• The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter
    Mar 25 2026
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter
    Pub date: 2026-03-23

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Cyberattacks don’t just test your systems - they test your preparedness.

    In this episode of Protect It All, host Aaron Crow breaks down key lessons from the Striker attack and what it reveals about today’s evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like “living off the land” - blending into normal operations instead of deploying obvious malware.

    Aaron takes this beyond theory, focusing on what organizations must do before an attack happens.

    A major theme? Tabletop exercises. Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can’t catch.

    You’ll learn:

    • What the Striker attack teaches about modern cyber warfare
    • How living-off-the-land tactics bypass traditional defenses
    • Why tabletop exercises are essential for real-world readiness
    • The role of threat hunting and collaboration across teams
    • How attackers exploit weaknesses in both IT and OT environments
    • Why small, consistent actions can dramatically improve resilience

    Whether you’re defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers practical insights you can apply immediately.

    Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All.

    Key Moments:

    04:59 "Modern Warfare: Cyber and Beyond"

    08:47 "Security Risks of Remote Wipe"

    10:31 "Living Off the Land Tactics"

    13:11 "Balancing Power and Security"

    19:12 "Vulnerabilities Demand Swift Action"

    20:21 Prioritize Risk, Justify Investment

    25:04 Practice Preparedness Before Crisis

    26:48 Weak Links Threaten Cybersecurity

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4



    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Show more Show less
    32 mins
  • 3/4 Accionesde Auditoría de seguridad OT
    Mar 24 2026
    Podcast: Casos de Ciberseguridad Industrial
    Episode: 3/4 Accionesde Auditoría de seguridad OT
    Pub date: 2026-03-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    En este episodio se propone un rediseño de las auditorías modernas, planteando el uso de simulación de escenarios y «gemelos de incidentes» como evidencias de confianza. Explica la importancia de integrar la seguridad industrial con la seguridad funcional y la continuidad operativa para gestionar el riesgo sistémico de forma integral.

    The podcast and artwork embedded on this page are from Centro de Ciberseguridad Industrial, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Show more Show less
    13 mins
  • Michael Pyle on Securing Internet-Facing OT and ICS Assets
    Mar 23 2026
    Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)
    Episode: Michael Pyle on Securing Internet-Facing OT and ICS Assets
    Pub date: 2026-03-22

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Michael Pyle, Director of Product Cybersecurity at Schneider Electric, joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to operational technology and industrial control systems that are insecurely connected to the internet.

    Attackers are adept at enumerating exposed devices and leveraging OT and ICS to access process and corporate networks. Pyle explains that Internet Exposure Prevention drops inbound traffic that the asset did not initiate. Checks are made on the IP address initiating the connection and whether it's a routable source IP, and an allow/deny decision is made.

    Pyle explains the risk to exposed devices, and the need to shut down illicit connections.

    Subscribe and listen to the Nexus Podcast here.



    The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Show more Show less
    24 mins
  • Cyber-Informed Engineering: Moving Beyond the Firewall
    Mar 22 2026
    Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)
    Episode: Cyber-Informed Engineering: Moving Beyond the Firewall
    Pub date: 2026-03-18

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    For the last episode of season 5, host Bryson Bort sat down with Andrew Ohrt, Resilience Director at West Yost Associates. A civil engineer specializing in water infrastructure, Andrew bridges the gap between traditional engineering and digital risk. Andrew walks us through the "invisible" nature of water systems, the impact of data centers on utility resilience, and how Cyber-Informed Engineering (CIE) protects our most essential resource.

    How did a drive under a rebuilt bridge in Minneapolis pivot Andrew’s career toward critical infrastructure? Why did a single wastewater release shut down Waikiki Beach for an entire week? And what happens when a cybersecurity team finds a client’s PLC exposed on the open internet?

    “To me, the integration of understanding cyber or digital risk in our critical infrastructure, the engineers picking that understanding up, building awareness, building skill sets, figuring out how to manage that risk, is one of the most important things that we've been working on,” he said.

    Join us for this and more on this episode of Hack the Plan[e]t.

    The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers.

    Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.



    The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Show more Show less
    43 mins
  • Episode 64: Rob Lee
    Mar 21 2026
    Podcast: CYBR.SEC.CAST (LS 25 · TOP 10% what is this?)
    Episode: Episode 64: Rob Lee
    Pub date: 2026-03-19

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Dragos CEO and U.S. National Guard Lt. Col. Rob Lee joins hosts Michael Farnum and Sam Van Ryder to discuss why he returned to military service, the growing cyber threats to critical infrastructure, and the role exercises like Cyber Fortress play in preparing both government and private sector operators for real-world cyber incidents.

    SHOW NOTES:

    Things Mentioned:

    • Cyber Fortress 2026: https://va.ng.mil/Cyber-Fortress/
    • Upcoming CYBR.SEC.Community events: https://www.cybrsecmedia.com/conference/
    • CYBR.SEC.Careers: https://www.linkedin.com/company/cybr-sec-careers/about/ fundraisers:
      • Cards for a Cause: https://www.linkedin.com/posts/cybr-sec-careers_cybrseccareers-nonprofit-cybersecurity-activity-7436794892787359744-v4Cz
      • CYBR CLAY SHOOT: https://www.linkedin.com/posts/cybr-sec-careers_cybrclayshoot-cybersecurity-cybercareers-activity-7435353518951084033-1iw9
      • Proceeds support CYBR.SEC.Careers mission is to build a strong, diverse workforce by providing career exposure, access to education and certifications, and mentorship for students and veterans pursuing careers in cybersecurity.

    Episode 64 Timestamps:

    6:48 – Why Lee returned to military service
    Lee explains how calls from government and military leaders prompted him to return to the National Guard to help address unresolved questions around defending operational technology (OT) during conflict.

    9:33 – Role in the 91st Cyber Brigade
    Lee describes his position as executive officer and the mission of the Army National Guard’s cyber brigade.

    14:52 – Cyber Fortress exercise explained
    Lee walks through the origins of Cyber Fortress and how it evolved from a state-level exercise into a broader operational technology training environment.

    17:53 – How Cyber Fortress works
    The exercise combines training, red-team simulations, and participation from infrastructure operators to practice responding to real OT cyber incidents.

    20:10 – Cyber conflict and civilian infrastructure
    Lee discusses the growing risk of state actors targeting hospitals, utilities, and other civilian infrastructure.

    24:23 – Cyber attacks that lead to loss of life
    Lee argues the cybersecurity community must acknowledge that cyber operations have already contributed to real-world deaths.

    27:04 – The role of cyber in modern warfare
    The discussion explores how cyber capabilities are increasingly intertwined with traditional military conflict.

    Do you have a question for the hosts? Reach out to us at media@cscgroupllc.com



    The podcast and artwork embedded on this page are from CYBR.SEC.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Show more Show less
    33 mins
  • The Hard Reality of Patch Management in OT Networks | OT Security Made Simple
    Mar 20 2026
    Podcast: OT Security Made Simple
    Episode: The Hard Reality of Patch Management in OT Networks | OT Security Made Simple
    Pub date: 2026-03-17

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Join Klaus Mochalski and Westermo’s CISO Niklas Mörth to explore why OT patch management differs from IT. Discover the challenges of safety, the importance of system baselines, and alternative mitigations like zero trust to keep your critical infrastructure secure.

    You can find more information on OT Security Made Simple at rhebo.com or send us your ideas, questions, or guest suggestions at podcast@rhebo.com.



    The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Show more Show less
    26 mins
  • The Connected Plant Floor: What S4X26 Revealed
    Mar 19 2026
    Podcast: Industrial Cybersecurity InsiderEpisode: The Connected Plant Floor: What S4X26 RevealedPub date: 2026-03-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCraig and Dino recap their experience at S4X26, the leading global OT cybersecurity conference in Miami.They discuss the conference's "connected" theme and how AI is creating an inflection point in industrial cybersecurity, driving unprecedented connectivity between IT and OT environments.The hosts explore the challenges of the "silver tsunami" as experienced engineers retire, how AI-powered tools are being embedded directly into edge devices and industrial products from vendors like Cisco and Fortinet, and why the regulatory landscape in Europe is advancing faster than other regions.They emphasize the importance of connecting with peers and partners in the OT security community, highlight key vendors and technologies showcased at the event, and explain why both IT and OT professionals should attend S4X together to bridge the knowledge gap.The episode concludes with details about next year's expanded conference in Tampa, February 8-11.Chapters:(00:00:00) - Random Encounter with Team USA Hockey in Miami(00:01:00) - S4X26 Conference Kickoff: The "Connected" Theme(00:03:00) - AI as the Inflection Point for OT Connectivity(00:05:00) - AI Embedded in Edge Devices and Vendor Technologies(00:07:00) - First-Time Attendee Experiences and Key Takeaways(00:10:00) - Europe's Cyber Resiliency Act and Regulatory Advancements(00:12:00) - Vendor Presence and the OT Technology Marketplace(00:14:00) - S4X27 Moving to Tampa: February 8-11, 2027(00:16:00) - AI's Role in Addressing the Silver Tsunami(00:18:00) - Final Thoughts: Why IT and OT Teams Should Attend TogetherLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Show more Show less
    20 mins
  • OT Under Siege: How to Defend Critical Infrastructure From Nation-State Cyber Threats
    Mar 18 2026
    Podcast: PrOTect It All (LS 27 · TOP 10% what is this?)
    Episode: OT Under Siege: How to Defend Critical Infrastructure From Nation-State Cyber Threats
    Pub date: 2026-03-16

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Global conflicts are no longer confined to physical battlefields - they’re spilling into cyberspace.

    In this urgent episode of Protect It All, host Aaron Crow breaks down the rising wave of cyber threats targeting critical infrastructure, from energy and water utilities to manufacturing and transportation systems.

    Drawing on recent global events and real-world incidents, Aaron explores how nation-state actors, hacktivists, and advanced adversaries are increasingly targeting operational technology environments. These attacks often rely on “living off the land” techniques - leveraging existing tools and access inside networks rather than deploying obvious malware.

    But this episode isn’t about panic. It’s about practical defense.

    Aaron outlines the immediate steps OT security teams can take to strengthen resilience - even with limited resources and tight budgets.

    In this episode, you’ll learn:

    • Why global instability increases cyber risk for critical infrastructure
    • How attackers exploit existing tools using living-off-the-land tactics
    • The importance of vigilance, monitoring, and patching in OT environments
    • Why access control and identity management are critical defenses
    • How organizations can improve security posture without massive investments
    • The role of collaboration and awareness in defending essential systems

    Whether you operate power systems, water facilities, industrial plants, or transportation infrastructure, this episode provides real-world guidance to help you stay ahead of evolving threats.

    Tune in to learn how OT teams can strengthen defenses and protect the systems society depends on - only on Protect It All.

    Key Moments:

    03:41 "Rising Cyber Threats Amid Tensions"

    08:24 Nation-State Cyber Threats Unveiled

    11:23 "Advanced Cybersecurity and Monitoring"

    14:24 Prioritizing and Addressing Security Risks

    17:24 Practical Steps for Cybersecurity Improvements

    19:34 "Focus on Resources and Action"

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4



    The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Show more Show less
    23 mins