Security Breach

By: Eric Sorensen
  • Summary

  • A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

    © 2024 Security Breach
    Show more Show less
activate_Holiday_promo_in_buybox_DT_T2
Episodes
  • Minimizing Hacks by Focusing on Uptime
    Nov 21 2024

    Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings.

    Perhaps most frustrating is having to essentially reverse engineer a number of established products in order to quell security concerns. However, as frustrating as these efforts might be, the growing number of zero day hacks emanating from embedded security vulnerabilities will only continue to grow as we look to embed greater levels of sensor, software and AI-driven functionality.

    In this episode we hear from Marcellus Buchheit, President and CEO of Wibu-Systems USA, a leading provider of security solutions for embedded data and intellectual property. Watch/listen as we discuss:

    • How vulnerabilities and risks need to be assessed beyond their expense to focus on updates, reconfigurations and the growing number of OT connection points.
    • The need for SOPs that make it easier to assimilate cybersecurity into OT processes.
    • Ways to more safely update the growing number of devices on the plant floor.
    • Protecting IP and, more specifically, the software coding associated with it.
    • The impact AI continues to have on increasing the sophistication of hacking attempts.
    • Why all hacks are "highly preventable."
    • The role of quantum computing and the steps to take in preparing for "Q Day".

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Everyday AI: Your daily guide to grown with Generative AI
    Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show more Show less
    40 mins
  • What Cybersecurity Can Learn from Tom Brady
    Nov 15 2024

    We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats.

    Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies.

    While table top exercises are nothing new, we’re going to demonstrate how they’re evolving and can be customized according to your needs. We’re going to tackle the human element of cybersecurity by discussing communications strategies, and we’ll offer some insight on getting greater buy-in from throughout the organization, including the C-suite and those controlling the purse strings.

    Joining me to discuss these topics and run through a mock exercise will be:

    • Navroop Mitter, the CEO and founder of ArmorText. His firm is a leader in secure out-of-band communications.
    • Matthew Welling, a partner at Crowell & Moring's Washington, D.C. office, where he works in the firm's Privacy & Cybersecurity Group.
    • Timothy Chase, the director of the Manufacturing ISAC, a non-profit organization and leading provider of threat intelligence sharing solutions.

    In addition to the table top exercise, we'll discuss:

    • Communication challenges before, during and after an attack.
    • Response strategies and the evolving dynamic of out-of-band communications.
    • The ongoing challenges of addressing the Human Element of cybersecurity.
    • The impact of regulatory efforts and how they're playing a bigger role in attack response plans.
    • The types of tools or solutions that can play the biggest role in helping organizations respond to attacks more effectively.
    • How to control the emotional responses that will undoubtedly emanate from an attack.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Everyday AI: Your daily guide to grown with Generative AI
    Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show more Show less
    54 mins
  • Threat Landscape Update
    Nov 8 2024

    For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries responsible for next-generation malware, ransomware and phishing schemes.

    To kick things off, we'll hear from:

    • Tom Marsland, VP of Technology for Cloud Range as he discusses threats to our infrastructure and state-sponsored groups from China.
    • (3:31) He’ll be followed by Cyberhoot’s Craig Taylor as he updates us on phishing schemes.
    • (5:45) And then we’ll hear from Jon Taylor at Versa Networks as he talks about strategies bad actors are taking in targeting legacy industrial control systems.

    While many of those topics are already at the top of our list of concerns, there are also a number of evolving threats that warrant an uptick in resources – from both a financial and skillset development perspective. We'll dive into comments from:

    • (9:26) Corsha’s Anusha Iyer as she discusses supply chain and dwelling attacks.
    • (15:33) Venafi’s Kevin Bocek and his take on embedded software vulnerabilities and how hackers are taking advantage of them.
    • (22:18) Baker Tilly’s Jeff Krull offers an update on the evolving complexity of ransomware groups and how they’re targeting the industrial sector.
    • (25:20) And finally, let’s wrap u

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Everyday AI: Your daily guide to grown with Generative AI
    Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show more Show less
    39 mins

What listeners say about Security Breach

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.