エピソード

  • Modern SCADA: ensuring safety, relevance and convenience
    2025/06/14
    Podcast: Control Amplified: The Process Automation Podcast (LS 25 · TOP 10% what is this?)
    Episode: Modern SCADA: ensuring safety, relevance and convenience
    Pub date: 2025-06-11

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    SCADA applications are responsible for far more than facilitating real-time process monitoring and alarm management. The process history they compile over time is critical to providing the data-driven insights that industry relies on when optimizing their systems to control costs, maximize uptime and increase the life of infrastructure. Modern SCADA systems must ensure data is safe, relevant and easily shareable with a company’s own team or third-party reporting solutions, business systems and artificial intelligence (AI) platforms.

    Control Amplified talked to Chris Little, media relations director, Trihedral Engineering, about straightforward principles to ensure that your SCADA data is ready to go to work.



    The podcast and artwork embedded on this page are from ControlGlobal, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    14 分
  • EP 64: Volt Typhoon
    2025/06/13
    Podcast: Error Code (LS 27 · TOP 10% what is this?)
    Episode: EP 64: Volt Typhoon
    Pub date: 2025-06-10

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    While cybersecurity threats targeting critical infrastructure, particularly focusing on the vulnerabilities of operational technology (OT) and industrial control systems (ICS).mostly originate on the business or IT side, there’s increasing concern about attacks crossing into OT, which could result in catastrophic consequences, especially in centralized systems like utilities. Michael Welch, managing director from MorganFranklin Cyber, discusses how Volt Typhoon and other attacks are living off the land, and lying in wait.



    The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    44 分
  • Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing World
    2025/06/13
    Podcast: KBKAST (LS 31 · TOP 5% what is this?)
    Episode: Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing World
    Pub date: 2025-06-11

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    In this episode, we sit down with Imran Husain, Chief Information Security Officer at MillerKnoll, as he discusses the evolving landscape of cybersecurity threats in the manufacturing sector. Imran explores the challenges that arise as manufacturing increasingly integrates with online technologies and IoT, highlighting the unique vulnerabilities posed by legacy systems and operational technology (OT). He shares insights on high-profile incidents like the Norsk Hydro ransomware attack, emphasizing the importance of cyber resilience, data backup, and incident recovery. Imran also offers a candid look at why critical tasks like backing up data are often neglected, the complexities of securing aging infrastructure, and the need for creative solutions such as network segmentation and IT/OT convergence.

    A dedicated and trusted senior Cyber security professional, Imran Husain has over 22 years of Fortune 1000 experience that covers a broad array of domains which includes risk management, cloud security, SecDevOps, AI Security and OT Cyber practices. A critical, action-oriented leader Imran brings strategic and technical expertise with a proven ability to build cyber program to be proactive in their threat detection, identifying and engaging in critical areas to the business while upholding their security posture. He specializes in Manufacturing and Supply Chain Distribution focusing on how to best use security controls and processes to maximize coverage and reduce risk in a complex multi-faceted environment. A skilled communicator and change agent with bias to action who cultivates an environment of learning and creative thinking, Imran champions open communication and collaboration to empower and inspire teams to exceed in their respective cyber commitments. He is currently the Global Chief Information Security Officer (CISO) at MillerKnoll, a publicly traded American company that produces office furniture, equipment, and home furnishings.



    The podcast and artwork embedded on this page are from KBI.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    41 分
  • Breaking In to Break Things: Practical Paths to Hardware Hacking and IoT Security
    2025/06/12
    Podcast: IoT Security Podcast (LS 24 · TOP 10% what is this?)
    Episode: Breaking In to Break Things: Practical Paths to Hardware Hacking and IoT Security
    Pub date: 2025-06-10

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Hash Salehi, Reserve Engineer and Founder of RECESSIM, joins host Philip Wylie to demystify the world of hardware hacking and security, highlighting niche but critical vulnerability research in IoT and embedded devices. Through recounting his own experiences, from customizing low-cost fault injection attacks on automotive microprocessors to reverse engineering smart meters, Hash shares both successes and frustrations from the front lines of hands-on security assessment. The conversation aims to inspire and equip listeners who want to explore or deepen their understanding of hardware security by surfacing resources, communities, and the mindset necessary to uncover vulnerabilities beyond software.
    Links:

    http://www.recessim.com/

    https://wiki.recessim.com/

    https://www.youtube.com/c/RECESSIM



    Let’s connect about IoT Security!

    Follow Phillip Wylie at https://www.linkedin.com/in/phillipwylie
    https://youtube.com/@phillipwylie

    The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast



    The podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    33 分
  • Old Systems, New Threats
    2025/06/12
    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)
    Episode: Old Systems, New Threats
    Pub date: 2025-06-10

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Bryson Bort is joined by Jim Montgomery, Director, Industrial Cybersecurity Solutions at TXOne Networks. TXOne provides network-based and endpoint-based products to tackle security vulnerabilities across industrial environments. With decades of IT security experience, Jim now leads TXOne’s work protecting Operational Technology environments across critical sectors like automotive, oil and gas, pharma, manufacturing, and semiconductors.

    How can we defend against threats that are already embedded within our systems? What are the most immediate and significant risks facing our critical infrastructure today? And how can operators begin to secure their networks?

    “Let's start with the basics. Let's start with understanding. Let's start with making it hard to get into your environment, and let's start discouraging that type of behavior from attacking your environment,” Jim said.

    Join us for this and more on this episode of Hack the Plan[e]t.

    The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers.

    Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.



    The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    31 分
  • From Y2K to 2038: Uncovering Time Bombs in OT and ICS Systems with Pedro Umbelino
    2025/06/11
    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: From Y2K to 2038: Uncovering Time Bombs in OT and ICS Systems with Pedro UmbelinoPub date: 2025-06-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Protect It All, host Aaron Crow welcomes Pedro Umbelino, Principal Research Scientist at BitSight, for an insightful and lively conversation recorded shortly after they met at RSA. Pedro shares stories of his early days in computing, from scavenging parts as a kid to teaching himself programming on a ZX Spectrum. The discussion quickly dives into critical cybersecurity issues across the interconnected worlds of IT and OT, focusing on dramatic vulnerabilities in Automatic Tank Gauges (ATGs) at gas stations—exposing ways attackers could cause significant physical damage and even spark major operational disruptions, all through insecure legacy protocols. Pedro also brings attention to a ticking time bomb: the “Year 2038” problem, where millions (if not billions) of 32-bit systems might fail due to an epoch time rollover—an issue that could have consequences reminiscent of Y2K, but on a potentially broader scale, especially for OT and critical infrastructure. Throughout the episode, Aaron and Pedro share practical strategies, lessons from the field, and the sobering reminder that many of these vulnerabilities are still lurking below the surface. The conversation highlights the importance of awareness, collaboration across industry and ISPs, and a proactive approach to understanding and hardening both new and legacy systems. Whether you're an OT engineer, a security researcher, or just curious about what it means to truly “protect it all,” this episode offers a fascinating look at the evolving landscape of digital and physical security risks. Key Moments: 06:37 Letting Go of Old Memories 15:12 Refueling Spill Risks Concern Technicians 17:37 Understanding Risks Beyond Fear 23:24 Internet Exposure Risks for OT Devices 32:17 Global Cyber Incident Response Challenges 35:30 Legacy System Challenges 39:19 Unidentified Cyber Assets Risk 48:41 "Understanding the Apocalypse Project's Challenges" 49:31 Testing System Vulnerabilities at Scale 55:12 Tech Vulnerabilities Analogous to Y2K 01:03:08 Challenges in OT Modernization About the Guest: Pedro Umbelino currently holds the position of Principal Research Scientist at Bitsight Technologies and brings over a decade of experience in dedicated security research. ⁤His eclectic curiosity has led to the uncovering of vulnerabilities spanning a gamut of technologies, highlighting critical issues in multiple devices and software, ranging from your everyday smartphone to household smart vacuums, from the intricacies of HTTP servers to the nuances of NFC radio frequencies, from vehicle GPS trackers to protocol-level denial of service attacks. Pedro is committed to advancing cybersecurity knowledge and has shared his findings at prominent conferences, including Bsides Lisbon, DEF CON, Hack.lu and RSA. How to connect Pedro : LinkedIn: https://www.linkedin.com/in/pedroumbelino/X: https://x.com/kripthorWebsite: https://www.bitsight.com/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    1 時間 7 分
  • 2/4 Análisis Incorporando ciberseguridad en el diseño de tecnología industrial
    2025/06/09
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 2/4 Análisis Incorporando ciberseguridad en el diseño de tecnología industrial
    Pub date: 2025-06-09

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Se analiza cuáles son los principales momentos del ciclo de vida del desarrollo de una tecnología industrial y cuándo se debe incorporar la ciberseguridad y otros requisitos.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    22 分
  • What Every CISO Gets Wrong About OT Security
    2025/06/06
    Podcast: Industrial Cybersecurity Insider
    Episode: What Every CISO Gets Wrong About OT Security
    Pub date: 2025-06-05

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    In this episode, Dino and Craig tackle one of the most misunderstood topics in industrial cybersecurity: IT/OT convergence.

    But is it truly convergence or more of a collision?

    Drawing from real-world experiences, they challenge the idea that OT is a “shadow IT group” and argue that operational technology deserves distinct governance, funding, and strategic influence.

    From secure-by-design to system integrators' evolving role, this conversation is a call to action for CISOs, CIOs, and engineering leaders to rethink how they build cybersecurity partnerships across the plant floor.

    Chapters:

    • 00:00:00 - Opening Shot: Who’s Really in Charge—CIOs or the Plant Floor?
    • 00:00:57 - Collision Course: IT and OT Can’t Keep Dodging Each Other
    • 00:01:52 - Two Worlds, One Mission: Why OT Isn’t Just “IT in a Hard Hat”
    • 00:04:07 - When Convergence Fails: What’s Missing in the Middle
    • 00:05:54 - Breaking Silos: Why Cybersecurity Demands True Collaboration
    • 00:08:22 - Real Talk: What Cyber Protection Looks Like on the Plant Floor
    • 00:10:46 - OT’s Tipping Point: Will the Next Move Come from IT, or the Shop Floor?
    • 00:17:32 - Your Move: What Leaders Must Do Next (Before It’s Too Late)

    Links And Resources:

    • Industrial Cybersecurity Insider on LinkedIn
    • Cybersecurity & Digital Safety on LinkedIn
    • BW Design Group Cybersecurity
    • Dino Busalachi on LinkedIn
    • Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!



    The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    21 分