Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
CE-Kennzeichen für Digitales: Wie der CRA die OT-Schieflage korrigiert | OT Security Made Simple
|
Apr 28, 2026 |
|
Ferrari ohne Führerschein? Die richtige Reihenfolge zur OT-Sicherheit für CEOs | OT Security Made Simple
|
Apr 14, 2026 |
|
Wenn Maschinen plötzlich Ausweise brauchen | OT Security Made Simple
|
Mar 31, 2026 |
|
The Hard Reality of Patch Management in OT Networks | OT Security Made Simple
|
Mar 17, 2026 |
|
NIS-2 kompakt: Was für Unternehmen zählt | OT Security Made Simple
|
Mar 03, 2026 |
|
Warum die Integration von Security Events in Leitwarten entscheidend ist | OT Security Made Simple
|
Feb 17, 2026 |
|
What’s going on with manufacturing OT security? | OT Security Made Simple
|
Feb 03, 2026 |
|
NIS2 mit gesundem Menschenverstand umsetzen | OT Security Made Simple
|
Jan 20, 2026 |
|
Die 3 grundlegenden Hausaufgaben beim Aufbau eines SzA | OT Security Made Simple
|
Jan 08, 2026 |
|
How the threat landscape for OT has changed since Colonial Pipeline | OT Security Made Simple
|
Dec 18, 2025 |
|
Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made Simple
|
Dec 04, 2025 |
|
Cybersicherheit in kommunalen Verwaltungen | OT Security Made Simple
|
Nov 18, 2025 |
|
Angriffserkennung in Umspannwerken nach dem BSI | OT Security Made Simple
|
Nov 06, 2025 |
|
Von der Angriffserkennung zum automatisierten Client Management in der OT | OT Security Made Simple
|
Oct 21, 2025 |
|
Threat Hunting in der OT | OT Security Made Simple
|
Oct 09, 2025 |
|
Wie können Hersteller proaktiv auf den CRA reagieren? | OT Security Made Simple
|
Sep 23, 2025 |
|
Wie geht Bosch Rexroth mit dem Cyber Resilience Act (CRA) um? | OT Security Made Simple
|
Sep 11, 2025 |
|
Wie steht es um die OT-Sicherheit in der Wasserwirtschaft? | OT Security Made Simple
|
Aug 26, 2025 |
|
Which low-hanging fruits to grab on the OT security journey | OT Security Made Simple
|
Aug 14, 2025 |
|
Bei der OT-Sicherheit ist der Staat in der Pflicht | OT Security Made Simple
|
Jul 29, 2025 |
|
Können Systeme zur Angriffserkennung zum Sicherheitsrisiko werden? | OT Security Made Simple
|
Jul 17, 2025 |
|
The Evolution of Procurement in OT Security | OT Security Made Simple
|
Jul 01, 2025 |
|
Wer ist für die Cybersicherheit der Windparks verantwortlich? | OT Security Made Simple
|
Jun 19, 2025 |
|
What do we need to deter insider threats? | OT Security Made Simple
|
Jun 03, 2025 |
|
How to build a SIEM SOC in OT? | OT Security Made Simple
|
May 22, 2025 |
|
How to implement Zero Trust in OT environments? | OT Security Made Simple
|
May 06, 2025 |
|
The State of Smart Grid Cybersecurity | OT Security Made Simple
|
Apr 24, 2025 |
|
Die Rolle des CISO in der OT | OT Security Made Simple
|
Apr 08, 2025 |
|
ISO 27001 für OT: Mehrwert oder Overhead? | OT Security Made Simple
|
Mar 27, 2025 |
|
Aus dem Tagebuch eines OT-Pentesters | OT Security Made Simple
|
Mar 11, 2025 |
|
How do you secure the smart grid infrastructure? | OT Security Made Simple
|
Feb 27, 2025 |
|
How to secure the smart metering infrastructure? | OT Security Made Simple
|
Feb 13, 2025 |
|
Looking at smart grid cybersecurity regulation under Trump | OT Security Made Simple
|
Jan 28, 2025 |
|
How to translate IT in OT security | OT Security Made Simple
|
Jan 16, 2025 |
|
Warum es sich lohnt, bei Use Cases über den Tellerrand zu schauen | OT Security Made Simple
|
Dec 12, 2024 |
|
Wer NIS2 aussitzt, spielt Russisches Roulette | OT Security Made Simple
|
Nov 28, 2024 |
|
Wie funktioniert OT-Sicherheit im Wassersektor | OT Security Made Simple
|
Nov 21, 2024 |
|
Warum sich für OT-Sicherheit vor allem die IT-Abteilung ändern muss | OT Security Made Simple
|
Oct 17, 2024 |
|
Wie OT-Monitoring TSN weitreichend ermöglicht und absichert | OT Security Made Simple
|
Oct 01, 2024 |
|
How programming language Rust makes for a more secure product code | OT Security Made Simple
|
Aug 15, 2024 |
|
Richtige Cybersicherheits-Invest-Entscheidungen brauchen zuerst eine OT-Security-Strategie | OT Security Made Simple
|
Jul 15, 2024 |
|
Warum spielen Unternehmen bei der OT-Sicherheit noch immer mit dem Feuer? | OT Security Made Simple
|
Jun 27, 2024 |
|
Why CISOs are becoming a the companies' supermen and superwomen | OT Security Made Simple
|
May 16, 2024 |
|
Hatte der Energiesektor bei Cyberangriffen bisher nur Glück? | OT Security Made Simple
|
Apr 25, 2024 |
|
Forensic analysis in OT - a case study | OT Security Made Simple
|
Apr 04, 2024 |
|
Wie entwickelt sich der OT-Markt (aus Investorensicht)? | OT Security Made Simple
|
Mar 20, 2024 |
|
What is Zero Trust really (and does it work in OT)? | OT Security Made Simple
|
Feb 19, 2024 |
|
Wer ist für Security by Design zuständig? (nicht wer du denkst) | OT Security Made Simple
|
Feb 08, 2024 |
|
The 4 types of OT monitoring and which to choose | OT Security Made Simple
|
Jan 23, 2024 |
|
OT-Sicherheit aus Sicht eines Pentesters | OT Security Made Simple
|
Jan 04, 2024 |
|
How to overcome the insecure-by-design challenge? | OT Security Made Simple
|
Dec 07, 2023 |
|
How to deal with the complexity of the OT security challenge? | OT Security Made Simple
|
Oct 26, 2023 |
|
End-to-end cybersecurity of the smart grid from the control system to the edge | OT Security Made Simple
|
Oct 05, 2023 |
|
Why OT Security needs to become a platform solution | OT Security Made Simple
|
Sep 14, 2023 |
|
The challenge and relevance of OT security services | OT Security Made Simple
|
Aug 17, 2023 |
|
Was die NIS 2 Direktive für Industrieunternehmen bedeutet | OT Security Made Simple
|
Jul 27, 2023 |
|
Lessons Learned from 10 Years OT Anomaly Detection | OT Security Made Simple
|
Jul 06, 2023 |