Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 The Icelandic Art of Intuition with Hrund Gunnsteinsdóttir | 307 35:19
Minimizing Hacks by Focusing on Uptime
Manage episode 451302071 series 3352216
Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings.
Perhaps most frustrating is having to essentially reverse engineer a number of established products in order to quell security concerns. However, as frustrating as these efforts might be, the growing number of zero day hacks emanating from embedded security vulnerabilities will only continue to grow as we look to embed greater levels of sensor, software and AI-driven functionality.
In this episode we hear from Marcellus Buchheit, President and CEO of Wibu-Systems USA, a leading provider of security solutions for embedded data and intellectual property. Watch/listen as we discuss:
- How vulnerabilities and risks need to be assessed beyond their expense to focus on updates, reconfigurations and the growing number of OT connection points.
- The need for SOPs that make it easier to assimilate cybersecurity into OT processes.
- Ways to more safely update the growing number of devices on the plant floor.
- Protecting IP and, more specifically, the software coding associated with it.
- The impact AI continues to have on increasing the sophistication of hacking attempts.
- Why all hacks are "highly preventable."
- The role of quantum computing and the steps to take in preparing for "Q Day".
As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.
Agency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...
Listen on: Apple Podcasts Spotify Digital Disruption with Geoff Nielson
Discover how technology is reshaping our lives and livelihoods.
Listen on: Apple Podcasts Spotify
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
Chapters
1. Minimizing Hacks by Focusing on Uptime (00:00:00)
2. [Ad] Promoguy Talk Pills (00:13:17)
3. (Cont.) Minimizing Hacks by Focusing on Uptime (00:13:50)
4. [Ad] Digital Disruption with Geoff Nielson (00:22:05)
5. (Cont.) Minimizing Hacks by Focusing on Uptime (00:22:45)
133 episodes
Manage episode 451302071 series 3352216
Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings.
Perhaps most frustrating is having to essentially reverse engineer a number of established products in order to quell security concerns. However, as frustrating as these efforts might be, the growing number of zero day hacks emanating from embedded security vulnerabilities will only continue to grow as we look to embed greater levels of sensor, software and AI-driven functionality.
In this episode we hear from Marcellus Buchheit, President and CEO of Wibu-Systems USA, a leading provider of security solutions for embedded data and intellectual property. Watch/listen as we discuss:
- How vulnerabilities and risks need to be assessed beyond their expense to focus on updates, reconfigurations and the growing number of OT connection points.
- The need for SOPs that make it easier to assimilate cybersecurity into OT processes.
- Ways to more safely update the growing number of devices on the plant floor.
- Protecting IP and, more specifically, the software coding associated with it.
- The impact AI continues to have on increasing the sophistication of hacking attempts.
- Why all hacks are "highly preventable."
- The role of quantum computing and the steps to take in preparing for "Q Day".
As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.
Agency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...
Listen on: Apple Podcasts Spotify Digital Disruption with Geoff Nielson
Discover how technology is reshaping our lives and livelihoods.
Listen on: Apple Podcasts Spotify
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
Chapters
1. Minimizing Hacks by Focusing on Uptime (00:00:00)
2. [Ad] Promoguy Talk Pills (00:13:17)
3. (Cont.) Minimizing Hacks by Focusing on Uptime (00:13:50)
4. [Ad] Digital Disruption with Geoff Nielson (00:22:05)
5. (Cont.) Minimizing Hacks by Focusing on Uptime (00:22:45)
133 episodes
All episodes
×

1 Why Ransomware, Credential Theft and Phishing Schemes Persist 40:30

1 Insecure Webcam Was All a Ransomware Group Needed 31:53



1 Observations of an Ethical Hacking Researcher 36:06





1 AI Is Exposing Your Most Vulnerable Attack Surface 35:48


1 What Cybersecurity Can Learn from Tom Brady 54:34


1 Phishing Attack Defense 'Not Rocket Science' 22:22

1 Legacy Mindsets Are Helping Hackers Weaponize Networks 43:17

1 Using Force Multipliers to Protect Against Next-Gen Stuxnet 40:51




1 Inside the Growing Complexity of Ransomware Hacking Groups 32:32

1 Time to 'Rip off the Band-Aid' to Ensure Security 40:20

1 Combating the 20th Century Mafia with a Stronger Human Firewall 47:15

1 Tearing Down the 'Set It and Forget It' Mindset 43:02

1 'There's No Bulletproof Vest' in Cybersecurity 52:37



1 There's No 'Plant the Flag' Moment in Cybersecurity 33:38


1 The Protection and Productivity of Zero Trust 44:17



1 The OT Threat Landscape's Infectious Nature 44:43




1 DMZs, Alarm Floods and Prepping for 'What If?' 48:58


1 The Impacts of Over-Connectivity and Mobile Defeatism 49:51






1 Patches, PLCs and Making it Harder for Hackers 36:24

1 Why AI is Your Biggest Threat and Most Powerful Ally 29:28




1 How Hackers are Targeting Vehicles and Fleets 41:31


1 Inside the Summer's Biggest Industrial Hacks 37:09



1 Avoiding a 'Chicken Little' Cybersecurity Strategy 40:32

1 Cybersecurity's Greatest Weapon - Awareness 37:27

1 Missteps Creating 'An Internal Collection of Hackers' 41:09




1 Tech Debt and the Unsexy Side of Cybersecurity 41:53

1 What Happens When a Torque Wrench Gets Hacked 29:16




1 The Growing Impact of Hacktivists and State-Sponsored Groups 43:18



1 Balancing The Light and Dark Forces of Technology 36:00

1 Breaking Down the Dole Foods Ransomware Attack 28:33

1 The Air Gap Lie and The Spectrum of Extortion 39:37

1 Latest Ransomware Attacks Educate, then Humiliate 27:03


1 Hacker's Insight: 'How Can I Make Stuff Worse' 26:46

1 When Seeing the Attack Isn't Enough to Stop It 25:46




1 Protecting Against 'Dormant Footholds' and Knowing You're a Target 37:48



1 A Little Social Engineering Goes a Long Way 20:32

1 Embracing The Devil Inside to Stifle Hackers 20:53

1 No Place to Hide When You Have Money and Data 21:46

1 From Attacking ISIS to Industrial Controls - Is GhostSec a Hacktivist or Threat? 22:12

1 Darknet Diaries Host Lifts the Veil on Cyberattack Secrecy 28:01


1 When Cyber Gangs 'Get Loud' - Responding to Dynamite Panda, LockBit and Others 23:57

1 Lessons Learned from DarkSide and the Solar Winds Hack 22:52

1 The Growing (and Frightening) Complexity of Ransomware Groups 16:27

1 Latest Tools of Choice for Hackers: Raspberry Robin and BlackCat 12:03

1 Preventing Ransomware Attacks Through Cyber Maintenance 18:11

1 Cyber Hygiene and Putin's Army of Criminal Hackers 18:00

1 Revisiting the JBS Ransomware Attack One Year Later 14:57

1 Security Breach: 'The Edge Always Goes to the Attacker' 49:35


1 The Growing Problem of 'Insecure by Design' 41:30



1 The Impressive and Terrifying Evolution of Ransomware Gangs 34:39

1 Humans, 'Promiscuous Devices' Creating More Threats 26:47

1 The Bad Guys Are Salivating Over Manufacturing 43:18

1 More than Security, Cyber Defense Is 'Life Safety' 35:18


1 Hackers Want to Steal, Extort Competitive Advantages 35:27

1 An Unlikely Assist from Ransomware and the Looming Threats of AI 36:26



1 'The Industry's Attack Surface Has Exploded' 18:34

1 DDoS Attacks (Part 1): 'They're Super Easy and Free' 12:25

1 DDoS Attacks - (Part II): Preparation is Prevention 12:21




1 Ransomware, Log4J and When — not if — You're Hacked 14:01


1 There's a Lot of Reasons October Could Be Terrifying 13:42

1 The Dangerous Reality of Your Cybersecurity Blast Radius 19:40
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.