Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
AI Agents & Cybersecurity: Identity, Compliance, and the New Risks Facing IT and OT
|
May 11, 2026 |
|
From NFL to OT Cybersecurity Why Trust and Teamwork Matter More Than Tools | Aaron Crow
|
May 04, 2026 |
|
Cyber Risk in Construction: Securing AEC Projects in a Digital, AI-Driven World
|
Apr 27, 2026 |
|
Breaking Into OT Cybersecurity: Closing the Skills Gap and Protecting Critical Infrastructure
|
Apr 20, 2026 |
|
OT Risk Management That Works: Asset Visibility, Risk Quantification & CISO-Level Strategy
|
Apr 13, 2026 |
|
100 Episodes of Protect It All: Aaron Crow’s Journey Through IT, OT & Cybersecurity
|
Apr 06, 2026 |
|
OT Cybersecurity That Works: Budgets, Soft Skills & AI Reality for Stronger Defense
|
Mar 30, 2026 |
|
The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter
|
Mar 23, 2026 |
|
OT Under Siege: How to Defend Critical Infrastructure From Nation-State Cyber Threats
|
Mar 16, 2026 |
|
Poland’s Power Grid Cyberattack What It Teaches Us About OT Security and Renewable Energy Risks
|
Mar 09, 2026 |
|
Safe AI Automation for Cybersecurity: Practical Workflows Without the Risk
|
Mar 02, 2026 |
|
Compliance Isn’t Security: NERC CIP 15 and the Real Gaps in OT Network Monitoring
|
Feb 23, 2026 |
|
OT Cybersecurity That Works: Tabletop Exercises, Critical Controls & Building Trust
|
Feb 16, 2026 |
|
Pen Testing Reality Check: Why Cybersecurity Fundamentals Still Matter More Than AI
|
Feb 09, 2026 |
|
OT Remote Access After COVID: Why IT Tools Fail and What Critical Infrastructure Needs Now
|
Feb 02, 2026 |
|
Securing Remote Access in OT: Visibility, Segmentation, and What Compliance Misses
|
Jan 19, 2026 |
|
Small Business Cybersecurity: Practical Steps to Survive Big Threats on a Small Budget
|
Jan 12, 2026 |
|
Cybersecurity Success in 2026: Why Planning Early and Investing in People Wins
|
Jan 05, 2026 |
|
AI Isn’t the Answer: Why Cybersecurity Fundamentals Still Decide OT and IT Success
|
Dec 29, 2025 |
|
Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get Right
|
Dec 22, 2025 |
|
AI, Governance & Cybersecurity Culture: Why People and Process Still Matter Most
|
Dec 15, 2025 |
|
AI, Human Behavior & Cybersecurity’s Future: Cutting Complexity and Strengthening Defense
|
Dec 08, 2025 |
|
Inside Cyber Incident Response: Military Lessons, OT Challenges & the Power of Blameless Culture
|
Dec 01, 2025 |
|
The Future of Cybersecurity Careers: Human Skills, AI Disruption & How to Stand Out Now
|
Nov 24, 2025 |
|
Data Diodes & Remote Access: How Industrial Systems Stay Secure in a Connected World
|
Nov 17, 2025 |
|
AI, Music, and Cybersecurity Collide: How Innovation Is Redefining Creativity and Risk
|
Nov 10, 2025 |
|
Open Source Intelligence Exposed: How Hackers Use Public Data to Target People, Passwords, and Critical Systems
|
Nov 04, 2025 |
|
Old Windows, New Risks: How End-of-Life Systems Threaten OT Security and What You Can Do
|
Oct 27, 2025 |
|
OT Cybersecurity Wake-Up Call: How Airports and Power Grids Expose the Gaps We Can’t Ignore
|
Oct 20, 2025 |
|
Why “One Size Fits All” Fails in OT Cybersecurity: Real-World Fixes for IT–OT Gaps
|
Oct 06, 2025 |
|
How to Protect Kids in a Digital World: Online Safety, AI Dangers, and Parental Guidance
|
Sep 22, 2025 |
|
Bridging Military and Civilian Cybersecurity: Leadership, Skills, and Lifelong Learning with Christopher Ross
|
Sep 15, 2025 |
|
AI, Quantum, and Cybersecurity: Protecting Critical Infrastructure in a Digital World
|
Sep 08, 2025 |
|
Bridging IT and OT Cybersecurity: Lessons from the Field with Patrick Gillespie
|
Sep 01, 2025 |
|
Lessons From 34 Years in OT Cybersecurity: Growth, Challenges, and Leading Change with Scott Rosenberger
|
Aug 25, 2025 |
|
Reflections from Black Hat and DEFCON: Trends, Community Energy, and the Future of OT Cybersecurity
|
Aug 11, 2025 |
|
How to Maximize the ROI at Cybersecurity Conferences
|
Aug 04, 2025 |
|
Lessons Learned in OT Security: Regulation, Collaboration, and the Rise of AI Threats with Kam Chumley-Soltani
|
Jul 28, 2025 |
|
The Double-Edged Sword of AI in Cybersecurity and Critical Infrastructure
|
Jul 22, 2025 |
|
Powering the Future: The Overlooked Cyber Risks in Our Expanding Electric Grid
|
Jul 14, 2025 |
|
How AI Became the Ultimate Cybersecurity Blind Spot: Understanding the Microsoft 365 Copilot Vulnerability
|
Jul 07, 2025 |
|
How to Harness AI Without Breaking Security or Corporate Policies
|
Jun 30, 2025 |
|
Driving OT Security Innovation: AI, Risk Reduction, and the Future of Critical Infrastructure
|
Jun 23, 2025 |
|
Inside OT Penetration Testing: Red Teaming, Risks, and Real-World Lessons for Critical Infrastructure with Justin Searle
|
Jun 16, 2025 |
|
From Y2K to 2038: Uncovering Time Bombs in OT and ICS Systems with Pedro Umbelino
|
Jun 09, 2025 |
|
Building Trust and Bridging the Gap in OT and IT Cybersecurity
|
Jun 02, 2025 |
|
From Plant Operator to OT Security: Stories of Failures and Breakthroughs
|
May 26, 2025 |
|
Why Cybersecurity Is More Than Just Technology and Tools with Paul Marco
|
May 19, 2025 |
|
Building Trust in OT Cybersecurity: Patching, Communication, and Personal Branding for Success
|
May 12, 2025 |
|
Beyond Compliance Cybersecurity Insights With Blake Hoge and Aaron Crow
|
May 05, 2025 |
|
How AI is Transforming the SOC: Automation, Challenges, and the Future of Cybersecurity with Amy Tom
|
Apr 28, 2025 |
|
Simplifying OT Cybersecurity: Tools and Strategies for Non-Experts in Critical Infrastructure with Steve Kiss
|
Apr 21, 2025 |
|
Navigating Cybersecurity Challenges in State Agencies with Joshua Kuntz
|
Apr 14, 2025 |
|
A Year in Cyber Podcasting: Building Trust and Community in Cybersecurity
|
Apr 07, 2025 |
|
Chemistry to Cybersecurity: Oakley Cox's Unique Journey
|
Mar 31, 2025 |
|
Safeguarding Operations: The Role of Cybersecurity in IT and OT Environments
|
Mar 24, 2025 |
|
The Intersection of IT and OT: Highlights from S4 Conference with Jori VanAntwerp
|
Mar 17, 2025 |
|
Rethinking IT and OT - Lessons from Colonial Pipeline and Other Cyber Incidents
|
Mar 10, 2025 |
|
The Intersection of AI, OT, and Cybersecurity with Sulaiman Alhasawi
|
Mar 03, 2025 |
|
Encryption Dilemmas: When Government Access May Threaten Individual Security
|
Feb 24, 2025 |
|
From Navy to Consulting - Dan Ricci's Unique Perspective on Bridging Security Gaps
|
Feb 10, 2025 |
|
Bridging the Gap: IT vs. OT Challenges and Solutions in Cybersecurity with Chris Robertson
|
Feb 03, 2025 |
|
Bridging IT and OT: Exploring Machine Identity and MFA in Cybersecurity with Anusha Iyer
|
Jan 27, 2025 |
|
Troubleshooting OT Environments with Next-Gen Firewalls with Adam Robbie
|
Jan 23, 2025 |
|
Understanding Cybersecurity Challenges in Industrial Settings with Lesley Carhart
|
Jan 13, 2025 |
|
Why Small Events Like Staccato Ranch Outshine Big Conferences in Cybersecurity
|
Jan 10, 2025 |
|
Key Conferences and Networking Opportunities for Cybersecurity Professionals in 2025
|
Jan 06, 2025 |
|
How to Protect Yourself and Loved Ones from Cyber Scams
|
Dec 30, 2024 |
|
Episode 37 - Protecting Critical Infrastructure: A Roundtable on Industrial Cybersecurity Strategies
|
Dec 23, 2024 |
|
Exclusive Cybersecurity Event at STACCATO RANCH: Where Networking Meets Adventure
|
Dec 16, 2024 |
|
Understanding Cybersecurity Risks and Management: Insights from Harry Thomas
|
Dec 09, 2024 |
|
ICS/OT Cybersecurity: Events, Networking, and Industry Discussions with Mike Holcomb
|
Dec 02, 2024 |
|
The Future of Automation and AI in Operational Technology with Shane Cox
|
Nov 25, 2024 |
|
Enhancing OT Cybersecurity: From Legacy Systems to Cloud Solutions with Paul Shaver
|
Nov 18, 2024 |
|
Essential Cybersecurity Strategies for Small and Medium-Sized Enterprises
|
Nov 11, 2024 |
|
Navigating Cybersecurity Challenges: AI, Tabletop Exercises, and Operational Technology
|
Nov 04, 2024 |
|
Bridging IT and OT in Cybersecurity for Power Plants with Jori VanAntwerp
|
Oct 28, 2024 |
|
Elevating Cybersecurity: Importance of Relationships, Mentorship, and Honest Feedback with Ken Foster
|
Oct 21, 2024 |
|
Practical Cyber Hygiene Tips for Families and Individuals During Cybersecurity Awareness Month
|
Oct 14, 2024 |
|
Building Resilient Tech Environments: Lessons from Dennis Maldonado
|
Oct 07, 2024 |
|
Funding OT Cybersecurity: Priority Setting and Practical Approaches
|
Sep 23, 2024 |
|
Evolution of Maritime Safety: From Analog Beginnings to Digital Redundancies
|
Sep 16, 2024 |
|
Why Cybersecurity Matters: Protecting Our Food Supply from Digital Threats with Kristin Demoranville
|
Aug 26, 2024 |
|
Tackling Tech Troubles: Inside the DFW Airport Cyber Incident and Wider Industry Challenges with Evan Morgan
|
Aug 19, 2024 |
|
Cybersecurity in Critical Industries: Lessons from Medical Devices to Automotive
|
Aug 12, 2024 |
|
The Intersection of Cybersecurity and Personal Development: A Deep Dive with Aaron Crow and Neal Conlon at the Lone Star Cyber Shootout
|
Aug 05, 2024 |
|
Lessons from CrowdStrike: Managing Risks in IT and OT Environments
|
Jul 29, 2024 |
|
From Concept to Reality: ResetCon and the Future of ICS Security Conferences
|
Jul 24, 2024 |
|
Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew Ginter
|
Jul 22, 2024 |
|
Understanding IT OT Convergence: Dealing with Challenges and Building Trust
|
Jul 15, 2024 |
|
Navigating Cybersecurity in OT: Challenges, Tools, and AI Integration with Joseph Perry
|
Jul 08, 2024 |
|
Episode 14 - Practical Approaches to OT Cybersecurity in Critical Infrastructure
|
Jul 01, 2024 |
|
Unlocking the Future: Hands-On Learning and AI's Role in Cybersecurity Education with Philip Huff
|
Jun 24, 2024 |
|
Exploring the Impact of AI and 5G on Future Technologies with Dr. Anmol Agarwal
|
Jun 17, 2024 |
|
Cybersecurity and Safety Risks of Modern Vehicles: Understanding Vulnerabilities and Solutions with Kevin Walter
|
Jun 10, 2024 |
|
Tools and Techniques for Better Network Visibility and Vulnerability Management with Kylie McClanahan
|
Jun 03, 2024 |
|
From Basics to Quantum: A Comprehensive Dive into Cybersecurity Trends
|
Apr 19, 2024 |
|
Securing Our Future: The Cyber Challenge in Aging Infrastructure
|
Apr 04, 2024 |
|
Securing OT: Strategies for Prioritizing Vulnerabilities
|
Mar 14, 2024 |
|
The Future of AI: Determinism, Security, and Beyond
|
Mar 05, 2024 |
|
Navigating Cybersecurity Challenges: A Conversation with Ted Gutierrez on Bridging OT and IT
|
Feb 27, 2024 |
|
Harnessing AI in Cybersecurity: Revolutionizing OT Protection
|
Feb 20, 2024 |
|
Exploring the OT Landscape: Insights from Building Management with Kyle Peters
|
Feb 12, 2024 |
|
Bridging the Gap: OT Cybersecurity in the Evolving Landscape of Industry and Recruitment
|
Feb 05, 2024 |
|
Welcome to PrOTect IT All
|
Jan 23, 2024 |