Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/80/12/9a/80129a22-1569-15a5-f9f2-481d3dcd6e66/mza_541581342092235567.jpg/600x600bb.jpg
Into the Breach by IBM
IBM
14 episodes
9 months ago
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…
Show more...
Technology
Education
RSS
All content for Into the Breach by IBM is the property of IBM and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…
Show more...
Technology
Education
https://files.casted.us/cef24cfa-e676-4835-8f44-7cd1e18bc05c.jpg
Curse of Cassandra or Hype of Chicken Little? Sorting Out Fact From Fiction On Operational Technology Security Risks
Into the Breach by IBM
34 minutes
3 years ago
Curse of Cassandra or Hype of Chicken Little? Sorting Out Fact From Fiction On Operational Technology Security Risks

Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kubecka about how these incidents can affect economies and public safety in every geography, and how we might defend against them. Chris is the Chair of the Cyber Program at the Middle East Institute (MEI) and has brought Operational Technology safety front and center across the globe. She details how these incidents can be a serious breach affecting economies around the world.


Key Takeaways:

00:06 - 01:07 Intro to episode

01:40 - 03:17 The Middle East Institute

04:34 - 05:22 The difference between information technology and operational technology

11:39 - 13:08 Motives behind attacks

13:20 - 14:33 How we should think about operational technology security, that we aren't considering today

14:33 - 17:26 Do we need the government in order to follow cybersecurity safeguards?

18:47 - 19:57 Ideal state for operational technology security

20:26 - 24:38 Chris shares a recent, and very interesting experience

25:42 - 27:38 What keeps Chris awake at night when it comes to operational technology

Into the Breach by IBM
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…