Discover
@BEERISAC: OT/ICS Security Podcast Playlist
@BEERISAC: OT/ICS Security Podcast Playlist
Author: Anton Shipulin / Listen Notes
Subscribed: 57Played: 9,968Subscribe
Share
© Copyright 2026 Anton Shipulin / Listen Notes
Description
A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!
933 Episodes
Reverse
Podcast: Digitalization Tech TalksEpisode: Episode 62: The hidden phase of industrial cyberattacks and how to spot it earlyPub date: 2026-02-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn the 62nd episode of Digitalization Tech Talks, hosts Jonas Norinder and Don Mack kick off a two‑part series on the evolving state of industrial cybersecurity. They uncover what’s really happening inside OT networks long before a cyber incident hits the plant floor including why over 80% of adversary behavior occurs months before impact, why air‑gaps no longer provide real protection, and how legacy vulnerabilities continue to be actively exploited. As guest Adam Robbie puts it “OT security is no longer a hidden problem — it’s a visibility problem.” This episode is essential listening for anyone navigating IT/OT convergence, looking for ways to improve industrial defenses, or preparing for emerging cyber risks. The insights come directly from a new white paper supported by a commercial and research partnership between Palo Alto Networks and Siemens, together with Idaho National Labs as the third-party research partner. Show Notes:Research Paper (S4 Conference): Intelligence-Driven Active Defense Report 2026 (https://sie.ag/416Tgm)Website (Palo Alto): OT Security Insights 2025 (https://sie.ag/2ZcgDY)Website (US Department of Energy): Cybersecurity for the Operational Technology Environment (https://sie.ag/5p9z6a)Website (Siemens): Industrial cybersecurity solutions | Siemens (https://sie.ag/4HJ8L4) Contact us:Adam Robbie email (arobbie@paloaltonetworks.com), LinkedIn (https://www.linkedin.com/in/adamrobbie/)Tilo Pinkert email (tilo.pinkert@siemens.com), LinkedIn (https://www.linkedin.com/in/tilopinkert/)Priyanjan Sharma email (priyanjan.sharma@siemens.com), LinkedIn (https://www.linkedin.com/in/priyanjansharma/) Don Mack email (mack.donald@siemens.com)Jonas Norinder email (jonas.norinder@siemens.com)The podcast and artwork embedded on this page are from Siemens, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Mike Holcomb on the Intersection of Hacktivists, State ActorsPub date: 2026-02-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMike Holcomb joins the Nexus Podcast to discuss a Converged Actor Framework he developed and presented at the S4 Conference. The framework delineates groups such as hacktivists and state threat actors based on the impact and frequency of their activity. State actors are leveraging hacktivist groups with greater frequency, and this convergence must be considered as defenders tasked with protecting OT and cyber-physical systems strategize around security. Subscribe and listen to the Nexus Podcast here. Subscribe to Mike Holcomb's YouTube channel here.The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Fortinet Cybersecurity Podcast (LS 26 · TOP 10% what is this?)Episode: Brass Tacks S2E01 – Cyber Conflict and the Risk to Critical InfrastructurePub date: 2026-02-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCyber attacks are used to strain states, disrupt power grids, and shake public trust. In this episode, Annita Sciacovelli, Cybersecurity Advisor and Professor of International Law at the University of Bari, explains how digital attacks target essential services, why societies are the pressure point, and how international law draws the line between cyber operations and armed response.
Watch or listen to the episode, and read the blog to dig deeper into the legal and societal impact.
Read the Fortinet blog: https://www.fortinet.com/blog/industry-trends/when-cyber-conflict-targets-society
Watch on YouTube: https://www.youtube.com/watch?v=WGnJHB5NdAwThe podcast and artwork embedded on this page are from Fortinet Cybersecurity Podcast, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Government Information Security Podcast (LS 27 · TOP 10% what is this?)Episode: The Danger of IT, OT, Medical Device Cyber Turf WarsPub date: 2026-02-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat often appears to be turf wars between healthcare technology management, facilities OT staff, IT departments and security teams are often the result of unclear ownership and accountability for device security. And that presents safety risks to patients, says Mohamed Waqas, CTO of Armis.The podcast and artwork embedded on this page are from GovInfoSecurity.com, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: Compliance Isn’t Security: NERC CIP 15 and the Real Gaps in OT Network MonitoringPub date: 2026-02-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPassing an audit doesn’t mean you’re secure.
In this episode of Protect It All, host Aaron Crow dives into one of the biggest misconceptions in operational technology: the belief that compliance equals protection. Using NERC CIP 15 as a real-world case study, Aaron explores why meeting regulatory requirements is only the starting point - not the finish line.
A major focus of this conversation is OT network monitoring, especially the often-overlooked east-west traffic inside your environment. Many organizations monitor perimeter traffic while internal blind spots remain wide open.
You’ll learn:
Why compliance frameworks don’t automatically create security
The real challenges of implementing NERC CIP 15 at scale
Why internal network visibility (east-west monitoring) matters
How to establish meaningful baselines in legacy OT environments
The difference between audit success and operational resilience
Why architecture, tooling, and skilled personnel must work together
Whether you’re working in utilities, manufacturing, or critical infrastructure, this episode provides practical guidance on how to move beyond checklists and build security programs that truly reduce risk.
Tune in to learn how to transform compliance requirements into real operational protection - only on Protect It All.
Key Moments:
00:00 OT Security Blind Spots
05:15 "OT Security and Monitoring Challenges"
10:41 Aging Switches and Monitoring Challenges
13:16 OT Protocols and Infrastructure Challenges
15:42 "IT vs OT: Complexity Challenges"
18:03 "Balancing Compliance and Security"
21:57 Securing Critical Infrastructure Spaces
Connect With Aaron Crow:
Website: www.corvosec.com
LinkedIn: https://www.linkedin.com/in/aaronccrow
Learn more about PrOTect IT All:
Email: info@protectitall.co
Website: https://protectitall.co/
X: https://twitter.com/protectitall
YouTube: https://www.youtube.com/@PrOTectITAll
FaceBook: https://facebook.com/protectitallpodcast
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Casos de Ciberseguridad IndustrialEpisode: 3/4 Acciones de Orquestando de la seguridad OTPub date: 2026-02-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se abordan retos reales de integrar la seguridad OT y los errores más comunes en ese proceso. Aborda cómo la automatización del cumplimiento libera a los equipos para tareas de mayor valor. Explica cómo la remediación basada en esfuerzo e impacto cambia la forma de trabajar de OT y seguridad.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: OT Security Made SimpleEpisode: Warum die Integration von Security Events in Leitwarten entscheidend ist | OT Security Made SimplePub date: 2026-02-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDirk Lüders, Director of Marketing & Sales International bei Jungmann Systemtechnik, spricht mit Host Klaus Mochalski über seine mehrjährigen Erfahrungen als Turnkey-Solution-Anbieter für Leitwarten, welche Vorteile KVM-Systeme bieten und was für Herausforderungen durch verstaubte DOS-Altlasten sowie streng regulierte Maustreiber entstehen. Mehr zum Thema OT Security Made simple findet Ihr auf rhebo.com oder schreibt uns mit Euren Ideen, Fragen oder Gastvorschlägen an podcast@rhebo.com. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 81: Root of Trust: Why Security Now Starts in SiliconPub date: 2026-02-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationRising software complexity in safety-critical industries is forcing cybersecurity requirements on systems previously not thought about before. David Sequino, CEO of OmniTrust (formerly ISS), talks about the need to secure digital certificates on life critical systems like cars and planes and the challenges in doing so.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: Your OT Cybersecurity Strategy Is Failing: Here's WhyPub date: 2026-02-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino and Craig reunite to tackle the shifts occuring in industrial cybersecurity in 2026.They discuss how OT-focused IDS software companies are shifting away from managed services to partner with systems integrators who understand the plant floor.The conversation explores the challenges manufacturers face—from aging infrastructure spanning decades to flat layer-2 networks that give remote vendors unrestricted access.They emphasize that IT departments cannot effectively manage OT assets they don't own or understand, especially when dealing with equipment older than their cybersecurity staff.The episode covers the pitfalls of penetration testing in live manufacturing environments, the reality of shadow IT versus shadow OT, and why EDR solutions struggle in control system environments.Dino and Craig stress the importance of treating cybersecurity as a marathon rather than a sprint, starting with basic asset inventory and microsegmentation.They call on manufacturing leaders to stop deferring to IT for OT security, attend industry-specific conferences like S4X26, and partner with systems integrators who have deep automation expertise.With threats mounting, the time for action is now—not next quarter.Chapters:(00:00:00) - Welcome & What We've Been Up To(00:00:48) - The Big Shift: Why OT IDS Companies Are Backing Away From Managed Services(00:03:00) - The Shelfware Problem: When Security Tools Sit Unused(00:04:12) - Why Pen Testing Can Be Disruptive (or Dangerous) in Manufacturing Environments(00:05:54) - The Reality of Legacy Infrastructure: Equipment Older Than Your Cybersecurity Team(00:07:43) - Who Can Actually Patch Your Control Systems?(00:09:04) - Supply Chain Vulnerabilities: You're Only as Strong as Your Weakest Link(00:11:01) - The Last Mile Challenge: Asset Inventory, Microsegmentation & Starting Small(00:13:55) - The Shelfware to Tool-Switching Problem: Why Companies Are Reconsidering Their First Choice(00:16:18) - Shadow IT vs. Shadow OT: Who Really Owns Plant Floor Security?(00:19:00) - Why EDR Struggles in Control System Environments(00:21:35) - Time to Step Up: Why Manufacturing Leaders Can't Defer to IT Anymore(00:23:00) - Where to Learn: S4, Automation Fair, and Why You Need to Attend Industry Conferences(00:25:00) - Finding the Right Partner: Systems Integrators Who Speak Automation and Cybersecurity(00:27:00) - Final Thoughts: The Time for Action Is NowLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: OT Cybersecurity That Works: Tabletop Exercises, Critical Controls & Building TrustPub date: 2026-02-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationYou can’t secure OT environments with checklists alone - you secure them with trust, clarity, and focused action.
In this episode of Protect It All, host Aaron Crow sits down with OT security expert Dean Parsons to unpack what actually improves cybersecurity maturity in manufacturing, water, and wastewater environments. From remote access blind spots to outdated network architecture, they explore the practical gaps many organizations face - and how to fix them without massive budgets.
A central theme? Tabletop exercises. Not as a compliance checkbox - but as a powerful tool to build collaboration between IT and OT teams, clarify roles, and stress-test real incident response plans before a crisis hits.
You’ll learn:
Why tabletop exercises accelerate OT maturity
The importance of trust between engineers and IT teams
How focusing on the SANS 5 Critical Controls drives meaningful progress
Why visibility and architecture matter more than shiny tools
How to improve OT security without overwhelming teams or budgets
The human and process factors that determine response success
Whether you’re leading OT security, managing critical infrastructure, or trying to bridge IT and engineering teams, this episode delivers practical, experience-backed strategies you can implement immediately.
Tune in to learn how to strengthen OT security through people, process, and purposeful action - only on Protect It All.
Key Moments:
03:57 "Improved IT-OT Collaboration Tabletops"
08:57 "ICS Security Priorities"
12:16 "Accelerating ICS Cybersecurity Programs"
15:07 Trusted Expertise Builds Credibility
17:28 "Engineering Role in Incident Response"
20:53 "Cybersecurity: Tabletops Gain Traction"
26:34 "Control Systems, Protocol Abuse Insights"
27:51 Secure Architecture Enables Network Visibility
33:07 "Targeted Network Monitoring Essentials"
35:23 Prioritize Critical Assets Strategically
37:50 "Bridging IT and OT Expertise"
41:56 Critical Infrastructure Security Risks
44:30 ICS Leadership and Threat Strategy
48:14 "Power Plant Walkthrough Insights"
52:02 Critical Cyber Asset Management
57:29 "SANS Courses: Essential and Valuable"
About the guest :
Dean Parsons is a SANS Principal Instructor and the CEO and Principal Consultant of ICS Defense Force. Over the past two decades, Dean has built and led industrial cyber defense programs, conducted incident response and digital forensics in live plants and partnered with operators and engineers to maintain both safety and uptime across major industrial sectors.
He helps organizations align investment and policy decisions with operational priorities, developing risk metrics and tabletop exercises that unify operations, engineering, and cybersecurity so organizations in any industrial sector can prioritize and measure what matters.
How to connect Dean : https://www.linkedin.com/in/dean-parsons-cybersecurity
Connect With Aaron Crow:
Website: www.corvosec.com
LinkedIn: https://www.linkedin.com/in/aaronccrow
Learn more about PrOTect IT All:
Email: info@protectitall.co
Website: https://protectitall.co/
X: https://twitter.com/protectitall
YouTube: https://www.youtube.com/@PrOTectITAll
FaceBook: https://facebook.com/protectitallpodcast
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Systems Engineering for Survival: A Physician's Guide to Emergency ManagementPub date: 2026-02-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOur host Bryson Bort welcomes Dr. Natalie Sullivan, Medical Director of the Emergency Response Medical Group and an emergency medicine physician at a D.C. area hospital. Trained in EMS and disaster and operational medicine, Natalie turned her attention to the critical intersection of clinical medicine, patient safety, and cybersecurity resilience after experiencing a prolonged ransomware attack on a major hospital. Dr. Sullivan lays out the disaster preparedness cycle, and the many vectors of risks for hospitals. How does a cyberattack on one hospital lead to increased cardiac arrest mortality at the hospital three blocks away? Why is a generation of "digital native" doctors a hidden vulnerability in an analog emergency? And what happens when a hospital's reliance on these "tightly coupled" systems—like water, power, and the Medical IoT—collapses during a ransomware event?“We are critical infrastructure, but we're deeply, deeply dependent on the surrounding critical infrastructure,” Dr. Sullivan said. Join us for this and more on this episode of Hack the Plan[e]t. The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Casos de Ciberseguridad IndustrialEpisode: 2/4 Análisis de Orquestando de la seguridad OTPub date: 2026-02-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se analiza la diferencia entre mostrar información y facilitar decisiones reales en ciberseguridad OT. Aborda cómo priorizar el riesgo por impacto operativo y de negocio sin generar alarmismo. Explica por qué el exceso de alertas y ruido puede ser más peligroso que la falta de visibilidad.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Today with ISSSourceEpisode: AI Boosts Functional SafetyPub date: 2026-02-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFacing a serious crunch of safety experts leaving the manufacturing industry and not enough coming in to fill the void, and add in a complex and more connected digital environment, the sector could use a technological boost. Artificial intelligence could be the answer.The podcast and artwork embedded on this page are from Gregory Hale, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: CISA's Matthew Rogers on Secure OT Protocol CommunicationPub date: 2026-02-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMatthew Rogers, ICS Cybersecurity Lead at the Cybersecurity Infrastructure and Security Agency (CISA) joins the Nexus Podcast to discuss new guidance published by the agency to help manufacturers and asset owners move toward more secure OT communication protocols. Legacy protocols that contain little to no basic security capabilities are still prevalent in OT environments today. Rogers explains the risk and why manufacturers should begin their journey away from proprietary protocols and toward open standards. According to CISA's guidance, operators want authentication and integrity capabilities to protect process data, but need to understand the value and business impact of doing so. Download CISA's guidance here. Subscribe and listen to the Nexus Podcast here. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Bites and Bytes PodcastEpisode: Danielle Jablanski on Food & Ag, OT Security & Everything in BetweenPub date: 2026-02-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDanielle Jablanski isn’t your typical OT security expert… she studied genocide in Rwanda, analyzed future water wars for her master’s thesis, and once received a phishing text inviting her to eat grilled crocodile on the beach. Now leading STV’s OT cybersecurity consulting program and teaching at both Middlebury Institute and Dallas College, Danielle brings policy depth, technical expertise, and genuine curiosity to oneof the most wide-ranging conversations we’ve ever had.We chase every rabbit worth chasing, smart greenhouses, vulnerabilities, food monopolies, insects, data integrity risks, geopolitics, and how food travels. Danielle shares lessons from nuclear security, explains why compromised data is scarier than loss of control, and makes the case for why more security pros should care about what ends up on our plates.This is exactly how Kristin and Danielle talk when the mics aren’t rolling… except this time they were.---------------Episode Key Highlights00:01:03 — Creative Phishing Texts00:10:27 — How Kristin and Danielle Met00:17:08 — Insects and the Food Chain00:28:05 — Monopolies and Single Points of Failure00:30:32 — Rat Trap Sensors vs. Robot Pickers00:33:46 — Centralization Risk00:44:25 — Data Integrity vs. Loss of Control00:55:30 — Food as Critical Infrastructure01:06:30 — Global Supply Chain and Ports01:15:45 — China, Soybeans, and Soft Power---------------📘 Sign up for early updates, exclusive previews, and launch news of Kristin’s book, “Securing What Feeds Us: Cybersecurity in Food and Agriculture,” here.---------------🎤 Book Kristin Demoranville to Speak: website to submit a request.---------------🎤 Bites and Bytes Podcast Info:Website: Explore all our episodes, articles, and more on our official website. Merch Shop: Show your support with some awesome Bites and Bytes gear!Substack:Stay updated with the latest insights and stories from the world of cybersecurity in the food industry.Schedule a Call with Kristin: Share Your Thoughts Socials: TikTok; Instagram; LinkedIn; BlueSky---------------🛡️ About AnzenSage & AnzenOTAnzenSage is a cybersecurity advisory firm specializing in security resilience for the food, agriculture, zoo, and aquarium industries. AnzenSage offers practical, strategic guidance to help organizations anticipate risks and build resilience. Learn more about their offerings at anzensage.com.AnzenOThelps organizations understand and prioritize operationalrisk faster, without slow or static assessments. Subscription access is available, including a student option. Learn more at anzenot.com.The podcast and artwork embedded on this page are from AnzenSage, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Energy TalksEpisode: #120: Use of Deception Solutions in Energy Sector CybersecurityPub date: 2026-02-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDiscover how digital twins of online infrastructure can be used to fool attackers
In this episode of Energy Talks, host Simon Rommer, OT Security Consultant at OMICRON, and his guest. Christoph Kukovic, Chief Information Security Officer at Verbund AG, Austria’s leading energy company and one of the largest producers of hydroelectricity in Europe, discuss the critical roles of IT and OT in power systems cybersecurity, focusing on the use of deception solutions.
Deception solutions aim to create realistic online environments for attackers. The idea is to challenge them with a digital twin of the online infrastructure so that they attack the deception solution instead of the real infrastructure.
Christoph shares his insights with Simon into his personal cybersecurity journey, the challenges faced in implementing innovative cybersecurity measures, and the development of his company’s own deception solutions. The conversation delves into the importance of collaboration, the need for realistic simulations, the difference between honeypot and deception solutions, and testing deception solutions in real-world scenarios.
Get more information about OT cybersecurity for power grids .
We welcome your questions and feedback. Simply send us an email to podcast@omicronenergy.com.
Please join us to listen to the next episode of Energy Talks.The podcast and artwork embedded on this page are from OMICRON electronics GmbH, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Exploited: The Cyber Truth Episode: The OT Mistakes Attackers Count On—And How to Fix Them Before They DoPub date: 2026-02-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joseph M. Saunders and OT/ICS security expert Mike Holcomb, founder of UTILSEC, for a candid discussion about the weaknesses attackers exploit inside industrial environments.
Mike shares what he repeatedly finds during assessments of large OT and ICS networks: no effective firewall between IT and OT, flat networks with little segmentation, stale Windows domains, shared engineering credentials, exposed HMIs, and OT protocols that will accept commands from any reachable host. He explains how attackers move from IT into OT using familiar enterprise techniques before pivoting into PLCs, RTUs, safety systems, and historians.
Joe outlines why secure-by-design practices, higher software quality, and “secure by demand” procurement are critical to long-term resilience—especially as cloud connectivity and AI accelerate modernization in industrial environments.
Together, they explore:
Why a missing or misconfigured IT/OT firewall remains the most common and dangerous gapHow micro-segmentation and unidirectional architectures reduce blast radiusThe risks of web-enabled HMIs and long-lived legacy systemsWhy monitoring PLC programming traffic and historian queries mattersHow the Cyber Resilience Act is reshaping accountability for OT vendors
If you’re responsible for industrial operations, plant uptime, or product security, this episode shows how attackers actually move through OT environments—and how to eliminate the mistakes they depend on.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to ManufacturingPub date: 2026-02-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Dick Wilkinson, CTO and co-founder of Proof Labs, to explore the intersection of space technology and industrial cybersecurity.Dick shares his 20-year journey in the U.S. Army with the National Security Agency, transitioning from signals intelligence to becoming a CISO for critical infrastructure organizations, including New Mexico's Supreme Court and the Albuquerque water authority.The conversation dives deep into the challenges of securing satellite systems with onboard intrusion detection and the persistent gap between IT and OT security teams. We also explore why the "castle wall" perimeter security model is dangerously outdated.Dick reveals how AI is lowering the barrier to entry for both attackers and defenders, and discusses the real-world applications of satellite communications in oil and gas operations.He also introduces a revolutionary physical layer-one air gap device called Goldilock Secure, which could transform how we protect remote industrial assets.This episode is essential listening for CISOs, CTOs, and security leaders looking to understand emerging threats in space-based infrastructure and practical solutions for securing distributed industrial environments.Chapters:(00:00:00) - Dick's Journey: From NSA to Space Cybersecurity(00:04:32) - What is Proof Labs and Why Space Security Matters(00:08:15) - Satellites as OT Assets: Oil, Gas, and Critical Infrastructure(00:12:47) - How Onboard Intrusion Detection Works in Spacecraft(00:16:23) - The Castle Wall Problem: Moving Beyond Perimeter Security(00:19:41) - IT vs OT: Bridging the Gap in Manufacturing Cybersecurity(00:24:18) - AI's Impact: Lowering the Barrier for Attackers and Defenders(00:27:35) - The Visibility Challenge: Why Most Plants Don't Know Their Assets(00:30:12) - Goldilock Firebreak: A Physical Air Gap Device That Changes Everything(00:35:20) - Real-World Applications for Remote Industrial Asset ProtectionLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Dick Wilkinson on LinkedInProof Labs WebsiteIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: Pen Testing Reality Check: Why Cybersecurity Fundamentals Still Matter More Than AIPub date: 2026-02-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationShiny tools don’t break attackers in basic mistakes.
In Episode 92 of Protect It All, host Aaron Crow sits down with Corey LeBleu, founder of Relix Security and seasoned penetration tester, for a candid look at what actually causes organizations to get compromised and why fundamentals still matter more than the latest security trends.
Drawing from years of red-team and penetration-testing experience, Corey shares real stories from the field: forgotten printers, unmanaged IoT devices, legacy systems no one owns anymore, and misconfigurations hiding in plain sight. Together, Aaron and Corey unpack why asset visibility, patching, and change management continue to be the weakest links - even as AI and automation enter the security conversation.
You’ll learn:
Why old printers, IoT devices, and “temporary” systems are prime attack paths
What most organizations misunderstand about pen testing and red teaming
How poor asset inventory and change management undermine security programs
The real risks behind shadow IT and unmanaged tools
Where AI helps in pen testing and where experience still wins
Why mastering the basics beats chasing new security gadgets every time
Whether you’re a security professional, IT leader, or someone looking to break into cybersecurity, this episode delivers practical, no-nonsense lessons from the front lines - focused on what actually reduces risk.
Tune in to hear why cybersecurity success still starts with the fundamentals - only on Protect It All.
Key Moments:
03:57 Critical Infrastructure: Finding Vulnerabilities
06:44 "Cyber Risks from Hidden Devices"
11:25 Cybersecurity: Focus on Basics
16:09 Complex Systems Demand Continuous Testing
18:17 Understanding Complex System Security
22:54 "Testing: External vs. Internal"
24:12 Enterprise Challenges with AI Integration
27:40 AI Lowers Barriers for Hacking
About the guest :
Corey LeBleu has built a career around application security testing, becoming deeply involved in integrating vulnerability assessments throughout the software testing lifecycle. Noticing shifts in industry practices, Corey observed major international financial institutions moving to routinely pentest every application- even legacy IBM systems - leading the way in robust cybersecurity practices. In contrast, Corey also highlights the challenges faced by manufacturing, where operational technology often suffers from outdated, vulnerable systems. Corey’s experience showcases the evolving landscape of application security, emphasizing the need for continuous testing and vigilance across diverse industries.
How to connect Corey : https://www.linkedin.com/in/coreylebleu/
Connect With Aaron Crow:
Website: www.corvosec.com
LinkedIn: https://www.linkedin.com/in/aaronccrow
Learn more about PrOTect IT All:
Email: info@protectitall.co
Website: https://protectitall.co/
X: https://twitter.com/protectitall
YouTube: https://www.youtube.com/@PrOTectITAll
FaceBook: https://facebook.com/protectitallpodcast
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Casos de Ciberseguridad IndustrialEpisode: 1/4 Contexto de Orquestando la seguridad OTPub date: 2026-02-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se aborda el paso de la detección a la orquestación como principal reto de la seguridad OT. Se analiza cómo se puede perder el control del riesgo pese a tener muchas herramientas de seguridad. Destaca que en entornos IT/OT/IoT la complejidad organizativa suele ser la más subestimada.The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

















