Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries.
The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology Officer at Industrial Defender, and the OT security community as they explore the latest developments and challenges unique to protecting operational environments
Whether you want to learn the best practices and strategies for protecting power plants, water treatment facilities, food and beverage plants or automotive factories, this podcast is for you.
Episode | Date |
---|---|
Todd Beebe: Beyond IT vs. OT, The Common Ground for Securing Any Environment
|
Dec 28, 2023 |
Ron Fabela: Secure Access That Makes Sense for Operations
|
Dec 21, 2023 |
Dan Gunter: Lessons Learned from Real-World Attack on Ukraine’s Critical Infrastructure
|
Dec 14, 2023 |
Thomas VanNorman: ICS Security Takes a Village - Building an OT Security Community
|
Dec 07, 2023 |
Don C. Weber: The Gray Area Between OT and IT
|
Nov 30, 2023 |
Ron Brash: Understanding the Small Details to Define Risk
|
Nov 23, 2023 |
Michael Holcomb: The Journey from IT to OT and Strengthening IT-OT Partnership
|
Nov 16, 2023 |
Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk
|
Nov 09, 2023 |
John Cusimano: Leveraging ISA/IEC 62443 to Quantify OT Risk
|
Nov 02, 2023 |
Eric Smith: The Importance of Physical Security in Protecting Infrastructure
|
Oct 26, 2023 |
Nick Tsamis: Leveraging MITRE’s Adversary Emulation Platform in OT
|
Oct 19, 2023 |
Chris Bihary: Tapping Into Packet Level Data in OT
|
Oct 12, 2023 |
Raphael Arakelian: Beyond the Tools - Maturing Implementation to Reduce Risk
|
Oct 05, 2023 |
Jonathan Tubb: Unlocking Business Value at the Intersection of IT, OT, Operations, and Cybersecurity
|
Sep 28, 2023 |
Josh Varghese: Holistic, Scalable OT Network Design
|
Sep 21, 2023 |
Fred Gordy: Protecting the Safety and Resilience of the Buildings We Live and Work In
|
Sep 14, 2023 |
Matthew Scott: Protecting Legacy OT in Mass Transit
|
Sep 07, 2023 |
Clint Bodungen: Cybersecurity Simulation As A Video Game, With AI Adversaries
|
Aug 31, 2023 |
Ian Frist: Beyond Buzzwords, Building Effective Programs in OT Security
|
Aug 24, 2023 |
Michael Weigand: From Planes to Power Plants, Protecting The Intersection of Physical and Digital
|
Aug 17, 2023 |
Daniel Bardenstein: Transparency and Trust With SBOM
|
Aug 10, 2023 |
Terence Gill & Roger Simmons: Bringing Texas Utilities Together to Strengthen The Grid Through Collaboration
|
Jul 27, 2023 |
Mollie Breen: Accelerating OT Security, Reliability and Efficiency
|
Jul 20, 2023 |
Pete Mauro: Designing System Security Before ‘Cyber’ Became Part of Everyday Vocabulary
|
Jul 06, 2023 |
Danielle Jablanski: Navigating the Multitude of OT Technologies Considering Interoperability, Reliability, and Centralization
|
Jun 08, 2023 |
Joy Ditto: The Evolution of Utility Cybersecurity with NERC CIP
|
Jun 01, 2023 |
Michael Welch: Tying Resilience, Availability, Compliance and Cybersecurity Together Into a GRC Program
|
May 25, 2023 |
Matt Wyckhouse: Behind the Cyber Shield: OT Security and the Importance of SBOM
|
May 18, 2023 |
Eric Olden: Managing Identity, Security, and Resiliency in Multi-Cloud Environments
|
May 11, 2023 |
Phoenix: OT Security for Smaller Plants and Factories
|
Apr 20, 2023 |
Roya Gordon: Secure Connections - Why Human Interaction is Key to OT Security
|
Apr 13, 2023 |
Duane Laflotte: Simulating Real-World Attacks on OT with Red Teaming
|
Apr 06, 2023 |
Bryson Bort: Security Is Defined By The Threat - Contextualizing Cyber Risks To Prioritize Security Efforts
|
Mar 30, 2023 |
Emilio Salabarria: Building Organizational Resilience through Comprehensive Cybersecurity Assessments for Cyber Florida
|
Mar 23, 2023 |
Dan Gunter: How Our Growing Ability To Process Data Affects Cybersecurity
|
Mar 16, 2023 |
Slade Griffin: Securing the Industrial World - Challenges and Strategies for Cybersecurity Assessments
|
Mar 09, 2023 |
Kurt Sanger: Safeguarding Cyberspace - A Legal Perspective on Cybersecurity Challenges and Information Sharing
|
Mar 02, 2023 |
Tony Sager: Practicality Over Perfection and Simplifying Security Standards
|
Feb 23, 2023 |
Admiral TJ White: Keeping People Safe Is The Heart Of Cybersecurity
|
Feb 16, 2023 |
Debbie Gordon: Practicing Cybersafety Through Simulated Environments
|
Feb 09, 2023 |
Patrick Miller: Discussing the New INSM Requirements for NERC-CIP
|
Feb 06, 2023 |
Sean Plankey: Protecting Critical Systems Within the IT/OT Convergence
|
Feb 02, 2023 |
Lucian Niemeyer: Making Cyber Safety A Part Of Culture
|
Jan 26, 2023 |
Roundtable Discussion with Jay Williams, Alex Bagwell, and Gabe Authier
|
Jan 19, 2023 |
Greg Valentine: You’re Compliant. Now Prove it.
|
Jan 12, 2023 |
Dennis Murphy: The Challenges With IT and OT Convergence
|
Jan 05, 2023 |
Welcome Episode
|
Dec 29, 2022 |