
New Resource: Adapting IT Advice for OT | Episode 129
Jack Bliss of 1898 & Co. has adapted the CIS Top-18 list for OT/industrial, adding a lot of industrial context and lists of related OT-centric tools and technology.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
Jack Bliss of 1898 & Co. has adapted the CIS Top-18 list for OT/industrial, adding a lot of industrial context and lists of related OT-centric tools and technology.
Airports are like small cities. Eric Vautier, CISO of all 3 Paris airports looks at WHAT is an airport and how are thousands of airports changing their cybersecurity because of NIS2 and the regulatory environment.
Ransomware is the most common cyber attack causing OT outages – all Windows machines encrypted. What if we could “press a button” and have everything working again in seconds or minutes? Alex Yevtushenko of Salvador Technologies joins us to look at new technology for rapid recovery.
The Mitre CWE – Common Weakness Enumeration is database talks about kinds of problems that can show up in the future – future zero days – rather than CVE that talks about what vulnerabilities were discovered in the past. Susan Farrell walks us through the CWE and how both vendors and owners and operators use it.
Leo Simonovich, VP & Global Head of Industrial Cyber and Digital Security at Siemens Energy, joins us to discuss AI and the industrial cyber risks and threats it poses to the digital transformation of the energy industry.
How hard is it for an attacker to dig around in my network? Robin Berthier of Network Perception joins us to look at new network segmentation evaluation and visualization technology that lets us see at a glance how much trouble, or not, we’re in.
Precision farming is heavily automated, as are the “food factories” essential to feeding the world’s population. Marcus Sachs at the McCrary Institute at Auburn University joins us to look at the threats, the challenges and opportunities to secure our food supplies from cyber risk.
From supply chain to Active Directory to segmentation designing security into ICS products is hard. Jake Hawkes walks us through how security gets built into AVEVA Enterprise SCADA.
Jørgen Hartig, CEO at SecuriOT, joins us to look at a decision support tool to help answer questions surrounding how to best use resources.
You plug in a USB drive and your laptop starts smoking – nasty. Mario Prieto Sanlés of AuthUSB joins us to look at the nastiest of USB attacks, and what we can do about them.