Artwork

المحتوى المقدم من Eric Sorensen. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Eric Sorensen أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

The Little Things That Kill

38:04
 
مشاركة
 

Manage episode 447867432 series 3352216
المحتوى المقدم من Eric Sorensen. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Eric Sorensen أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true.

We know that the frequency of attacks will continue to increase.

We know that it’s not if your ICS will be probed, but when.

And we also know that asset and connection visibility is an ongoing challenge due to the implementation of more automated technology.

Finally, we also know that one of the most important aspects of any cybersecurity plan is the portion that lays out the response.

One of the most effective ways to address these concerns can be the use of attack simulations. In this episode we tap in to the expertise of Tom Marsland, VP of Technology for Cloud Range, a leading provider of live-fire cybersecurity exercises and training. Watch/listen as we discuss:

  • All the little things that are continuing to pose challenges to industrial cybersecurity.
  • Why state-sponsored hacker groups in China are getting more of his attention lately.
  • Why successful incident response is about the people, not the tools.
  • The importance of "training like you fight."
  • His role with VetSec, and the role it can play in filling cybersecurity talent gaps.
  • How to bring IT and OT together and why the onus on strengthening these bonds might fall more on IT.
  • Why the culture of security needs to permeate throughout the entire organization.
  • How AI can help make the most of your people.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

118 حلقات

Artwork
iconمشاركة
 
Manage episode 447867432 series 3352216
المحتوى المقدم من Eric Sorensen. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Eric Sorensen أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true.

We know that the frequency of attacks will continue to increase.

We know that it’s not if your ICS will be probed, but when.

And we also know that asset and connection visibility is an ongoing challenge due to the implementation of more automated technology.

Finally, we also know that one of the most important aspects of any cybersecurity plan is the portion that lays out the response.

One of the most effective ways to address these concerns can be the use of attack simulations. In this episode we tap in to the expertise of Tom Marsland, VP of Technology for Cloud Range, a leading provider of live-fire cybersecurity exercises and training. Watch/listen as we discuss:

  • All the little things that are continuing to pose challenges to industrial cybersecurity.
  • Why state-sponsored hacker groups in China are getting more of his attention lately.
  • Why successful incident response is about the people, not the tools.
  • The importance of "training like you fight."
  • His role with VetSec, and the role it can play in filling cybersecurity talent gaps.
  • How to bring IT and OT together and why the onus on strengthening these bonds might fall more on IT.
  • Why the culture of security needs to permeate throughout the entire organization.
  • How AI can help make the most of your people.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

118 حلقات

Όλα τα επεισόδια

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع