Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical...
Industrial cybersecurity is no longer an option—it’s a necessity. In this episode, Kimberly Anderson, Managing Director at UHY, joins Craig Duckworth to explore the growing cybersecurity challenges facing manufacturers and industrial operations. They discuss the gaps in cybersecurity accountability, IT/OT entanglement, and why network segregation is still a major hurdle. Kimberly shares insights on cyber insurance pitfalls, compliance best practices, and why businesses should move beyond "checking the box" to build a truly resilient cybersecurity program. Whether you're facing vendor or OEM remote access risks, securing legacy systems, or navigating industrial cybersecurity regulations, this conversation provides actionable insights to help you stay in compliance and ahead of common cybersecurity pitfalls.Chapters:00:00:00 - Ransomware Isn’t Your Biggest Threat—Human Error Is00:00:44 - Meet Kimberly Anderson: From Chemistry to Cybersecurity Leadership00:01:17 - Why Technology Risk & Compliance Can’t Be Ignored in Industrial Cybersecurity00:02:29 - IT/OT Security Integration: Why It’s a Struggle and How to Get It Right00:03:56 - Network Segregation: The Critical Security Step Most Companies Overlook00:05:42 - The IT/OT “Divorce”: Why Separating Networks is a Game-Changer00:06:41 - Rushing to the Cloud? Avoid These Vendor Security Pitfalls00:11:48 - Cyber Insurance Isn’t a Safety Net—Here’s What You’re Missing00:14:43 - Beyond “Checking the Box”: How to Build a Resilient Cybersecurity Strategy00:18:25 - Final Takeaways: Simple Steps to Strengthen Your Security TodayLinks And Resources:Kimberly Anderson on LinkedInUHY Advisors, Inc.Industrial Cybersecurity LinkedIn GroupDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!
--------
23:18
Gartner, DOGE, and the Future of OT Cybersecurity Policy
In this episode, we dive into the latest Gartner Magic Quadrant report for OT cybersecurity and analyze key players, market trends, and strategies for selecting the right security partners.We also discuss insights from the recent S4 conference, the growing importance of cyber-informed engineering, and how organizations can effectively align IT and OT security strategies. We discuss CapEx versus OpEx and potential implications of the DOGE initiative around industrial cybersecurity investments.Whether you're planning your next cybersecurity investment or tackling legacy system challenges, this episode provides practical guidance to help you navigate the OT security landscape.Chapters:00:00:00 -Think Globally, Secure Locally: Crafting an Effective OT Cyber Strategy00:00:31 -Meet Dino & Craig: Cybersecurity Pros with Real-World OT Experience00:01:03 -Cybersecurity Headlines That Matter: What’s Shaping OT Security Today00:02:20 -Gartner’s Magic Quadrant Revealed: Who’s Leading OT Cybersecurity?00:03:08 -Why OT Teams Hold the Key to Cybersecurity Success00:04:24 -Your OT Ecosystem is Bigger Than You Think—Here’s Why That Matters00:05:08 -S4 Conference Takeaways: The Future of Secure-By-Design Machines00:11:39 -CapEx vs. OpEx: Smart Budgeting for OT Cybersecurity Investments00:19:08 -AI, Onshoring, and the Next Big Shifts in Industrial Cybersecurity00:20:50 -IT vs. OT? No—IT & OT: How to Bridge the Divide for Better Security00:23:02 -Final Insights: The Must-Know Takeaways for Securing Your OT EnvironmentLinks And Resources:Cybersecurity Group Page on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!
--------
23:50
Assessing AI’s Role in Cybersecurity
The rapid evolution of AI is reshaping industrial cybersecurity, but are organizations ready for the risks? In this episode, three different experts explore the complexities of securing OT environments, the rising role of AI in threat detection, and the challenges of integrating IT and OT security. From governance and compliance to workforce development and emerging cyber threats, this discussion sheds light on the shifting cybersecurity landscape. Gain insights into the future of industrial security, the impact of AI-driven decision-making, and the importance of balancing innovation with risk management.Chapters:00:00:00 - Diving into AI’s evolving role in industrial cybersecurity—threats, solutions, and what’s next00:00:43 - AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with Claroty00:5:16 - AI in Industrial Cybersecurity: Friend, Foe, or Something in Between?00:10:58 - From Legacy Systems to Ransomware: The Evolution of OT CybersecurityLinks And Resources:Cybersecurity Group Page on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!
--------
23:05
Overlooked Risks With IIoT in Industrial Cybersecurity
Craig and Dino dive deep into the critical yet often overlooked aspects of industrial cybersecurity in relation to IIoT. They discuss the misconception that many OT assets are isolated when, in reality, they are interconnected and vulnerable. The conversation highlights the importance of complete asset inventory, IT-OT collaboration, and the hidden risks posed by vendor access, remote connections, and unmonitored network traffic. With real-world insights, they explore how organizations can leverage cybersecurity tools not just for threat prevention but also for process integrity and operational efficiency. If you’ve ever wondered how to bridge the gap between IT-driven cybersecurity and OT-focused operations, this episode is a must-listen.Chapters:00:00:00 - Introduction: Why OT Security Matters More Than You Think00:01:08 - Meet Craig and Dino: Experts in Industrial Cybersecurity00:01:16 - Breaking Down IoT vs. OT: Understanding the Differences00:02:33 - Why Asset Inventory in Industrial Environments is a Challenge00:03:42 - The Hidden Risks of Overlooking Connected OT Assets00:04:32 - The IT-OT Divide: Why Collaboration is Crucial for Security00:08:29 - Industrial IoT Blind Spots: What You’re Missing00:09:08 - Preventing Downtime: How Cybersecurity Tools Can Help00:12:00 - How Sensors and Data Can Predict and Prevent Failures00:14:20 - Digital Threats to OT: Why Anomalies Matter00:16:42 - Why OT Teams Need to Fully Understand Cybersecurity Tools00:19:13 - Finding the Right Partner for IT-OT Cybersecurity Integration00:20:04 - Bridging the Gap: Building Stronger IT and OT Relationships00:21:07 - Final Thoughts: How to Take Action on OT Security TodayLinks And Resources:Velta TechnologyDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!
--------
22:28
How to Secure OT Environments Without Disruptions with Dan Cartmill, TXOne Networks
The cybersecurity challenges of industrial environments are unique and complex, requiring a shift in mindset from traditional IT security strategies. Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, joins Dino Busalachi for this episode. They discuss the critical divide between IT and OT security, why collaboration is essential, and how organizations can take the first steps toward securing their industrial control systems (ICS). Drawing from his experience in the Royal Australian Navy, IT security, and product marketing, Dan shares key insights on the operational risks of cybersecurity tools, the importance of ownership in security decisions, and why companies must move beyond fear-based approaches to focus on practical, incremental solutions. If your organization struggles with securing legacy systems, aligning IT and OT teams, or justifying cybersecurity investments, this episode offers real-world strategies and actionable takeaways.Chapters:00:00:00 - The First Step to Securing OT: Why You Can’t Afford to Wait00:01:00 - Meet Dino and Dan: A Conversation on Industrial Cybersecurity00:01:51 - From the Navy to Cybersecurity: Dan’s Journey into Protecting Industrial Systems00:05:30 - The Biggest Cybersecurity Challenges Facing Industrial Environments Today00:09:00 - IT vs. OT: Who Owns Cybersecurity and Why It Matters00:14:01 - Breaking Down Silos: How Collaboration Can Make or Break Your Security Strategy00:22:35 - Cybersecurity is a Team Sport: How the Right Partners Can Make All the Difference00:25:00 - Think Globally, Act Locally: Why OT Security Must Be Customized for Each Plant00:29:15 - Who Owns OT Security? Why IT and OT Leaders Need a Unified Strategy00:33:00 - The Power of Collaboration: Bringing IT, OT, and Vendors to the Same Table00:36:10 - The Cost of Cybersecurity: Why Companies Struggle to Justify OT Security Investments00:38:45 - Legacy Systems & Cyber Risk: Why Ignoring the Problem is Not an Option00:40:53 - The Takeaway: Why Action Beats Perfection in OT SecurityLinks And Resources:Dan Cartmill on LinkedInTXOne NetworksDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!