Industrial Cybersecurity Insider

Velta Technology
Industrial Cybersecurity Insider

Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!

  1. 3D AGO

    The #1 Myth Putting Your Industrial OT Assets at Risk

    In this episode, Dino and Craig tackle one of the most overlooked vulnerabilities in industrial cybersecurity: the unintentional chaos caused when IT security procedures are blindly applied to OT environments. Using real-world examples like the CrowdStrike EDR failure, they illustrate how tools meant to protect can actually shut down production lines, cripple HMIs, and introduce massive operational risk. They call out the air-gap myth, the need for shared authority between IT and OT, and the critical importance of context when deploying cybersecurity solutions on the plant floor. For executives and practitioners alike, this episode is a wake-up call to rethink governance, accountability, and collaboration between traditionally siloed IT and OT teams. Chapters: 00:00:00 – IT vs. OT: The Unspoken War00:01:03 – Meet Your Guides: Dino & Craig00:01:05 – IT/OT Explained… Without the Jargon00:02:26 – How IT Crashed the Plant Floor00:05:12 – Talk to Me Like I’m Production00:08:53 – Security Priorities: Worlds Collide00:13:40 – Vendors, Integrators & Invisible Risks00:21:52 – Who Owns the Fallout? Links And Resources: Cybersecurity & Digital Safety Group on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedIn Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    24 min
  2. MAR 19

    Staying Ahead of an Industrial Cybersecurity Attack with Carlos Buenaño, Armis CTO

    Dino Busalachi sits down with Carlos Buenaño, CTO of Armis, to explore the evolving cybersecurity challenges in industrial control systems (ICS) and operational technology (OT). Carlos shares insights from his extensive experience in process control engineering, industrial network security, and IT-OT convergence. He sheds light on how organizations can gain visibility into their OT environments, mitigate cyber risks, and implement effective security frameworks. From real-world ransomware incidents to strategies for network segmentation and asset monitoring, this discussion provides actionable insights for anyone involved in securing industrial infrastructure. Whether you're a plant manager, security leader, or IT-OT strategist, this episode is packed with valuable takeaways. Chapters: 00:00:00 - The High-Stakes World of Plant Management and Control Systems00:01:20 - Meet the Experts: Dino and Carlos on Industrial Cybersecurity00:01:55 - From Engineer to CTO: Carlos’ Journey in Securing ICS00:03:15 - Designing Secure Control Networks: Lessons from Australia00:05:17 - IT vs. OT: Why the Security Approach Must Change00:08:14 - Breaking Down IT-OT Conflicts and Finding Common Ground00:13:52 - Hidden Cyber Threats in Industrial Control Systems00:23:16 - How to Stay Ahead of Cyber Attacks in OT Environments00:24:15 - Key Takeaways and Actionable Steps for Industrial Security Links And Resources: Juan Carlos (Carlos) Buenaño on LinkedInCybersecurity & Digital Safety Group on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedIn Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    30 min
  3. MAR 13

    Blind Spots in Industrial Cybersecurity: What False Confidence Could Cost You

    Organizations in the industrial sector continue to invest in cybersecurity, but are they truly secure, or just leaning on a false sense of comfort? In this episode, industry experts Dino Busalachi and Craig Duckworth, dive into the dangerous gap between perception and reality when it comes to OT cybersecurity. They discuss real-world challenges, from blind spots in asset visibility to leadership misalignment and third-party risks. With a focus on practical steps, they explore why security frameworks must go beyond IT, how to align business needs with security, and why treating cybersecurity like safety is essential. This episode is a must-listen for anyone serious about protecting their industrial environments. Chapters: 00:00:00 - Kicking Off: Are You Truly Secure or Just Comfortable?00:00:47 - A Quick Timeout: NCAA Madness Before Cyber Madness00:01:15 - OT Security Reality Check: Do You Really Know Your Risks?00:01:45 - The Hidden Challenges Holding OT Security Back00:03:15 - Lack of Skilled Resources: The Biggest Barrier to Security00:05:30 - Security Frameworks: Are They Reaching the Plant Floor?00:06:15 - The Dangerous Myth of “Isolated” OT Systems00:07:58 - From Theory to Action: Winning Strategies for OT Security00:12:13 - Leadership’s Role in Cybersecurity: Who’s Driving the Change?00:19:55 - No More Blind Spots: Key Takeaways for a Secure Future Links And Resources: Cybersecurity LinkedIn GroupDino Busalachi on LinkedInCraig Duckworth on LinkedIn Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    23 min
  4. MAR 4

    Avoiding Compliance Risks : From Audit to Action

    Industrial cybersecurity is no longer an option—it’s a necessity.  In this episode, Kimberly Anderson, Managing Director at UHY, joins Craig Duckworth to explore the growing cybersecurity challenges facing manufacturers and industrial operations.  They discuss the gaps in cybersecurity accountability, IT/OT entanglement, and why network segregation is still a major hurdle.  Kimberly shares insights on cyber insurance pitfalls, compliance best practices, and why businesses should move beyond "checking the box" to build a truly resilient cybersecurity program.  Whether you're facing vendor or OEM remote access risks, securing legacy systems, or navigating industrial cybersecurity regulations, this conversation provides actionable insights to help you stay in compliance and ahead of common cybersecurity pitfalls. Chapters: 00:00:00 - Ransomware Isn’t Your Biggest Threat—Human Error Is00:00:44 - Meet Kimberly Anderson: From Chemistry to Cybersecurity Leadership00:01:17 - Why Technology Risk & Compliance Can’t Be Ignored in Industrial Cybersecurity00:02:29 - IT/OT Security Integration: Why It’s a Struggle and How to Get It Right00:03:56 - Network Segregation: The Critical Security Step Most Companies Overlook00:05:42 - The IT/OT “Divorce”: Why Separating Networks is a Game-Changer00:06:41 - Rushing to the Cloud? Avoid These Vendor Security Pitfalls00:11:48 - Cyber Insurance Isn’t a Safety Net—Here’s What You’re Missing00:14:43 - Beyond “Checking the Box”: How to Build a Resilient Cybersecurity Strategy00:18:25 - Final Takeaways: Simple Steps to Strengthen Your Security Today Links And Resources: Kimberly Anderson on LinkedInUHY Advisors, Inc.Industrial Cybersecurity LinkedIn GroupDino Busalachi on LinkedInCraig Duckworth on LinkedIn Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    23 min
  5. FEB 25

    Gartner, DOGE, and the Future of OT Cybersecurity Policy

    In this episode, we dive into the latest Gartner Magic Quadrant report for OT cybersecurity and analyze key players, market trends, and strategies for selecting the right security partners. We also discuss insights from the recent S4 conference, the growing importance of cyber-informed engineering, and how organizations can effectively align IT and OT security strategies. We discuss CapEx versus OpEx and potential implications of the DOGE initiative around industrial cybersecurity investments. Whether you're planning your next cybersecurity investment or tackling legacy system challenges, this episode provides practical guidance to help you navigate the OT security landscape. Chapters: 00:00:00 -Think Globally, Secure Locally: Crafting an Effective OT Cyber Strategy00:00:31 -Meet Dino & Craig: Cybersecurity Pros with Real-World OT Experience00:01:03 -Cybersecurity Headlines That Matter: What’s Shaping OT Security Today00:02:20 -Gartner’s Magic Quadrant Revealed: Who’s Leading OT Cybersecurity?00:03:08 -Why OT Teams Hold the Key to Cybersecurity Success00:04:24 -Your OT Ecosystem is Bigger Than You Think—Here’s Why That Matters00:05:08 -S4 Conference Takeaways: The Future of Secure-By-Design Machines00:11:39 -CapEx vs. OpEx: Smart Budgeting for OT Cybersecurity Investments00:19:08 -AI, Onshoring, and the Next Big Shifts in Industrial Cybersecurity00:20:50 -IT vs. OT? No—IT & OT: How to Bridge the Divide for Better Security00:23:02 -Final Insights: The Must-Know Takeaways for Securing Your OT Environment Links And Resources: Cybersecurity Group Page on LinkedInDino Busalachi on LinkedInCraig Duckworth on LinkedIn Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    24 min
  6. FEB 11

    Overlooked Risks With IIoT in Industrial Cybersecurity

    Craig and Dino dive deep into the critical yet often overlooked aspects of industrial cybersecurity in relation to IIoT.  They discuss the misconception that many OT assets are isolated when, in reality, they are interconnected and vulnerable.  The conversation highlights the importance of complete asset inventory, IT-OT collaboration, and the hidden risks posed by vendor access, remote connections, and unmonitored network traffic.  With real-world insights, they explore how organizations can leverage cybersecurity tools not just for threat prevention but also for process integrity and operational efficiency.  If you’ve ever wondered how to bridge the gap between IT-driven cybersecurity and OT-focused operations, this episode is a must-listen. Chapters: 00:00:00 - Introduction: Why OT Security Matters More Than You Think00:01:08 - Meet Craig and Dino: Experts in Industrial Cybersecurity00:01:16 - Breaking Down IoT vs. OT: Understanding the Differences00:02:33 - Why Asset Inventory in Industrial Environments is a Challenge00:03:42 - The Hidden Risks of Overlooking Connected OT Assets00:04:32 - The IT-OT Divide: Why Collaboration is Crucial for Security00:08:29 - Industrial IoT Blind Spots: What You’re Missing00:09:08 - Preventing Downtime: How Cybersecurity Tools Can Help00:12:00 - How Sensors and Data Can Predict and Prevent Failures00:14:20 - Digital Threats to OT: Why Anomalies Matter00:16:42 - Why OT Teams Need to Fully Understand Cybersecurity Tools00:19:13 - Finding the Right Partner for IT-OT Cybersecurity Integration00:20:04 - Bridging the Gap: Building Stronger IT and OT Relationships00:21:07 - Final Thoughts: How to Take Action on OT Security Today Links And Resources: Velta TechnologyDino Busalachi on LinkedInCraig Duckworth on LinkedIn Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    22 min
  7. FEB 4

    How to Secure OT Environments Without Disruptions with Dan Cartmill, TXOne Networks

    The cybersecurity challenges of industrial environments are unique and complex, requiring a shift in mindset from traditional IT security strategies. Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, joins Dino Busalachi for this episode. They discuss the critical divide between IT and OT security, why collaboration is essential, and how organizations can take the first steps toward securing their industrial control systems (ICS). Drawing from his experience in the Royal Australian Navy, IT security, and product marketing, Dan shares key insights on the operational risks of cybersecurity tools, the importance of ownership in security decisions, and why companies must move beyond fear-based approaches to focus on practical, incremental solutions. If your organization struggles with securing legacy systems, aligning IT and OT teams, or justifying cybersecurity investments, this episode offers real-world strategies and actionable takeaways. Chapters: 00:00:00 - The First Step to Securing OT: Why You Can’t Afford to Wait00:01:00 - Meet Dino and Dan: A Conversation on Industrial Cybersecurity00:01:51 - From the Navy to Cybersecurity: Dan’s Journey into Protecting Industrial Systems00:05:30 - The Biggest Cybersecurity Challenges Facing Industrial Environments Today00:09:00 - IT vs. OT: Who Owns Cybersecurity and Why It Matters00:14:01 - Breaking Down Silos: How Collaboration Can Make or Break Your Security Strategy00:22:35 - Cybersecurity is a Team Sport: How the Right Partners Can Make All the Difference00:25:00 - Think Globally, Act Locally: Why OT Security Must Be Customized for Each Plant00:29:15 - Who Owns OT Security? Why IT and OT Leaders Need a Unified Strategy00:33:00 - The Power of Collaboration: Bringing IT, OT, and Vendors to the Same Table00:36:10 - The Cost of Cybersecurity: Why Companies Struggle to Justify OT Security Investments00:38:45 - Legacy Systems & Cyber Risk: Why Ignoring the Problem is Not an Option00:40:53 - The Takeaway: Why Action Beats Perfection in OT Security Links And Resources: Dan Cartmill on LinkedInTXOne NetworksDino Busalachi on LinkedInCraig Duckworth on LinkedIn Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    42 min

    About

    Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!

    You Might Also Like

    Content Restricted

    This episode can’t be played on the web in your country or region.

    To listen to explicit episodes, sign in.

    Stay up to date with this show

    Sign in or sign up to follow shows, save episodes, and get the latest updates.

    Select a country or region

    Africa, Middle East, and India

    Asia Pacific

    Europe

    Latin America and the Caribbean

    The United States and Canada