How do we estimate the probability of an attack that has never happened? Ron Brash of Verve Industrial explains. Tune in now
Jens Wiesner returns to the Industrial Security Podcast to discuss the German BSI's commitment to the new "Malcolm" OT network visibility tool. PLAY NOW
Lyndon Hall is routinely called on for the first-ever security assessment at industrial sites. On this episode of the Industrial Security Podcast, he explains how he does that and what he finds
A wide-ranging conversation with Greg Hale, Editor and Founder of Industrial Safety and Security Source (ISSSource), about where we are today, how security relates to safety, how to sell security as improving efficiency and other topics.
Meg Duba, a recruiter at Idaho National Labs talks about techniques, tips, and challenges for industrial security recruitment and job hunting. Tune in to the new episode of the Industrial Security Podcast
Mark Lindike explores industrial systems and security challenges at the Munich International Airport, as well as how the new Munich ISH training facility is helping the airport and others.
Industrial security insights regarding risks, programs, budgets and technology at the City of Calgary Water Services, with Darrol Weiss.
Patrick Miller discusses how technology advances in Industrial Control Systems are out-pacing existing industrial cybersecurity and business risk management programs and what needs to change to keep pace.
The differences between IT and OT teams and approaches both make life difficult and represent opportunities to improve industrial operations.
Marty Edwards discusses the need for a standard way to classify the criticality of industrial control systems - eg: safety-critical vs. equipment-critical vs. reliability-critical systems, and what implications such classification should have for industrial security programs.
Buki Carmeli walks us through the evolution of government programs and legislation for securing Israel's critical infrastructure.
We caught Jens Weisner at S4 and he talks about cybersecurity in Germany – progress, challenges and a little comparing of the German approach to what he sees happening in North America.
Jonathan Pollet, CEO of Red Tiger Security, walks us through how his crew does control system penetration testing, often with live, running systems as a target, with examples of findings and how customers use those findings.
Harry Paul is a cyber security expert at OSIsoft. Harry walks us through OSIsoft's contribution to the new EPRI ICS cyber-risk assessment methodology. The new methodology is detailed and thorough.
Sven Schrecker is a co-chair of the Industrial Internet Consortium Security Working group and a co-author of the IIC Security Framework.