Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Ot Security Podcasts

show episodes
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Artwork

1
The Watchers

Sentinel Blue

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
  continue reading
 
Artwork

1
Security Voices

Security Voices

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
  continue reading
 
Artwork
 
The Critical Assets Podcast covers important OT and ICS security topics with an eye toward standards and regulation to keep you ahead of your adversaries... and your auditors. Ampyx Cyber. Securing your world. See our other content such as blogs, cybersecurity news and more at www.ampyxcyber.com
  continue reading
 
Welcome to Manufacturing Happy Hour, the podcast where we get real about the latest trends and technologies impacting modern manufacturers. Hosted by industry veteran Chris Luecke, each week, we interview makers, founders, and other manufacturing leaders that are at the top of their game and give you the tools, tactics, and strategies you need to take your career and your business to the next level. We go beyond the buzzwords and dissect real-life applications and success stories so that you ...
  continue reading
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Artwork

1
Unsolicited Response

Dale Peterson: ICS Security Catalyst and S4 Conference Chair

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
  continue reading
 
Artwork

1
Manufacturing Hub

Vlad Romanov & Dave Griffith

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
  continue reading
 
Artwork

1
The OT Life

Cygnet Health Care

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to The OT Life: A careers podcast from the OTs of Cygnet Health Care. We created The OT Life for OTs around the country who are interested in hearing from people who share the same passion for Occupational Therapy.We chat all things OT from our opinions about the profession, our role in health and social care, stories and experiences, and career advice.This is the place to help you make the most of the profession you love.https://join.cygnethealth.co.uk/ot-life/
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Artwork

1
TopCyberPro

TopCyberPro

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Artwork
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
  continue reading
 
Artwork

1
The Get Cyber Resilient Show

Get Cyber Resilient

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott, Garrett O'Hara and Vinh Nguyen will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get ...
  continue reading
 
Artwork

1
Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Artwork

1
AWS Industrial Insights

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Welcome to the Methods podcast! Methods are the UK’s leading independent transformation partner for public services. We apply our skills in innovation and collaboration from across the Methods Group, to deliver end-to-end business and technical solutions that are people-centered, safe, and designed for the future. You can find out more about the Methods group at www.methods.co.uk.
  continue reading
 
Dave Kittle, DPT of www.CashBasedPhysicalTherapy.org discuss Physical Therapy and Technology in this podcast. Full VIDEO versions of each episode can be found at https://www.youtube.com/PTTechTalk Dave Kittle also owns www.ConciergePainRelief.com (Home Physical Therapy) serving New York City, Long Island, NJ, and CT.
  continue reading
 
Artwork

1
Left to Our Own Devices

Cybellum Technologies LTD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Introducing Left to Our Own Devices - the podcast dedicated to everything product security. Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros. Hosted & produced by: *David Leichner, CMO at Cybellum - https://www ...
  continue reading
 
Loading …
show series
 
In this episode of The Watchers, Andy Sauer sits down with cybersecurity leader Tatyana Bolton. From her unexpected start in acting to shaping national policy at CISA, Google, and beyond, Tatyana shares her perspective on why U.S. cyber defenses must keep pace with adversaries moving at the “speed of relevance.” They discuss policy gridlock, supply…
  continue reading
 
It’s been over a year since we’ve talked about cybersecurity on Manufacturing Happy Hour, and with AI changing the game completely, we’re overdue for a refresh. Around 80-85% of the global industry doesn’t have basic defense at the edge of their networks; that’s a sobering statistic. Felipe Sabino Costa, Senior Product Manager for Networking and Cy…
  continue reading
 
Could an LLM or some kind of an AI-driven language model, such as a natural language interface, someday replace our beloved CLI? That is, instead of needing to understand the syntax of a specific vendor’s CLI, could a language model allow network operators to use plain language to get the information they need or the... Read more »…
  continue reading
 
Could an LLM or some kind of an AI-driven language model, such as a natural language interface, someday replace our beloved CLI? That is, instead of needing to understand the syntax of a specific vendor’s CLI, could a language model allow network operators to use plain language to get the information they need or the... Read more »…
  continue reading
 
Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud net…
  continue reading
 
Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud net…
  continue reading
 
A college degree can be a useful stepping stone into a tech career, and it certainly doesn’t hurt to have it on your resume. But do you really need that college degree to succeed in IT? Maybe, maybe not. Today’s guest is Wes Noonan, whose non-traditional path into and through a career in IT has... Read more »…
  continue reading
 
A college degree can be a useful stepping stone into a tech career, and it certainly doesn’t hurt to have it on your resume. But do you really need that college degree to succeed in IT? Maybe, maybe not. Today’s guest is Wes Noonan, whose non-traditional path into and through a career in IT has... Read more »…
  continue reading
 
Modern robotic picking is moving beyond neat rows and perfect lighting conditions. In this Automate 2025 conversation, Vlad and Dave sit down with Kevin Wu from Siemens to explore how Simatic Robot Pick AI Pro is tackling the messy reality of warehouses and factories. They discuss how the new edge architecture with the Simatic IPC BX 59 A and an NV…
  continue reading
 
Michael Reid went from studying aerospace engineering to becoming CEO at Megaport, a global network-as-a-service platform. How did he get there, and what can we learn from his journey? We walk his career path, including a pivotal role scaling ThousandEyes from 74 million to over 2.4x ARR post-acquisition, and how those experiences shaped his approa…
  continue reading
 
We’re thrilled to welcome Tim McConnaughy back to the podcast. Tim is a hybrid cloud network architect, author, and co-host of the Cables to Cloud podcast. He recently wrote a 5-part blog series titled ‘Goodbye, Yellow Brick Road’ that reflects on his career path, including his decision to leave a startup. We discuss the impetus... Read more »…
  continue reading
 
We’re thrilled to welcome Tim McConnaughy back to the podcast. Tim is a hybrid cloud network architect, author, and co-host of the Cables to Cloud podcast. He recently wrote a 5-part blog series titled ‘Goodbye, Yellow Brick Road’ that reflects on his career path, including his decision to leave a startup. We discuss the impetus... Read more »…
  continue reading
 
Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
  continue reading
 
Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
  continue reading
 
Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
  continue reading
 
In this episode, Craig and Dino address why manufacturers still suffer incidents after spending millions on OT security tools. They discuss how to convert those investments into measurable risk reduction. You'll learn why buying tools isn't a strategy. Get insights into how to validate asset visibility on the floor (not just the network map), pract…
  continue reading
 
Ad fraud driven by both humans and AI agents require new signals beyond traditional bot-vs-human checks. Gavin Reid and Lindsay Kaye from HUMAN Security discuss how monetization includes ad and click fraud (peach pit), selling residential proxy access, and operating botnets for hire and preventing harm requires dismantling criminal infrastructure a…
  continue reading
 
In times of major change–whether in IT or the economy–organizations should take a fresh look at their sourcing strategy. Companies outsourcing key functions need to re-examine the reasoning and scrutinize the results. The same goes for in-house functions. IT leaders need to ask: is our sourcing strategy in line with our current corporate and IT... …
  continue reading
 
Take a Network Break! We start with listener follow-up on security browsers, and then dive into a deep pool of Juniper vulnerabilities to pick two critical ones affecting Juniper Space. We also get an update from SonicWall that the breach of its cloud storage service affected all users of the service. Cisco announces a new... Read more »…
  continue reading
 
Take a Network Break! We start with listener follow-up on security browsers, and then dive into a deep pool of Juniper vulnerabilities to pick two critical ones affecting Juniper Space. We also get an update from SonicWall that the breach of its cloud storage service affected all users of the service. Cisco announces a new... Read more »…
  continue reading
 
What does it really take to help manufacturers grow? It’s not just about cutting costs or chasing margins. It’s about understanding how capital really moves through your business. In this episode, we’re sitting down with Erik Skie, Jon Hughes, and Aaron Traut from CLA (CliftonLarsonAllen) for a roundtable chat over beers (in spirit, if not literall…
  continue reading
 
Jack Rhysider, creator of Darknet Diaries, joins The Watchers to talk privacy, hacking culture, and the evolving threats shaping our digital lives. From disguises at DEFCON to exploring hacker origins in video games, Jack shares insights on why breaches are inevitable, how underground communities evolve, and where optimism fits in the face of AI, n…
  continue reading
 
Jennifer Selby Long reframes security awareness as more than training—it’s about earning trust and influence with executives and security teams. She shares leadership lessons on how to build stronger alignment and support for security initiatives. Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodca…
  continue reading
 
Jennifer Selby Long reframes security awareness as more than training—it’s about earning trust and influence with executives and security teams. She shares leadership lessons on how to build stronger alignment and support for security initiatives. Show Notes: https://cisostoriespodcast.com/csp-217
  continue reading
 
LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-generation networking. Today we have a team from LightRiver lead by Jim Brinksma to help explain how LightRiver is advancing automation in optical and bridging the gap between the IP and optical layers. Th…
  continue reading
 
LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-generation networking. Today we have a team from LightRiver lead by Jim Brinksma to help explain how LightRiver is advancing automation in optical and bridging the gap between the IP and optical layers. Th…
  continue reading
 
Today’s show is one of those “We’re living in the future” episodes, where we talk about using AI to perform root cause analysis of a performance issue. But not root cause analysis for just the networking part of the stack. The full stack. Why? Because it’s not good enough to say “it’s not the network”.... Read more »…
  continue reading
 
Today’s show is one of those “We’re living in the future” episodes, where we talk about using AI to perform root cause analysis of a performance issue. But not root cause analysis for just the networking part of the stack. The full stack. Why? Because it’s not good enough to say “it’s not the network”.... Read more »…
  continue reading
 
Sometimes weirdness occurs within DNS if you’re on an IPv4 network and you connect to a dual-stack or v6-only VPN. Maybe the browser doesn’t connect, but you can still send pings, or vice versa. Is the OS getting confused about which stack and which order of interfaces to request services? Is the weird behavior being... Read more »…
  continue reading
 
ICC 2025 was a clear level up for the Ignition community. In this conversation Vlad and Dave share on the ground insights from a week of packed sessions, vendor showcases, and ProveIt demonstrations that brought working integrations to life. They unpack why the move to a larger venue created more chances for deep technical conversations, how the co…
  continue reading
 
The job interview is an inescapable part of a career journey. Today on N Is For Networking, we conduct a mock interview with a candidate who’s applying for a junior network administration role. The goal is to give Toni Mrowetz, our candidate, feedback. At the same time, we hope this helps anyone listening who might... Read more »…
  continue reading
 
The job interview is an inescapable part of a career journey. Today on N Is For Networking, we conduct a mock interview with a candidate who’s applying for a junior network administration role. The goal is to give Toni Mrowetz, our candidate, feedback. At the same time, we hope this helps anyone listening who might... Read more »…
  continue reading
 
Selecting and managing ICS/OT cybersecurity vendors and integrators isn’t just a procurement step - it’s a strategic decision that shapes resilience, compliance, and long-term security outcomes. The best approach depends on organization size, resources, and security objectives. In this episode, Don and Tom are joined by Saltanat Mashirova, OT Cyber…
  continue reading
 
AI is developing at an incredible pace. With that development comes questions. For instance, how do you connect your resources to agents? How do agents connect with each other? And how do you keep it all secure? Our guest Christian Posta is here to guide us through AI, MCP, and the concept of workload identities.... Read more »…
  continue reading
 
AI is developing at an incredible pace. With that development comes questions. For instance, how do you connect your resources to agents? How do agents connect with each other? And how do you keep it all secure? Our guest Christian Posta is here to guide us through AI, MCP, and the concept of workload identities.... Read more »…
  continue reading
 
חדשנות בסייבר היא צורך קיומי, קצב השינוי בראיית התוקפים ומשטחי תקיפה חדשים שנוצרים חדשות לבקרים לא מאפשרים לצוותי ההגנה לנוח על זרי הדפנה מרבית צוותי הסייבר בחברות עסוקים במימושים של הגנות ולעיתים קרובות נותנים היום מענה לאתמול ופחות למחר. הצורך בצוות שיבצע חשיבה ובדיקות לאיומי המחר ומציאת פתרונות טכנולוגים הפך לכורח המציאות נחשון פינקו מארח את אופ…
  continue reading
 
Ever wonder what the hosts of The Audit talk about when the mics are rolling but the formal interview isn't happening? This Field Notes episode gives you exactly that—unfiltered conversations covering everything from coffee preferences and glider flying to trademark scams targeting cybersecurity professionals. Nick and Eric dive into Eric's latest …
  continue reading
 
Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »…
  continue reading
 
Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »…
  continue reading
 
If you’ve got an Autonomous System Number (ASN) and an IPv6 block, you too can multi-home IPv6 to your home lab! Sounds easy, right? Well, maybe…but today we’re going to discuss why you’d want to and how you can do that with guest Anton Lönnerbro. Anton is a solutions architect at a managed service provider... Read more »…
  continue reading
 
If you’ve got an Autonomous System Number (ASN) and an IPv6 block, you too can multi-home IPv6 to your home lab! Sounds easy, right? Well, maybe…but today we’re going to discuss why you’d want to and how you can do that with guest Anton Lönnerbro. Anton is a solutions architect at a managed service provider... Read more »…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play