Podcasts on ICS cybersecurity

   

 

 

Water Services Security at the City of Calgary – Darrol Weiss

Industrial security insights regarding risks, programs, budgets and technology at the City of Calgary Water Services, with Darrol Weiss.

Listen Here

 

RUNNING WITH SCISSORS – PATRICK MILLER

Patrick Miller discusses how technology advances in Industrial Control Systems are out-pacing existing industrial cybersecurity and business risk management programs and what needs to change to keep pace.

Listen Here

 

Israeli Cybersecurity – Dr. Gabi Siboni

Gabi Siboni joins us to talk about standards, challenges and current initiatives in Israel – perhaps most thoroughly-cyber-protected nation on the planet

Listen Here

CLASSIFYING CONTROL SYSTEMS, CONSEQUENCES AND CRITICALITY – MARTY EDWARDS

The need for a standard way to classify the criticality of industrial control systems – eg: safety-critical vs. equipment-critical vs. reliability-critical systems, and what implications such classification should have for industrial security programs

Listen Here

IT VS OT: CHALLENGES AND OPPORTUNITIES – ART CONKLIN

The differences between IT and OT teams and approaches both make life difficult and represent opportunities to improve industrial operations

Listen Here

Pen Testing Cybersecurity

ICS Penetration Testing – Jonathan Pollet

In this pilot episode, Jonathan walks us through how his crew does control system penetration testing, often with live, running systems as a target, with examples of findings and how customers use those findings.

Listen Here

Cybersecurity

German Initiatives & Progress in Cybersecurity – Jens Weisner

We caught Jens Weisner at S4 and he talks about cybersecurity in Germany – progress, challenges and a little comparing of the German approach to what he sees happening in North America.

Listen Here

Critical Infrastructure

Critical Infrastructure Security In Israel –
Buki Carmeli

Buki Carmeli walks us through the evolution of government
programs and legislation for securing Israel’s
critical infrastructure.

Listen Here

ICS security podcast

IIoT Security – Sven Shrecker

In this pilot episode, Sven takes us through the
emerging field of industrial IoT and how
connecting the grid to the cloud presents new
problems, and new solutions, for security professionals.

Listen Here

OSIsoft & EPRI Methodology – Harry Paul

Join us for an introduction to the EPRI approach and
an overview of what OSIsoft is doing,
and what other product vendors can do,
to support the effort.

Listen Here

Cybersecurity Governance – Paul Feldman

Paul Feldman joins us to explore cybersecurity
governance topics for boards of directors
in the North American electric sector:
what are their responsibilities and more.

Listen Here

The future of OT security in
modern industrial operations

How new approaches are needed to gain defensive advantage over already-capable cyber adversaries, to keep up with new OT/ICS technologies, and to serve business risk management needs in increasingly-demanding, competitive environments.

Listen Here

Safe IT/OT Integration with
unidirectional security gateways

The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. Unidirectional security gateways allow to digitize without compromise.

Listen Here

Vulnerabilities and architectural considerations in ICS

In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about SCADA vulnerabilities in Industrial Control Systems architectures.

Listen Here

Malicious hacking activity increasingly
targeting critical infrastructure

As operational technology (OT) and industrial control system (ICS) infrastructure have become much more prominent components of national critical infrastructure, malicious hacking activity is increasingly targeted in this direction.

Listen Here

A closer look at the IT/OT Landscape
for infosec professionals

The challenge for modern cyber security engineers working in the OT/ICS area involves modernizing the weak or missing protection controls in existing infrastructure toward more advanced and effective solutions that will stop malicious actors.

Listen Here

Why Unidirectional Security Gateways
can replace firewalls

Unidirectional Security Gateways can replace firewalls in industrial network environments, providing absolute protection to control systems and operations networks from attacks originating on external networks.

Listen Here

Seal the integrity of your logs
with Waterfall BlackBox

Logs are the baseline information required for quality incident response and forensics. They consist of tracks and hints of the attack and the attacker. How do you keep log repositories more secure than the attacked network?

Listen Here

Unidirectional communications
in a bidirectional world

Modern enterprises transmit control system information to business networks continuously, and need to send information from business networks into operations networks occasionally. How do you do it securely?

Listen Here

Remote access options for
unidirectionally protected networks

Remote control is the modern attack method. While unidirectional gateways are designed to defeat remote control, that doesn’t mean we have to give up remote access. Learn about few practical options.

Listen Here

The difference between
IT security and ICS security

On IT networks, the focus of a security program is generally preventing the theft of information. The primary focus on control system networks is safety and reliability, and preventing sabotage of those elements.

Listen Here