The SolarWinds supply chain breach is arguably the biggest hack in history. OSIsoft's Security Architect, Bryan Owen, joins us to explore the breach and what it means for industrial security.
The SolarWinds supply chain breach is arguably the biggest hack in history. OSIsoft's Security Architect, Bryan Owen, joins us to explore the breach and what it means for industrial security.
Like civil engineers building bridges, security engineers should have quantitative goals: How secure must the system be when commissioned? (How much load must the bridge carry?) How long must the system maintain that security level without major maintenance? (How long must the bridge carry that load
CIP-013 is intended to reduce supply chain risks. What are the rules? What are they costing? Are they working? Dr. Joseph Baugh, Managing Consultant at Guidehouse joins us to explore CIP-013, the executive order and other timely NERC CIP topics.
Ed Amoroso of Tag Cyber, former CSO of AT&T talks about the IT perspective & approach for OT security - where to start and what to watch for.
Some say "Industrial" and "Cloud" and "Security" don't fit together - but is this true? Our guest Andrea Carcano from Nozomi Networks explainins how cloud-based security systems really do improve industrial and IoT security
Markus Braendle, head of Airbus Cybersecurity, and Falk Lindner, lead architect for Industrial Cybersecurity at Airbus Manufacturing join us to talk about industrial security monitoring and management at one of the most complex industrial enterprises on the planet.
Breaking into tenant enterprise networks via building automation networks, say from a public coffee shop: Barry Coflan, a Strategy Consultant at Tower Hill Analytics, provides a perspective on the growing attack surface in modern buildings.
Patrick Coyle - long-time blogger at Chemical Facility Security News explores the state of CFATS regulations, new cybersecurity spending bills in the pipe, and his new blog: Future ICS Security News.
Cybersecurity for rolling stock (trains) is trickier and even more safety critical than we imagine. Join Shannon Ramsaywak, Managing Partner at Nathanial Rand as we explore automation, security and safety issues for passenger rails.
Join us to explore building automation for skyscrapers, cybersecurity, and attack examples with Fred Gordy of Intelligent Buildings
A timely and insightful exploration of supply chain security issues with Spencer Wilcox, the CSO and Executive Director of Technology at PNM Resources
Episodes in the theme of "risk assessment." We need to understand the problem before it makes any sense to talk about solutions
Daniel Ehrenreich joins us to explore practitioner experience of IT/OT Integration, 62443 training and the ICS CyberSec conference every year in Israel
P&I diagrams connect process engineering to control engineering. Sarah Fluchs of Admeritia explains what we need to connect control engineers with security engineers
Most building automation is poorly secured, which is a big problem for hospitals. Gilad Zinger of PWC joins us to explore vulnerabilities and what hospital CISO's are starting to do about the problem.
Ransomware continues to evolve and sophisticated phishing attacks are the most popular attack vector. James McQuiggan of KnowBe4 explores ransomware, phishing and what we can do about it.
Internet communications are creeping into electric distribution systems. James McCarthy and Don Faatz join us from the NIST NCCoE to talk about this project & others where they provide detailed "how to" industrial security documentation
Each of these perspectives involves more than software and are immune to an inevitable litany of software vulnerabilities found in control systems
Learn about the Beer ISAC movement, the Beer ISAC Podcast, the Russian industrial security community and other initiatives with Anton Shipulin and Vladimir Dashchenko of Kaspersky
Explore a targeted ransomware attack at a pharmaceuticals plant, the incident response and how hard it is to just "restore from backup" with Ofer Shaked, Co-Founder & Chief Technology Officer at SCADAfence
Author, researcher and industrial security pioneer Jake Brodsky explores the security and operational benefits of configuring self-consistency checks into industrial control systems
Derek Harp, CEO and Co-Founder of CS2AI and Founder of The Cyber List speaks to the history and future of CS2AI, and provides some insights into cyber security training for non-cyber-savvy audiences
Roman Arutyunov, Co-Founder of Xage Security, explores intrinsically-distributed, authority-based blockchains for industrial security in the form of the Xage Security Fabric
Marco Blume, Product Manager for Embedded at WIBU Systems introduces discrete manufacturing and explores how intellectual property protection, safety and cybersecurity work in that vertical and others.
Phil Neray, VP Industrial Security of CyberX reviews findings, remediations and C-level responses for security assessments at 1800 industrial sites
Phil Dunbar, CTO of the new Industrial Defender joins us to explore the significance of the firm's historical contributions, and where the new Industrial Defender is headed today
Andy Bochman of Idaho National labs describes CCE, a new methodology for industrial security with a focus on mission assurance, which means different things in different industries
Robert Pitcher of Public Safety Canada explores Canadian industrial security, including very popular attack training/awareness sessions and the annual industrial security symposium
Security PHA Review – a new methodology for protecting safe operations. Join our discussion with James McGlone, one of the authors of the new ISA book describing a robust connection between safety and cybersecurity. PLAY Now
The Industrial Security Podcast: how education differs from training, with examples from Dr. Art Conklin at the University of Houston. Click Play
Matt Gibson from the EPRI explores analog control systems, IIoT at nuclear sites and control system product "labeling" for security. Click Play
As 2019 comes to a close, we look back at the top five episodes by downloads. The top five include guests from the United States, Israel, and Germany: Joe Weiss, Dr. Gabi Siboni, Jens Weisner, Patrick Miller, and Jonathan Pollet. To hear the insights of our most popular guests, click on each episode
Pointing fingers at vendors is easy. Creating "secure" products is a real challenge, supply chain is a big part of that challenge, and vendors cannot solve the problem in isolation. Kenneth Crowther, a Product Security Leader at GE explores what a leader in this space is doing. Click PLAY
Rick Driggers of CISA describes cyber, physical and industrial security priorities at the new US DHS CISA agency. Tune in now
How do we estimate the probability of an attack that has never happened? Ron Brash of Verve Industrial explains. Tune in now
Jens Wiesner returns to the Industrial Security Podcast to discuss the German BSI's commitment to the new "Malcolm" OT network visibility tool. PLAY NOW
Build, break & secure with a 1000-lb portable lab - Matthew Luallen of Cybati explores modern industrial security training
Industrial security pioneer Joe Weiss explains how there are 3 networks, not two - IT, OT and Engineering, with examples from the 2007 aurora test.
Explore out of band security and operational anomaly detection with Ilan Gendelman and Hadas Levine of SIGA OT Solutions. Click PLAY
Industrial security pioneer Eric Byres, CEO of aDolus, speaks to software supply chain trust issues & some of the technology his new venture
Mark Fabro, from Lofty Perch, explores how robust cyber/physical risk assessments help “stay left of boom” at industrial sites
Lyndon Hall is routinely called on for the first-ever security assessment at industrial sites. On this episode of the Industrial Security Podcast, he explains how he does that and what he finds
Asset inventory is the foundation of industrial security, which is essential to IT/OT convergence. Tune in to our new podcast with Rick Kaun
A wide-ranging conversation with Greg Hale, Editor and Founder of Industrial Safety and Security Source (ISSSource), about where we are today, how security relates to safety, how to sell security as improving efficiency and other topics.
Meg Duba, a recruiter at Idaho National Labs talks about techniques, tips, and challenges for industrial security recruitment and job hunting. Tune in to the new episode of the Industrial Security Podcast
Mark Lindike explores industrial systems and security challenges at the Munich International Airport, as well as how the new Munich ISH training facility is helping the airport and others.
Industrial security insights regarding risks, programs, budgets and technology at the City of Calgary Water Services, with Darrol Weiss.
Patrick Miller discusses how technology advances in Industrial Control Systems are out-pacing existing industrial cybersecurity and business risk management programs and what needs to change to keep pace.
Gabi Siboni joins us to talk about standards, challenges and current initiatives in Israel - perhaps most thoroughly-cyber-protected nation on the planet.
The differences between IT and OT teams and approaches both make life difficult and represent opportunities to improve industrial operations.
Marty Edwards discusses the need for a standard way to classify the criticality of industrial control systems - eg: safety-critical vs. equipment-critical vs. reliability-critical systems, and what implications such classification should have for industrial security programs.
Buki Carmeli walks us through the evolution of government programs and legislation for securing Israel's critical infrastructure.
We caught Jens Weisner at S4 and he talks about cybersecurity in Germany – progress, challenges and a little comparing of the German approach to what he sees happening in North America.
Jonathan Pollet, CEO of Red Tiger Security, walks us through how his crew does control system penetration testing, often with live, running systems as a target, with examples of findings and how customers use those findings.
Paul Feldman joins us to explore cybersecurity governance topics for boards of directors in the North American electric sector. P
Harry Paul is a cyber security expert at OSIsoft. Harry walks us through OSIsoft's contribution to the new EPRI ICS cyber-risk assessment methodology. The new methodology is detailed and thorough.
Sven Schrecker is a co-chair of the Industrial Internet Consortium Security Working group and a co-author of the IIC Security Framework.
Andrew Ginter, and Edward Amoroso, talk about how new approaches are needed to gain defensive advantage over already-capable cyber adversaries
Andrew Ginter and Edward Amoroso talk about how unidirectional security gateways enable safe IT/OT integration. Podcast
Andrew Ginter, VP of Industrial Security at Waterfall, and Edward Amoroso, CEO of TAG Cyber, talk about SCADA vulnerabilities in ICS architectures
In this podcast, Andrew Ginter and Edward Amoroso talk about how the traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value
In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about industrial control system security
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about remote access options for unidirectionally protected networks
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, explains how, in order to keep log repositories more secure than the attacked network, Waterfall developed the BlackBox
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, explains how you can send information into these sites securely.
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about Unidirectional Security Gateways. They can replace firewalls in industrial network environments, providing absolute protection to control systems and o
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about the difference between IT security and ICS security
Restoring trust in network information for cyber-attack response teams and forensics”.