@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

417 episodes

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!

Podcasts

Ep. #04 Segurança em Redes de Automação Industrial

Published: March 20, 2021, 7:54 a.m.
Duration: 56 minutes

Listed in: Technology

Live Show: Level 0 Security & IR Table Top Exercises

Published: March 18, 2021, 6:19 p.m.
Duration: 34 minutes 22 seconds

Listed in: Technology

Awareness Of Purdue Level 0 and 1 (In)Security

Published: March 16, 2021, 9:42 p.m.
Duration: 4 minutes 5 seconds

Listed in: Technology

A Conversation With Bryson Bort | Candid CyberSec Podcast With Vandana Verma

Published: March 16, 2021, 1:12 p.m.
Duration: 15 minutes 43 seconds

Listed in: Technology

200 The Journey Ahead is the Challenge in ICS

Published: March 15, 2021, 5:36 p.m.
Duration: 23 minutes 42 seconds

Listed in: Technology

Ron Brash on the water plant hacks and the state of ICS security

Published: March 13, 2021, 7:43 p.m.
Duration: 50 minutes 6 seconds

Listed in: Technology

Cplane.ai and ExxonMobil's Orchestration Pilot

Published: March 12, 2021, 7:22 p.m.
Duration: 34 minutes 51 seconds

Listed in: Technology

Justin Fier of Darktrace on utility cybersecurity

Published: March 12, 2021, 11:58 a.m.
Duration: 39 minutes 53 seconds

Listed in: Technology

Mauro Conti on Assessing the Use of Insecure ICS Protocols

Published: March 11, 2021, 10:50 a.m.
Duration: 31 minutes 32 seconds

Listed in: Technology

Legacy System Problem Keeps Growing

Published: March 10, 2021, 10:42 a.m.
Duration: 5 minutes 44 seconds

Listed in: Technology

NCF-249 How important is industrial cybersecurity?

Published: March 9, 2021, 6:28 p.m.
Duration: 29 minutes 30 seconds

Listed in: Technology

‘Een veilige integratie tussen OT en IT is vrijwel onmogelijk’

Published: March 9, 2021, 1:07 p.m.
Duration: 30 minutes 48 seconds

Listed in: Technology

Safety and Security in Mining [The Industrial Security Podcast]

Published: March 8, 2021, 10:15 p.m.
Duration: 56 minutes 15 seconds

Listed in: Technology

Ep. #03 Gestão de Riscos na TA com a ISA/IEC 62443

Published: March 6, 2021, 8:16 a.m.
Duration: 51 minutes 52 seconds

Listed in: Technology

Protecting Military Weapon Systems from Cyberattacks

Published: March 5, 2021, 12:41 p.m.
Duration: 6 minutes 34 seconds

Listed in: Technology

ICS Security: February Month In Review

Published: March 5, 2021, 8:41 a.m.
Duration: 41 minutes 25 seconds

Listed in: Technology

Episode 351: When will Cyberattacks on the Grid Become the New Normal?

Published: March 4, 2021, 11:51 a.m.
Duration: 1 hour 12 minutes 13 seconds

Listed in: Technology

Episode 12 - Gemeinsame Ziele von Safety und Security - mit Sarah Fluchs

Published: March 4, 2021, 11:15 a.m.
Duration: 1 hour 3 minutes 20 seconds

Listed in: Technology

Maturing Past Maturity-Based To Risk-Based

Published: March 3, 2021, 9:46 a.m.
Duration: 5 minutes 20 seconds

Listed in: Technology

VC's View Of The ICS Security Market

Published: Feb. 28, 2021, 9:24 a.m.
Duration: 1 hour 3 minutes 45 seconds

Listed in: Technology

Best Practices to Reduce Cyber Risk, Improve Digital Resilience

Published: Feb. 26, 2021, 9:56 a.m.
Duration: 21 minutes 52 seconds

Listed in: Technology

ICS Security Company Valuation and Value Investing

Published: Feb. 25, 2021, 9:04 p.m.
Duration: 5 minutes 42 seconds

Listed in: Technology

Could 2021 Be the Year of Product Security?

Published: Feb. 25, 2021, 9:47 a.m.
Duration: 27 minutes 25 seconds

Listed in: Technology

Fiction Book Review: Total Power

Published: Feb. 24, 2021, 11:53 p.m.
Duration: 24 minutes 2 seconds

Listed in: Technology

Water ISAC on Oldsmar Hack, Sector Cybersecurity

Published: Feb. 24, 2021, 10:40 a.m.
Duration: 41 minutes 5 seconds

Listed in: Technology

Justin Searle on Pen-Testing ICS

Published: Feb. 24, 2021, 10:39 a.m.
Duration: 39 minutes 3 seconds

Listed in: Technology

Tom Tervoort on Zerologon

Published: Feb. 24, 2021, 10:39 a.m.
Duration: 41 minutes 13 seconds

Listed in: Technology

Richard Thomas, Joe Gardiner on CVE Discovery Time for ICS

Published: Feb. 24, 2021, 10:39 a.m.
Duration: 41 minutes 2 seconds

Listed in: Technology

Dustin Childs on Vulnerability Disclosure, Pwn2Own, ZDI

Published: Feb. 24, 2021, 10:39 a.m.
Duration: 36 minutes 30 seconds

Listed in: Technology

DoD and Critical Infrastructure

Published: Feb. 24, 2021, 8:49 a.m.
Duration: 41 minutes 59 seconds

Listed in: Technology

Learnings from the SolarWinds Breach [The Industrial Security Podcast]

Published: Feb. 23, 2021, 11:37 a.m.
Duration: 53 minutes 45 seconds

Listed in: Technology

Industrial Cybersecurity and the Florida Water Supply Attack with Dale Peterson

Published: Feb. 22, 2021, 8:44 p.m.
Duration: 27 minutes 28 seconds

Listed in: Technology

Women In ICS Security

Published: Feb. 20, 2021, 12:27 a.m.
Duration: 1 hour 9 minutes 19 seconds

Listed in: Technology

ICS SECURITY PODCAST - Episódio #02 Transformação Digital com CyberSecurity na Indústria 4.0

Published: Feb. 19, 2021, 3:33 p.m.
Duration: 1 hour 10 seconds

Listed in: Technology

My Recollection of the F**g Salmon Dinner

Published: Feb. 18, 2021, 10:45 a.m.
Duration: 5 minutes 29 seconds

Listed in: Technology

Bayshore Networks' CEO Kevin Senator

Published: Feb. 11, 2021, 10:11 p.m.
Duration: 58 minutes 2 seconds

Listed in: Technology

Countering Cyber Sabotage - CCE

Published: Feb. 10, 2021, 12:52 p.m.
Duration: 1 hour 5 minutes 44 seconds

Listed in: Technology

[The Industrial Security Podcast] The Science of Security

Published: Feb. 9, 2021, 2:08 p.m.
Duration: 1 hour 6 minutes 41 seconds

Listed in: Technology

Episódio #01 - O que é ICS Security?

Published: Feb. 8, 2021, 8 p.m.
Duration: 56 minutes 58 seconds

Listed in: Technology

E04 - The Rise of OT Security - Part 2

Published: Feb. 7, 2021, 5:43 p.m.
Duration: 9 minutes 46 seconds

Listed in: Technology

E03 - The Rise of OT Security - Part 1

Published: Feb. 7, 2021, 5:43 p.m.
Duration: 13 minutes 5 seconds

Listed in: Technology

E02 - Vulnerable ICS systems in The Netherlands

Published: Feb. 7, 2021, 5:43 p.m.
Duration: 8 minutes 7 seconds

Listed in: Technology

Operator Turing Test / Consequence & INL's CCE

Published: Feb. 5, 2021, 9:03 a.m.
Duration: 9 minutes 51 seconds

Listed in: Technology

An Interview With Eddie Habibi of PAS

Published: Feb. 2, 2021, 9:31 p.m.
Duration: 50 minutes 3 seconds

Listed in: Technology

PSM: Back to Basics, Part 6 - Mechanical Integrity (MI)

Published: Jan. 30, 2021, 11:59 a.m.
Duration: 24 minutes 15 seconds

Listed in: Technology

Project Bids and Cybersecurity

Published: Jan. 29, 2021, 11:32 a.m.
Duration: 28 minutes 59 seconds

Listed in: Technology

Proactive OT Security—Protecting Before The Attack

Published: Jan. 28, 2021, 1:53 p.m.
Duration: 18 minutes 27 seconds

Listed in: Technology

Critical Infrastructure Protection & ICS

Published: Jan. 27, 2021, 9:05 p.m.
Duration: 39 minutes 30 seconds

Listed in: Technology

Pwn2Own Miami

Published: Jan. 27, 2021, 10:30 a.m.
Duration: 53 minutes 29 seconds

Listed in: Technology

36: The Anatomy of a Targeted Ransomware Attack with SCADAfence CTO Ofer Shaked

Published: Jan. 27, 2021, 10:29 a.m.
Duration: 48 minutes 49 seconds

Listed in: Technology

A Coordinated Approach Toward Stronger Industrial Cyber Security

Published: Jan. 26, 2021, 1:30 p.m.
Duration: 32 minutes 46 seconds

Listed in: Technology

[The Industrial Security Podcast] Addressing "Weak Link" Vendors in the Power Grid

Published: Jan. 25, 2021, 9:08 p.m.
Duration: 48 minutes 35 seconds

Listed in: Technology

Are Your ICS Security Patching Plans Realistic?

Published: Jan. 23, 2021, 12:16 a.m.
Duration: 4 minutes 6 seconds

Listed in: Technology

Sustainable Cybersecurity over the Complete Life-Cycle for Rail

Published: Jan. 21, 2021, 12:23 p.m.
Duration: 37 minutes 2 seconds

Listed in: Technology

Supply Chain Cybersecurity Cyber Senate Control Systems Podcast with Industrial Defender

Published: Jan. 21, 2021, 12:23 p.m.
Duration: 45 minutes 20 seconds

Listed in: Technology

Is The Normalized, Taxonomized Approach In A SIEM Doomed To Fail

Published: Jan. 19, 2021, 8:34 p.m.
Duration: 40 minutes 22 seconds

Listed in: Technology

PSM: Back to Basics, Part 5 - Even More Acronyms

Published: Jan. 17, 2021, 3:08 p.m.
Duration: 33 minutes 47 seconds

Listed in: Technology

Manufacturing sector is increasingly a target for adversaries. [Research Saturday]

Published: Jan. 17, 2021, 3:08 p.m.
Duration: 25 minutes 47 seconds

Listed in: Technology

How To Be An OT Visionary

Published: Jan. 15, 2021, 8:41 a.m.
Duration: 4 minutes 3 seconds

Listed in: Technology

Protecting Critical Technologies Used in Military Weapons From Adversarial Threats

Published: Jan. 13, 2021, 10:27 a.m.
Duration: 6 minutes 39 seconds

Listed in: Technology

[The Industrial Security Podcast] The Enterprise Perspective on OT Security

Published: Jan. 13, 2021, 10:26 a.m.
Duration: 47 minutes 45 seconds

Listed in: Technology

ICS Breaches Will Happen

Published: Jan. 7, 2021, 6:18 p.m.
Duration: 6 minutes 26 seconds

Listed in: Technology

December: ICS Security Month In Review

Published: Jan. 6, 2021, 12:15 p.m.
Duration: 43 minutes 24 seconds

Listed in: Technology

2020 Predictions: Right, Wrong and Pending

Published: Dec. 31, 2020, 2:24 p.m.
Duration: 8 minutes 43 seconds

Listed in: Technology

Critical Response for Critical Infrastructure

Published: Dec. 29, 2020, 9:45 a.m.
Duration: 34 minutes 48 seconds

Listed in: Technology

Good News

Published: Dec. 24, 2020, 3:43 p.m.
Duration: 1 minute 42 seconds

Listed in: Technology

Episode 236 - Cyber-attack on Norsk Hydro - LockerGoga Ransomware cost kr800M

Published: Dec. 24, 2020, 7:55 a.m.
Duration: 23 minutes 24 seconds

Listed in: Technology

[The Industrial Security Podcast] Industrial Cloud Security

Published: Dec. 21, 2020, 6:51 p.m.
Duration: 56 minutes 26 seconds

Listed in: Technology

Robert Lee: Keeping the lights on. [ICS] [Word Notes]

Published: Dec. 20, 2020, 2:35 p.m.
Duration: 7 minutes 4 seconds

Listed in: Technology

ICS Detection Market Analysis - Part 2

Published: Dec. 15, 2020, 7:56 p.m.
Duration: 11 minutes 58 seconds

Listed in: Technology

Weekly Article: ICS Detection Market Analysis - Part 1

Published: Dec. 10, 2020, 8:08 p.m.
Duration: 12 minutes 5 seconds

Listed in: Technology

SBA 230: Cyber-Security Basics for BAS

Published: Dec. 9, 2020, 10:18 p.m.
Duration: 25 minutes 2 seconds

Listed in: Technology

[The Industrial Security Podcast] Security Monitoring & Management at Airbus

Published: Dec. 8, 2020, 7:06 p.m.
Duration: 1 hour 4 minutes 2 seconds

Listed in: Technology

How to: Secure the Manufacturing Cell

Published: Dec. 7, 2020, 3:42 p.m.
Duration: 31 minutes 27 seconds

Listed in: Technology

Ron Brash: Problem fixer in critical infrastructure. [OT] [Career Notes]

Published: Dec. 6, 2020, 9:01 p.m.
Duration: 7 minutes 51 seconds

Listed in: Technology

Threat Intelligence Panel Cyber Senate Industrial Control Cybersecurity Europe

Published: Dec. 4, 2020, 8:05 p.m.
Duration: 38 minutes 14 seconds

Listed in: Technology

BEER and Cyber

Published: Dec. 3, 2020, 12:59 p.m.
Duration: 36 minutes 42 seconds

Listed in: Technology

November: ICS Security Month In Review

Published: Dec. 2, 2020, 6:09 p.m.
Duration: 55 minutes 53 seconds

Listed in: Technology

Published: Nov. 24, 2020, 3:03 p.m.
Duration: N/A

Listed in: Technology

Impact to ICS Security Effort with Dir. Krebs Firing

Published: Nov. 24, 2020, 8:57 a.m.
Duration: 41 minutes 51 seconds

Listed in: Technology

[The Industrial Security Podcast] 20,000 CPUs In An Average SkyScraper

Published: Nov. 16, 2020, 7:32 p.m.
Duration: 48 minutes 24 seconds

Listed in: Technology

From Triton to Stuxnet: Preparing for OT Incident Response

Published: Nov. 15, 2020, 2:47 p.m.
Duration: 24 minutes 15 seconds

Listed in: Technology

Increasing Threats to OT/ICS Assets Need a Robust Cybersecurity Program

Published: Nov. 15, 2020, 10:58 a.m.
Duration: 29 minutes 9 seconds

Listed in: Technology

Cybersecurity in Non-Critical Indudustries

Published: Nov. 14, 2020, 10:12 a.m.
Duration: 29 minutes 6 seconds

Listed in: Technology

Security in the New Normal

Published: Nov. 14, 2020, 10:12 a.m.
Duration: 24 minutes 17 seconds

Listed in: Technology

401 Access Denied Ep. 14 | OT Security: Scientific Sensors

Published: Nov. 9, 2020, 9:22 a.m.
Duration: 58 minutes 39 seconds

Listed in: Technology

Maersk Cyber Senate Fire Side Chat 7th annual ICS CyberSec Europe 2020

Published: Nov. 7, 2020, 8:52 p.m.
Duration: 33 minutes 11 seconds

Listed in: Technology

Panel Session ICS Europe 2020 CIA vs. Reliability and Safety

Published: Nov. 6, 2020, 7:23 p.m.
Duration: 37 minutes 59 seconds

Listed in: Technology

NCF-234 Cybersecurity Operations in the Military

Published: Nov. 5, 2020, 9:33 a.m.
Duration: 31 minutes 31 seconds

Listed in: Technology

111: Root Cause Analysis Best Practices

Published: Nov. 4, 2020, 5:53 p.m.
Duration: 17 minutes 44 seconds

Listed in: Technology

October: ICS Security Month In Review

Published: Nov. 3, 2020, 6:31 p.m.
Duration: 46 minutes 13 seconds

Listed in: Technology

[The Industrial Security Podcast] 83 Cyber Laws In The Pipe

Published: Nov. 2, 2020, 4:22 p.m.
Duration: 55 minutes 12 seconds

Listed in: Technology

David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]

Published: Nov. 1, 2020, 1:57 p.m.
Duration: 24 minutes

Listed in: Technology

29: Ensuring OT Integrity and Establishing a Culture of Security with Mark Carrigan, COO of PAS Global

Published: Oct. 30, 2020, 6:28 p.m.
Duration: 32 minutes 23 seconds

Listed in: Technology

Oil, Gas and Cybersecurity

Published: Oct. 29, 2020, 5:48 p.m.
Duration: 42 minutes 40 seconds

Listed in: Technology

Oil, Gas and Cybersecurity in the Middle East

Published: Oct. 29, 2020, 5:48 p.m.
Duration: 42 minutes 40 seconds

Listed in: Technology

Episode 226 - Faking a Factory: Creating and Operating a Realistic Honeypot - BlackHat Asia 2020 takeaway

Published: Oct. 28, 2020, 3:47 p.m.
Duration: 30 minutes 21 seconds

Listed in: Technology

95 | Intelligence Island | DARPA RADICS

Published: Oct. 27, 2020, 9:14 p.m.
Duration: 27 minutes 56 seconds

Listed in: Technology

IOCs and CVEs in the OT - Ep 002

Published: Oct. 26, 2020, 3:44 p.m.
Duration: 41 minutes 52 seconds

Listed in: Technology

401 Access Denied Ep. 13 | OT Security: Transportation with Shift5

Published: Oct. 21, 2020, 9:25 a.m.
Duration: 54 minutes 24 seconds

Listed in: Technology

[The Industrial Security Podcast] A Thousand People Panicking In Tunnels

Published: Oct. 19, 2020, 8:42 p.m.
Duration: 42 minutes 49 seconds

Listed in: Technology

ICS Gabe - Electrical Engineer to Accidental Cybersecurity ICS Expert

Published: Oct. 11, 2020, 10:48 p.m.
Duration: 58 minutes 53 seconds

Listed in: Technology

Protecting Air Travel from Cyberthreats

Published: Oct. 9, 2020, 7:24 p.m.
Duration: 5 minutes 49 seconds

Listed in: Technology

Ralph Langner (YouTube): MITRE ATT&CK for ICS and the Triconex evaluation

Published: Oct. 8, 2020, 8:46 p.m.
Duration: 8 minutes 18 seconds

Listed in: Technology

401 Access Denied Ep. 12 | OT Security: Introduction to OT Security with Chris Kubecka

Published: Oct. 7, 2020, 12:58 p.m.
Duration: 58 minutes 56 seconds

Listed in: Technology

September: ICS Security Month In Review

Published: Oct. 7, 2020, 12:49 p.m.
Duration: 26 minutes 49 seconds

Listed in: Technology

[The Industrial Security Podcast] Destroyed A 300 Ton Chiller

Published: Oct. 1, 2020, 9:54 p.m.
Duration: 53 minutes 14 seconds

Listed in: Technology

ATT&CK for ICS Evaluations

Published: Oct. 1, 2020, 11:25 a.m.
Duration: 49 minutes 12 seconds

Listed in: Technology

Where is the Cavalry?

Published: Sept. 28, 2020, 3:01 p.m.
Duration: 49 minutes 27 seconds

Listed in: Technology

Episode 29 - Insurance Surveys with Guest Bob Wasileski

Published: Sept. 26, 2020, 11:11 p.m.
Duration: 46 minutes 45 seconds

Listed in: Technology

GSX+ Daily: Chemical Security in a Crisis

Published: Sept. 24, 2020, 9:03 p.m.
Duration: 21 minutes 4 seconds

Listed in: Technology

Critical Industrial Flaws Pose a Patching Headache For Manufacturers

Published: Sept. 24, 2020, 9:03 p.m.
Duration: 22 minutes 28 seconds

Listed in: Technology

Protecting Your Control System From Cyber Attacks

Published: Sept. 22, 2020, 8:20 p.m.
Duration: 26 minutes 43 seconds

Listed in: Technology

Geopolitics: If You Want A Friend, Get A Dog

Published: Sept. 22, 2020, 8:15 p.m.
Duration: 54 minutes 44 seconds

Listed in: Technology

Splunk OT Security Add-On

Published: Sept. 16, 2020, 9:35 p.m.
Duration: 51 minutes 46 seconds

Listed in: Technology

Episode 145: Security Information Sharing & Analysis with Jim Linn

Published: Sept. 15, 2020, 9:02 p.m.
Duration: 31 minutes 36 seconds

Listed in: Technology

[The Industrial Security Podcast] Connection, Not Integration

Published: Sept. 7, 2020, 9:15 p.m.
Duration: 40 minutes 23 seconds

Listed in: Technology

73: WannaCry

Published: Sept. 5, 2020, 1:21 p.m.
Duration: 46 minutes 51 seconds

Listed in: Technology

What OT Can Learn From IT

Published: Sept. 5, 2020, 8:27 a.m.
Duration: 41 minutes 38 seconds

Listed in: Technology

The Future of War with P.W. Singer

Published: Sept. 1, 2020, 8:15 a.m.
Duration: 38 minutes 47 seconds

Listed in: Technology

Securing Manufacturing Industrial Control Systems: NIST NCCoE Resources At Your Fingertips

Published: Aug. 26, 2020, 10:29 p.m.
Duration: 39 minutes 13 seconds

Listed in: Technology

19: ‘Is the U.S. Doing Enough to Secure the Grid?’ with Joe Weiss of Applied Control Solutions

Published: Aug. 25, 2020, 8:41 p.m.
Duration: 26 minutes 44 seconds

Listed in: Technology

2020-032-Dr. Allan Friedman, SBOM, Software Transparency, and how the sausage is made - Part 2

Published: Aug. 24, 2020, 7:13 p.m.
Duration: 57 minutes 42 seconds

Listed in: Technology

2020-031-Allan Friedman, SBOM, software transparency, and knowing how the sausage is made

Published: Aug. 23, 2020, 12:10 a.m.
Duration: 44 minutes 50 seconds

Listed in: Technology

[The Industrial Security Podcast] Closing the Gap - P&I Diagrams For Security Engineering

Published: Aug. 21, 2020, 11:34 a.m.
Duration: 38 minutes 21 seconds

Listed in: Technology

DHS CISA's New Strategy

Published: Aug. 18, 2020, 9:38 p.m.
Duration: 46 minutes 11 seconds

Listed in: Technology

No Name Special: Інтерв'ю з @marmusha

Published: Aug. 16, 2020, 6:29 p.m.
Duration: 1 hour 28 minutes 28 seconds

Listed in: Technology

How Much Cybersecurity Do I Really Need?

Published: Aug. 14, 2020, 10:01 p.m.
Duration: 19 minutes 11 seconds

Listed in: Technology

SECARMY Podcast ft. Anton Shipulin

Published: Aug. 10, 2020, 6:22 p.m.
Duration: 17 minutes 33 seconds

Listed in: Technology

ICS Village & CISA Talk DEFCON And The Future Of Critical Infrastructure | Bryson Bort & Bryan Ware

Published: Aug. 6, 2020, 10:39 p.m.
Duration: 40 minutes 58 seconds

Listed in: Technology

Sharpening Your Defenses With MITRE ATT&CK’s New Sub-Techniques

Published: Aug. 6, 2020, 2:03 p.m.
Duration: 23 minutes 16 seconds

Listed in: Technology

July - ICS Security Month In Review

Published: Aug. 5, 2020, 10:06 p.m.
Duration: 53 minutes 2 seconds

Listed in: Technology

[The Industrial Security Podcast] Hospitals Upping Their Games

Published: Aug. 5, 2020, 6:33 p.m.
Duration: 29 minutes 25 seconds

Listed in: Technology

Sponsored Podcast: Why IT and OT Security Priorities 'Don't Translate'

Published: Aug. 4, 2020, 9:13 p.m.
Duration: 26 minutes 50 seconds

Listed in: Technology

Episode 139: Lessons Learned From Gas Utility Incidents with John Erickson

Published: Aug. 4, 2020, 9:56 a.m.
Duration: 34 minutes 43 seconds

Listed in: Technology

DtSR Episode 404 - The Wacky Wild World of OT

Published: July 24, 2020, 12:56 p.m.
Duration: 43 minutes 52 seconds

Listed in: Technology

Ransomware Goes Nuclear

Published: July 23, 2020, 6:13 p.m.
Duration: 52 minutes 54 seconds

Listed in: Technology

Episode 101: Trump & the CIA feat Kim Zetter

Published: July 21, 2020, 9:45 p.m.
Duration: 43 minutes 15 seconds

Listed in: Technology

Ian Anderson

Published: July 18, 2020, 8:11 p.m.
Duration: 20 minutes 35 seconds

Listed in: Technology

ARC's Eric Cosman on IEC/ISA 62443 cybersecurity series of standards Hosted by Larry O'Brien

Published: July 18, 2020, 10:29 a.m.
Duration: 50 minutes 22 seconds

Listed in: Technology

Deception Technology and Honeypots ft. Mikael Vingaard

Published: July 17, 2020, 1:05 p.m.
Duration: 29 minutes 6 seconds

Listed in: Technology

Unique Threats to OT and Cyber Physical Systems

Published: July 16, 2020, 1:29 p.m.
Duration: 33 minutes 35 seconds

Listed in: Technology

SECARMY Podcast ft. Patrick C Miller

Published: July 10, 2020, 7:55 a.m.
Duration: 23 minutes 45 seconds

Listed in: Technology

IIoT for Distributed Energy Resources

Published: July 9, 2020, 7:42 p.m.
Duration: 46 minutes 43 seconds

Listed in: Technology

Sponsored Podcast: Security Dangers in Rail Systems

Published: July 7, 2020, 8:11 p.m.
Duration: 23 minutes 37 seconds

Listed in: Technology

Peter Singer - Author of Burn In: A Novel About The Real Robotic Revolution

Published: July 7, 2020, 8:07 p.m.
Duration: 48 minutes 25 seconds

Listed in: Technology

Solutions spotlight: Take steps to ensure safety system readiness

Published: July 6, 2020, 9:30 p.m.
Duration: 19 minutes 21 seconds

Listed in: Technology

20: Cybersecurity, Startups, and Examining Unconscious Bias with Galina Antova

Published: July 6, 2020, 9:28 p.m.
Duration: 48 minutes 49 seconds

Listed in: Technology

Episode 24 - Emergency Planning & Response with The SafetyPro Podcast

Published: July 4, 2020, 11:33 p.m.
Duration: 23 minutes 52 seconds

Listed in: Technology

June - ICS Security Month In Review

Published: July 2, 2020, 5:32 p.m.
Duration: 57 minutes 9 seconds

Listed in: Technology

Beer ISAC, Beer ISAC podcast and other initiatives Kaspersky supports

Published: June 29, 2020, 10:24 a.m.
Duration: 45 minutes 13 seconds

Listed in: Technology

Security Monitoring Cloud Infrastructure for the Rail Sector

Published: June 25, 2020, 11:50 p.m.
Duration: 1 hour 42 minutes 15 seconds

Listed in: Technology

Building & Using Digital Twins

Published: June 25, 2020, 6:53 p.m.
Duration: 42 minutes 39 seconds

Listed in: Technology

68: Triton

Published: June 23, 2020, 1:11 p.m.
Duration: 1 hour 15 minutes 29 seconds

Listed in: Technology

Episode 23 - Incident Investigation with The SafetyPro Podcast

Published: June 20, 2020, 11:37 p.m.
Duration: 37 minutes 27 seconds

Listed in: Technology

Cybersecurity Mini-Series: ICS Product Security & Standards (ISA/IEC 62443) (Ep. 4 of 4)

Published: June 20, 2020, 9:04 a.m.
Duration: 31 minutes 32 seconds

Listed in: Technology

Joe Weiss on Electronic Control Systems Security

Published: June 19, 2020, 9:15 a.m.
Duration: 31 minutes 47 seconds

Listed in: Technology

OT Cyber Security Podcast - Episode 6 - The Culture of Industrial Safety and NERC/CIP

Published: June 17, 2020, 7:35 p.m.
Duration: 21 minutes 32 seconds

Listed in: Technology

Matt Wyckhouse: Testing ICS Firmware Security & Supply Chains

Published: June 17, 2020, 8:51 a.m.
Duration: 50 minutes 49 seconds

Listed in: Technology

Industrial Cybersecurity: From HVAC Systems to Conveyor Belts

Published: June 16, 2020, 6:41 p.m.
Duration: 25 minutes 37 seconds

Listed in: Technology

Cybersecurity Mini-Series: Defense in Depth & NIST Framework (Ep. 3 of 4)

Published: June 13, 2020, 9:35 p.m.
Duration: 42 minutes 47 seconds

Listed in: Technology

Cybersecurity Mini-Series: Security Fundamentals & “Cyber Hygiene” (Ep. 2 of 4)

Published: June 13, 2020, 9:34 p.m.
Duration: 33 minutes 15 seconds

Listed in: Technology

Cybersecurity Mini-Series: Why Security Matters (Ep. 1 of 4)

Published: June 13, 2020, 9:34 p.m.
Duration: 38 minutes 13 seconds

Listed in: Technology

Interview with Albert Rooyakkers the CEO of Bedrock Automation Hosted by Rick Rys

Published: June 13, 2020, 5:45 p.m.
Duration: 25 minutes 6 seconds

Listed in: Technology

Targeted Ransomware At A Pharma Plant

Published: June 11, 2020, 11:31 p.m.
Duration: 1 hour 2 minutes 15 seconds

Listed in: Technology

PSM: Back to Basics, Part 4 - Management of Change (MOC)

Published: June 5, 2020, 10:59 p.m.
Duration: 13 minutes 58 seconds

Listed in: Technology

May: ICS Security Month In Review

Published: June 5, 2020, 11:09 a.m.
Duration: 56 minutes 17 seconds

Listed in: Technology

Episode 16: Ron Brash ICS/OT Expert

Published: June 3, 2020, 9:55 a.m.
Duration: 22 minutes 25 seconds

Listed in: Technology

Wrangling Security Issues Associated with IT/OT Convergence

Published: June 1, 2020, 3:49 p.m.
Duration: 9 minutes 49 seconds

Listed in: Technology

PSM: Back to Basics, Part 3 - Process Hazard Analysis (PHA)

Published: May 29, 2020, 3:41 p.m.
Duration: 14 minutes 38 seconds

Listed in: Technology

COVID-19 Impact In ICS Security

Published: May 28, 2020, 7:02 p.m.
Duration: 24 minutes 9 seconds

Listed in: Technology

People have been hurt believing just one gauge

Published: May 27, 2020, 1:58 p.m.
Duration: 43 minutes 47 seconds

Listed in: Technology

Practical improvements for the cybersecurity of your process operations, organizations

Published: May 26, 2020, 5:56 p.m.
Duration: 23 minutes 12 seconds

Listed in: Technology

PSM: Back to Basics, Part 2 - Open Source Resources

Published: May 25, 2020, 6:04 p.m.
Duration: 24 minutes 21 seconds

Listed in: Technology

PSM: Back to Basics, Part 1 - Acronyms

Published: May 17, 2020, 5:14 p.m.
Duration: 32 minutes 14 seconds

Listed in: Technology

Gangnam Industrial Style APT campaign targets South Korea. [Research Saturday]

Published: May 16, 2020, 2:52 p.m.
Duration: 21 minutes 9 seconds

Listed in: Technology

Chemical Facilities Cybersecurity

Published: May 15, 2020, 6:18 p.m.
Duration: 6 minutes 46 seconds

Listed in: Technology

Connecting with your local gurus

Published: May 14, 2020, 5:54 p.m.
Duration: 36 minutes 16 seconds

Listed in: Technology

Season 2 Episode #7 | NERC CIP and ISO 27001

Published: May 14, 2020, 7:55 a.m.
Duration: 29 minutes 44 seconds

Listed in: Technology

S4x20 Closing Panel

Published: May 13, 2020, 1:43 p.m.
Duration: 42 minutes

Listed in: Technology

Cybersecurity and Intelligent Buildings with Larry O'Brien and Eduard Fidler Hosted by Jim Frazer

Published: May 5, 2020, 7:08 a.m.
Duration: 19 minutes 19 seconds

Listed in: Technology

ICS with Gabe: Episode 4 | Zohar Rozenberg

Published: May 4, 2020, 8:34 a.m.
Duration: 52 minutes 45 seconds

Listed in: Technology

Episode 22 - Establishing an Alarm Management Program 101 with Guest Curt Snyder

Published: May 1, 2020, 7:44 p.m.
Duration: 53 minutes 56 seconds

Listed in: Technology

Blockchains for Industrial Security

Published: April 30, 2020, 6:32 p.m.
Duration: 59 minutes 7 seconds

Listed in: Technology

Interview with Inventor & Legend Ed Schweitzer

Published: April 22, 2020, 7:20 a.m.
Duration: 34 minutes 43 seconds

Listed in: Technology

What have we learned from significant incidents?

Published: April 18, 2020, 10:56 a.m.
Duration: 23 minutes 39 seconds

Listed in: Technology

OT Cyber Security Podcast - Episode 5 - Just because you can doesn't mean you should

Published: April 18, 2020, 8:44 a.m.
Duration: 34 minutes 16 seconds

Listed in: Technology

Episode 21 - ISA 84 & IEC 61511-1 with Guest Curt Snyder

Published: April 17, 2020, 7:33 p.m.
Duration: 50 minutes 39 seconds

Listed in: Technology

Safety protects the man from the machine, security the reverse

Published: April 16, 2020, 9:07 p.m.
Duration: 50 minutes 56 seconds

Listed in: Technology

Ensuring Mobile Device Safety and Security for Industrial Use

Published: April 16, 2020, 7:14 a.m.
Duration: 14 minutes 48 seconds

Listed in: Technology

Interview with Bryan Owen of OSIsoft

Published: April 14, 2020, 6:45 p.m.
Duration: 42 minutes 40 seconds

Listed in: Technology

ICS with Gabe: Episode 3 | What's New? | Experiential

Published: April 14, 2020, 6:20 p.m.
Duration: 15 minutes 33 seconds

Listed in: Technology

Larry O'Brien and Jim Frazer Interview Joel Rakow of Fortium Partners

Published: April 13, 2020, 8:02 p.m.
Duration: 40 minutes 29 seconds

Listed in: Technology

Internet of Things

Published: April 13, 2020, 3:41 p.m.
Duration: 29 minutes 13 seconds

Listed in: Technology

Critical Infrastructure Cybersecurity: Watchdog Report Deep Dig Edition

Published: April 9, 2020, 3:28 p.m.
Duration: 22 minutes 24 seconds

Listed in: Technology

Convergence of Safety and Cybersecurity with Larry O'Brien

Published: April 7, 2020, 6:18 p.m.
Duration: 43 minutes 37 seconds

Listed in: Technology

Tenable's OT Strategy with Marty Edwards

Published: April 7, 2020, 5:50 p.m.
Duration: 44 minutes 12 seconds

Listed in: Technology

1800 sites: air gaps, Windows XP and evolving due diligence

Published: April 2, 2020, 8:38 a.m.
Duration: 53 minutes 22 seconds

Listed in: Technology

Board of Directors Role in ICS Security with Thomas Parenty

Published: March 31, 2020, 8:43 p.m.
Duration: 53 minutes 35 seconds

Listed in: Technology

BAM 203: Setting up remote access

Published: March 31, 2020, 7:58 a.m.
Duration: 25 minutes 3 seconds

Listed in: Technology

Episode 120: Risk Management -- How to Start with Justin Shannon

Published: March 29, 2020, 11:40 p.m.
Duration: 32 minutes 29 seconds

Listed in: Technology

OT Cyber Security Podcast - Episode 4 - Automation is the answer

Published: March 27, 2020, 1:16 p.m.
Duration: 22 minutes 25 seconds

Listed in: Technology

ICS Threat Intel with Sergio Caltagirone

Published: March 24, 2020, 11:23 p.m.
Duration: 46 minutes 20 seconds

Listed in: Technology

Industrial Defender Returns

Published: March 19, 2020, 11:02 a.m.
Duration: 51 minutes 43 seconds

Listed in: Technology

An Interview with Andy Greenberg - Author of Sandworm

Published: March 19, 2020, 11:01 a.m.
Duration: 36 minutes 47 seconds

Listed in: Technology

OT Cyber Security Podcast Episode 3 Mmm, drop!

Published: March 16, 2020, 9:40 p.m.
Duration: 20 minutes 31 seconds

Listed in: Technology

We can handle disruption – Not destruction

Published: March 5, 2020, 4:21 p.m.
Duration: 1 hour 11 minutes 23 seconds

Listed in: Technology

Kelly Jackson Higgins Interviews Dale

Published: March 4, 2020, 6:54 a.m.
Duration: 32 minutes 24 seconds

Listed in: Technology

Is Inherently Safer Design really safer?

Published: Feb. 28, 2020, 6:36 p.m.
Duration: 27 minutes 31 seconds

Listed in: Technology

Transatlantic Cable Podcast - Episode 130

Published: Feb. 25, 2020, 9:15 p.m.
Duration: 30 minutes 52 seconds

Listed in: Technology

The Cabana Sessions

Published: Feb. 25, 2020, 6:22 p.m.
Duration: 23 minutes 47 seconds

Listed in: Technology

Canadian Initiatives for Industrial Security

Published: Feb. 20, 2020, 12:11 p.m.
Duration: 43 minutes 29 seconds

Listed in: Technology

Episode 17 - Tips for a Successful PHA

Published: Feb. 16, 2020, 10:51 p.m.
Duration: 29 minutes 1 second

Listed in: Technology

What is Functional Machine Safety?

Published: Feb. 16, 2020, 10:49 p.m.
Duration: 21 minutes

Listed in: Technology

Megan Samford on ICS4ICS

Published: Feb. 13, 2020, 6:29 a.m.
Duration: 26 minutes 6 seconds

Listed in: Technology

BAM 196: Cybersecurity 101 with Fred Gordy

Published: Feb. 10, 2020, 2:45 p.m.
Duration: 52 minutes 38 seconds

Listed in: Technology

NCF-SR13 Department of Homeland Security and CISA

Published: Feb. 7, 2020, 8:19 a.m.
Duration: 33 minutes 40 seconds

Listed in: Technology

Unhackable Safeguards

Published: Feb. 6, 2020, 11:20 p.m.
Duration: 50 minutes

Listed in: Technology

Interview with DHS CISA Director Chris Krebs

Published: Feb. 6, 2020, 7:09 a.m.
Duration: 31 minutes 52 seconds

Listed in: Technology

ICS with Gabe: Episode 2 | ICS/OT Cybersecurity Certifications)

Published: Jan. 31, 2020, 5:58 p.m.
Duration: 32 minutes 23 seconds

Listed in: Technology

Triton, Part 2: The World’s Most Dangerous Malware

Published: Jan. 30, 2020, 3:26 p.m.
Duration: 38 minutes 48 seconds

Listed in: Technology

20 minutes on S4x2020

Published: Jan. 29, 2020, 11:44 a.m.
Duration: 20 minutes 27 seconds

Listed in: Technology

Know Thine Enemy - Identifying North American Cyber Threats. [Research Saturday]

Published: Jan. 26, 2020, 6:29 p.m.
Duration: 29 minutes 57 seconds

Listed in: Technology

Your Human Supply Chain

Published: Jan. 24, 2020, 1:32 p.m.
Duration: 49 minutes 1 second

Listed in: Technology

Triton: A Malware Designed To Kill Humans, Part 1

Published: Jan. 21, 2020, 9:54 p.m.
Duration: 36 minutes 22 seconds

Listed in: Technology

Reality Check: How Vulnerable Is the Power Grid?

Published: Jan. 14, 2020, 5:43 p.m.
Duration: 16 minutes 36 seconds

Listed in: Technology

Know more about your system than attackers do

Published: Jan. 2, 2020, 7:28 p.m.
Duration: 56 minutes 4 seconds

Listed in: Technology

OT Cyber Security Podcast - Episode 2 - What is Operational Technology

Published: Jan. 2, 2020, 6:41 p.m.
Duration: 32 minutes 10 seconds

Listed in: Technology

OT Cyber Security Podcast - Episode 1 - The State of the State

Published: Jan. 2, 2020, 6:40 p.m.
Duration: 22 minutes 27 seconds

Listed in: Technology

Edge Computing - More than a hype!?

Published: Dec. 29, 2019, 2:16 p.m.
Duration: 25 minutes 9 seconds

Listed in: Technology

54: NotPetya

Published: Dec. 24, 2019, 11:10 a.m.
Duration: 1 hour 2 minutes 29 seconds

Listed in: Technology

Xage VP Roman Arutyunov on ComEd

Published: Dec. 18, 2019, 9:56 a.m.
Duration: 51 minutes 16 seconds

Listed in: Technology

Xage VP Roman Arutyunov

Published: Dec. 18, 2019, 9:56 a.m.
Duration: 46 minutes 54 seconds

Listed in: Technology

Episode 106: Cyber Security Monitoring & Incident Response with Pascal Ackerman

Published: Dec. 17, 2019, 11:13 a.m.
Duration: 29 minutes

Listed in: Technology

Joe Weiss' ground-up view of cybersecurity

Published: Dec. 17, 2019, 7 a.m.
Duration: 25 minutes 45 seconds

Listed in: Technology

NCF-163 Cybersecurity Energy Security and Emergency Response

Published: Dec. 16, 2019, 6:21 p.m.
Duration: 28 minutes 27 seconds

Listed in: Technology

Achieving IEC 62443-3-3 Security Level 3 for Rail Automation Systems

Published: Dec. 14, 2019, 7:43 a.m.
Duration: 17 minutes 6 seconds

Listed in: Technology

Product Security at GE

Published: Dec. 13, 2019, 1:26 p.m.
Duration: 55 minutes 54 seconds

Listed in: Technology

Episode 13 - Incident Investigation Framework

Published: Dec. 7, 2019, 11:06 p.m.
Duration: 24 minutes 16 seconds

Listed in: Technology

Target USA -- Episode 199: Countries are scared to reveal cyber attacks

Published: Dec. 7, 2019, 9:51 a.m.
Duration: 32 minutes

Listed in: Technology

Cyber and industrial focus at US CISA

Published: Nov. 28, 2019, 1:20 p.m.
Duration: 54 minutes 8 seconds

Listed in: Technology

Season 2 Episode #2 | The Path Forward for Resiliency: From Policy to Simulation

Published: Nov. 26, 2019, 7:36 a.m.
Duration: 31 minutes 11 seconds

Listed in: Technology

Season 2 Episode #1 | It’s All About Telecommunications

Published: Nov. 24, 2019, 2:46 p.m.
Duration: 41 minutes 9 seconds

Listed in: Technology

Episode 12 - Risk Matrices

Published: Nov. 24, 2019, 2:44 p.m.
Duration: 22 minutes 47 seconds

Listed in: Technology

Season 2 Episode #3 | Cybersecurity – Are We Really Prepared?

Published: Nov. 22, 2019, 9:57 p.m.
Duration: 49 minutes 40 seconds

Listed in: Technology

The Dark Web's Automobile Hacking Forums

Published: Nov. 17, 2019, 7:30 p.m.
Duration: 11 minutes 20 seconds

Listed in: Technology

How Scary Is Critical Infrastructure Hacking?

Published: Nov. 15, 2019, 7:43 p.m.
Duration: 35 minutes 52 seconds

Listed in: Technology

When Numbers Are Scarce

Published: Nov. 14, 2019, 7:04 p.m.
Duration: 41 minutes 27 seconds

Listed in: Technology

Cyber Security: It's not if you'll be hacked -- it's when.

Published: Nov. 12, 2019, 5:53 a.m.
Duration: 16 minutes 8 seconds

Listed in: Technology

Säkerhetspodcasten #166 - CS3STHLM 2019

Published: Nov. 11, 2019, 5:07 p.m.
Duration: 1 hour 15 minutes 28 seconds

Listed in: Technology

Episode 2 - Intro to PHAs

Published: Nov. 11, 2019, 10:36 a.m.
Duration: 25 minutes 14 seconds

Listed in: Technology

We're On Fire! - ESW #159

Published: Nov. 9, 2019, 5:28 p.m.
Duration: 1 hour 25 minutes 46 seconds

Listed in: Technology

Ep 50: Operation Glowing Symphony

Published: Nov. 6, 2019, 10:29 p.m.
Duration: 1 hour 14 minutes 10 seconds

Listed in: Technology

Managed or unmanaged switches? Exploring the benefits of network automation

Published: Nov. 1, 2019, 10:59 p.m.
Duration: 24 minutes 10 seconds

Listed in: Technology

Weakness at your boundaries

Published: Nov. 1, 2019, 10:59 p.m.
Duration: 27 minutes 19 seconds

Listed in: Technology

Feature Podcast: Critical infrastructure security with Eric Rosenbach and Robert M Lee

Published: Oct. 31, 2019, 9:03 p.m.
Duration: 50 minutes 40 seconds

Listed in: Technology

Malcolm – A New (Free, INL) Tool for Network Visibility

Published: Oct. 31, 2019, 8:59 p.m.
Duration: 39 minutes 12 seconds

Listed in: Technology

An Interview with Marina Krotofil

Published: Oct. 30, 2019, 4 p.m.
Duration: 51 minutes 57 seconds

Listed in: Technology

Sean McBride on ICS Security Education and Degree Programs

Published: Oct. 18, 2019, 7:59 a.m.
Duration: 45 minutes 8 seconds

Listed in: Technology

Build, Break & Secure

Published: Oct. 17, 2019, 7:03 p.m.
Duration: 41 minutes 50 seconds

Listed in: Technology

Can we protect our National Critical Infrastructure from a major cyber-attack?

Published: Oct. 14, 2019, 11:10 p.m.
Duration: 18 minutes 35 seconds

Listed in: Technology

URGENT/11 Vulnerabilities: Taking Action

Published: Oct. 14, 2019, 10:47 p.m.
Duration: 13 minutes 6 seconds

Listed in: Technology

BAM 182: Cyber Security for BAS Professionals

Published: Oct. 14, 2019, 8:15 p.m.
Duration: 34 minutes 16 seconds

Listed in: Technology

Season 2, Episode 38: Issues In Cyber & Insider Threat Risk Management

Published: Oct. 11, 2019, 10:49 p.m.
Duration: 22 minutes 44 seconds

Listed in: Technology

Episode 96: Process Safety Management and Alarm Management with Stephen Swanson

Published: Oct. 10, 2019, 9:56 p.m.
Duration: 35 minutes 33 seconds

Listed in: Technology

Three Networks – IT, OT & Engineering

Published: Oct. 7, 2019, 10:01 p.m.
Duration: 59 minutes 22 seconds

Listed in: Technology

An Interview with Patrick Miller

Published: Oct. 7, 2019, 9:20 a.m.
Duration: 51 minutes 48 seconds

Listed in: Technology

Electric Grid Cybersecurity

Published: Sept. 27, 2019, 10:29 a.m.
Duration: 7 minutes 57 seconds

Listed in: Technology

Season 2, Episode 34: Insider Threat Awareness

Published: Sept. 23, 2019, 11:18 a.m.
Duration: 11 minutes

Listed in: Technology

Layer Zero Anomaly Detection

Published: Sept. 20, 2019, 4:40 a.m.
Duration: 42 minutes 59 seconds

Listed in: Technology

Episode 92: Unique Cyber Security Requirements for Pipelines with Pascal Ackerman

Published: Sept. 10, 2019, 7:42 p.m.
Duration: 33 minutes 27 seconds

Listed in: Technology

Smart Building Cyber Security - The Challenge of IT/OT Convergence

Published: Sept. 9, 2019, 10:37 p.m.
Duration: 4 minutes 17 seconds

Listed in: Technology

Risky Biz Soap Box: MITRE ATT&CK framework is now officially everywhere

Published: Sept. 8, 2019, 10:16 a.m.
Duration: 45 minutes 48 seconds

Listed in: Technology

Where Do Your Bits Really Come From? – Eric Byres

Published: Sept. 6, 2019, 7:32 a.m.
Duration: 54 minutes 49 seconds

Listed in: Technology

Mikko Hyppönen Discusses When It’s OK to Respond to a Cyber Attack with Missiles

Published: Aug. 29, 2019, 2:09 a.m.
Duration: 53 minutes 39 seconds

Listed in: Technology

Be Brave When Assessing Risks – Mark Fabro

Published: Aug. 22, 2019, 5:32 p.m.
Duration: 59 minutes 17 seconds

Listed in: Technology

5 Questions for Cybersecurity Expert Jaime Foose

Published: Aug. 17, 2019, 11:25 a.m.
Duration: 10 minutes 33 seconds

Jim: Hi, everyone, and welcome to another edition of “5 questions for an Emerson Expert.” Today, I’m joined by Jaime Foose. Jaime is a Director of Security Solutions and Lifecycle Shared Services in our Power and Water Solutions (PWS) business unit. Jaime received her bachelor’s degree in computer science with a minor in Mathematics, as well as also attaining an MBA and a Master of Science in IT project management. Wow. That’s an impressive academic career. Welcome, Jaime.

Jaime: Thanks, Jim. It’s great to be here today.

Jim: Well, it’s great having you. So I always like to start out because some of the courses, computer science, mathematics, and then some business and some IT, all in there. So what made you decide to pursue a STEM-based career?

Jaime: So, Jim, I’d always had an interest in computers, but my college career didn’t start out there. I started in another science field. Actually, because when I was in eighth grade, I had a teacher that had told me he didn’t think I’d be able to pass college-level calculus. And that had always stuck with me for a really long time, so much so that I didn’t pursue computer science. In the summers, when I was going to college, I worked for Kelly Temporary Services, and I ran into a lady that worked for a gas company, and I was working as an admin that summer. And I told her about my college background in history and this teacher that had really gotten in my head. And she really encouraged me to pursue my dream and really chase doing computer science. So I went back to school that fall, changed my major to computer science, made it through all the calculus courses just fine, and ended up finishing with my computer science degree, just one semester extra to do that. And then found that it led me here to Emerson. So it was a really fantastic change that I made.

Jim: Well, that’s a great story. It’s nice that there was a person along the way that spurred you on and overcame some negative about how difficult it was or whatever. I hope other people are a force of being positive with other younger people to encourage them along. So from there, I guess with that background, what led you to a career in the field of process automation, and I guess more specifically, in your area, cybersecurity for control systems?

Jaime: Sure. So when I first started, I don’t think I really even realized what industry I was getting into. I used the placement services of the university I attended for job placement and actually interviewed with Westinghouse at the time. And so, this was right when PWS had just been acquired by Emerson. And in my hometown, Westinghouse had a fantastic name. And if you got offered a job from Westinghouse, you took it. So I had this great interview with a great company. I didn’t really know all that much about process automation, but I knew it was a good company. And that’s how I joined. When I first started, I worked on communication interfaces, and just did a lot of different work in a lot of different areas, but always seemed to gravitate towards new things or things that were just a little bit more challenging or tricky. So in 2008, we saw a big increase in cybersecurity concerns around power generation.

And this was really in tune with when NERC CIP [North American Reliability Corporation Critical Infrastructure Protection] started making regulatory obligations, you know, requirements for power generators. And we started seeing this in the business and coming in through different requests for proposal. And so I took on that challenge to try to understand what exactly was going on in our industry. You know, for a long time, cyber had been a problem for financial industries and retail industries, but now was really hitting home in power. I felt like this was an area that I could dig into and really help, not only ease the burden for our customers, but also for our company as well. And that’s kind of how I ended up in cybersecurity realm.

Jim: Well, that’s great. And we’ll have a follow-on podcast, at some point, to dig more into that specific area. But for right now, tell us about a recent challenge that you’ve been working on to solve.

Jaime: Sure. So, a recent challenge that’s facing, not only our customers, but also Emerson as a whole is this idea of what’s called a Transient Cyber Asset. And so what that means, these are devices, computers, USB sticks, or other electronic equipment that come and go on the control system. So it might be like a maintenance laptop or the USB stick a field service engineer has in their pocket. In power space, our customers are now required to apply some base level security controls for those devices and implement them across their different systems to make sure that, for any devices entering into the control system network, there’s some core security controls. So, for our customers, that means they have to inventory everything, not only internally, but also systems that their vendors bring on site. And then make sure that their vendor systems are secured and able to work on the control system.

This is a really big challenge for us in field service area, because up until now we’ve been very accustomed to using our own Emerson provided laptops to perform this type of work. And we’ve been able to do this for upgrades or other maintenance activities. Now we have to figure out, not only how can we continue to do our job effectively and efficiently, but do it under these new controls and restrictions of using a Transient Cyber Asset. So, not only we’re working right now to figure out how that impacts Emerson and what types of things we can put in place to help our customers, we also have several jobs with customers right now helping them inventory their Transient Cyber Assets, and apply some basic cyber controls. The standard for this goes into effect on January, so we’re starting to really see a big uptick in concern around Transient Cyber Assets.

Jim: Well, yeah, that sounds like it really raises the degree of difficulty, just from, it’s one thing to secure everything that’s known and fixed and part of the control system, but when you have these electronic devices and USB sticks coming and going, that really sounds challenging and a meaty problem to be working on. So enough about all this about automation, cybersecurity, and all this. So once we get outside the world of process automation, what do you enjoy doing in your spare time?

Jaime: I have two little girls. They’re 9 and 10, so they really keep me busy. They love to swim, actually, we all love to swim, so we spend a lot of time at the pool, especially, it’s been pretty hot here in Pittsburgh lately, so we’ve been doing that. Also, spend a lot of time at the movies. We’re big Marvel movie fans. And so we’ve been busy this spring and summer catching up on all of that. And when we’re not doing that, we participate in Community 5K races as a family and with friends, now, whether we’re walking or running, just some community engagement, and trying to stay healthy. We do some volunteering as well with the Light of Life Rescue Mission for the women and children’s program. So I spend one Tuesday a month down there. And then we’ve also been working as volunteers with the Agapao Ministries, they are serving the refugees that have been placed here in Pittsburgh. So, some fun and volunteering and exercise all rolled into one, is what keeps us busy in the off time.

Jim: Wow. That sounds like busy. So staying healthy and fit, and volunteering your time, and all of that, that’s really great. And I guess the final of the 5 questions, we have a lot of newcomers joining our ranks both in our world of process automation and power producers, and other manufacturing industries, and everything else. So what advice would you have for someone new coming into the field, I guess, especially around the area that you see in cybersecurity?

Jaime: Advice I’d give to anyone new coming into this field or any field really is to follow your passion. Don’t let other people, you know, tell you what you can and can’t do. Certainly, set your mind to what you’d like to accomplish and work hard. I can’t stress enough, you know, being the hardest worker in the room and really putting your full self into it.

Specific to the field of cybersecurity or process automation, I think it’s actually a fantastic field where you can have an impact on the critical infrastructure of the world. When you think about the systems that we’re securing, you know, they’re helping to provide energy and water, and really maintaining our way of life as we know it. Every night when we go home, the air conditioning is on, the lights are on, we have clean drinking water. Securing those systems and making sure that they are protected from attack is really a noble, noble cause that people can join in and make a difference. And so, it’s an exciting field. It’s always changing. Every day there’s something new. And so for folks that are interested in staying up to date with the latest and greatest, and never getting bored, cyber and process automation is a great place to be.

Jim: Wow. It sounds like, yeah, everybody knows if the power is not making its way to their house, or there’s a problem with the water or something else. So, yeah, this may be the noblest of noble causes. Well, thank you so much for joining us today, Jaime, and I look forward when we do round two here in a little while.

Jaime: Thanks, Jim. Me too, looking forward to it.

End of Transcript

Visit the ICS Cyber Security section on Emerson.com for more ways to protect your distributed control system and other elements of your operational technology infrastructure.



The podcast and artwork embedded on this page are from Jim Cahill, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

-->

Listed in: Technology

Feature Podcast: Inaction is escalatory

Published: Aug. 15, 2019, 10:02 p.m.
Duration: 31 minutes 33 seconds

Listed in: Technology

How Often Should You Upgrade Your Industrial Network?

Published: Aug. 15, 2019, 11:08 a.m.
Duration: 20 minutes 17 seconds

Listed in: Technology

Season 2, Episode 14: Patrick Coyle on Risk Reporting in The Chemical Sector

Published: Aug. 14, 2019, 5:27 p.m.
Duration: 10 minutes 30 seconds

Listed in: Technology

S4x19 Closing Panel

Published: Aug. 14, 2019, 3:03 p.m.
Duration: 37 minutes 57 seconds

Listed in: Technology

Starting From Zero – Lyndon Hall of Iron Spear

Published: Aug. 11, 2019, 11:27 a.m.
Duration: 53 minutes 26 seconds

Listed in: Technology

Michael Farnum Chats about ICS Security

Published: Aug. 5, 2019, 10:01 p.m.
Duration: 1 hour 16 minutes 48 seconds

Listed in: Technology

Industry 4.0: Cyber Securing Legacy Systems across the Business

Published: Aug. 4, 2019, 8:48 a.m.
Duration: 36 minutes 21 seconds

Listed in: Technology

OPAF update: O-PAS Version 1.0 explained

Published: July 31, 2019, 4:57 p.m.
Duration: 28 minutes 28 seconds

Listed in: Technology

We can only secure what we know we have – Rick Kaun

Published: July 28, 2019, 11:30 p.m.
Duration: 59 minutes 17 seconds

Listed in: Technology

Rockwell Automation Cybersecurity

Published: July 17, 2019, 9:17 p.m.
Duration: 1 hour 8 minutes 41 seconds

Listed in: Technology

Efficiency Through Security – Greg Hale

Published: July 12, 2019, 5:39 p.m.
Duration: 52 minutes 8 seconds

Listed in: Technology

Episode 79: Bellingham Incident 20-Year Anniversary - Personal Story with Larry Shelton

Published: June 30, 2019, 9:36 p.m.
Duration: 38 minutes 24 seconds

Listed in: Technology

Forescout's Strategy Post SecurityMatters Acquisition

Published: June 29, 2019, 2:18 p.m.
Duration: 54 minutes 28 seconds

Listed in: Technology

Configuring Wireless Networks for Mobile Use

Published: June 27, 2019, 10:39 p.m.
Duration: 27 minutes 37 seconds

Listed in: Technology

Ep 41: Just Visiting

Published: June 27, 2019, 10:36 p.m.
Duration: 51 minutes 16 seconds

Listed in: Technology

Tips for Recruiting and being Recruited into Industrial Security Positions

Published: June 27, 2019, 10:21 p.m.
Duration: 26 minutes

Listed in: Technology

Munich Airport – Security Challenges and Information Security Hub

Published: June 13, 2019, 7:44 p.m.
Duration: 39 minutes 36 seconds

Listed in: Technology

An Interview With Jonathan Homer of DHS

Published: June 12, 2019, 8:20 p.m.
Duration: 38 minutes 9 seconds

Listed in: Technology

Episode 78: Risk Management in Pipeline Operations with Justin Shannon

Published: June 4, 2019, 11:23 a.m.
Duration: 33 minutes 12 seconds

Listed in: Technology

ICS Firewall Market & Scoring SW/FW

Published: June 4, 2019, 11:18 a.m.
Duration: 1 hour 2 minutes 15 seconds

Listed in: Technology

Threat Detection & Response: What's the right solution for your company? Sid Snitkin-ARC Forum 2019

Published: June 4, 2019, 11:16 a.m.
Duration: 23 minutes 32 seconds

Listed in: Technology

Water Services Security at the City of Calgary

Published: May 31, 2019, 8:04 a.m.
Duration: 47 minutes 58 seconds

Listed in: Technology

Running with Scissors – with Patrick Miller

Published: May 19, 2019, 11:07 a.m.
Duration: 46 minutes 52 seconds

Listed in: Technology

IoT Trojectory Podcast - Episode 10 - IoT Trends with IIOT World

Published: May 17, 2019, 9:09 p.m.
Duration: 19 minutes 22 seconds

Listed in: Technology

Truth or Consequences?

Published: May 15, 2019, 8:58 p.m.
Duration: 38 minutes 59 seconds

Listed in: Technology

Billy Ray Built a Meth Lab - Paul's Security Weekly #603

Published: May 11, 2019, 2:58 p.m.
Duration: 2 hours 55 minutes 27 seconds

Listed in: Technology

Foundations for a Winning Operational Technology (OT) Security Strategy

Published: May 8, 2019, 1:45 a.m.
Duration: 22 minutes 14 seconds

Listed in: Technology

Israeli Cybersecurity – Dr. Gabi Siboni

Published: May 7, 2019, 12:10 a.m.
Duration: 42 minutes 23 seconds

Listed in: Technology

Deep Learning threatens 3D medical imaging integrity. [Research Saturday]

Published: April 27, 2019, 2:21 p.m.
Duration: 24 minutes 47 seconds

Listed in: Technology

IT vs OT – Challenges and Opportunities

Published: April 25, 2019, 8:48 p.m.
Duration: 32 minutes 39 seconds

Listed in: Technology

The Cybersecurity Pros and Cons of Smart Instruments: Part 1

Published: April 19, 2019, 9:58 a.m.
Duration: 22 minutes 59 seconds

Listed in: Technology

Classifying Control Systems, Consequences and Criticality

Published: April 11, 2019, 1:13 p.m.
Duration: 32 minutes 6 seconds

Listed in: Technology

Rick Kaun of Verve Industrial - Episode 24

Published: April 3, 2019, 9:53 a.m.
Duration: 27 minutes 59 seconds

Listed in: Technology

Maritime Cybersecurity

Published: April 3, 2019, 7:50 a.m.
Duration: 52 minutes 40 seconds

Listed in: Technology

Alarming vulnerabilities in automotive security systems. [Research Saturday]

Published: March 31, 2019, midnight
Duration: 22 minutes 22 seconds

Listed in: Technology

Steve Newcomer of Phoenix Contact - Episode 22

Published: March 29, 2019, 9:16 a.m.
Duration: 36 minutes 20 seconds

Listed in: Technology

DtSR Episode 339 - Insuring Against Acts of Cyber War

Published: March 28, 2019, 10:37 p.m.
Duration: 47 minutes 48 seconds

Listed in: Technology

Critical Infrastructure Security In Israel – Buki Carmeli

Published: March 28, 2019, 10:35 p.m.
Duration: 55 minutes 32 seconds

Listed in: Technology

The Threatpost Podcast: The Norsk Hydro Cyberattack and Manufacturing Security

Published: March 22, 2019, 6:42 p.m.
Duration: 22 minutes 23 seconds

Listed in: Technology

RSA Conference / ICS Village Report

Published: March 21, 2019, 11:57 a.m.
Duration: 25 minutes 1 second

Listed in: Technology

EP038 - Security and Trustworthiness in IoT Deployments - An Interview with Sven Schrecker of Intel

Published: March 18, 2019, 12:49 p.m.
Duration: 49 minutes 26 seconds

Listed in: Technology

German Initiatives and Progress in Cybersecurity

Published: March 17, 2019, 1:03 a.m.
Duration: 34 minutes 30 seconds

Listed in: Technology

Säkerhetspodcasten #146 - CS3 Stockholm 2018 #2

Published: March 17, 2019, 12:59 a.m.
Duration: 1 hour 4 minutes 16 seconds

Listed in: Technology

#49 Control Systems Cybersecurity: A Grim Gap - A Conversation with Joe Weiss

Published: March 17, 2019, 12:59 a.m.
Duration: 54 minutes 27 seconds

Listed in: Technology

ICS Penetration Testing with Jonathan Pollet

Published: March 17, 2019, 12:58 a.m.
Duration: 38 minutes 54 seconds

Listed in: Technology

An Interview With Robert Graham

Published: March 17, 2019, 12:58 a.m.
Duration: 41 minutes 40 seconds

Listed in: Technology

Weapon System Software Sustainment

Published: March 17, 2019, 12:58 a.m.
Duration: 6 minutes 39 seconds

Listed in: Technology

Board-Level Security Governance – Paul Feldman

Published: March 17, 2019, 12:58 a.m.
Duration: 32 minutes 11 seconds

Listed in: Technology

Is The Purdue Model Dead?

Published: March 17, 2019, 12:58 a.m.
Duration: 34 minutes 47 seconds

Listed in: Technology

Säkerhetspodcasten #144 - CS3 Stockholm 2018 #1

Published: March 17, 2019, 12:58 a.m.
Duration: 53 minutes 42 seconds

Listed in: Technology

4 Takeaways from 2018 ... And Kicking Off 2019 With My S4x19 Mini Keynote

Published: March 17, 2019, 12:58 a.m.
Duration: 25 minutes 41 seconds

Listed in: Technology

Episode 60: Cyber Vulnerability and Risk Quantification with Clint Bodungen

Published: March 17, 2019, 12:58 a.m.
Duration: 37 minutes 3 seconds

Listed in: Technology

Ep 30: Shamoon

Published: March 17, 2019, 12:58 a.m.
Duration: 37 minutes 21 seconds

Listed in: Technology

Behold! An ICS security bonanza!

Published: March 17, 2019, 12:58 a.m.
Duration: 49 minutes 22 seconds

Listed in: Technology

Ep 29: Stuxnet

Published: March 17, 2019, 12:58 a.m.
Duration: 43 minutes 6 seconds

Listed in: Technology

TSA's Pipeline Security Program

Published: March 17, 2019, 12:58 a.m.
Duration: 5 minutes 7 seconds

Listed in: Technology

Protecting the Electric Grid

Published: March 17, 2019, 12:58 a.m.
Duration: 5 minutes 31 seconds

Listed in: Technology

Neighborhood Keeper

Published: March 17, 2019, 12:58 a.m.
Duration: 1 hour 59 seconds

Listed in: Technology

OSIsoft and the EPRI Methodology with Harry Paul

Published: March 17, 2019, 12:58 a.m.
Duration: 36 minutes 49 seconds

Listed in: Technology

IIoT Security with Sven Schrecker

Published: March 17, 2019, 12:58 a.m.
Duration: 52 minutes 2 seconds

Listed in: Technology

Flawed ICS Mantras

Published: March 17, 2019, 12:58 a.m.
Duration: 21 minutes 41 seconds

Listed in: Technology

Episode 45: IT/OT Convergence and Risk Management with Clint Bodungen

Published: March 17, 2019, 12:58 a.m.
Duration: 34 minutes 24 seconds

Listed in: Technology

How to look for hardware hacks

Published: March 17, 2019, 12:58 a.m.
Duration: 56 minutes 20 seconds

Listed in: Technology

Ralph Langner on the ICS Security Product Market

Published: March 17, 2019, 12:58 a.m.
Duration: 1 hour 44 seconds

Listed in: Technology

Blake Sobczak on Electric Sector Cybersecurity

Published: March 17, 2019, 12:58 a.m.
Duration: 52 minutes 1 second

Listed in: Technology

ICS - Enterprise Security Weekly #102

Published: March 17, 2019, 12:58 a.m.
Duration: 19 minutes 47 seconds

Listed in: Technology

068 Protecting Missiles From Malware

Published: March 17, 2019, 12:58 a.m.
Duration: 21 minutes 13 seconds

Listed in: Technology

The Threatpost Podcast: Bitcoin Mining on OT Networks

Published: March 17, 2019, 12:57 a.m.
Duration: 18 minutes 59 seconds

Listed in: Technology

The Threatpost Podcast: How to Secure Industrial Control Systems

Published: March 17, 2019, 12:57 a.m.
Duration: 21 minutes 59 seconds

Listed in: Technology

CCE with Andy Bochman of INL

Published: March 17, 2019, 12:57 a.m.
Duration: 1 hour 7 minutes 52 seconds

Listed in: Technology

063 Protecting Critical Infrastructure

Published: March 17, 2019, 12:57 a.m.
Duration: 20 minutes 50 seconds

Listed in: Technology

Michael Assante Interview

Published: March 17, 2019, 12:57 a.m.
Duration: 1 hour 9 minutes 47 seconds

Listed in: Technology

057 ICS Security Concerns Explained

Published: March 17, 2019, 12:57 a.m.
Duration: 25 minutes 9 seconds

Listed in: Technology

Cyber Hygiene?

Published: March 17, 2019, 12:57 a.m.
Duration: 1 hour 1 minute 12 seconds

Listed in: Technology

Robert M. Lee, Chief Executive Officer, Dragos Inc.

Published: March 17, 2019, 12:57 a.m.
Duration: 54 minutes 44 seconds

Listed in: Technology

What's Happening At ICS & IT Security Conferences

Published: March 17, 2019, 12:57 a.m.
Duration: 57 minutes 55 seconds

Listed in: Technology

Episode 22: The Gamification of Cybersecurity with Clint Bodungen

Published: March 17, 2019, 12:57 a.m.
Duration: 28 minutes 56 seconds

Listed in: Technology

Press Coverage of ICS Security

Published: March 17, 2019, 12:57 a.m.
Duration: 50 minutes 59 seconds

Listed in: Technology

#051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult

Published: March 17, 2019, 12:57 a.m.
Duration: 52 minutes 14 seconds

Listed in: Technology

Iatrogenics - Harm Done By The Healer

Published: March 17, 2019, 12:57 a.m.
Duration: 41 minutes 18 seconds

Listed in: Technology

Episode 16: Cybersecurity Threats and Awareness with Dan Nagala

Published: March 17, 2019, 12:57 a.m.
Duration: 29 minutes 43 seconds

Listed in: Technology

Enterprise SOC or IT SOC

Published: March 17, 2019, 12:57 a.m.
Duration: 39 minutes 17 seconds

Listed in: Technology

FireEye's Marina Krotofil On Triton and ICS Threats

Published: March 17, 2019, 12:57 a.m.
Duration: 16 minutes 56 seconds

Listed in: Technology

Säkerhetspodcasten #121 - Strategic Network Defense in ICS med Joe Slowik

Published: March 17, 2019, 12:57 a.m.
Duration: 13 minutes 31 seconds

Listed in: Technology

ICS Detection Challenge Part 2

Published: March 17, 2019, 12:57 a.m.
Duration: 55 minutes 42 seconds

Listed in: Technology

S4x18 ICS Detection Challenge Analysis

Published: March 17, 2019, 12:57 a.m.
Duration: 55 minutes 46 seconds

Listed in: Technology

Medical Sector Cybersecurity & Dense Vulnerabilities

Published: March 17, 2019, 12:57 a.m.
Duration: 57 minutes 35 seconds

Listed in: Technology

Managing Global Cyber Security Risk

Published: March 17, 2019, 12:57 a.m.
Duration: 28 minutes 24 seconds

Listed in: Technology

Dan Geer Interview at S4x18

Published: March 17, 2019, 12:57 a.m.
Duration: 40 minutes 14 seconds

Listed in: Technology

TRISIS Malware: Fail-safe fail. [Research Saturday]

Published: March 17, 2019, 12:57 a.m.
Duration: 39 minutes 54 seconds

Listed in: Technology

2018 Plans: Podcast, S4, Consulting & Your Career

Published: March 17, 2019, 12:57 a.m.
Duration: 13 minutes 46 seconds

Listed in: Technology

DtSR Episode 276 - Game Changer in ICS (no FUD edition)

Published: March 17, 2019, 12:57 a.m.
Duration: 44 minutes 5 seconds

Listed in: Technology

Säkerhetspodcasten #112 - Cyberattacks Against Critical Infrastructure in Ukraine

Published: March 17, 2019, 12:57 a.m.
Duration: 25 minutes 16 seconds

Listed in: Technology

Episode 6: Risk-Based Cybersecurity with Clint Bodungen

Published: March 17, 2019, 12:56 a.m.
Duration: 36 minutes 19 seconds

Listed in: Technology

Internet shut down in Ethiopia. TRITON ICS malware updates. Security products patched. Cryptocurrency capers.

Published: March 17, 2019, 12:56 a.m.
Duration: 22 minutes 48 seconds

Listed in: Technology

DtSR Episode 274 - Let's Talk Power Grid

Published: March 17, 2019, 12:56 a.m.
Duration: 38 minutes 48 seconds

Listed in: Technology

Threat and Detection Debate

Published: March 17, 2019, 12:56 a.m.
Duration: 53 minutes 34 seconds

Listed in: Technology

034 ICS is Serious Business, But There's No Need to Panic

Published: March 17, 2019, 12:56 a.m.
Duration: 20 minutes 16 seconds

Listed in: Technology

Next Generation Security Audit Files for ICS

Published: March 17, 2019, 12:56 a.m.
Duration: 49 minutes 17 seconds

Listed in: Technology

ICS Capture The Flag at S4x18

Published: March 17, 2019, 12:56 a.m.
Duration: 27 minutes 3 seconds

Listed in: Technology

Securing ICS Protocols

Published: March 17, 2019, 12:56 a.m.
Duration: 45 minutes 29 seconds

Listed in: Technology

The ICS Detection Challenge at S4x18

Published: March 17, 2019, 12:56 a.m.
Duration: 19 minutes 18 seconds

Listed in: Technology

Episode 4: Cybersecurity with William Gage

Published: March 17, 2019, 12:56 a.m.
Duration: 36 minutes 56 seconds

Listed in: Technology

DtSR Episode 269 - Industrial Internet of Things (IIOT)

Published: March 17, 2019, 12:56 a.m.
Duration: 48 minutes 11 seconds

Listed in: Technology

Understanding & Interpreting ICS Security Statistics

Published: March 17, 2019, 12:56 a.m.
Duration: 48 minutes 25 seconds

Listed in: Technology

Kaspersky and Cyber Nationalism

Published: March 17, 2019, 12:56 a.m.
Duration: 34 minutes

Listed in: Technology

SCADA Apologist or SCADA Realist

Published: March 17, 2019, 12:56 a.m.
Duration: 37 minutes 21 seconds

Listed in: Technology

NERC CIP's Impact on Electric Sector Security

Published: March 17, 2019, 12:56 a.m.
Duration: 50 minutes 51 seconds

Listed in: Technology

State of Fuzzing ICS Protocols in 2017

Published: March 17, 2019, 12:56 a.m.
Duration: 34 minutes 33 seconds

Listed in: Technology

Interview with Steve Bitar of Exxon Mobil on Open Process Automation

Published: March 17, 2019, 12:56 a.m.
Duration: 41 minutes 58 seconds

Listed in: Technology

DtSR Episode 254 - Lowdown and Dirty ICS

Published: March 17, 2019, 12:56 a.m.
Duration: 1 hour 2 minutes 26 seconds

Listed in: Technology

Selecting an IDS Detection Solution

Published: March 17, 2019, 12:55 a.m.
Duration: 47 minutes 1 second

Listed in: Technology

Interview with Joel Langill, aka the SCADAhacker

Published: March 17, 2019, 12:55 a.m.
Duration: 44 minutes 1 second

Listed in: Technology

John Matherly - The Creator of Shodan

Published: March 17, 2019, 12:55 a.m.
Duration: 47 minutes 57 seconds

Listed in: Technology

Unsolicited Response Podcast: Cyber Insurance

Published: March 17, 2019, 12:55 a.m.
Duration: 53 minutes 16 seconds

Listed in: Technology

Unsolicited Response Podcast: Eric Byres after Tofino

Published: March 17, 2019, 12:55 a.m.
Duration: 49 minutes 37 seconds

Listed in: Technology

Unsolicited Response Podcast: Rios on WhiteScope and Medical Device Security

Published: March 17, 2019, 12:55 a.m.
Duration: 42 minutes 32 seconds

Listed in: Technology

Noise Security Bit #14 (О PacSec, 31c3, S4 и атаках на SCADA)

Published: March 17, 2019, 12:55 a.m.
Duration: 2 hours 35 minutes 52 seconds

Listed in: Technology

Unsolicited Response Podcast: SANS ICS 410 Course & GICSP

Published: March 17, 2019, 12:55 a.m.
Duration: 1 hour 7 minutes 46 seconds

Listed in: Technology

Unsolicited Response Podcast – Interview with Kim Zetter from S4x15

Published: March 17, 2019, 12:55 a.m.
Duration: 1 hour 5 minutes 55 seconds

Listed in: Technology

Unsolicited Response Podcast – Jack Whitsitt on NIST Cybersecurity Framework

Published: March 17, 2019, 12:55 a.m.
Duration: 56 minutes 19 seconds

Listed in: Technology

Unsolicited Response Podcast: Cyber War & Cyber Weapons with Author Thomas Rid

Published: March 17, 2019, 12:55 a.m.
Duration: 58 minutes 57 seconds

Listed in: Technology

Unsolicited Response Podcast: Siemens S7 Security Features

Published: March 17, 2019, 12:55 a.m.
Duration: 36 minutes 19 seconds

Listed in: Technology

Unsolicited Response Podcast #2 – Bob Radvanovsky on Project Shine

Published: March 17, 2019, 12:55 a.m.
Duration: 39 minutes 51 seconds

Listed in: Technology

Unsolicited Response Podcast #1 – Brian Ahern, Industrial Defender

Published: March 17, 2019, 12:54 a.m.
Duration: 42 minutes 2 seconds

Listed in: Technology