use those findings. The podcast and artwork embedded on this page are from Ran Levi, which is the property of its owner and not affiliated wit...

An Interview With Robert Graham

March 17, 2019 00:58 - 41 minutes

Podcast: Unsolicited Response Podcast (LS 30 · TOP 10% what is this?) Episode: An Interview With Robert Graham Pub date: 2019-02-28 I interviewed Robert Graham on the S4x19 Main Stage. Robert has an illustrious career in cyber security products including the creator of BlackIce and the first network IPS. We brought him to the S4 Stage for his contrarian views. Some of the topics we discussed in the podcast: The downside to IoT regulation and virtue signaling Likely threat agents, broad...

Weapon System Software Sustainment

March 17, 2019 00:58 - 6 minutes

Podcast: Government Accountability Office (GAO) Podcast: Watchdog Report (LS 41 · TOP 2% what is this?) Episode: Weapon System Software Sustainment Pub date: 2019-02-25 What happens when the software in DOD's weapons systems needs to be updated or maintained? Hear about it in this podcast. The podcast and artwork embedded on this page are from Government Accountability Office, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Board-Level Security Governance – Paul Feldman

March 17, 2019 00:58 - 32 minutes

Podcast: The Industrial Security Podcast (LS 32 · TOP 5% what is this?) Episode: Board-Level Security Governance – Paul Feldman Pub date: 2019-02-14 Paul Feldman joins us to explore cybersecurity governance topics for boards of directors in the North American electric sector. Paul is a former director of WECC and MISO, among many other roles. He talks to us about what are the responsibilities of boards of directors for cybersecurity and what kinds of cybersecurity discussions he sees taking...

Is The Purdue Model Dead?

March 17, 2019 00:58 - 34 minutes

Podcast: Unsolicited Response Podcast (LS 30 · TOP 10% what is this?) Episode: Is The Purdue Model Dead? Pub date: 2019-02-12 This episode of the Unsolicited Response Podcast features a discussion on the S4x19 Main Stage with Brad Hegrat, Joel Langill and Dale Peterson. The question: Is the Purdue Model Dead? The three coalesced around an answer (unexpected). And it's not dead, but also not terribly useful going forward in helping with OT network architecture. Have a listen, maybe you wil...

Säkerhetspodcasten #144 - CS3 Stockholm 2018 #1

March 17, 2019 00:58 - 53 minutes

Podcast: Säkerhetspodcasten (LS 38 · TOP 3% what is this?) Episode: Säkerhetspodcasten #144 - CS3 Stockholm 2018 #1 Pub date: 2019-02-11 I dagens avsnitt låter vi vår flygande reporter Robin von Post ta över rodret för att göra intervjuer under CS3 i Stockholm 2018. Intervjuer med Ervin Kooi, Rick van Hees, Ben Miller och Erik Hjelmvik. The podcast and artwork embedded on this page are from Säkerhetspodcastpanelen, which is the property of its owner and not affiliated with or endorsed by ...

4 Takeaways from 2018 ... And Kicking Off 2019 With My S4x19 Mini Keynote

March 17, 2019 00:58 - 25 minutes

Podcast: Unsolicited Response Podcast (LS 29 · TOP 10% what is this?) Episode: 4 Takeaways from 2018 ... And Kicking Off 2019 With My S4x19 Mini Keynote Pub date: 2019-01-29 The first Unsolicited Response episode of 2019 is a shorter solo-sode. It begins with my four major takeaways from 2018 Finally figuring out the OT / IT issue Consequence based risk reduction Detection market acceleration and shake out The ICS bane called Cyber Hygiene And then at 10:20 in the podcast I've inclu...

Episode 60: Cyber Vulnerability and Risk Quantification with Clint Bodungen

March 17, 2019 00:58 - 37 minutes

Podcast: Pipeliners Podcast (LS 36 · TOP 3% what is this?) Episode: Episode 60: Cyber Vulnerability and Risk Quantification with Clint Bodungen Pub date: 2019-01-29 In this week’s Pipeliners Podcast episode, Russel Treat welcomes back cybersecurity expert Clint Bodungen to discuss the latest developments in cybersecurity, specifically cyber vulnerabilities and quantifying risk. You will learn about the CVSS scoring system that Clint’s team is building upon to create the IVSS system for com...

Ep 30: Shamoon

March 17, 2019 00:58 - 37 minutes

Podcast: Darknet Diaries (LS 72 · TOP 0.05% what is this?) Episode: Ep 30: Shamoon Pub date: 2019-01-22 In 2012, Saudi Aramco was hit with the most destructive virus ever. Thousands and thousands of computers were destroyed. Herculean efforts were made to restore them to operational status again. But who would do such an attack? Very special thanks goes to Chris Kubecka for sharing her story. She is author of the book Down the Rabbit Hole An OSINT Journey, and Hack The World With OSINT (...

Behold! An ICS security bonanza!

March 17, 2019 00:58 - 49 minutes

Podcast: Securiosity Episode: Behold! An ICS security bonanza! Pub date: 2019-01-18 The S4 Conference was full of news. Buildings, cranes, Fortnite, they are all hackable! Believe it! In our interview: we talk to Nate Lesser, CEO and co-founder of Cypient Black. Our random question is SUPER random this week. Enjoy! The podcast and artwork embedded on this page are from Scoop News Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Ep 29: Stuxnet

March 17, 2019 00:58 - 43 minutes

Podcast: Darknet Diaries (LS 72 · TOP 0.05% what is this?) Episode: Ep 29: Stuxnet Pub date: 2019-01-08 Stuxnet was the most sophisticated virus ever discovered. It's target was a nuclear enrichment facility in Iran. This virus was successfully able to destroy numerous centrifuges. Hear who did it and why. Special thanks to Kim Zetter for joining us this episode. You can find more about Stuxnet from her book Count Down to Zero Day.  The podcast and artwork embedded on this page are from J...

TSA's Pipeline Security Program

March 17, 2019 00:58 - 5 minutes

Podcast: Government Accountability Office (GAO) Podcast: Watchdog Report (LS 40 · TOP 2.5% what is this?) Episode: TSA's Pipeline Security Program Pub date: 2018-12-19 In addition to airline security, the Transportation Security Administration is also responsible for securing the nation's nearly 3-million-mile pipeline system carrying oil, natural gas, and other resources. This episode of the watchdog report explores this TSA function. The podcast and artwork embedded on this page are from...

Protecting the Electric Grid

March 17, 2019 00:58 - 5 minutes

Podcast: Government Accountability Office (GAO) Podcast: Watchdog Report (LS 40 · TOP 2.5% what is this?) Episode: Protecting the Electric Grid Pub date: 2018-12-19 GAO reports on the risk to our electric grid from geomagnetic disturbances coming from outer space. The podcast and artwork embedded on this page are from Government Accountability Office, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Neighborhood Keeper

March 17, 2019 00:58 - 1 hour

Podcast: Unsolicited Response Podcast (LS 29 · TOP 10% what is this?) Episode: Neighborhood Keeper Pub date: 2018-11-08 In this Unsolicited Response episode I interview Rob Lee of Dragos and Rob Smith of INL on a Department of Energy funded program called Neighborhood Keeper. The program attempts to provide threat detection and intelligence in an easy and affordable way to small and medium sized asset owners. Originally these are in the Energy sector, given the funding source. While Drago...

OSIsoft and the EPRI Methodology with Harry Paul

March 17, 2019 00:58 - 36 minutes

Podcast: The Industrial Security Podcast (LS 31 · TOP 10% what is this?) Episode: OSIsoft and the EPRI Methodology with Harry Paul Pub date: 2018-11-05 Harry Paul's product is, well, complicated. His company produces what are called “data sheets”, addressing threat assessment and vulnerability mitigation for industrial cyber systems...and that's just about the simplest, most basic part of it. Andrew's got a big task in today's show—to take on some of the very highest-concept work going on i...

IIoT Security with Sven Schrecker

March 17, 2019 00:58 - 52 minutes

Podcast: The Industrial Security Podcast (LS 31 · TOP 10% what is this?) Episode: IIoT Security with Sven Schrecker Pub date: 2018-10-31 Sven Shrecker is not just an expert in the internet of things—he's a well-versed, experienced public speaker. A Chief Architect at IBM, Sven is not only at the cutting-edge of IoT security, but someone who can magically make the work he does sound both engaging and understandable to just about anyone. In this pilot episode of The Industrial Security Podcas...

Trolling the trolls. Triton/Trisis attributed to Russia. Asset management in ICS. Threat intelligence drives threat evolution. Shadow web-apps. Apple likes GDPR, hates the Data-Industrial Complex.

March 17, 2019 00:58 - 22 minutes

Podcast: The CyberWire Daily (LS 59 · TOP 0.5% what is this?) Episode: Trolling the trolls. Triton/Trisis attributed to Russia. Asset management in ICS. Threat intelligence drives threat evolution. Shadow web-apps. Apple likes GDPR, hates the Data-Industrial Complex. Pub date: 2018-10-24 In today's podcast, we hear that US Cyber Command has been reaching out to tell the trolls Uncle Sam cares. Industrial control system security suffers from poor asset management practices. FireEye looks at ...

Flawed ICS Mantras

March 17, 2019 00:58 - 21 minutes

Podcast: Unsolicited Response Podcast (LS 29 · TOP 10% what is this?) Episode: Flawed ICS Mantras Pub date: 2018-10-18 I’m trying something a bit different in this short 22 minute episode. I rant about two flawed ICS mantras that are gaining traction and detract from useful discussions, and there is an overview of the S4x19 agenda and OnRamp training. 1:47 Mantra: “If you are in critical infrastructure, you will be targeted. If you are targeted, you will be compromised”. Andy Bochman and ...

Episode 45: IT/OT Convergence and Risk Management with Clint Bodungen

March 17, 2019 00:58 - 34 minutes

Podcast: Pipeliners Podcast (LS 36 · TOP 3% what is this?) Episode: Episode 45: IT/OT Convergence and Risk Management with Clint Bodungen Pub date: 2018-10-16 In this week’s Pipeliners Podcast episode, Russel Treat welcomes back cybersecurity expert Clint Bodungen to discuss the importance of IT & OT convergence to support risk management in pipeline operations. Listen to this episode to learn about how technology is enabling IT and OT to bridge gaps to manage risk, the differences between...

How to look for hardware hacks

March 17, 2019 00:58 - 56 minutes

Podcast: Securiosity Episode: How to look for hardware hacks Pub date: 2018-10-12 Greg and Jen continue to discuss the big Bloomberg story that's causing so much grief. In our interview, we talk to PFP founder Stephen Chen on how helps companies uncover hacks like the plausible one discussed in the Bloomberg story. Don't forget: DC Cyber Week is next week! The podcast and artwork embedded on this page are from Scoop News Group, which is the property of its owner and not affiliated with or ...

Ralph Langner on the ICS Security Product Market

March 17, 2019 00:58 - 1 hour

Podcast: Unsolicited Response Podcast (LS 29 · TOP 10% what is this?) Episode: Ralph Langner on the ICS Security Product Market Pub date: 2018-09-27 In this episode I speak with Ralph Langner of Langner Communications about the ICS Product Security Market. Ralph is famous for his work on Stuxnet, and he has done a lot of great work before and after Stuxnet. For the last two years he has set aside his decades of being in the ICS Security Consulting business and focused on developing the prod...

Blake Sobczak on Electric Sector Cybersecurity

March 17, 2019 00:58 - 52 minutes

Podcast: Unsolicited Response Podcast (LS 29 · TOP 10% what is this?) Episode: Blake Sobczak on Electric Sector Cybersecurity Pub date: 2018-09-13 Blake Sobczak, a reporter for Energy & Environment News, has been on fire lately with his coverage of electric sector cybersecurity. It seems like I'm consistently retweeting his stories and putting them into my Friday News & Notes email (are you subscribed?). So I brought him on the podcast to talk about it. To me the most interesting discussi...

ICS - Enterprise Security Weekly #102

March 17, 2019 00:58 - 19 minutes

Podcast: Enterprise Security Weekly (Video) Episode: ICS - Enterprise Security Weekly #102 Pub date: 2018-08-17 Paul and Matt review the ICS security landscape, discussing the problems and potential solutions to secure critical infrastructure. We used several on-site interviews and briefings with solutions providers at Blackhat as a basis for this segment. Recorded live at the Security Weekly pool cabana in Las Vegas! Visit http://securityweekly.com/esw for all the latest episodes! The ...

Books

Twitter Mentions

@idefend_ics 31 Episodes
@protectitall 9 Episodes
@houseccon 5 Episodes
@robertmlee 5 Episodes
@eduardohonorato 5 Episodes
@brysonbort 4 Episodes
@joe_carson 4 Episodes
@cybraryit 4 Episodes
@thycotic 4 Episodes
@secarmyofficial 3 Episodes
@securityweekly 3 Episodes
@ics_village 3 Episodes
@marmusha 2 Episodes
@thejournal_rok 2 Episodes
@electricfork 2 Episodes
@secureaerospace 2 Episodes
@kimzetter 2 Episodes
@tom_vannorman 2 Episodes
@three_cube 2 Episodes
@peterwsinger 2 Episodes