The PrOTect OT Cybersecurity Podcast

By Aaron Crow

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Aaron Crow

Category: Management

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 9
Reviews: 0
Episodes: 47

Description

Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries.

The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology Officer at Industrial Defender, and the OT security community as they explore the latest developments and challenges unique to protecting operational environments

Whether you want to learn the best practices and strategies for protecting power plants, water treatment facilities, food and beverage plants or automotive factories, this podcast is for you.


Episode Date
Todd Beebe: Beyond IT vs. OT, The Common Ground for Securing Any Environment
Dec 28, 2023
Ron Fabela: Secure Access That Makes Sense for Operations
Dec 21, 2023
Dan Gunter: Lessons Learned from Real-World Attack on Ukraine’s Critical Infrastructure
Dec 14, 2023
Thomas VanNorman: ICS Security Takes a Village - Building an OT Security Community
Dec 07, 2023
Don C. Weber: The Gray Area Between OT and IT
Nov 30, 2023
Ron Brash: Understanding the Small Details to Define Risk
Nov 23, 2023
Michael Holcomb: The Journey from IT to OT and Strengthening IT-OT Partnership
Nov 16, 2023
Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk
Nov 09, 2023
John Cusimano: Leveraging ISA/IEC 62443 to Quantify OT Risk
Nov 02, 2023
Eric Smith: The Importance of Physical Security in Protecting Infrastructure
Oct 26, 2023
Nick Tsamis: Leveraging MITRE’s Adversary Emulation Platform in OT
Oct 19, 2023
Chris Bihary: Tapping Into Packet Level Data in OT
Oct 12, 2023
Raphael Arakelian: Beyond the Tools - Maturing Implementation to Reduce Risk
Oct 05, 2023
Jonathan Tubb: Unlocking Business Value at the Intersection of IT, OT, Operations, and Cybersecurity
Sep 28, 2023
Josh Varghese: Holistic, Scalable OT Network Design
Sep 21, 2023
Fred Gordy: Protecting the Safety and Resilience of the Buildings We Live and Work In
Sep 14, 2023
Matthew Scott: Protecting Legacy OT in Mass Transit
Sep 07, 2023
Clint Bodungen: Cybersecurity Simulation As A Video Game, With AI Adversaries
Aug 31, 2023
Ian Frist: Beyond Buzzwords, Building Effective Programs in OT Security
Aug 24, 2023
Michael Weigand: From Planes to Power Plants, Protecting The Intersection of Physical and Digital
Aug 17, 2023
Daniel Bardenstein: Transparency and Trust With SBOM
Aug 10, 2023
Terence Gill & Roger Simmons: Bringing Texas Utilities Together to Strengthen The Grid Through Collaboration
Jul 27, 2023
Mollie Breen: Accelerating OT Security, Reliability and Efficiency
Jul 20, 2023
Pete Mauro: Designing System Security Before ‘Cyber’ Became Part of Everyday Vocabulary
Jul 06, 2023
Danielle Jablanski: Navigating the Multitude of OT Technologies Considering Interoperability, Reliability, and Centralization
Jun 08, 2023
Joy Ditto: The Evolution of Utility Cybersecurity with NERC CIP
Jun 01, 2023
Michael Welch: Tying Resilience, Availability, Compliance and Cybersecurity Together Into a GRC Program
May 25, 2023
Matt Wyckhouse: Behind the Cyber Shield: OT Security and the Importance of SBOM
May 18, 2023
Eric Olden: Managing Identity, Security, and Resiliency in Multi-Cloud Environments
May 11, 2023
Phoenix: OT Security for Smaller Plants and Factories
Apr 20, 2023
Roya Gordon: Secure Connections - Why Human Interaction is Key to OT Security
Apr 13, 2023
Duane Laflotte: Simulating Real-World Attacks on OT with Red Teaming
Apr 06, 2023
Bryson Bort: Security Is Defined By The Threat - Contextualizing Cyber Risks To Prioritize Security Efforts
Mar 30, 2023
Emilio Salabarria: Building Organizational Resilience through Comprehensive Cybersecurity Assessments for Cyber Florida
Mar 23, 2023
Dan Gunter: How Our Growing Ability To Process Data Affects Cybersecurity
Mar 16, 2023
Slade Griffin: Securing the Industrial World - Challenges and Strategies for Cybersecurity Assessments
Mar 09, 2023
Kurt Sanger: Safeguarding Cyberspace - A Legal Perspective on Cybersecurity Challenges and Information Sharing
Mar 02, 2023
Tony Sager: Practicality Over Perfection and Simplifying Security Standards
Feb 23, 2023
Admiral TJ White: Keeping People Safe Is The Heart Of Cybersecurity
Feb 16, 2023
Debbie Gordon: Practicing Cybersafety Through Simulated Environments
Feb 09, 2023
Patrick Miller: Discussing the New INSM Requirements for NERC-CIP
Feb 06, 2023
Sean Plankey: Protecting Critical Systems Within the IT/OT Convergence
Feb 02, 2023
Lucian Niemeyer: Making Cyber Safety A Part Of Culture
Jan 26, 2023
Roundtable Discussion with Jay Williams, Alex Bagwell, and Gabe Authier
Jan 19, 2023
Greg Valentine: You’re Compliant. Now Prove it.
Jan 12, 2023
Dennis Murphy: The Challenges With IT and OT Convergence
Jan 05, 2023
Welcome Episode
Dec 29, 2022