Powered by RND
PodcastsTechnologies@BEERISAC: OT/ICS Security Podcast Playlist
Écoutez @BEERISAC: OT/ICS Security Podcast Playlist dans l'application
Écoutez @BEERISAC: OT/ICS Security Podcast Playlist dans l'application
(48 139)(250 169)
Sauvegarde des favoris
Réveil
Minuteur

@BEERISAC: OT/ICS Security Podcast Playlist

Podcast @BEERISAC: OT/ICS Security Podcast Playlist
Anton Shipulin / Listen Notes
A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin ...

Épisodes disponibles

5 sur 300
  • 1/4 Contexto Rol de la Comunicación en la Ciberseguridad Industrial
    Podcast: Casos de Ciberseguridad IndustrialEpisode: 1/4 Contexto Rol de la Comunicación en la Ciberseguridad IndustrialPub date: 2025-03-07Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se presentará el contexto del caso: datos del entrevistado y cuál es la evolución y principales desafíos de la comunicación en la ciberseguridad industrial.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    21:14
  • Network Monitoring in OT/ICS Environments with Stuart Bailey
    Podcast: HOU.SEC.CAST.Episode: Network Monitoring in OT/ICS Environments with Stuart BaileyPub date: 2025-03-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn today’s episode Michael and Sam are catching up with Security Consulting Manager, ICS/OT at Accenture, Stuart Bailey! Stuart shares his journey from a career in social work to cybersecurity, the challenges of working on OT environments, and the importance of network monitoring for critical infrastructure. Things Mentioned:·      Romanian energy supplier Electrica hit by ransomware attack - https://www.bleepingcomputer.com/news/security/romanian-energy-supplier-electrica-hit-by-ransomware-attack/·      Stuart’s talk - https://youtu.be/wI-7q1RSVZU?si=CaKziboHBHtyberhDo you have a question for the hosts? Reach out to us at [email protected] Keep up with HOU.SEC.CON:·      LinkedIn·      Twitter·      Facebook·      Instagram·      YouTube·      BlueskyCheck out our other show:·      CyberSundayCheck out our Conferences and Events:·      HOU.SEC.CON.·      OT.SEC.CON.·      EXEC.SEC.CON.·      HSC User GroupSupport or apply to our Scholarship Program:·      TAB Cyber Foundation In this episode:·      Host: Michael Farnum·      Host: Sam Van Ryder·      Guest: Stuart Bailey·      Production and editing: Lauren Lynch·      Music by: August HoneyThe podcast and artwork embedded on this page are from Michael Farnum and Sam Van Ryder, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    31:05
  • EP 57: Strengthening Embedded Device Security with Cloud-Based SCADA
    Podcast: Error Code (LS 26 · TOP 10% what is this?)Episode: EP 57: Strengthening Embedded Device Security with Cloud-Based SCADAPub date: 2025-03-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEmbedded devices need basic security measures like multi-factor authentication and unique credentials to reduce vulnerabilities and protect against cyber threats. Mauritz Botha, co-founder and CTO of XiO Inc., explains that cloud-based SCADA can update old systems and provide the visibility that’s currently missing.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    33:36
  • S4x25 Feedback & Review
    Podcast: Unsolicited Response (LS 33 · TOP 5% what is this?)Episode: S4x25 Feedback & ReviewPub date: 2025-03-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIf you're not interested in S4, skip this episode. Dale goes over the feedback from the survey and S4 Event's own thoughts on the event, Tampa, and more. The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    23:14
  • Agroterrorism & Cyber Threats: How Farms Are Under Attack
    Podcast: Bites & Bytes PodcastEpisode: Agroterrorism & Cyber Threats: How Farms Are Under AttackPub date: 2025-03-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization📢 Listener Advisory: This episode discusses unsettling topics, including terrorism, animal harm, cult-like groups, radical activism, and threats to food security. Listener discretion is advised. What happens when terrorism targets the food we eat?  In this eye-opening episode of Bites and Bytes Podcast, we explore agroterrorism—the deliberate targeting of farms, livestock, and food supply chains to incite fear, economic damage, or ideological change. Joining host Kristin Demoranville are three leading experts in agriculture, risk management, and security: 👩‍🌾 Hannah Thompson-Weeman – President & CEO of the Animal Agriculture Alliance, Hannah is a leading voice in protecting animal agriculture from activist threats and misinformation.  She has dedicated her career to connecting the food supply chain and defending farms against radical actors. 📜 Michael Urbanik – Insurance and risk management expert at R.K. Tongue Co., Inc., Michael works closely with businesses to understand their vulnerabilities and create protection strategies against emerging threats, including agroterrorism and cybercrime. 🌎 Andrew Rose - A Bites and Bytes Podcast repeat guest, Andrew is a visionary AgFuturist and cybersecurity strategist. He is focused on mitigating threats to agriculture that are generations ahead of their time. As an advisor to BIO-ISAC and an expert in food and climate security, he brings a crucial perspective on the evolving risks to our food systems. 🛑 Who should listen? Farmers & Ranchers – Protect your livelihood from security threats. Food Industry Professionals – Learn about supply chain risks and disruptions. Cybersecurity & Risk Experts – Understand the intersection of cybercrime and agriculture. Policy Makers & Regulators – Gain insights into the evolving threats to food security. Concerned Consumers – Get a behind-the-scenes look at what it takes to keep our food supply safe. 🔍 In this episode, we discuss: What agroterrorism is (and what it isn’t) How extremist groups are infiltrating farms and food supply chains The role of cyberattacks in disrupting agriculture The impact of activism, misinformation, and social engineering on food production Best practices for protecting farms and food systems Real-world examples of agroterrorist incidents and their consequences Food security is national security.  Join us for a gripping discussion on why agriculture is under attack—and what we can do to defend it. _______________________________________________ Episode Key Highlights (0:08:09) - What is Agroterrorism?  (0:11:56) - Economic and Social Impact (0:16:42) - Detection Challenges (0:19:16) - Cybersecurity’s Role (0:23:36) - Radical Activism (0:25:03) - Protective Measures for Farmers (0:29:20) - Do We Have the Right Skills? (0:33:38) - Real Agroterrorism Cases (0:38:59) - Cyberbullying & Threats (0:42:22) - Mental Health Toll (0:50:20) - How Cyber Experts Can Help (1:00:15) - Final Thoughts _______________________________________________ Show Notes: FBI Definition of Agroterrorism: https://leb.fbi.gov/articles/featured-articles/agroterrorism-threats-to-americas-economy-and-food-supply#:~:text=A%20subset%20of%20bioterrorism%2C%20agroterrorism,from%20four%20categories%20of%20perpetrators. Terrorism Risk Insurance Act (TRIA) https://home.treasury.gov/policy-issues/financial-markets-financial-institutions-and-fiscal-service/federal-insurance-office/terrorism-risk-insurance-program Animal Enterprise Terrorism Act: https://www.congress.gov/109/plaws/publ374/PLAW-109publ374.pdf _______________________________________________ Wicked6  is about women coming together to play cyber games and learn about careers in cybersecurity. 🔥 March 28-30, 2025 – a three-day, global, virtual Hack & Chat event where women worldwide come together to play cyber games, compete, learn, and connect. 💡 We’ve got international speakers, technical talks, hands-on workshops, and, of course…the GAMES!  Think Capture the Flag, Attack & Defend, and a high-stakes team tournament—all virtually streamed LIVE! ✨ Whether you’re a newbie or a seasoned pro, there’s a game for you.  Plus, there’s networking, prizes, merch, and so much more! 💻 Sign up now at Wicked6.com, and let’s LEVEL UP together! 🔥💪 🎤 Want to share your story?  Call for speakers & technical workshops is OPEN! 📹 Ever wonder what cybersecurity careers look like?  Submit a “Day in the Life” video! 🙌 Passionate about supporting women in cyber?  Join us as a volunteer or referee! 🤝 And, companies—be a sponsor!  Help empower the next generation of women in cybersecurity. 🚀 Attack & Defense Call for Volunteers – Help design the next big challenge!  If you’re a seasoned challenge developer, step up and create a mind-bending cyber challenge for the competition. Just remember—developers can’t compete! 🤯🔐 Sign up here: 🔗 Volunteer Form 🌍 Meet the Wicked6 2025 Advisory Board! This powerhouse team of women is driving the mission forward—building an event that’s about competition, connection, and career growth. Get to know them here: 🔗 Advisory Board  - you will see your Bites and Bytes Podcast host there! _______________________________________________ Bites and Bytes Podcast Info: Website:  Explore all our episodes, articles, and more on our official website.  Visit Now Merch Shop:  Show your support with some awesome Bites and Bytes gear! 🧢👕 Shop Now Blog:  Stay updated with the latest insights and stories from the world of cybersecurity in the food industry.  Read Our Blog Audience Survey:  We value your feedback!  Help us make the podcast even better.  Take the Survey Schedule a Call with Kristin:  Want to share your thoughts?  Schedule a meeting with Kristin!  Schedule Now Socials:  TikTok; Instagram; LinkedInThe podcast and artwork embedded on this page are from AnzenSage, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    1:03:25

Plus de podcasts Technologies

À propos de @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Site web du podcast

Écoutez @BEERISAC: OT/ICS Security Podcast Playlist, Acquired ou d'autres podcasts du monde entier - avec l'app de radio.fr

Obtenez l’app radio.fr
 gratuite

  • Ajout de radios et podcasts en favoris
  • Diffusion via Wi-Fi ou Bluetooth
  • Carplay & Android Auto compatibles
  • Et encore plus de fonctionnalités
Applications
Réseaux sociaux
v7.10.0 | © 2007-2025 radio.de GmbH
Generated: 3/12/2025 - 11:03:25 AM