All Episodes
Industrial Cybersecurity Insider — 126 episodes
OT Cybersecurity: Is the Purdue Model Still Useful?
Federal Agencies Can Enter Private Networks to Hunt Malware. Is Your Plant Prepared?
The Phishing Attack That Could Have Shut Down a Plant Floor
Your Most Valuable & Underutilized Cybersecurity Asset
OT Patching vs IT Patching: What's Commonly Misunderstood
Who Actually Owns OT Cybersecurity? Not Who You Think
You Think Your Plant Is Secure. Your Data Says Otherwise.
Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon Chassar
The Connected Plant Floor: What S4X26 Revealed
The Hidden Cost of Siloed OT Security Tools
The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook
IT SOC vs OT SOC How & Why They’re Different
Your OT Cybersecurity Strategy Is Failing: Here's Why
Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to Manufacturing
The IT-OT Knowledge Gap Costing Organizations Millions
The Patching Gap Putting Industrial Operations at Risk: IT vs OT
Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security
Your New Equipment Just Shipped With Security Risks & Here's Why Your OEM Won't Fix Them
The CISO's Impossible Task: Protecting Plant Floors They've Never Seen
IT and OT Are Still Siloed - Here's Why That's Dangerous
The Hidden Reason Most Manufacturing Cybersecurity Programs Fail
Why OT Must Lead the Manufacturing Cybersecurity Conversation
How OT Managed Services Are Revolutionizing Industrial Cybersecurity
Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets
Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You Think
The Silver Tsunami: Manufacturing's Talent and Knowledge Retirement Crisis
The Nation-State Attacks Hiding in Your OT Network
When IT Security Meets OT Reality: Why One Size Doesn't Fit All
Dispelling IT/OT Convergence Challenges and Myths
What Actually Works in OT Vulnerability Management with Dan Cartmill, TXOne Networks
Industrial Cybersecurity: The Gap Between Investment and Cyber Event Prevention
Hidden Cybersecurity Vulnerabilities in Today’s Data Centers
Building OT Cybersecurity That Works in the Real World
Mitsubishi’s Billion-Dollar Bet on OT Cybersecurity with Nozomi Acquisition
Responsibility Without Authority: The CISO's Industrial Cybersecurity Dilemma
The Critical Role of Local Knowledge in Industrial Cybersecurity
FBI Alerts, OT Vulnerabilities, and What Comes Next
AI, Phishing, and the Future of Industrial Cyber Defense
Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats
From Shelfware to Security: Operationalizing OT Industrial Cybersecurity Tools
When the Plant Can't Stop: Securing Systems That Never Sleep
The Lawyer's View: Strategic Lessons in Cybersecurity and Incident Response
Plant-Level Cyber Risk: Who’s Actually Responsible?
The C-Suite's Role in Industrial Cybersecurity
Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant Floor
The System Integrator’s Role in Supporting OT Security
When IT Cyber Events Bring Down the Plant Floor
When CISOs Inherit the Plant Floor: What Happens Next?
Reflections from the Front Lines of Industrial Cyber Failures
What Every CISO Gets Wrong About OT Security
OT Security in Hindsight: Visibility, Authority, and the Executive Disconnect
Bridging the IT-OT Divide with AI-Powered Insight
Visibility Revisited: Trends Shaping the Future of OT Cybersecurity
Stuxnet to Colonial Pipeline What Have We Learned & What’s on the Horizon?
Bridging IT/OT & Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, Cyolo
Cyber Threats, China, and the Global Wake-Up Call
Zero Trust in OT: A Look Back at Lessons Across IT and OT
Cybersecurity by Design: Building OT Security Into Your Manufacturing Plant Floor
The CISO & Talent Crisis: Turnover Meets OT Cybersecurity Gaps
The #1 Myth Putting Your Industrial OT Assets at Risk
Staying Ahead of an Industrial Cybersecurity Attack with Carlos Buenaño, Armis CTO
Blind Spots in Industrial Cybersecurity: What False Confidence Could Cost You
Avoiding Compliance Risks : From Audit to Action
Gartner, DOGE, and the Future of OT Cybersecurity Policy
Assessing AI’s Role in Cybersecurity
Overlooked Risks With IIoT in Industrial Cybersecurity
How to Secure OT Environments Without Disruptions with Dan Cartmill, TXOne Networks
The A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson Bort
Uncovering Blind Spots in OT Cybersecurity
AI in Industrial Cybersecurity: Friend, Foe, or Something in Between?
Cybersecurity Challenges and Insights with Industry Analyst Jonathon Gordon
OT Cybersecurity Insights with Lauren Blocker, Rockwell Automation
Keys to Bridging the Industrial Cybersecurity IT/OT Gap
The Future Looks Bright : Building a Career in OT Cybersecurity
Hackers and the Holidays: Strengthening Industrial Cybersecurity
The Future Looks Bright : Insights & Advice for Next Gen Cybersecurity Leaders
CISA’s Role in Supporting Asset Owners & Government Sectors with Cybersecurity
AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with Claroty
Women in STEM: Bridging the Talent Gap in Industrial Cybersecurity
How CISOs Are Bridging the Gap between OT and IT Cybersecurity
OT Cybersecurity Lessons from the Trenches Revisited
Securing Critical Assets: What Every CISO Should Know
Zero Day to Virtual Patching: Cybersecurity Solutions A-Z with TXOne Networks Revisited
Proactive vs. Reactive Cybersecurity: A Strategic Communications Perspective
From Legacy Systems to Ransomware: The Evolution of OT Cybersecurity
How CISA Supports Cybersecurity from Critical Infrastructure to Elections
Vendor and Version Lock Threats to Industrial Cybersecurity
The Human Factor : Securing Your Industrial Assets
Crowdstrike, Virtual Patching and Industrial OT Environments with Debbie Lay, TXOne Networks
Patch Management and Software Updates: IT versus OT
Future Trends in Industrial Cybersecurity with Sandeep Lota of Nozomi Networks
Top Takeaways: Why IT and OT Must Unite Now
SEC Cybersecurity Rulings: Are Public Companies Really Ready?
CISO Resignations: Is the Industrial Sector Prepared for the Fallout?
Exposing the Gaps: Railway Systems and Cyber Threats with Miki Shifman, Co-Founder and CTO of Cylus
The Air Gap Myth: How Misinformation Is Endangering Your Plant Floor
Why Preventative Cybersecurity is the Future with Ed Turkaly, Schneider Electric’s Cybersecurity Management Director
The Truth About IT / OT Convergence with Andrew McPhee - Cisco
Hidden Dangers in Your Devices: Exposing xIoT's Dark Side with John Vecchi, Phosphorous CMO
Building the Case for Cybersecurity Funding
Zero Trust : IT versus OT with Dino Busalachi and Jim Cook
Overcoming Obstacles in Diverse Technological Landscapes with CEO and Co-Founder of Garland Technology, Chris Bihary
Empowering IT and OT Teams to Improve Industrial Cybersecurity
The Future of Cybersecurity Insurance with Observatory Holding’s CEO, Gerry Kennedy
The State of OT Cybersecurity From the Field
Cybersecurity Missteps Putting the C-Suite at Risk
S4x24 Insights & Reflections on Cybersecurity Market Trends
Zero Trust in OT: Adapting IT's Playbook for Enhanced Security
Foreign Cybersecurity Threats & Risks to ICS / OT Equipment
Industrial Cybersecurity Lessons From the Field
Asset Inventory and Management the IT versus the OT Way
Cybersecurity and Data Protection in Modern Manufacturing with Jim Fledderjohn, Dell Technologies
Future Trends & Evolving Cybersecurity Threats with Simon Chassar, Claroty Former CRO
Operational Technology: A Case Study on Securing the Backbone of Manufacturing
Cybersecurity A-Z in Manufacturing and Industrial Sectors with Armis CTO, Mick Coady
Equipping OT Cybersecurity Frontlines With Training and Tech with Cloud Range CEO Debbie Gordon
High Visibility Cyber Attacks from MGM to Clorox to Critical Infrastructure: Risks and Responses
Innovation, Regulation and Education in ICS Cybersecurity with Nozomi’s Danielle Jablanski
ICS Cybersecurity Knowns, Unknowns, and Actions to Take with Industry Expert & S4 Founder Dale Peterson
Unmasking Industrial Cybersecurity Threats and Solutions with Dave Purdy of TXOne Networks
Holidays & Hackers: Keeping Industrial Control Systems Safe
Cybersecurity Threats and Insurance Solutions with Rogan Dwyer
Missteps and Common Blunders with Manufacturing, ICS and Cybersecurity
The Ins and Outs of Cybersecurity Talent for OT ICS Roles
Cybersecurity Unveiled Through IT and OT Alignment
Industrial Cybersecurity Insider Intro