エピソード

  • Policy Pulse: Regulatory Roundtable - Cyber Strategy, Large Loads, AI & CISA in Flux
    2026/05/14
    Podcast: Critical Assets PodcastEpisode: Policy Pulse: Regulatory Roundtable - Cyber Strategy, Large Loads, AI & CISA in FluxPub date: 2026-05-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPatrick Miller reconvenes with Joy Ditto (Joy Ditto Consulting) and Earl Shockley (INPOWERD) for a tour of the past two months in critical infrastructure policy. The episode opens on the administration's new National Cybersecurity Strategy and its six pillars, with focus on the openly offensive "shape adversary behavior" posture and the asymmetric risk it creates for asset owners likely to absorb retaliation.The panel then digs into the pressures reshaping the bulk electric system: data center designation, cloud-hosted control centers running NERC standards while the underlying compute is unregulated, and the physics of computational loads that behave nothing like traditional load. Earl walks through the recent NERC Level 3 alert on large load connections, an unusually serious signal that industry processes are behind.The discussion also covers April infrastructure executive orders that release funding but ignore cybersecurity, hyperscalers displacing utilities as the top buyers of bulk electrical equipment, the multi-agency zero trust in OT guidance, and CISA's leadership uncertainty after Sean Plankey withdrew his nomination. On the AI front, the group unpacks what Anthropic's Mythos and the Glasswing response mean for vulnerability discovery at scale, and why no OT vendors are on the Glasswing list.Closing thoughts include Joy's note on satellite cybersecurity and a rare bipartisan Senate trip to China, Earl's emphasis that computational load is now an enterprise governance issue rather than a technical one, and Patrick's plea to stop making the adversary's job easy.Topics coveredThe new National Cybersecurity Strategy and its six pillarsOffensive cyber posture and the asymmetric risk to asset ownersData center designation as critical infrastructureCloud control centers and the NERC 100-series standardsComputational load, grid stability, and loss of system inertiaNERC Level 3 alert on large load connectionsApril infrastructure executive orders and the missing cyber languageSupply chain shifts and hyperscalers as the top equipment buyersZero trust principles for OT environmentsCISA Fortify guidance and CISA's current leadership statusAnthropic's Mythos, the Glasswing response, and the OT vendor gapSatellite cybersecurity and bipartisan engagement on China policyBasic hygiene: get exposed devices off the internetThe podcast and artwork embedded on this page are from Patrick Miller, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    1 時間
  • AI Agents & Cybersecurity: Identity, Compliance, and the New Risks Facing IT and OT
    2026/05/13
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: AI Agents & Cybersecurity: Identity, Compliance, and the New Risks Facing IT and OTPub date: 2026-05-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization AI agents are changing cybersecurity faster than most organizations can adapt. In this episode of Protect It All, host Aaron Crow welcomes back cybersecurity veteran Ken Foster for a deep dive into how AI is reshaping risk, identity, and resilience across IT and OT environments. With more than 30 years of experience spanning the Navy, manufacturing, fintech, government programs, and startups, Ken brings a grounded, real-world perspective on what organizations are getting right and dangerously wrong about AI adoption. Together, Aaron and Ken explore the growing challenges around AI agents, identity governance, shadow AI, compliance, and attribution in highly regulated industries. As AI tools become embedded into workflows and decision-making, organizations must rethink how they manage access, monitor activity, and maintain resilience against rapidly evolving threats. You’ll learn: Why AI agents introduce new identity and governance risksThe dangers of shadow AI inside enterprise environmentsHow AI impacts compliance, attribution, and accountabilityWhy foundational practices like patching, segmentation, and documentation still matterThe role of continuous monitoring in AI-driven environmentsHow organizations can balance innovation with resilience and control Whether you’re leading cybersecurity strategy, managing critical infrastructure, or navigating AI adoption inside regulated environments, this episode delivers practical insights for securing the next generation of digital operations. Tune in to learn how AI is transforming cybersecurity - and what leaders must do to stay ahead - only on Protect It All. Key Moments: 07:47 AI guardrails discussion 12:02 Patching and network segmentation 20:44 AI changing job roles 24:24 FISMA and FedRAMP concerns 29:18 Emergency response planning 35:36 Choosing the right tech team 37:14 Discussing accountability and risk 46:31 Developer access problems 51:50 AI Dependence Risks 57:36 AI in pen testing 58:55 AI in risk prevention About the guest : Ken Foster is a veteran cybersecurity leader with 25+ years of experience in enterprise security, risk governance, and global infrastructure strategy. Currently Head of Global Architecture at Adient, Ken has previously led cybersecurity and compliance programs at Fleetcor and Fiserv, specializing in IAM, cloud security, regulatory compliance, and risk-based cybersecurity strategy. He is known for helping organizations balance innovation, resilience, and operational execution in highly regulated environments. How to connect Ken: http://linkedin.com/in/kennethfoster/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    1 時間 7 分
  • 2/4 Análisis de la Resiliencia Colectiva en el Sector Ferroviario
    2026/05/13
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 2/4 Análisis de la Resiliencia Colectiva en el Sector Ferroviario
    Pub date: 2026-05-11

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    En este episodio se analiza los riesgos sistémicos derivados de la disparidad en la madurez de ciberseguridad entre operadores, fabricantes y proveedores. Se examina el impacto de las brechas regulatorias en la cadena de suministro y se evalúan las prácticas europeas de cooperación, intercambio de inteligencia y armonización normativa como pilares para alcanzar una resiliencia […]

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    11 分
  • Deral Heiland on Weaponizing Cellular-Based IoT
    2026/05/12
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Deral Heiland on Weaponizing Cellular-Based IoT
    Pub date: 2026-05-10

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Rapid7 Principal Security Research (IoT) lead Deral Heiland joins the Nexus Podcast to discuss work his team did on how attackers might weaponize cellular-based IoT.

    Rapid7 conducted three phases of this research, with the most recent digging into how attackers with access to these systems can abuse them to gain unauthorized access, potentially exfiltrate critical data, or pivot into backend network infrastructure.

    Subscribe and listen to the Nexus Podcast here.

    Read the Rapid7 research report.



    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    26 分
  • Federal Agencies Can Enter Private Networks to Hunt Malware. Is Your Plant Prepared?
    2026/05/11
    Podcast: Industrial Cybersecurity InsiderEpisode: Federal Agencies Can Enter Private Networks to Hunt Malware. Is Your Plant Prepared?Pub date: 2026-05-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino and Jim break down a major shift in the cyber threat landscape: federal agencies obtaining legal authority to enter private networks to hunt down state-sponsored malware, and what that signals for industrial organizations. They discuss why critical infrastructure and supply chains are prime targets, how “soft targets” in OT and building automation get exploited, and why many companies still lack visibility into what’s happening on the plant floor. The conversation zooms in on real-world exposure points, especially unmanaged vendor remote access and end-of-life equipment, and closes with practical themes for leadership.Stop assuming “IT has it covered” Define measurable OT security outcomesStart taking steps that make disruption harder and detection faster.Chapters:(00:00:00) Why identity, trust, and vendor access are breaking down in modern plants(00:01:00) The episode’s trigger: government-led operations to remove malware from private networks(00:03:00) “Machete scanning” and why IT-style tactics can disrupt OT operations(00:05:00) The real target set: critical infrastructure, supply chains, and smaller utilities with limited resources(00:08:00) Collateral damage and how cyber “weapons” trickle down to criminal ransomware(00:13:00) Why OT is still a soft target: visibility gaps, unpatched systems, and weak segmentation(00:14:00) Remote access everywhere: OEM/SI pathways, unknown identities, and lack of governance(00:20:00) The logging gap: what IT sees vs. what OT can’t see (and why that matters for incident response)(00:24:00) Building automation and facilities systems as weak links attackers love(00:26:00) Executive accountability: what boards should be measuring after breaches (and why progress stalls)Links And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    32 分
  • Decoding the IEC 62443-4-1 Standard for OT
    2026/05/10
    Podcast: SecurityWeek Podcast Series - Cybersecurity Insights
    Episode: Decoding the IEC 62443-4-1 Standard for OT
    Pub date: 2026-05-06

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    In this episode of the SecurityWeek Podcast, we speak with Rod Locke of Fortinet about the growing importance of IEC 62443 standards in operational technology (OT) security. The conversation explores secure-by-design principles, IEC 62443-4-1 certification, long-term security support for industrial systems, and how critical infrastructure operators can evaluate vendor security practices as IT and OT environments continue to converge.

    Follow SecurityWeek on LinkedIn



    The podcast and artwork embedded on this page are from SecurityWeek, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    19 分
  • Your Food Waste Has a Second Life. Meet Insect Agriculture with Dr. Heather Jordan & Cheryl Preyer
    2026/05/09
    Podcast: Bites and Bytes Podcast (LS 26 · TOP 10% what is this?)Episode: Your Food Waste Has a Second Life. Meet Insect Agriculture with Dr. Heather Jordan & Cheryl PreyerPub date: 2026-05-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMost people have never heard of insect agriculture. By the end of this episode, you’ll wonder how you missed it.Bites & Bytes Podcast host Kristin King sits down with Dr. Heather Jordan, microbiologist, professor at Mississippi State University, and site director for the NSF-funded Center for Insect Biomanufacturing and Innovation (CIBI), and Cheryl Preyer, the center’s industry liaison and former fast food executive, to unpack one of the most quietly consequential shifts happening in the global food system right now.For consumers, this is where your food waste is going next and why that matters for everything from the fish on your plate to the cost of your groceries. Black soldier fly, cricket, and mealworm farming aren’t science fiction. They’re converting food waste into high-quality livestock feed, fertilizer, and protein at scale. Research is even showing promise in using these insects to remove plastics, antibiotics, and heavy metals from our environment.For professionals in cyber-physical risk, OT security, and food and agriculture cybersecurity, pay attention. Insect agriculture facilities are automated, sensor-dependent production environments with real operational technology vulnerabilities, and this industry is scaling fast with limited security frameworks in place (aka a factory) This is the circular bioeconomy in action. And it already exists.---------------Guest Contact Information:Dr. Heather JordanProfessor of Microbiology and Molecular Biology, Mississippi State University, and Site Director, Center for Insect Biomanufacturing and Innovation (CIBI)Cheryl PreyerIndustry Liaison Officer, Center for Insect Biomanufacturing and InnovationCenter for Insect Biomanufacturing and Innovation ---------------Episode Key Highlights‍ 00:08:01 — "I Traded Fries for Flies" — Cheryl’s Origin Line00:11:49 — Insect Farming Is Livestock Farming00:12:37 — "Feed the Food That Feeds Us."00:16:02 — What a Black Soldier Fly Actually Does as an Adult00:23:19 — Why Organic Chickens Need Synthetic Methionine00:23:50 — The Lauric Acid and Coconut Connection00:28:34 — Using Everything But the Oink00:39:51 — The Cricket Densovirus Crisis That Wiped Out Facilities00:50:15 — Heather’s West Africa Origin Story---------------📘 Info on Kristin’s upcoming book📘 “Securing What Feeds Us: Cybersecurity in Food and Agriculture” Publish Date: September 29, 2026 Published by Wiley 📘 Pre-Order Links: Pre-Order Link (Amazon): ⁠https://www.amazon.com/Securing-What-Feeds-Cybersecurity-Agriculture/dp/1394391005#detailBullets_feature_div⁠---------------🎤 Book Kristin Demoranville to SpeakTo invite Kristin to speak at your conference, corporate event, webinar, or workshop, visit the website and submit a request.---------------🎤 Bites and Bytes Podcast Info:Website: Explore all our episodes, articles, and more on our official website. Merch Shop: Show your support with some awesome Bites and Bytes gear!Substack: Stay updated with the latest insights and stories from the world of cybersecurity in the food industry.Socials: TikTok; Instagram; LinkedIn; BlueSky‍---------------🛡️ About AnzenSage & AnzenOTAnzenSage is a cybersecurity advisory firm specializing in security resilience for the food, agriculture, zoo, and aquarium industries. AnzenSage offers practical, strategic guidance to help organizations anticipate risks and build resilience. Learn more about their offerings at anzensage.com.​AnzenOT helps organizations understand and prioritize operational risk faster, without slow or static assessments. Compliance supported, including NIST, ISA/IEC 62443-2-1, NIS2 Directive, CMMC, and many other industry-specific frameworks. Subscription access is available, including a student option. Learn more at anzenot.com.The podcast and artwork embedded on this page are from AnzenSage, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    55 分
  • From NFL to OT Cybersecurity Why Trust and Teamwork Matter More Than Tools | Aaron Crow
    2026/05/08
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)Episode: From NFL to OT Cybersecurity Why Trust and Teamwork Matter More Than Tools | Aaron CrowPub date: 2026-05-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCybersecurity isn’t just about technology - it’s about people. In this episode of Protect It All, host Aaron Crow sits down with Sean Tufts for a conversation that goes far beyond tools and tactics. From the locker room to control rooms, Sean shares how his journey from professional football to OT cybersecurity shaped his approach to trust, teamwork, and leadership. Together, they unpack one of the biggest challenges in OT environments: building trust between IT and OT teams. Because without trust, even the best tools fail. You’ll learn: Why trust is the foundation of OT cybersecurity successHow to bridge the gap between IT teams and engineersThe role of communication and empathy in security programsReal-world lessons from segmentation failures and hidden network risksWhy diversity and teamwork drive stronger security outcomesHow leadership mindset shapes resilience in high-stakes environments Whether you’re leading cybersecurity, working in OT environments, or building cross-functional teams, this episode delivers practical insights on the human side of security—where real progress happens. Tune in to learn why the strongest cybersecurity programs are built on people, not just platforms only on Protect It All. Key Moments: 05:11 Importance of communication in tech 06:58 Learning from early career mistakes 11:40 Implementing network scanning in OT environments 15:50 Debating project priorities in cybersecurity 18:24 Improving system reliability and ROI 20:28 Convincing plants to self-fund projects 26:21 Creating layered RACI charts 26:57 Discussing people, process, and technology 31:15 Easy validations and big risks 34:35 Operators' productivity challenges 37:21 Network security in hospitals 42:25 Creating a safe network environment 43:10 Addressing network configuration issues 46:55 Different types of AI users About the guest : Sean Tufts is Field CTO at Claroty and a cybersecurity leader with deep expertise in industrial environments. With leadership roles at GE and Optiv, he has helped asset-intensive industries navigate the intersection of OT, IT, and cyber risk. Before cybersecurity, Sean was a standout linebacker and team captain at the University of Colorado and went on to play in the NFL with the Carolina Panthers bringing the same discipline, teamwork, and leadership mindset to securing critical infrastructure today. How to connect Sean : LinkedIn: https://www.linkedin.com/in/sean-tufts-36b4909/ Website: https://claroty.com/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    49 分