Addiction, recovery and the everday struggle.
…
continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
…
continue reading
1
Todd Beebe: Beyond IT vs. OT, The Common Ground for Securing Any Environment
1:03:45
1:03:45
Play later
Play later
Lists
Like
Liked
1:03:45
About Todd Beebe: Todd Beebe, a cybersecurity veteran since the early 90s, commenced his journey by thwarting attempts to hack his BBS. His expertise led to pivotal roles with an international organization, securing remote access, fortifying websites, and pioneering firewall deployment. Later, at Ernst & Young, he spearheaded the Attack & Penetrati…
…
continue reading
1
Ron Fabela: Secure Access That Makes Sense for Operations
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23
About Ron Fabela: Ron Fabela, a seasoned cybersecurity professional with over 20 years of experience, specializes in safeguarding Industrial Control Systems (ICS) and Operations Technology (OT). Currently serving as the Field CTO at XONA, Ron leads initiatives to establish secure industrial access, ensuring safe operations for asset owners globally…
…
continue reading
1
Dan Gunter: Lessons Learned from Real-World Attack on Ukraine’s Critical Infrastructure
58:28
58:28
Play later
Play later
Lists
Like
Liked
58:28
About Dan Gunter: Dan Gunter, founder and CEO of Insane Forensics, is a seasoned cybersecurity professional renowned for his extensive expertise in the field. With a background as an officer in the United States Air Force, specifically with the Air Force Computer Emergency Response Team (AFCERT) and operational CYBERCOM teams, Dan has a wealth of e…
…
continue reading
1
Thomas VanNorman: ICS Security Takes a Village - Building an OT Security Community
45:31
45:31
Play later
Play later
Lists
Like
Liked
45:31
About Thomas VanNorman: Thomas VanNorman, a seasoned professional with almost three decades of experience in OT, is currently leading the CyPhy Product group at GRIMM. His primary focus involves securing Industrial Control Systems and networking within this domain. Additionally, Tom is a co-founder of the ICS Village, a 501(c)(3) non-profit organiz…
…
continue reading
1
Don C. Weber: The Gray Area Between OT and IT
55:58
55:58
Play later
Play later
Lists
Like
Liked
55:58
About Don C. Weber: Don C. Weber is the Principal Consultant and Founder of Cutaway Security, LLC, an information security consulting firm based in Texas. With a master's degree in network security and a Certified Information Systems Security Professional (CISSP) certification, Don has a wealth of expertise gained over two decades. As a seasoned le…
…
continue reading
1
Ron Brash: Understanding the Small Details to Define Risk
55:36
55:36
Play later
Play later
Lists
Like
Liked
55:36
About Ron Brash: Ron Brash, a renowned figure in ICS/OT cybersecurity and embedded vulnerability research, garnered acclaim as the recipient of the Top 40 under 40 award for Engineering Leaders 2020 from Plant Engineering. Serving as the VP of Technical Research & Integrations at aDolus Technology Inc., Ron aligns his passion for ICS/OT security by…
…
continue reading
1
Michael Holcomb: The Journey from IT to OT and Strengthening IT-OT Partnership
49:05
49:05
Play later
Play later
Lists
Like
Liked
49:05
About Michael Holcomb: Michael Holcomb is the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, a prominent engineering, procurement, and construction company. In his current role, he focuses on securing vast ICS/OT environments, ranging from power plants and commuter rail to manufacturing facilities and refineries. Curren…
…
continue reading
1
Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk
58:58
58:58
Play later
Play later
Lists
Like
Liked
58:58
About Kayne McGladrey: Kayne McGladrey, CISSP, is a seasoned cybersecurity expert with over twenty-five years of experience and a senior member of the IEEE. As the field CISO for Hyperproof, he specializes in advising companies on upholding the implicit social contract to protect entrusted data. Kayne's transformative leadership has been instrument…
…
continue reading
1
John Cusimano: Leveraging ISA/IEC 62443 to Quantify OT Risk
45:04
45:04
Play later
Play later
Lists
Like
Liked
45:04
About John Cusimano: John Cusimano is a seasoned business and thought leader, boasting over 30 years of expertise in process control, functional safety, and operational technology (OT) and industrial control systems (ICS) cybersecurity. With a track record of conducting numerous OT cybersecurity vulnerability assessments, he has played a pivotal ro…
…
continue reading
1
Eric Smith: The Importance of Physical Security in Protecting Infrastructure
42:50
42:50
Play later
Play later
Lists
Like
Liked
42:50
About Eric Smith: Eric Smith is a dedicated Security Management Consultant and the founder of Business Karate, LLC, a Colorado-based company specializing in security planning and strategic development for organizations. With over a decade of experience in law enforcement, Eric is passionate about aligning security measures with business needs and h…
…
continue reading
1
Nick Tsamis: Leveraging MITRE’s Adversary Emulation Platform in OT
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58
About Nick Tsamis: Nick currently serves as Department Chief Engineer within the Cybersecurity Infrastructure Protection Innovation Center (CIPIC) at The MITRE Corporation where he works to develop strategies for protection against emerging threats on critical infrastructure. Nick led the technical efforts for the first release of Caldera for OT. H…
…
continue reading
1
Chris Bihary: Tapping Into Packet Level Data in OT
56:38
56:38
Play later
Play later
Lists
Like
Liked
56:38
About Chris Bihary: Chris Bihary is the CEO and Co-Founder of Garland Technology, a leading USA-based manufacturer specializing in Network TAPs, Network Packet Brokers, Hardware Data Diodes, and Inline Bypass solutions. With a rich background spanning over 30 years in IT and OT cybersecurity, Chris has fostered collaborative partnerships with tech …
…
continue reading
1
Raphael Arakelian: Beyond the Tools - Maturing Implementation to Reduce Risk
57:08
57:08
Play later
Play later
Lists
Like
Liked
57:08
About Raphael Arakelian: Raphael Arakelian is a distinguished figure in the field of cybersecurity, serving as a manager within PwC Canada's OT & IoT cybersecurity team. With a national leadership role, he directs PwC Canada's efforts in OT monitoring implementation services, overseeing proof-of-concept evaluations and implementations across divers…
…
continue reading
1
Jonathan Tubb: Unlocking Business Value at the Intersection of IT, OT, Operations, and Cybersecurity
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08
About Jonathan Tubb: Jonathan Tubb is a seasoned cybersecurity expert, renowned for his proficiency in crafting innovative solutions to address the most pressing security issues in the power generation sector. With a background in Computer Engineering from Ohio State University and a Professional Engineer (P.E.) license, he has over 15 years of han…
…
continue reading
1
Josh Varghese: Holistic, Scalable OT Network Design
1:14:12
1:14:12
Play later
Play later
Lists
Like
Liked
1:14:12
About Josh Varghese: Josh Varghese, founder of Traceroute, is a seasoned industrial networking expert who has dedicated himself to serving the dynamic industrial/OT market. With nearly a decade of experience as a technical lead at Industrial Networking Solutions, where he established their technical support and application engineering department, J…
…
continue reading
1
Fred Gordy: Protecting the Safety and Resilience of the Buildings We Live and Work In
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12
About Fred Gordy: Fred Gordy is a pioneering figure in the SmartBuilding industry, with two decades of expertise in developing and implementing secure control systems for Fortune 500 companies across the globe. A trailblazer in addressing the inherent cybersecurity risks posed by control system technology, he has authored over 100 articles on build…
…
continue reading
1
Matthew Scott: Protecting Legacy OT in Mass Transit
58:18
58:18
Play later
Play later
Lists
Like
Liked
58:18
About Matthew Scott: Matthew Scott is a technical leader with over three decades of experience in industrial automation, specializing in the design, deployment, and maintenance of cutting-edge SCADA systems across critical infrastructure sectors such as transit, oil & gas, energy, and water/wastewater. His expertise spans a wide range of hardware a…
…
continue reading
1
Clint Bodungen: Cybersecurity Simulation As A Video Game, With AI Adversaries
1:05:37
1:05:37
Play later
Play later
Lists
Like
Liked
1:05:37
About Clint Bodungen: Clint Bodungen is a distinguished industrial cybersecurity expert, celebrated public speaker, accomplished author, and a trailblazer in the realm of cybersecurity gamification. With over 25 years of experience in the field, he has left an indelible mark as the Founder, CEO & Chairman of ThreatGEN® Red vs. Blue. A veteran of th…
…
continue reading
1
Ian Frist: Beyond Buzzwords, Building Effective Programs in OT Security
50:51
50:51
Play later
Play later
Lists
Like
Liked
50:51
About Ian Frist: Ian Frist is the Cybersecurity Compliance Program Director at Corning, boasting a MS in Cybersecurity. With a dynamic background spanning both private sector and government roles, Ian's expertise encompasses NIST, CIS, and CMMC frameworks. Currently leading Corning's compliance team within the cybersecurity group, Ian's journey ven…
…
continue reading
1
Michael Weigand: From Planes to Power Plants, Protecting The Intersection of Physical and Digital
53:16
53:16
Play later
Play later
Lists
Like
Liked
53:16
About Michael Weigand: Michael Weigand is the visionary co-founder and Chief Growth Officer of Shift5, spearheading the realization of Shift5’s ambitious growth strategies. With a distinguished background, he spent eight years as an innovative leader in the U.S. Army, pioneering cyber operations and commanding specialized cyber units. Michael's piv…
…
continue reading
1
Daniel Bardenstein: Transparency and Trust With SBOM
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15
About Daniel Bardenstein: Daniel Bardenstein is the driving force behind Manifest, a pioneering software supply chain company revolutionizing how organizations manage SBOM lifecycles. As CTO and co-founder, he empowers enterprises to automate and streamline their processes. Daniel's remarkable journey includes pivotal roles such as Chief of Tech St…
…
continue reading
1
Terence Gill & Roger Simmons: Bringing Texas Utilities Together to Strengthen The Grid Through Collaboration
41:16
41:16
Play later
Play later
Lists
Like
Liked
41:16
About Terence Gill: Terence Gill is a seasoned professional with 26 years of experience in technical roles across various industries. With a background in Computer Science and Finance, he has successfully designed and developed critical systems for organizations like Lockheed Martin, the New York Metropolitan Transportation Authority, and BNY Mello…
…
continue reading
1
Mollie Breen: Accelerating OT Security, Reliability and Efficiency
45:47
45:47
Play later
Play later
Lists
Like
Liked
45:47
About Mollie Breen: Mollie Breen is the dynamic CEO and Co-founder of Perygee, a groundbreaking IoT/OT security platform that has garnered significant funding. With a strong background as an Applied Research Mathematician at esteemed organizations such as the Department of Defense and the National Security Agency, Mollie is a recognized expert in n…
…
continue reading
1
Pete Mauro: Designing System Security Before ‘Cyber’ Became Part of Everyday Vocabulary
50:43
50:43
Play later
Play later
Lists
Like
Liked
50:43
About Pete Mauro: Pete Mauro is a highly accomplished serial entrepreneur with extensive experience and successful exits in the defense industry. With a background spanning startups, system integrators, procurement, and program management, Pete is the CEO and Founder of DTCUBED, a startup consulting firm specializing in cybersecurity, predictive an…
…
continue reading
1
Danielle Jablanski: Navigating the Multitude of OT Technologies Considering Interoperability, Reliability, and Centralization
46:39
46:39
Play later
Play later
Lists
Like
Liked
46:39
About Danielle Jablanski: Danielle Jablanski is an accomplished OT cybersecurity strategist at Nozomi Networks, where she spearheads global research on cybersecurity and drives awareness of operational technology (OT) and industrial control systems (ICS) cybersecurity throughout the industry. She is a nonresident fellow at the Cyber Statecraft Init…
…
continue reading
1
Joy Ditto: The Evolution of Utility Cybersecurity with NERC CIP
1:04:43
1:04:43
Play later
Play later
Lists
Like
Liked
1:04:43
About Joy Ditto: Joy Ditto is a dynamic leader and influential figure in the energy sector. As the President and CEO of Joy Ditto Consulting, she advises companies on vital areas such as cyber and physical security, resilience, broadband, and clean energy development. With her strategic prowess, Joy helps organizations shape their engagement with t…
…
continue reading
1
Michael Welch: Tying Resilience, Availability, Compliance and Cybersecurity Together Into a GRC Program
53:59
53:59
Play later
Play later
Lists
Like
Liked
53:59
About Michael Welch: Michael Welch is the Director, GRCaaS within T&D Governance, Risk, Cybersecurity & Compliance group at Burns & McDonnell. He has over 25 years of professional experience in risk management, compliance, and critical infrastructure. Michael previously served as global chief information security officer for OSI Group, a privately-…
…
continue reading
1
Matt Wyckhouse: Behind the Cyber Shield: OT Security and the Importance of SBOM
50:37
50:37
Play later
Play later
Lists
Like
Liked
50:37
About Matt Wyckhouse: Matt Wyckhouse is a renowned cybersecurity expert with over 15 years of experience in offensive and defensive cyber operations. He is the co-founder and CEO of Finite State, a cybersecurity startup that focuses on illuminating the vulnerabilities and threats within complex software supply chains to protect the devices that pow…
…
continue reading
1
Eric Olden: Managing Identity, Security, and Resiliency in Multi-Cloud Environments
55:33
55:33
Play later
Play later
Lists
Like
Liked
55:33
About Eric Olden: Eric Olden is a serial entrepreneur who has made a career out of simplifying and securing enterprise identity management. He is widely respected as a thought leader in identity management and has pioneered three major paradigm shifts in the field. Eric founded, scaled, and successfully exited both Securant/ClearTrust and Symplifie…
…
continue reading
1
Phoenix: OT Security for Smaller Plants and Factories
24:28
24:28
Play later
Play later
Lists
Like
Liked
24:28
In this special episode, we are joined by Gabe Authier and Greg Valentine to introduce Industrial Defender's new product, Phoenix, an innovative OT security solution designed specifically for small to medium-sized businesses struggling with limited resources and budget. With the rise of attacks on operational technology and the crippling effects of…
…
continue reading
1
Roya Gordon: Secure Connections - Why Human Interaction is Key to OT Security
50:17
50:17
Play later
Play later
Lists
Like
Liked
50:17
About Roya Gordon: Roya Gordon is a trailblazing cybersecurity expert, inspiring young women and people of color to pursue their passions in technology. With an impressive background that includes serving as an intelligence specialist in the U.S. Navy and working at Idaho National Laboratory and Accenture, Roya now holds the position of OT/IoT Secu…
…
continue reading
1
Duane Laflotte: Simulating Real-World Attacks on OT with Red Teaming
52:04
52:04
Play later
Play later
Lists
Like
Liked
52:04
About Duane Laflotte: Duane Laflotte is a renowned Chief Technology Officer (CTO) and technology expert, currently leading the charge at Pulsar Security. With a deep understanding of complex technical issues and a constant thirst for staying at the forefront of emerging technologies, Duane is known for his innovative and creative solutions to even …
…
continue reading
1
Bryson Bort: Security Is Defined By The Threat - Contextualizing Cyber Risks To Prioritize Security Efforts
52:40
52:40
Play later
Play later
Lists
Like
Liked
52:40
About Bryson Bort: Bryson Bort is a skilled cybersecurity professional with an impressive background as an entrepreneur and former U.S. Army Officer. He founded SCYTHE, a platform for next-generation attack emulation, and GRIMM, a cybersecurity consulting firm. Additionally, he co-founded the ICS Village, a non-profit organization dedicated to rais…
…
continue reading
1
Emilio Salabarria: Building Organizational Resilience through Comprehensive Cybersecurity Assessments for Cyber Florida
49:51
49:51
Play later
Play later
Lists
Like
Liked
49:51
About Emilio Salabarria: Emilio Salabarria is a highly accomplished expert in emergency management and cybersecurity. He's been serving as the Deputy Senior Executive Advisor at Cyber Florida since July 2022. Emilio brings a wealth of knowledge and expertise to the table when it comes to cybersecurity education, research, training and development, …
…
continue reading
1
Dan Gunter: How Our Growing Ability To Process Data Affects Cybersecurity
58:23
58:23
Play later
Play later
Lists
Like
Liked
58:23
About Dan Gunter: Dan Gunter is an accomplished cybersecurity professional with a wealth of experience in the field. As the founder and CEO of Insane Forensics, he is committed to providing digital forensics and threat-hunting services to help organizations protect themselves from cyber threats. Dan's expertise was honed through years of service in…
…
continue reading
1
Slade Griffin: Securing the Industrial World - Challenges and Strategies for Cybersecurity Assessments
50:59
50:59
Play later
Play later
Lists
Like
Liked
50:59
About Slade Griffin: Slade Griffin is a highly experienced cybersecurity expert with a career spanning more than two decades. He currently serves as the Director of Security Assessments at Contextual Security Solutions, overseeing the company's cybersecurity assessment and penetration testing practice. His expertise in vulnerability assessments, pe…
…
continue reading
1
Kurt Sanger: Safeguarding Cyberspace - A Legal Perspective on Cybersecurity Challenges and Information Sharing
45:55
45:55
Play later
Play later
Lists
Like
Liked
45:55
About Kurt Sanger: Kurt Sanger is a highly respected cybersecurity, national security, and information leader, known for his expertise in solving complex and high-stakes problems under demanding circumstances. With over two decades of experience serving in the U.S. Marine Corps, Kurt has a unique perspective on the responsibility of providing safet…
…
continue reading
1
Tony Sager: Practicality Over Perfection and Simplifying Security Standards
56:49
56:49
Play later
Play later
Lists
Like
Liked
56:49
About Tony Sager: Tony Sager is a renowned cybersecurity expert who has a distinguished career in both the government and private sectors. He started his professional journey as a mathematical cryptographer and software vulnerability analyst at the National Security Agency (NSA) where he held various leadership positions and received multiple award…
…
continue reading
1
Admiral TJ White: Keeping People Safe Is The Heart Of Cybersecurity
56:36
56:36
Play later
Play later
Lists
Like
Liked
56:36
About Admiral TJ White: Vice Admiral TJ White is a retired 30-plus-year national security practitioner, strategist, and cyber operations expert. He has commanded at all levels within the Navy and on joint service, including as the commander of US Fleet Cyber Command, US Tenth Fleet, and US Navy Space Command, as well as the commander of the US Cybe…
…
continue reading
1
Debbie Gordon: Practicing Cybersafety Through Simulated Environments
45:54
45:54
Play later
Play later
Lists
Like
Liked
45:54
About Debbie Gordon: Debbie Gordon is the founder and CEO of Cloud Range, the industry-leading cybersecurity simulation training solution that helps organizations reduce cyber risk. A globally recognized technology entrepreneur, Debbie founded Cloud Range on the premise that simulation training is as integral in cybersecurity as it is in other fiel…
…
continue reading
1
Patrick Miller: Discussing the New INSM Requirements for NERC-CIP
51:48
51:48
Play later
Play later
Lists
Like
Liked
51:48
About Patrick Miller: Patrick Miller is a renowned expert in the critical infrastructure protection and cybersecurity industries. With over 35 years of experience, he currently leads Ampere Industrial Security as CEO, offering independent security and regulatory advice for industrial control systems across the globe. He is an active volunteer, publ…
…
continue reading
1
Sean Plankey: Protecting Critical Systems Within the IT/OT Convergence
45:58
45:58
Play later
Play later
Lists
Like
Liked
45:58
About Sean Plankey: Sean Plankey currently serves as the Chief Architect for BedRock Systems, leading efforts to utilize BedRock’s formal methods proven software isolation secure platform to solve the most pressing cybersecurity problems across industry and government. Prior to BedRock Systems Sean served as the Public Sector CTO at DataRobot, a Si…
…
continue reading
1
Lucian Niemeyer: Making Cyber Safety A Part Of Culture
55:35
55:35
Play later
Play later
Lists
Like
Liked
55:35
Over three decades, Lucian has served in the White House, the Pentagon, and in Congress providing budget, policy, and management leadership for U.S. national security programs. He served as an Assistant Secretary of Defense managing the world’s largest real property portfolio valued at a trillion dollars. Lucian was responsible for identifying and …
…
continue reading
1
Roundtable Discussion with Jay Williams, Alex Bagwell, and Gabe Authier
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
In this episode, Aaron Crow, Jay Williams, Alex Bagwell, and Gabe Authier discuss: Who is Industrial Defender? What’s coming soon from Industrial Defender? Asset data as the foundation for security Key Takeaways: Industrial Defender has built a reputation for being trusted by the largest industrial organizations and critical infrastructure operator…
…
continue reading
1
Greg Valentine: You’re Compliant. Now Prove it.
36:25
36:25
Play later
Play later
Lists
Like
Liked
36:25
About Greg Valentine: He has over 30 years of experience in the software industry. The past 15 of which have been focused on cyber security. Greg currently holds two certifications including an ISC2 – CISSP, and GIAC – GRID. Greg is responsible for building technical solutions for Industrial Defender so that our clients receive the most effective, …
…
continue reading
1
Dennis Murphy: The Challenges With IT and OT Convergence
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11
About Dennis Murphy: Dennis is Lead OT Security Engineer at National Grid. He focuses on providing practical solutions to meet national critical infrastructure cyber security requirements. One of his main interests in OT cybersecurity is helping to bridge the gap between the information technology (IT) and operational technology (OT) domains. Contr…
…
continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brin…
…
continue reading
Pilot
…
continue reading