Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/80/12/9a/80129a22-1569-15a5-f9f2-481d3dcd6e66/mza_541581342092235567.jpg/600x600bb.jpg
Into the Breach by IBM
IBM
14 episodes
9 months ago
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…
Show more...
Technology
Education
RSS
All content for Into the Breach by IBM is the property of IBM and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…
Show more...
Technology
Education
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/80/12/9a/80129a22-1569-15a5-f9f2-481d3dcd6e66/mza_541581342092235567.jpg/600x600bb.jpg
Operational Technology: The evolving threats that might shift regulatory policy
Into the Breach by IBM
31 minutes
2 years ago
Operational Technology: The evolving threats that might shift regulatory policy

Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022—a direct result of Russia’s invasion of Ukraine sparking a growing willingness on behalf of criminals to target the ICS of critical infrastructure.


Conversations about what could happen if these kinds of systems were compromised were once relegated to “what ifs” and disaster movie scripts. But those days are behind us, and the threats to OT and ICS are real and ongoing.


Roya Gordon and her team at Nozomi Networks keep a close eye on these kinds of threats, and recently released their biannual OT/IoT Security Report that examines what’s happened in the landscape for this sector in the latter half of 2022.


She joins me in this episode to talk in-depth about what her team found—including the latest on the types of attacks hitting OT and IoT, what effect increased regulation may have on industries in this sector, how Russia’s invasion of Ukraine continues to change the landscape, and what may be on the horizon for cyber insurance. And maybe most importantly, she helps us understand what OT/IoT organizations can do to stay safer.


Join us—and together we’ll venture Into the Breach.


Things to listen for:

  • [00:05 - 00:44] Introduction
  • [01:00 - 02:50] Important pieces from Nozomi's security report
  • [03:23 - 05:21] Threat actors Roya sees at Nozomi
  • [06:16 - 08:10] Roya explains being anti-cyber insurance
  • [11:40 - 15:21] Sector-specific plans: What do we know and are they needed?
  • [16:19 - 17:21] International efforts for a safer sector
  • [20:45 - 23:06] Advice for loT and OT friends


Into the Breach by IBM
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…