『@BEERISAC: OT/ICS Security Podcast Playlist』のカバーアート

@BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

著者: Anton Shipulin / Listen Notes
無料で聴く

このコンテンツについて

A curated playlist of Operational Technology and ICS Cyber Security related podcast episodes [any language] by ICS Security enthusiasts. Contact Anton Shipulin / @shipulin_anton on Twitter or LinkedIn if something is missing. Subscribe!Copyright 2025 Anton Shipulin / Listen Notes 経済学
エピソード
  • How to Maximize the ROI at Cybersecurity Conferences
    2025/08/05
    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)
    Episode: How to Maximize the ROI at Cybersecurity Conferences
    Pub date: 2025-08-04

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Welcome back to Protect It All, the podcast where host Aaron Crow goes beyond the basics of OT to explore the dynamic intersection of IT and OT cybersecurity. In this episode, Aaron takes us inside a hacker summer camp in Las Vegas - home to industry giants Black Hat and DEFCON, where tens of thousands of security professionals gather each year.

    Drawing from his years of experience attending these events, Aaron unpacks the good, the bad, and the ugly of the conference circuit: from the value of in-person networking and the buzz of vendor events, to the challenges of ROI, overwhelming hype, and the evolving role of sponsors.

    Plus, he shares hard-won tips for making the most of Vegas - including how to find your tribe, engage meaningfully with vendors, and stay cool (literally and figuratively) amidst the chaos.

    Whether you’re a first-timer or a seasoned attendee, this episode is packed with honest insights and actionable advice to help you navigate the ever-evolving world of cybersecurity conferences.

    Key Moments:

    03:05 Networking’s Importance in Vegas

    08:29 Evaluating Black Hat Conference ROI

    12:17 "CISOs' Discreet Presence at Vendor Events"

    13:22 Buzzword Overload at Conferences

    18:40 Relationship-Driven Sales Strategy

    21:02 Balancing Conference Costs and Value

    25:44 "Prioritize Genuine Leads Only"

    27:05 Enhancing Cybersecurity Events

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4



    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    29 分
  • Long Conversation: OT and IT - Convergence, Integration, and Separation?
    2025/08/04
    Podcast: Unsolicited Response (LS 33 · TOP 5% what is this?)
    Episode: Long Conversation: OT and IT - Convergence, Integration, and Separation?
    Pub date: 2025-07-30

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Few topics get as much heat as the current, future, and ideal relationship between OT and IT. One of the first posts someone just discovering OT makes is how OT is different than IT. As you dig deeper into OT you find an increasing case of the technology, processes, and even the people being similar to IT.

    In this 90 minute long conversation format, we will try to bring some enlightenment to this question with a specially curated group of 9 S4x25 attendees.

    About The Long Conversation Format

    Two people begin the discussion on stage. After 10 minutes a third person will tap one of the participants on the shoulder and replace them in the conversation. This continues for the 90 minutes. Participants are on stage for 20 minutes talking to two different people for 10 minutes each.



    The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    1 時間 33 分
  • Breaking Down Barriers: Making IoT and Hardware Hacking Accessible to All with Andrew Bellini
    2025/08/02
    Podcast: IoT Security Podcast (LS 25 · TOP 10% what is this?)
    Episode: Breaking Down Barriers: Making IoT and Hardware Hacking Accessible to All with Andrew Bellini
    Pub date: 2025-07-29

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    The episode centers on the challenges and opportunities in IoT and OT security, with insights from technical content creator, hardware hacker, and educator Andrew Bellini. It highlights the often-overlooked vulnerabilities of industrial and consumer IoT devices, emphasizing the accessibility of hardware hacking and the need for practical, low-cost educational resources, covering hands-on learning, industry anecdotes, recommendations for securing environments, and advice for newcomers interested in hardware security.



    Let’s connect about IoT Security!

    Follow Phillip Wylie at https://www.linkedin.com/in/phillipwylie
    https://youtube.com/@phillipwylie

    The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast



    The podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    続きを読む 一部表示
    32 分
まだレビューはありません