Discover
@BEERISAC: OT/ICS Security Podcast Playlist
@BEERISAC: OT/ICS Security Podcast Playlist
Author: Anton Shipulin / Listen Notes
Subscribed: 56Played: 9,481Subscribe
Share
© Copyright 2025 Anton Shipulin / Listen Notes
Description
A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
842 Episodes
Reverse
Podcast: Industrial Cybersecurity InsiderEpisode: How OT Managed Services Are Revolutionizing Industrial CybersecurityPub date: 2025-12-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with industrial automation and industrial cybersecurity expert Kevin Kumpf, fresh off the floor of Rockwell Automation Fair 2025. They discuss why OT managed services are finally becoming viable for manufacturing, the critical 80/20 split between people and technology challenges, and how the industry's "silver tsunami" of retiring talent is forcing a reckoning. Kevin shares insights on building unified platforms that can manage everything from 30-year-old paper tape systems to AI-powered smart factories, why IT's "patch now" mentality fails in OT environments, and how the DG 360 platform is delivering true cyber-physical convergence today - not tomorrow. They discuss the reality that most OT cybersecurity tools only discover 30% of plant assets, the importance of human-in-the-loop decision making, and why the OT ecosystem - not IT - must drive the managed services revolution. This is a must-listen for anyone struggling with the complexity of protecting and managing modern manufacturing facilities.Chapters:(00:00:00) - Introduction and Rockwell Automation Fair Recap(00:01:43) - The OT Managed Services Evolution and Rebranding(00:04:15) - The Three-Legged Stool: IT, OT, and OEMs(00:07:32) - Point Solutions vs. Unified Platforms in Manufacturing(00:10:45) - The DG 360 Vision: 360-Degree Plant Visibility(00:14:28) - The Silver Tsunami and Training Challenges(00:18:22) - Alert Fatigue and Actionable Intelligence(00:22:45) - Software Defined Automation and Legacy Systems(00:26:18) - Why OT Must Drive the Cybersecurity Conversation(00:30:35) - Real-Time Demo and Implementation ReadinessLinks And Resources:Kevin Kumpf on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: AI, Human Behavior & Cybersecurity’s Future: Cutting Complexity and Strengthening DefensePub date: 2025-12-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe future of cybersecurity won’t be won by tools alone - it will be won by people, process, and smarter use of AI.
In this episode of Protect It All, host Aaron Crow sits down with cybersecurity veteran Sharad Rai to explore how IT and OT security teams can reduce complexity, fight alert fatigue, and build stronger defenses through foundational practices and intelligent automation.
Sharad brings decades of real-world experience - from early firewall management to leading large-scale security programs at major financial institutions. Together, Aaron and Sharad break down what actually works in cybersecurity today: simplifying policies, understanding user behavior, strengthening basics like patching, and leveraging AI for contextual decision-making.
You’ll learn:
Why human behavior is the root of both risk and resilience
How AI can reduce complexity, noise, and alert fatigue
What “good vs bad” looks like through an AI-driven, context-aware lens
How policy overload cripples organizations - and how to fix it
Why OT and IT security still depend on foundational hygiene
The rise of browser-based security and Chrome as an endpoint
What’s coming next: AI-driven phishing, contextual controls, and automated response
Whether you're a security leader, practitioner, or just navigating modern cyber challenges, this episode will reshape how you think about defending systems and the people using them.
Tune in to discover how AI, clarity, and human-centered design are shaping cybersecurity’s next chapter only on Protect It All.
Key Moments:
06:21 "Cybersecurity Basics: Know the Layers"
09:49 "Defining Good to Block Bad"
13:03 Alarm Fatigue and Information Overload
14:01 Alarm Tuning and Data Utilization
19:02 RFID Tags and Process Frustration
23:03 Simplifying Cybersecurity for Success
25:18 "AI Optimizing Policy Adjustments"
27:33 "Tech Frustrations Then and Now"
31:46 Cloud Computing Transformed Everyday Work
36:05 Focus on Foundational Basics
About the guest :
Sharad Rai is a cybersecurity leader and architect with over 20 years of experience securing some of the world’s most complex financial institutions. As Vice President of Security and Architecture at State Street, he leads regulatory-driven initiatives and delivers enterprise-wide cybersecurity programs across cloud, infrastructure, and endpoint platforms. Sharad has held key security roles at Morgan Stanley, BNP Paribas, Jefferies, and Foundation Medicine, with deep expertise in EDR, PAM, SASE, ZTNA, and cloud-native security. He is known for simplifying complexity, reducing risk, and bridging product, engineering, and executive teams.
How to connect Sharad: https://www.linkedin.com/in/sharad-rai-cissp-a951a28
Connect With Aaron Crow:
Website: www.corvosec.com
LinkedIn: https://www.linkedin.com/in/aaronccrow
Learn more about PrOTect IT All:
Email: info@protectitall.co
Website: https://protectitall.co/
X: https://twitter.com/protectitall
YouTube: https://www.youtube.com/@PrOTectITAll
FaceBook: https://facebook.com/protectitallpodcast
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: OT Security Made SimpleEpisode: Wie kann man Krisenbewältigung bei Cybervorfällen trainieren? | OT Security Made SimplePub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJanka Kreißl von der Agentur Dunkelblau spricht über Krisenprävention und Krisenbewältigung bei Cybervorfällen. Sie erläutert aus Erfahrung, was gute Abläufe brauchen und wer von Anfang involviert sein sollte. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen & Fragen an podcast@rhebo.com. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Exploited: The Cyber Truth Episode: The Asymmetric Advantage: How Cybersecurity Can Outpace AdversariesPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin sits down with RunSafe Founder and CEO Joseph M. Saunders to explore why the future of cyber defense depends on disrupting attacker economics rather than racing to keep up with every new threat.
Joe breaks down how organizations can gain an asymmetric advantage by reducing exploitability across entire classes of vulnerabilities, especially persistent memory safety flaws that continue to expose critical systems. He shares why adding lightweight, automated protections at build time is one of the fastest ways to shift the cost curve onto attackers without forcing massive code rewrites or slowing development teams down.
Together, Paul and Joe discuss:
Why attackers’ resource advantage requires a new defensive mindsetThe power of “patchless” protection in embedded and OT environmentsWhy memory safety flaws persist and how to neutralize them at scaleThe risks of AI-generated code and how to prevent silent vulnerabilitiesHow Secure by Design practices improve resilience for critical infrastructure
If you're responsible for securing embedded systems, OT assets, or long-lived devices where patch cycles are slow and risk is high, this episode offers a new mindset that gives defenders the upper hand.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Conservas Guillén by Trend MicroEpisode: Conserva #50 con Jose Ramon Coz (AGENCIA ESPACIAL EUROPEA) - Ciberseguridad y sector aeroespacialPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn Conservas Guillén abrimos una nueva lata para hablar con José Ramón Coz Fernandez, Director de Auditoría Interna de Ciberseguridad en la Agencia Espacial Europea (European Space Agency - ESA). Hablamos de ciberseguridad en el sector espacial, del sistema Galileo, del sistema EGNOS...
Conservaciones de 30 minutos, aproximadamente, en lenguaje entendible y coloquial.The podcast and artwork embedded on this page are from Trend Micro Iberia, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: Former U.S. Secret Service Special Agent Shares Cyber Criminal SecretsPub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFormer U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail, how ransomware attacks actually cost organizations millions if not billions beyond the ransom payment itself, and why the timeline between compromise and detection has shrunk from months to minutes. He shares jaw-dropping statistics on vulnerability management failures, explains how adversaries are using AI to become exponentially more dangerous, and provides actionable insights for building resilient security programs that protect what matters most to your business. Whether you're defending critical infrastructure or managing security for a manufacturing organization, this conversation offers a rare insider perspective on the evolving threat landscape and what it takes to stay ahead of increasingly sophisticated cyber criminals.Chapters:(00:00:00) - Meet the Ex-Secret Service Agent Who Infiltrated Underground Cyber Criminal Networks(00:03:00) - Inside Operation Carder Kaos: Going Undercover in the Dark Web(00:06:00) - The Real Price Tag: Why Ransomware Costs Go Far Beyond the Ransom(00:11:00) - When Production Lines Go Dark: The Hidden Costs of Manufacturing Downtime(00:14:00) - Reality Check: How Prepared Is Your Organization for a Cyber Attack?(00:17:00) - The AI Arms Race: How Adversaries Are Weaponizing Artificial Intelligence(00:21:00) - 2027 Threat Landscape: What Keeps a Field CISO Up at Night(00:24:00) - Follow the Bitcoin: How Cyber Criminals Launder Billions Through Cryptocurrency(00:31:00) - Why Speed Matters: The Critical Window for Law Enforcement Notification(00:33:00) - The Security Leader's Playbook: Threat Intelligence + Business ContextLinks And Resources:Richard LaTulip on LinkedInRichard's Book: Operation Carder KaosRecorded FutureWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Arabia PodcastEpisode: Demystifying ISA/IEC 62443 with Khalid Ansari | 48Pub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPodcast with Khalid Ansari, an expert in ISA/IEC 62443 and a passionate advocate for OT product certification and standardization.Khalid shared incredible insights from his engineering journey—from instrumentation to working with Yokogawa, Qatalum and FM Approvals—and we dove deep into some of the most pressing topics in OT security, including:🔹 Overview of ISA/IEC-62443 🔹 Key parts relevant to product manufacturers 🔹 Secure by Design & Secure by Default principles 🔹 ISASecure certification process & global relevance 🔹 Supply chain security & SDLA 🔹 Role of standards in actual security outcomes 🔹 Is it only for engineers? Can beginners learn for free? 🔹 Risk assessments and where to start 🔹 Can AI/LLMs help in understanding 62443? 🔹 Cyber-Informed Engineering (CIE) 🔹 Hardware/software solutions & reverse engineeringThe podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Security Weekly Podcast Network (Audio) (LS 47 · TOP 1% what is this?)Episode: Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359Pub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFor OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359The podcast and artwork embedded on this page are from Security Weekly Productions, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Arabia PodcastEpisode: Medical Systems: Cybersecurity Challenges Arabic | 38Pub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMedical Systems Cybersecurity Challenges Arabic with Eng Hussain EssayeghThe podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Inside Cyber Incident Response: Military Lessons, OT Challenges & the Power of Blameless CulturePub date: 2025-12-01Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCyber incidents don’t just test your technology - they test your people, your processes, and your culture.
In this episode of Protect It All, host Aaron Crow sits down with Daniel Swann, Cyber Incident Commander at Rockwell Automation, to pull back the curtain on what really happens during IT and OT incidents. With decades of experience across the U.S. Air Force, enterprise environments, and industrial operations, Daniel shares lessons learned the hard way - from managing chaos in real time to building a culture where teams can learn without blame.
You’ll learn:
Why documentation and scribe roles can make or break an incident response
How blameless postmortems actually strengthen team performance
What military-style discipline can teach us about OT and IT incident handling
How to run effective tabletop exercises that expose real gaps
The human factors - communication, clarity, ownership - that reduce downtime and panic
Practical strategies to evolve your incident response plan before the next breach
Whether you’re developing your first IR playbook or leading seasoned response teams, this episode delivers actionable, real-world insights that help you prepare, respond, and recover with confidence.
Tune in for battle-tested wisdom from military operations to industrial control rooms - only on Protect It All.
Key Moments:
00:00 "Protect IT/OT Cybersecurity Podcast"
03:30 Cybersecurity: Versatility Is Key
07:52 "Balancing Bureaucracy and Flexibility"
10:20 "Practice Makes Plans Effective"
14:17 "Learning While Doing"
18:44 "Document Key Info in Incidents"
19:46 "Versatile Team Role Importance"
22:45 "Tracking Lessons with Visibility"
28:34 Proactive Reporting Encouraged
29:33 Safe Reporting Prevents Phishing Incidents
32:52 "Bridging IT and OT Safely"
37:15 Team Collaboration Enhances Outcomes
41:00 Military Preparedness and Logistics Planning
42:59 Preparing for Unlikely Scenarios
47:20 AI Threats to OT Systems
48:32 "AI's Impact on Learning and Jobs"
About the guest:
Daniel Swann is a seasoned Cyber Incident Commander at Rockwell Automation, bringing 17+ years of IT leadership and nearly a decade of cybersecurity experience. A U.S. Air Force veteran, he has led global cyber operations, responded to major vulnerabilities like Log4J, and driven large-scale improvements in incident response and vulnerability management. Daniel is highly certified, mission-driven, and recognized for building strong, resilient security teams.
Links :
Video of Daniel Swann with Kate Vajda, Director of Vulnerability Research and Malware Threat Research, Dragos : https://www.youtube.com/watch?v=4zotgrPk8vI
Connect with Daniel on LinkedIn : https://www.linkedin.com/in/j-daniel-swann/
Connect With Aaron Crow:
Website: www.corvosec.com
LinkedIn: https://www.linkedin.com/in/aaronccrow
Learn more about PrOTect IT All:
Email: info@protectitall.co
Website: https://protectitall.co/
X: https://twitter.com/protectitall
YouTube: https://www.youtube.com/@PrOTectITAll
FaceBook: https://facebook.com/protectitallpodcast
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Arabia PodcastEpisode: Hands-On ICS/OT Testbeds | 18Pub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoin Us Dr. Sridhar Adepu from University of Bristol . as we delve into the Bristol University-developed testbed by The Bristol Cyber Security Group. We'll cover specifications, physical processes, software, cybersecurity, training, and explore the ICS/OT capture the flag (CTF) challenges conducted in this lab. The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 76: Why Security Certs for New Medical Devices Might Just WorkPub date: 2025-11-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDiversity in healthcare devices complicates segmentation, security controls, and zero-trust approaches. New certifications aim to help. Bob Lyle, CRO of Medcrypt, identifies how layered defenses, rigorous cybersecurity requirements for new devices, continuous monitoring, and dark-web credential surveillance can reduce risk.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Arabia PodcastEpisode: Engineering OT Security: ISA Standards & Open Source in Action | 62Pub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization🎙️ New Episode Recap | ICS Arabia Podcast #62 Engineering OT Security: ISA Standards & Open Source in ActionIn this episode, SZ Lin (林上智) , an experienced OT cybersecurity consultant and ISA Taiwan Section leader, shares his journey from industrial software engineering to advancing OT cybersecurity across sectors like semiconductors, oil & gas, and manufacturing.🔹 Key takeaways: • The growing importance of cybersecurity in semiconductor manufacturing, guided by Relevant standard • The pivotal role of open-source software and Industrial Linux in ensuring long-term system security and resilience. • Taiwan’s strong adoption of 62443 standards, supported by government policies and industry collaboration. • Why certification is only the beginning — true security lies in continuous improvement and integration into daily operations.A must-listen for professionals exploring the intersection of engineering, standards, and open-source innovation in OT cybersecurity.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You ThinkPub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this eye-opening conversation, Dino and Craig address a critical issue facing manufacturing organizations today: the dangerous gap between perceived and actual cybersecurity preparedness in operational technology (OT) environments.They discuss why many organizations "don't know what they don't know" when it comes to securing industrial control systems, the myth of isolated manufacturing equipment, and why 25% of companies still lack comprehensive OT asset monitoring. Drawing powerful parallels to safety protocols, they explain why cybersecurity must become as ingrained in plant culture as wearing a hard hat on the factory floor.Their bottom line: Back up your beliefs with data, treat every system as if it's connected, and verify, don't just trust, your security posture. In OT cybersecurity, perception isn't reality, and that gap could cost not only millions but also brand perception and even human life.This episode is a must-listen for anyone serious about protecting their industrial environments.Chapters:00:00:00 - Kicking Off: Are You Truly Secure or Just Comfortable?00:01:15 - OT Security Reality Check: Do You Really Know Your Risks?00:01:45 - The Hidden Challenges Holding OT Security Back00:03:15 - Lack of Skilled Resources: The Biggest Barrier to Security00:05:30 - Security Frameworks: Are They Reaching the Plant Floor?00:06:15 - The Dangerous Myth of “Isolated” OT Systems00:07:58 - From Theory to Action: Winning Strategies for OT Security00:12:13 - Leadership’s Role in Cybersecurity: Who’s Driving the Change?00:19:55 - No More Blind Spots: Key Takeaways for a Secure FutureLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Arabia PodcastEpisode: OT Incident Response Explained | 68Pub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode 🎙️, we sit down with Tobias Halmans, an OT Incident Responder , to dive deep into one of the most critical topics in industrial cybersecurity — Incident Response in OT environments.Together, we explore: ⚙️ Why incident response in OT is different from IT 🚨 The unique challenges of detecting incidents in industrial networks 📋 Frameworks and best practices for effective OT response 🧩 How disaster recovery and business continuity planning intersect in OT 🧠 The importance of tabletop exercises for readiness and coordinationA special thanks to Sarah Fluchs for recommending Tobias — much appreciated! 🙏🎧 Watch now on YouTube: https://lnkd.in/dy3Ncfp3 The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Bites & Bytes PodcastEpisode: Realities in the Systems That Produce Our Food with James SlabyPub date: 2025-11-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat does a deep fake phone call scamming your grandma have to do with food manufacturing?
More than you think.
In this episode of Bites and Bytes Podcast, host Kristin King and James Slaby discuss the operational technology challenges in food production—from legacy systems running Windows XP to ransomware threats when production lines go down.
James is Director of OT Solutions GTM at Acronis and brings over 20 years of cybersecurity and industry analyst experience from Forrester Research, HFS Research, and technology companies. The conversation covers why food plants can't update their systems, the growing threat of social engineering and deep fakes, and practical strategies like the family password defense.
Topics include:
Why food manufacturers still run ancient operating systems
Deep fake threats and how to protect yourself
Air-gapped systems and OT security challenges
Social engineering targeting industrial operations
Legacy technology in food production environments
Whether you’re in food manufacturing, cybersecurity, or just curious about the systems behind your food supply, this episode reveals the realities of keeping production running while managing cyber threats.
---------------
Guest Contact Information:
James Slaby’s LinkedIn
Company: Acronis
Role: Director of OT Solutions GTM at Acronis
---------------
Episode Key Highlights
---------------
📘 Sign up for early updates, exclusive previews, and launch news of Kristin’s book, “Securing What Feeds Us: Cybersecurity in Food and Agriculture” here.
---------------
🎤 Book Kristin Demoranville to Speak
To invite Kristin to speak at your conference, corporate event, webinar, or workshop, visit the website and submit a request.
---------------
🎤 Bites and Bytes Podcast Info:
Website: Explore all our episodes, articles, and more on our official website.
Merch Shop: Show your support with some awesome Bites and Bytes gear!
Substack: Stay updated with the latest insights and stories from the world of cybersecurity in the food industry.
Schedule a Call with Kristin: Share Your Thoughts
Socials: TikTok; Instagram; LinkedIn; BlueSky
---------------
🛡️ About AnzenSage & AnzenOT
AnzenSage is a cybersecurity advisory firm specializing in security resilience for the food, agriculture, zoo, and aquarium industries. AnzenSage offers practical, strategic guidance to help organizations anticipate risks and build resilience. Learn more about their offerings at anzensage.com.
AnzenOT: Industrial Cyber Risk — Simple. Smart. Swift.
AnzenOT is the SaaS risk management platform built to bring clarity and control to Operational Technology (OT) cybersecurity. Designed for critical infrastructure sectors, AnzenOT translates technical risk into clear, actionable insight for decision-makers. Explore the platform at anzenot.com.
For demo requests or inquiries, email stuart@anzenot.com or kristin@anzenot.comThe podcast and artwork embedded on this page are from AnzenSage, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Arabia PodcastEpisode: OT Security Posture & Attack Path Analysis | 59Pub date: 2025-11-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn our latest episodes, we were joined by Vivek Ponnada, SVP at Frenos and a veteran with nearly 30 years in OT, for a deep dive into the future of industrial cybersecurity.We explored:🔹 Why OT security is fundamentally different from IT — and why patching isn’t always the answer.🔹 How attack path analysis and digital twins can model real-world threats without disrupting operations.🔹 The power of AI trained on OT-specific TTPs to simulate adversaries and recommend precise mitigations.🔹 The critical role of threat intelligence-based prioritization — especially for teams with limited budgets.🔹 Regional differences in maturity, and why the Middle East is ahead in risk awareness.🔹 And the vision for a future where OT security is as embedded as safety and quality.Vivek shared practical advice for newcomers, the importance of compensating controls, and how integrated data (from assets to firewalls) creates a holistic security posture.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: The Future of Cybersecurity Careers: Human Skills, AI Disruption & How to Stand Out NowPub date: 2025-11-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe cybersecurity job market is changing faster than ever - and the skills that mattered five years ago won’t carry you into the future.
In this episode of Protect It All, host Aaron Crow sits down with Mark Sasson, Managing Partner at Pinpoint Search Group, to break down what the future of cybersecurity careers really looks like. From the rise of AI and automation to the growing importance of human skills, they uncover the new realities facing candidates, hiring managers, and leaders across IT and OT security.
You’ll learn:
Why soft skills, communication, and adaptability are now just as critical as technical expertise
How AI is reshaping job searches, resumes, and candidate evaluation
The shift between employer-driven and candidate-driven markets
What separates standout candidates in today’s competitive landscape
How startups think about hiring - and what they won’t compromise on
Practical steps to future-proof your cybersecurity career starting now
Whether you’re entering cybersecurity, leveling up your role, or hiring your next team member, this episode delivers real-world, actionable insights to help you stay relevant - and competitive in an evolving industry.
Tune in to learn how to stay ahead in the cybersecurity job market of today and tomorrow only on Protect It All.
Key Moments:
04:14 Recruitment Growth and Funding Trends
06:42 Tangible Value in AI Age
12:18 "Stepping Outside the Comfort Zone"
15:16 "Growth Through Embracing Discomfort"
19:23 "Embracing Growth and New Challenges"
21:01 Balancing Growth and Bold Moves
25:14 "Breaking Into Tech: Sacrifice & Strategy"
27:40 Experience Beats Book Knowledge
32:13 Human Insight Beats AI in Hiring
34:45 AI Recruitment: Potential, Limits, Distinctions
39:37 "Reluctant Growth through Opportunity"
42:47 "AI Tools: Benefits and Downsides"
44:29 "Human-Centered Hiring Over AI"
50:12 "Human Connection Over Technology"
53:23 "Planning Your Next Step"
About the guest:
Mark Sasson is the Managing Partner of Pinpoint Search Group, a recruitment firm specializing in helping innovators in emerging markets attract the talent needed to drive maturation, scale, and successful outcomes. In 2014, Mark launched Pinpoint’s Cybersecurity practice, where he and his team have successfully completed hundreds of executive and senior-level individual contributor searches for leading Cybersecurity vendors. Building on that success, Mark is now guiding Pinpoint’s expansion into the rapidly evolving Space sector.
Connect Mark:
Website: https://pinpointsearchgroup.com/
LinkedIn: linkedin.com/in/markjsasson/Learn more about Cybersecurity Vendor M&A + Funding Roundups here : https://pinpointsearchgroup.com/cybersecurity-industry-reports/
Connect With Aaron Crow:
Website: www.corvosec.com
LinkedIn: https://www.linkedin.com/in/aaronccrow
Learn more about PrOTect IT All:
Email: info@protectitall.co
Website: https://protectitall.co/
X: https://twitter.com/protectitall
YouTube: https://www.youtube.com/@PrOTectITAll
FaceBook: https://facebook.com/protectitallpodcast
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Arabia PodcastEpisode: Labshock | 51Pub date: 2025-11-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationZakhar has given the OT security community something truly special — LabShock, a free and open OT testbed that anyone can use to gain hands-on experience in ICS/OT cybersecurity. No hardware required. No excuses.The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: We can't - and shouldn't - fix everything [The Industrial Security Podcast]Pub date: 2025-11-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe know there are problems in our security systems, but we can't and shouldn't fix everything. What do we fix? Who decides? How do we explain what's reasonable to people who do decide? Kayne McGladrey, CISOIn Residence at Hyperproof, joins us to explore risk, communication, and a surprising role for insurance.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.











![We can't - and shouldn't - fix everything [The Industrial Security Podcast] We can't - and shouldn't - fix everything [The Industrial Security Podcast]](https://cdn-images-3.listennotes.com/podcasts/the-industrial-security-podcast-pi-media-Hj0wnqx_vW5-K5gXeFuzZ1S.1400x1400.jpg)

