Powered by RND
PodcastsNegócios@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
@BEERISAC: OT/ICS Security Podcast Playlist
Último episódio

Episódios Disponíveis

5 de 371
  • S1 E5: Incident Response in ICS/OT/SCADA
    Podcast: Simply ICS CyberEpisode: S1 E5: Incident Response in ICS/OT/SCADAPub date: 2025-04-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHow does Incident Response in ICS/OT/SCADA work? In this episode of Simply ICS Cyber, Don and Tom welcome Kai Thomsen, Director of Global Incident Response Services at Dragos.Join us as we answer the questions below and provide more insight into how IR works in OCS, OT, and SCADA:- Is DFIR the same on the OT side as the IT side?- What are some of the challenges the OT DFIR team faces?- In an organization, who is responsible for OT incident response?- What are table tops, how should you conduct them?- What are some table top exercises?- How do you get into OT DFIR?Discover the Dragos 2025 YIR Report: https://www.dragos.com/ot-cybersecurity-year-in-reviewConnect with Kai on LinkedIn: https://www.linkedin.com/in/kai-thomsen-a635b21b7Check out the Incident Response Table top resources below:- CISA Tabletop Exercise Packages (CTEPs)- CISA ICS Training- Dean Parson’s ICS Incident Response Tabletops- Lenny Zeltser Cheat Sheets and Presentations- NERC’s Grid Security Exercise (GridEx) - MITRE Cyber Exercise Playbook- Black Hills Information Security (BHIS) Backdoors and Breaches ICS/OT Deck- Center for Internet Security, Tabletop Exercises – Six Scenarios to Help Prepare Your Cybersecurity Team- Red Canary: Are You Using Tabletop Simulations to Improve Your Information Security Program?- Dragos: Preparing for Industrial Cyber Response Tookit- Dragos: Preparing for Incident Handling and Response in ICS- Dragos Tabletop Exercise- ICS4ICS Incident Command System for Industrial Control Systems- European Network for Cyber Security (ENCS) Red Team – Blue Team TrainingJoin us every other Wednesday for Season 1 of the Simply ICS Cyber podcast, with your hosts, Don C. Weber and Tom VanNorman.Connect with your hosts on LinkedIn:- Don linkedin.com/in/cutaway- Tom linkedin.com/in/thomasvannorman=========================Simply Cyber empowers people who want a rewarding cybersecurity career=========================All the ways to connect with Simply Cyberhttps://SimplyCyber.io/SocialsThe podcast and artwork embedded on this page are from Simply Cyber Media Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    24:50
  • S1 E4: What are the 5 ICS Cybersecurity Controls?
    Podcast: Simply ICS CyberEpisode: S1 E4: What are the 5 ICS Cybersecurity Controls?Pub date: 2025-04-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Tom and Don host special guest Michael Hilken, Cyber Physical Engineer at Grimm. The trio review and discuss the Five ICS Cybersecurity Critical Controls. Links from this episode:- Michael Hilken: https://www.linkedin.com/in/michael-hilken/- SANS Whitepaper on the The Five ICS Cybersecurity Critical Controls: https://www.sans.org/white-papers/five-ics-cybersecurity-critical-controls/ - Dragos 2025 OT Cybersecurity Report - 8th Annual Year in Review: https://www.dragos.com/ot-cybersecurity-year-in-review/  Join us every other Wednesday for Season 1 of the Simply ICS Cyber podcast, with your hosts, Don C. Weber and Tom VanNorman.Connect with your hosts on LinkedIn:- Don https://www.linkedin.com/in/cutaway- Tom https://www.linkedin.com/in/thomasvannorman=========================Simply Cyber empowers people who want a rewarding cybersecurity career=========================All the ways to connect with Simply Cyberhttps://SimplyCyber.io/Socials=========================The podcast and artwork embedded on this page are from Simply Cyber Media Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    20:23
  • Noam Moshe on Hacking Video Surveillance
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Noam Moshe on Hacking Video SurveillancePub date: 2025-08-07Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationNoam Moshe, Research Director for Claroty Team82, joins the Nexus Podcast live at the Black Hat Briefings in Las Vegas to discuss research that was presented here on the security of a popular video surveillance platform manufactured by Axis Communications. Moshe describes how Team82 examined the proprietary protocol supporting Axis servers and clients (camera) and uncovered four vulnerabilities that could be chained to eventually gain pre-authentication remote-code execution. Moshe explains Team82's research process, the risks to users, and the successful disclosure process with Axis Communication that resulted in prompt patches available for the servers and camera platforms. Read Team82's research blog hereListen and subscribe to the Nexus PodcastThe podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    27:50
  • S1 E3: Critical Infrastructure vs. Everything Else
    Podcast: Simply ICS CyberEpisode: S1 E3: Critical Infrastructure vs. Everything ElsePub date: 2025-03-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Simply ICS Cyber, Don and Tom interview Gus Serino, water sector expert and Owner at I&C Secure, Inc.Listen in as we will answer the following questions:- What is Critical Infrastructure?- What are other types of Industrial and Automation?- Is cybersecurity different between the two?Links from this episode:- Gus Serino LinkedIn: https://www.linkedin.com/in/gusserino/- Instrumentation & Control Secure, Inc.: https://www.iandcsecure.com/- S4Events - Water Sector Cyber Risk with Gus Serino: https://www.youtube.com/watch?v=ScigBpXIjggJoin us every other Wednesday for Season 1 of the Simply ICS Cyber podcast, with your hosts, Don C. Weber and Tom VanNorman.Connect with your hosts on LinkedIn:- Don https://www.linkedin.com/in/cutaway- Tom https://www.linkedin.com/in/thomasvannorman=========================Simply Cyber empowers people who want a rewarding cybersecurity career=========================All the ways to connect with Simply Cyberhttps://SimplyCyber.io/Socials=========================The podcast and artwork embedded on this page are from Simply Cyber Media Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    22:07
  • Shaya Feedman Ex Head of Information Security @Porsche Digital about cars functional safety & cyber
    Podcast: ICS Cyber Talks PodcastEpisode: Shaya Feedman Ex Head of Information Security @Porsche Digital about cars functional safety & cyberPub date: 2025-08-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationכשאתם נכנסים לרכב שלכם כמה מחשבה אתם מקדישים לעובדה שאתם בתוך דאטה-סנטר עצום, איך מתמודדים בטיחותית וסייברית עם מפעל שיש בו עשרות רבות ולעיתים מאות מחשבים עם שתי רשתות תקשורת שלפחות אחת מוגדרת כקריטית וכול זה ממוזער ונדחס לרכב אחד אין ספק שבטיחות והגנת סייבר בתעשיית הרכב היא אחד האתגרים הקשיים שיש החל משלב התכנון, דרך שרשרת אספקה ועד הרכב עצמו. נחשון פינקו מארח את שייע פידמן עד לאחרונה מנהל מרכז הפיתוח והגנת הסייבר בפורשה דיגיטל בשיחה על הגנת סייבר בעולם ייצור הרכבים והרכבים עצמם. ועוד כמה מיידעים לגבי הרכבים שלכם שכנראה לא ידעתם When you get into your car, how much thought do you give to the fact that you are inside a huge data center, how do you deal with safety and cyber security with a factory that has dozens and sometimes hundreds of computers with two communication networks, at least one of which defined as critical, and all of this is minimized and compressed into one car? There is no doubt that safety and cybersecurity in the automotive industry are among the most difficult challenges, from the planning stage, through the supply chain, to the vehicle itself. Nachshon Pincu hosts Shaya Feedman, until recently the Head of Information Security at Porsche Digital, in a conversation about cybersecurity in the world of vehicle manufacturing and the vehicles themselves. And some more information about your cars that you probably didn't know  The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    --------  
    41:54

Mais podcasts de Negócios

Sobre @BEERISAC: OT/ICS Security Podcast Playlist

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
Site de podcast

Ouça @BEERISAC: OT/ICS Security Podcast Playlist, G4 Podcasts: Gestão e Alta Performance e muitos outros podcasts de todo o mundo com o aplicativo o radio.net

Obtenha o aplicativo gratuito radio.net

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções
Aplicações
Social
v7.22.0 | © 2007-2025 radio.de GmbH
Generated: 8/11/2025 - 10:25:12 AM