Artwork

Content provided by Eric Sorensen. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Sorensen or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

People Are Part of the Damage

33:18
 
Share
 

Manage episode 354327805 series 3352216
Content provided by Eric Sorensen. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Sorensen or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

I usually start each episode by listing off a number of escalating and intentionally frightening statistics about the rising number of cybersecurity threats facing the industrial sector. The goal is to get your attention and reinforce how your data, operations and all of your vital assets continue to be so vulnerable.

Today’s guest, however, would argue that our strategies also need to acknowledge the human factor of cybersecurity. Instead of tailoring our strategy to focus exclusively on what’s at risk, we also need to remember the people that will play such a crucial role in carrying out these strategies.
The hackers are focused on people and their activities, and according to Ken Fanger at On Technology Partners, so should we. He shares a number of personal experiences about a wide range of hacks, and the personal impact of them all.
For more information on the work On Technology does, you can go to www.ontechpartners.com
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

133 episodes

Artwork
iconShare
 
Manage episode 354327805 series 3352216
Content provided by Eric Sorensen. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Sorensen or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

I usually start each episode by listing off a number of escalating and intentionally frightening statistics about the rising number of cybersecurity threats facing the industrial sector. The goal is to get your attention and reinforce how your data, operations and all of your vital assets continue to be so vulnerable.

Today’s guest, however, would argue that our strategies also need to acknowledge the human factor of cybersecurity. Instead of tailoring our strategy to focus exclusively on what’s at risk, we also need to remember the people that will play such a crucial role in carrying out these strategies.
The hackers are focused on people and their activities, and according to Ken Fanger at On Technology Partners, so should we. He shares a number of personal experiences about a wide range of hacks, and the personal impact of them all.
For more information on the work On Technology does, you can go to www.ontechpartners.com
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

133 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play