Industrial Cybersecurity Insider cover art

All Episodes

Industrial Cybersecurity Insider — 126 episodes

#
Title
1

OT Cybersecurity: Is the Purdue Model Still Useful?

2

Federal Agencies Can Enter Private Networks to Hunt Malware. Is Your Plant Prepared?

3

The Phishing Attack That Could Have Shut Down a Plant Floor

4

Your Most Valuable & Underutilized Cybersecurity Asset

5

OT Patching vs IT Patching: What's Commonly Misunderstood

6

Who Actually Owns OT Cybersecurity? Not Who You Think

7

You Think Your Plant Is Secure. Your Data Says Otherwise.

8

Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon Chassar

9

The Connected Plant Floor: What S4X26 Revealed

10

The Hidden Cost of Siloed OT Security Tools

11

The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook

12

IT SOC vs OT SOC How & Why They’re Different

13

Your OT Cybersecurity Strategy Is Failing: Here's Why

14

Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to Manufacturing

15

The IT-OT Knowledge Gap Costing Organizations Millions

16

The Patching Gap Putting Industrial Operations at Risk: IT vs OT

17

Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security

18

Your New Equipment Just Shipped With Security Risks & Here's Why Your OEM Won't Fix Them

19

The CISO's Impossible Task: Protecting Plant Floors They've Never Seen

20

IT and OT Are Still Siloed - Here's Why That's Dangerous

21

The Hidden Reason Most Manufacturing Cybersecurity Programs Fail

22

Why OT Must Lead the Manufacturing Cybersecurity Conversation

23

How OT Managed Services Are Revolutionizing Industrial Cybersecurity

24

Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets

25

Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You Think

26

The Silver Tsunami: Manufacturing's Talent and Knowledge Retirement Crisis

27

The Nation-State Attacks Hiding in Your OT Network

28

When IT Security Meets OT Reality: Why One Size Doesn't Fit All

29

Dispelling IT/OT Convergence Challenges and Myths

30

What Actually Works in OT Vulnerability Management with Dan Cartmill, TXOne Networks

31

Industrial Cybersecurity: The Gap Between Investment and Cyber Event Prevention

32

Hidden Cybersecurity Vulnerabilities in Today’s Data Centers

33

Building OT Cybersecurity That Works in the Real World

34

Mitsubishi’s Billion-Dollar Bet on OT Cybersecurity with Nozomi Acquisition

35

Responsibility Without Authority: The CISO's Industrial Cybersecurity Dilemma

36

The Critical Role of Local Knowledge in Industrial Cybersecurity

37

FBI Alerts, OT Vulnerabilities, and What Comes Next

38

AI, Phishing, and the Future of Industrial Cyber Defense

39

Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats

40

From Shelfware to Security: Operationalizing OT Industrial Cybersecurity Tools

41

When the Plant Can't Stop: Securing Systems That Never Sleep

42

The Lawyer's View: Strategic Lessons in Cybersecurity and Incident Response

43

Plant-Level Cyber Risk: Who’s Actually Responsible?

44

The C-Suite's Role in Industrial Cybersecurity

45

Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant Floor

46

The System Integrator’s Role in Supporting OT Security

47

When IT Cyber Events Bring Down the Plant Floor

48

When CISOs Inherit the Plant Floor: What Happens Next?

49

Reflections from the Front Lines of Industrial Cyber Failures

50

What Every CISO Gets Wrong About OT Security

51

OT Security in Hindsight: Visibility, Authority, and the Executive Disconnect

52

Bridging the IT-OT Divide with AI-Powered Insight

53

Visibility Revisited: Trends Shaping the Future of OT Cybersecurity

54

Stuxnet to Colonial Pipeline What Have We Learned & What’s on the Horizon?

55

Bridging IT/OT & Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, Cyolo

56

Cyber Threats, China, and the Global Wake-Up Call

57

Zero Trust in OT: A Look Back at Lessons Across IT and OT

58

Cybersecurity by Design: Building OT Security Into Your Manufacturing Plant Floor

59

The CISO & Talent Crisis: Turnover Meets OT Cybersecurity Gaps

60

The #1 Myth Putting Your Industrial OT Assets at Risk

61

Staying Ahead of an Industrial Cybersecurity Attack with Carlos Buenaño, Armis CTO

62

Blind Spots in Industrial Cybersecurity: What False Confidence Could Cost You

63

Avoiding Compliance Risks : From Audit to Action

64

Gartner, DOGE, and the Future of OT Cybersecurity Policy

65

Assessing AI’s Role in Cybersecurity

66

Overlooked Risks With IIoT in Industrial Cybersecurity

67

How to Secure OT Environments Without Disruptions with Dan Cartmill, TXOne Networks

68

The A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson Bort

69

Uncovering Blind Spots in OT Cybersecurity

70

AI in Industrial Cybersecurity: Friend, Foe, or Something in Between?

71

Cybersecurity Challenges and Insights with Industry Analyst Jonathon Gordon

72

OT Cybersecurity Insights with Lauren Blocker, Rockwell Automation

73

Keys to Bridging the Industrial Cybersecurity IT/OT Gap

74

The Future Looks Bright : Building a Career in OT Cybersecurity

75

Hackers and the Holidays: Strengthening Industrial Cybersecurity

76

The Future Looks Bright : Insights & Advice for Next Gen Cybersecurity Leaders

77

CISA’s Role in Supporting Asset Owners & Government Sectors with Cybersecurity

78

AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with Claroty

79

Women in STEM: Bridging the Talent Gap in Industrial Cybersecurity

80

How CISOs Are Bridging the Gap between OT and IT Cybersecurity

81

OT Cybersecurity Lessons from the Trenches Revisited

82

Securing Critical Assets: What Every CISO Should Know

83

Zero Day to Virtual Patching: Cybersecurity Solutions A-Z with TXOne Networks Revisited

84

Proactive vs. Reactive Cybersecurity: A Strategic Communications Perspective

85

From Legacy Systems to Ransomware: The Evolution of OT Cybersecurity

86

How CISA Supports Cybersecurity from Critical Infrastructure to Elections

87

Vendor and Version Lock Threats to Industrial Cybersecurity

88

The Human Factor : Securing Your Industrial Assets

89

Crowdstrike, Virtual Patching and Industrial OT Environments with Debbie Lay, TXOne Networks

90

Patch Management and Software Updates: IT versus OT

91

Future Trends in Industrial Cybersecurity with Sandeep Lota of Nozomi Networks

92

Top Takeaways: Why IT and OT Must Unite Now

93

SEC Cybersecurity Rulings: Are Public Companies Really Ready?

94

CISO Resignations: Is the Industrial Sector Prepared for the Fallout?

95

Exposing the Gaps: Railway Systems and Cyber Threats with Miki Shifman, Co-Founder and CTO of Cylus

96

The Air Gap Myth: How Misinformation Is Endangering Your Plant Floor

97

Why Preventative Cybersecurity is the Future with Ed Turkaly, Schneider Electric’s Cybersecurity Management Director

98

The Truth About IT / OT Convergence with Andrew McPhee - Cisco

99

Hidden Dangers in Your Devices: Exposing xIoT's Dark Side with John Vecchi, Phosphorous CMO

100

Building the Case for Cybersecurity Funding

101

Zero Trust : IT versus OT with Dino Busalachi and Jim Cook

102

Overcoming Obstacles in Diverse Technological Landscapes with CEO and Co-Founder of Garland Technology, Chris Bihary

103

Empowering IT and OT Teams to Improve Industrial Cybersecurity

104

The Future of Cybersecurity Insurance with Observatory Holding’s CEO, Gerry Kennedy

105

The State of OT Cybersecurity From the Field

106

Cybersecurity Missteps Putting the C-Suite at Risk

107

S4x24 Insights & Reflections on Cybersecurity Market Trends

108

Zero Trust in OT: Adapting IT's Playbook for Enhanced Security

109

Foreign Cybersecurity Threats & Risks to ICS / OT Equipment

110

Industrial Cybersecurity Lessons From the Field

111

Asset Inventory and Management the IT versus the OT Way

112

Cybersecurity and Data Protection in Modern Manufacturing with Jim Fledderjohn, Dell Technologies

113

Future Trends & Evolving Cybersecurity Threats with Simon Chassar, Claroty Former CRO

114

Operational Technology: A Case Study on Securing the Backbone of Manufacturing

115

Cybersecurity A-Z in Manufacturing and Industrial Sectors with Armis CTO, Mick Coady

116

Equipping OT Cybersecurity Frontlines With Training and Tech with Cloud Range CEO Debbie Gordon

117

High Visibility Cyber Attacks from MGM to Clorox to Critical Infrastructure: Risks and Responses

118

Innovation, Regulation and Education in ICS Cybersecurity with Nozomi’s Danielle Jablanski

119

ICS Cybersecurity Knowns, Unknowns, and Actions to Take with Industry Expert & S4 Founder Dale Peterson

120

Unmasking Industrial Cybersecurity Threats and Solutions with Dave Purdy of TXOne Networks

121

Holidays & Hackers: Keeping Industrial Control Systems Safe

122

Cybersecurity Threats and Insurance Solutions with Rogan Dwyer

123

Missteps and Common Blunders with Manufacturing, ICS and Cybersecurity

124

The Ins and Outs of Cybersecurity Talent for OT ICS Roles

125

Cybersecurity Unveiled Through IT and OT Alignment

126

Industrial Cybersecurity Insider Intro