The PrOTect OT Cybersecurity Podcast

Aaron Crow
The PrOTect OT Cybersecurity Podcast

Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology Officer at Industrial Defender, and the OT security community as they explore the latest developments and challenges unique to protecting operational environments Whether you want to learn the best practices and strategies for protecting power plants, water treatment facilities, food and beverage plants or automotive factories, this podcast is for you.

  1. Todd Beebe: Beyond IT vs. OT, The Common Ground for Securing Any Environment

    12/28/2023

    Todd Beebe: Beyond IT vs. OT, The Common Ground for Securing Any Environment

    About Todd Beebe: Todd Beebe, a cybersecurity veteran since the early 90s, commenced his journey by thwarting attempts to hack his BBS. His expertise led to pivotal roles with an international organization, securing remote access, fortifying websites, and pioneering firewall deployment. Later, at Ernst & Young, he spearheaded the Attack & Penetration practice in Houston, penetrating Fortune 500 clients and contributing to the precursor of the Hacking Exposed book series. Todd's entrepreneurial spirit thrived as he founded cybersecurity companies, notably inventing the telecom firewall 'TeleWall' and the web application firewall 'eServer Secure,' holding nine US patents. His career includes fortifying the White House and Pentagon against cyber threats and building cybersecurity programs for multiple Fortune 500 organizations. In this episode, Aaron and Todd Beebe discuss: Their journeys into cybersecurity careersNavigating the convergence of IT and OT securityFinding common ground and overcoming historical hurdlesShared labs for enhanced understanding and effective problem-solvingCybersecurity challenges in critical infrastructure Key Takeaways: In addressing cybersecurity challenges, it's crucial for IT and OT teams to collaborate closely, recognizing that the threat landscape targets common denominators such as IP addresses, ports, and Windows systems, and adopting a unified approach to securing both environments is essential in the evolving landscape of cyber threats.In navigating the convergence of IT and OT, the key lies in recognizing the shared technological foundation, fostering collaboration to merge expertise, and dispelling the misconception of a takeover, ultimately shifting the focus from being adversaries to allies in the pursuit of a secure and efficient operational landscape.Fostering collaboration between IT and OT teams through shared advisory roles, regular communication, and the establishment of a collaborative lab environment not only enhances technical expertise but also builds trust, camaraderie, and a common language, ultimately contributing to a more resilient and stable organizational infrastructure.While Todd is excited about the increasing diversity of people entering the cybersecurity field, he expresses concern about the SEC's decision to hold CISOs accountable for breaches and emphasizes the challenge of training junior analysts to effectively identify and respond to cyber threats in the evolving landscape.  "I'm ready to continue learning. I believe that's the most important part for anyone in cybersecurity. It's whether they have that mindset: it's not failure, it's learning. If we can get that into the mindsets of the next generation, I think then we've done what we needed to do." — Todd Beebe   Connect with Todd Beebe:   Email: tvbeebe@freeportlng.com LinkedIn: https://www.linkedin.com/in/toddbeebe/ Connect with Aaron: LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about Industrial Defender: Website: https://www.industrialdefender.com/podcast  LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/ Twitter: https://twitter.com/iDefend_ICS YouTube: https://www.youtube.com/@industrialdefender7120 Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

    1h 4m
  2. Ron Fabela: Secure Access That Makes Sense for Operations

    12/21/2023

    Ron Fabela: Secure Access That Makes Sense for Operations

    About Ron Fabela: Ron Fabela, a seasoned cybersecurity professional with over 20 years of experience, specializes in safeguarding Industrial Control Systems (ICS) and Operations Technology (OT). Currently serving as the Field CTO at XONA, Ron leads initiatives to establish secure industrial access, ensuring safe operations for asset owners globally. With a background rooted in hands-on experience across diverse critical infrastructure sectors such as power generation, offshore oil, and refineries, he excels in overcoming industry-specific challenges and possesses a unique skill set to articulate technical and business concepts effectively to a broad audience. In this episode, Aaron and Ron Fabela discuss: Adopting secure remote access in OT as an operational requirementThe complex landscape of active scanning in ICSBuilding trust and bridging the gap between cybersecurity and OTBalancing innovation, risk, and security in a changing landscape Key Takeaways: In the dynamic world of ICS, securing remote access is not just a cybersecurity necessity but a practical operational requirement, as witnessed through the evolution from air gaps to accepted industry practices, embracing the concept of zero trust while facilitating secure access is not only a cybersecurity feat but a collaborative effort aligning operational needs with stringent security measures.The shift from passive to active scanning is crucial for effective threat detection and asset visibility; while skepticism persists, bridging the gap between security and operations through trust-building and advocacy is essential to navigate the challenges and seize the opportunities in securing critical infrastructure.To establish trust and enhance cybersecurity in operational environments, genuine collaboration, understanding the challenges of control system engineers, and acknowledging small victories are crucial steps toward securing critical infrastructure and ensuring operational resilience.The future of industrial cybersecurity brings excitement and concern with the shift to advanced systems like cloud, edge, and virtualization, offering scalability but inheriting a substantial attack surface. This underscores the importance of a strategic security approach in this evolving landscape.  "I appreciate where I'm at. That's why I stay in the community. I don't think I could ever go back to enterprise and have that same feeling of mission and importance without letting it get to you. Early on, a lot of us were like, "We're saving the world." It's like, "No, no, no. We're just trying to help people, and we're helping ourselves in the process." That's why I love the community." — Ron Fabela   Connect with Ron Fabela:   Email: ron@fabela.co (unofficial business) & ron@xonasystems.com (official business) LinkedIn: https://www.linkedin.com/in/ronniefabela/ Twitter: https://twitter.com/ron_fab Connect with Aaron: LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about Industrial Defender: Website: https://www.industrialdefender.com/podcast  LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/ Twitter: https://twitter.com/iDefend_ICS YouTube: https://www.youtube.com/@industrialdefender7120 Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

    52 min
  3. Dan Gunter: Lessons Learned from Real-World Attack on Ukraine’s Critical Infrastructure

    12/14/2023

    Dan Gunter: Lessons Learned from Real-World Attack on Ukraine’s Critical Infrastructure

    About Dan Gunter: Dan Gunter, founder and CEO of Insane Forensics, is a seasoned cybersecurity professional renowned for his extensive expertise in the field. With a background as an officer in the United States Air Force, specifically with the Air Force Computer Emergency Response Team (AFCERT) and operational CYBERCOM teams, Dan has a wealth of experience in protecting critical infrastructure sites. His leadership extends to the private sector, where he served as the Director of Research and Development for Dragos Inc. before founding Insane Forensics. As a prominent speaker at major cybersecurity events, including Black Hat and ShmooCon, Dan shares his insights on incident response, threat hunting, consequence analysis, and security operations. Under his guidance, Insane Forensics provides a cutting-edge cybersecurity automation platform and services, catering to the unique challenges faced by industrial sites with limited cybersecurity resources. In this episode, Aaron and Dan Gunter discuss: Addressing the growing threat of cyber attacks on critical infrastructure, reflecting on Mandiant’s report on attacks in UkraineNavigating the complexities, resource limitations, and timely application of threat intelligenceRethinking industrial cybersecurityThe intersection of cybersecurity, AI, and OT Key Takeaways: In the face of escalating cyber threats to critical infrastructure, exemplified by recent attacks like the Ukraine power grid incident, it is evident that a passive approach alone is insufficient; as attackers grow more sophisticated, understanding and actively monitoring both network and host activities become imperative for effective defense strategies.The evolving landscape of OT cybersecurity demands a nuanced approach, addressing the historical lack of understanding, resource constraints, and the critical need for timely threat intelligence application, highlighting the urgency for industry-wide collaboration and the integration of advanced technologies like AI.To navigate the integration of AI and ML in industrial settings, overcoming fear and resistance is key. Scaling incident response, fostering collaboration, and embracing proactive and reactive measures are essential for building a resilient security foundation in critical infrastructure.In the next 5 to 10 years, the increasing scale and sophistication of cyber attacks, especially in critical infrastructure, pose a significant concern, requiring a holistic approach that combines people, processes, and technology to address evolving threats and vulnerabilities, emphasizing the need for proactive design considerations in new environments and fostering collaborative efforts to share knowledge and solutions. "I worry about how we keep up. We're not going to do it by people alone. We won't do it by process or technology alone. It's going to be all three. It's going to be just us being smart about it and being open to the future." — Dan Gunter   Connect with Dan Gunter:  Website: https://insaneforensics.com/  Email: dan@insaneforensics.com YouTube: https://www.youtube.com/channel/UCSBx8on8ffSm00kqUcTrRPA LinkedIn: https://www.linkedin.com/in/dan-gunter/ Twitter: https://twitter.com/insaneforensics Connect with Aaron: LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about Industrial Defender: Website: https://www.industrialdefender.com/podcast  LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/ Twitter: https://twitter.com/iDefend_ICS YouTube: https://www.youtube.com/@industrialdefender7120 Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

    58 min
  4. Thomas VanNorman: ICS Security Takes a Village - Building an OT Security Community

    12/07/2023

    Thomas VanNorman: ICS Security Takes a Village - Building an OT Security Community

    About Thomas VanNorman: Thomas VanNorman, a seasoned professional with almost three decades of experience in OT, is currently leading the CyPhy Product group at GRIMM. His primary focus involves securing Industrial Control Systems and networking within this domain. Additionally, Tom is a co-founder of the ICS Village, a 501(c)(3) non-profit organization dedicated to Control System security and awareness, where he has volunteered for almost a decade. Tom retired from the Air National Guard after serving in Cyber Warfare Operations, capping off a diverse career that included working on airplane control systems for 12 years. In this episode, Aaron and Thomas VanNorman discuss: Starting up The ICS VillageNavigating the world of industrial control systemsAddressing the unique challenges of OT securityThe chicken and egg dilemma in industrial cybersecurityInsights from recent SEC actions and the role of CISOs in risk acceptance Key Takeaways: The ICS Village, founded eight years ago, focuses on educating and raising awareness about industrial control systems (ICS) and their security, using conferences, events, and roadshows to provide hands-on experiences, non-sales discussions, and tabletop exercises, with a mission to bridge knowledge gaps, address terminology variations, and emphasize the importance of both old and new threats in the ICS space.Addressing cybersecurity challenges in the OT space, particularly with aging technology, requires a unique approach due to potential impacts on production and safety, leading to the launch of a four-year apprenticeship program initially targeting veterans to bridge the skills gap.Navigating the challenges of cybersecurity in industrial settings requires a blend of technical expertise, an understanding of operational processes, and effective risk communication, as demonstrated by the importance of bridging the gap between IT and OT and addressing vulnerabilities in a context-specific manner.In the ever-evolving landscape of cybersecurity, the role of CISOs is becoming increasingly crucial, with recent legal actions targeting them personally; however, it's essential to recognize that CISOs often lack the executive power to make decisions, highlighting the need for a shift in organizational dynamics and a deeper understanding of the risks being accepted. "Our role as technologists is to explain the facts: Why does this matter? What happens if you fix it? What happens if you don't fix it? It may cost millions of dollars to fix it. It might be for an air handler that operates the warehouse, which doesn't matter much. Or it could be an air handler for that warehouse that does matter because it has to be climate-controlled. Things go south quickly. It's the same piece of hardware, the same piece of technology, but with different applications." — Thomas VanNorman   Connect with Thomas VanNorman:   Email: tom@icsvillage.com Website: https://www.icsvillage.com/ LinkedIn: https://www.linkedin.com/in/thomasvannorman/ Connect with Aaron: LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about Industrial Defender: Website: https://www.industrialdefender.com/podcast  LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/ Twitter: https://twitter.com/iDefend_ICS YouTube: https://www.youtube.com/@industrialdefender7120 Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

    46 min
  5. Don C. Weber: The Gray Area Between OT and IT

    11/30/2023

    Don C. Weber: The Gray Area Between OT and IT

    About Don C. Weber: Don C. Weber is the Principal Consultant and Founder of Cutaway Security, LLC, an information security consulting firm based in Texas. With a master's degree in network security and a Certified Information Systems Security Professional (CISSP) certification, Don has a wealth of expertise gained over two decades. As a seasoned leader, he has spearheaded large-scale incident response efforts, overseen the certification and accreditation of classified federal and military systems, and managed distributed security teams safeguarding mission-critical Navy assets. A prolific contributor to open-source projects in the realm of information security and incident response, Don focuses his current efforts on assisting organizations in fortifying their critical infrastructure and operational technology environments through comprehensive vulnerability evaluations and strategic security solutions. In this episode, Aaron and Don C. Weber discuss: Navigating the convergence of IT and OT in cybersecurityAddressing the gray area in OT and IT collaborationEnhancing cybersecurity in control systemsEmbracing cloud technology in ICS security Key Takeaways: Understanding the distinct languages, processes, and incident response approaches between IT and OT is crucial for effective cybersecurity in the evolving landscape, requiring a collaborative baseline to ensure efficient communication and decision-making during critical incidents.The integration of OT and IT in cybersecurity strategies is crucial, and addressing the often overlooked gray area between these domains requires proactive collaboration, communication, and education to bridge the gap and ensure a comprehensive approach to security measures.The integration of cybersecurity measures in control systems requires a holistic approach, involving clear requirements, collaboration between IT and OT experts, and a shift from the traditional "we've always done it this way" mindset to address evolving challenges and ensure the resilience and safety of critical infrastructure.As industries rapidly transition to cloud-based solutions, failure to integrate IT and OT teams, train IT professionals about OT, and prepare for potential vulnerabilities in cloud services can lead to increased costs, heightened risks, and a competitive disadvantage in the evolving landscape of ICS security. "Does the OT side understand anything about cloud? No, that's not their job. Whose job is it? It's the job, right now every company has an IT admin or an IT team, a full team for managing cloud within the corporate environment. If you don't accept, if you don't allow some leadership people from those teams in and start building out your cloud team, you're going to quickly fall behind the times, you're going to be deploying solutions that are vulnerable to remote attacks." — Don C. Weber   Additional Resources: SANS Industrial Control Systems Security: https://www.sans.org/industrial-control-systems-security/ ICS Village: https://www.icsvillage.com/ Connect with Don C. Weber:   Email: don@cutawaysecurity.com Website: https://www.cutawaysecurity.com LinkedIn: https://www.linkedin.com/in/cutaway/ GitHub: https://github.com/cutaway-security Connect with Aaron: LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about Industrial Defender: Website: https://www.industrialdefender.com/podcast  LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/ Twitter: https://twitter.com/iDefend_ICS YouTube: https://www.youtube.com/@industrialdefender7120 Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

    56 min
  6. Ron Brash: Understanding the Small Details to Define Risk

    11/23/2023

    Ron Brash: Understanding the Small Details to Define Risk

    About Ron Brash: Ron Brash, a renowned figure in ICS/OT cybersecurity and embedded vulnerability research, garnered acclaim as the recipient of the Top 40 under 40 award for Engineering Leaders 2020 from Plant Engineering. Serving as the VP of Technical Research & Integrations at aDolus Technology Inc., Ron aligns his passion for ICS/OT security by leveraging his extensive experience in advising major asset owners across industries such as oil & gas, manufacturing, energy, and aviation. His notable achievements include playing a pivotal role in creating datasets for the S4 ICS Detection Challenges, reflecting his commitment to advancing industry standards and fostering innovation in cybersecurity. In this episode, Aaron and Ron Brash discuss: Understanding and managing vulnerabilities in OT systemsBalancing risk, detection, and recoveryExploring the intersection of cybersecurity, business risk, and vendor collaborationNavigating challenges in industrial networks Key Takeaways: In the complex world of industrial cybersecurity, understanding and managing vulnerabilities is like conducting a home inspection or maintaining a car—focus on what matters most, prioritize based on critical assets, and approach it with a measured, pragmatic strategy rather than panicking in the face of a long list of issues.Achieving zero incidents is an unrealistic goal, and the focus should shift towards proactive detection, deflection, and defense, along with a robust recovery plan, emphasizing the importance of people, processes, and technology, particularly in the context of evolving technologies and complex vendor landscapes.The key to cybersecurity success lies in translating technical intricacies into tangible business value, effectively correlating cyber and architectural considerations to business risk, as demonstrated by a strategic approach involving transparency, attestation, and collaboration with vendors, ultimately leading to improved security measures and operational efficiency.Navigating the challenges of aging industrial systems, transparency issues in software development, and evolving threat landscapes underscores the crucial importance of a collaborative community effort to ensure the resilience and security of critical infrastructure in the face of emerging threats. "Some are very forward-leaning and some believe in the democratization of data, and some are more old school and don't want to share a thing. Within the realm of business, and to be truly fair, no business is homogenous. So, there are different business units that might be more modern and more open facing, and others that are like, don't touch this because you don't know what other industries we're working in." — Ron Brash   Connect with Ron Brash:   Email: ron.brash@adolus.com Website: www.adolus.com LinkedIn: https://www.linkedin.com/company/adolus & https://www.linkedin.com/in/ronbrash/ Twitter: https://twitter.com/ron_brash Connect with Aaron: LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about Industrial Defender: Website: https://www.industrialdefender.com/podcast  LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/ Twitter: https://twitter.com/iDefend_ICS YouTube: https://www.youtube.com/@industrialdefender7120 Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

    56 min
  7. Michael Holcomb: The Journey from IT to OT and Strengthening IT-OT Partnership

    11/16/2023

    Michael Holcomb: The Journey from IT to OT and Strengthening IT-OT Partnership

    About Michael Holcomb: Michael Holcomb is the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, a prominent engineering, procurement, and construction company. In his current role, he focuses on securing vast ICS/OT environments, ranging from power plants and commuter rail to manufacturing facilities and refineries. Currently pursuing his Master’s thesis on Programmable Logic Controllers' attack surface with the SANS Technology Institute, he holds multiple cyber security and ICS/OT certifications like CISSP, GRID, GICSP, GCIP, GPEN, GCIH, and ISA 62443. Beyond his professional endeavors, he founded the UpstateSC ISSA Chapter and BSides Greenville conference, and authored and taught cyber security courses at Greenville Technical College, earning him the CyberSC’s MG Lester D. Eisner Award for Cyber Excellence in Leadership for South Carolina in 2023.   In this episode, Aaron and Michael Holcomb discuss: ○    Closing the IT-OT skills gap in cybersecurity ○    Navigating the path to cybersecurity expertise ○    The intersection of OT cybersecurity and networking ○    The evolving landscape of OT cybersecurity   Key Takeaways: ○    Bridging the gap between IT professionals learning to think like engineers and OT specialists embracing cybersecurity not only enhances collaboration but also strengthens our ability to secure critical infrastructures, a journey that demands time, dedication, and a shared commitment to a safer digital future. ○    Embracing a multidisciplinary approach and fostering collaboration between IT and OT professionals, along with hands-on experience and continuous learning, is the key to breaking into the rapidly evolving field of cybersecurity, transforming passion and knowledge into practical expertise. ○    Mastering networking fundamentals is the key to bridging the gap between IT and engineering, enabling the design of resilient systems that prevent costly operational disruptions, and emphasizing the need for continuous learning and collaboration in this dynamic field. ○    The integration of IT technologies into OT without adequate expertise has led to vulnerabilities; expecting OT professionals to handle cybersecurity is akin to asking a plumber to do electrical work. While progress is being made, the industry must prepare for a potentially catastrophic event to truly acknowledge the importance of cybersecurity in OT. "One of the things that's sad to me about the OT cybersecurity industry, and this even goes for folks that are new to the industry and even some of the old players that have been out there for 20, 30, maybe 40 years plus, is that there's still, in some respects, not a lot of concern around what it's going to take for people to take cybersecurity and OT seriously. And so there's going to be that event one day, where people are going to die, right? That is going to finally force people to take cybersecurity and OT seriously." — Michael Holcomb   Connect with Michael Holcomb:  Email: michael.holcomb@fluor.com Website: www.fluor.com LinkedIn: www.linkedin.com/in/mikeholcomb YouTube: https://www.youtube.com/@utilsec Connect with Aaron: LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about Industrial Defender: Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/ Twitter: https://twitter.com/iDefend_ICS YouTube: https://www.youtube.com/@industrialdefender7120   Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

    49 min
  8. Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk

    11/09/2023

    Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk

    About Kayne McGladrey: Kayne McGladrey, CISSP, is a seasoned cybersecurity expert with over twenty-five years of experience and a senior member of the IEEE. As the field CISO for Hyperproof, he specializes in advising companies on upholding the implicit social contract to protect entrusted data. Kayne's transformative leadership has been instrumental in implementing robust security measures, disaster-recovery systems, and compliance standards, earning him recognition as a spokesperson for IEEE's Public Visibility Initiative and a prominent media presence. Additionally, his dedication to fostering diversity in cybersecurity has led him to develop educational programs and build effective teams, showcasing his commitment to expanding opportunities in the field. In this episode, Aaron and Kayne McGladrey discuss: Strategic alignment of cybersecurity with business riskNavigating the changing landscape of cybersecurityEmpowering CISOs in the evolving landscape of cybersecurityThe challenges and opportunities of generative AI Key Takeaways: The key to a successful cybersecurity strategy lies in reframing it as a business imperative, focusing on aligning security efforts with business risks, engaging with cross-functional teams, proactively obtaining certifications, and leveraging control design expertise, ensuring a competitive advantage and effective risk management beyond mere compliance and technology concerns.In today's dynamic cybersecurity landscape, CISOs must continually reassess their controls and their alignment with business risks, while also considering the personal liability they bear, making succession planning and strategic adaptability vital for maintaining effective security programs.The role of a CISO is crucial, yet often misunderstood; empowering and respecting CISOs' authority is essential to effectively manage cyber risks and avoid potential disasters, as generic approaches and AI-driven risk registers fall short of addressing the unique challenges faced by businesses.In a world where cybersecurity threats are inevitable, the key lies in fostering resiliency rather than aiming for an unattainable zero-risk goal; while a lot are excited about the potential of education and automation, the lack of regulatory control over generative AI poses a daunting challenge, risking societal upheaval and economic unrest. "If we don't decide to manage the economic impacts of artificial intelligence, potentially a lot of industries could be at least partially automated. And that has the potential for a lot of social arm where people just don't have jobs. And when you get people who are automated out of a job, what are they going to go do? They're going to do something that everybody can do fine, but it doesn't pay well. Like you end up going and driving for a living or doing deliveries for a living. And you end up with a highly educated workforce that is unhappy. That's like a recipe right there for civil unrest." — Kayne McGladrey   Connect with Kayne McGladrey:   Email: kayne@hyperproof.io Website: https://hyperproof.io LinkedIn: https://www.linkedin.com/in/kaynemcgladrey/ YouTube: https://www.youtube.com/@hyperproof Twitter: https://twitter.com/kaynemcgladrey Kayne will be speaking at the GPSEC Columbus next week: https://go.guidepointsecurity.com/2023_11_14_GPSEC_Columbus_NC_01-Registration-Page.html Connect with Aaron: LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about Industrial Defender: Website: https://www.industrialdefender.com/podcast  LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/ Twitter: https://twitter.com/iDefend_ICS YouTube: https://www.youtube.com/@industrialdefender7120 Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

    59 min
5
out of 5
13 Ratings

About

Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology Officer at Industrial Defender, and the OT security community as they explore the latest developments and challenges unique to protecting operational environments Whether you want to learn the best practices and strategies for protecting power plants, water treatment facilities, food and beverage plants or automotive factories, this podcast is for you.

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes, and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada