Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Health & Fitness
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/1a/81/a4/1a81a48d-f587-433c-0389-45d5dbe778ce/mza_10141453975800713152.jpg/600x600bb.jpg
Cyber Brews - The Operational Technologies Podcast
Dave A. and Chris F.
13 episodes
4 days ago
Cyber Brews explores the world of Cybersecurity in Industrial Control Systems (ICS) and Operational Technology (OT) — one conversation (and one brew) at a time. Each episode breaks down complex cyber topics into easy-to-digest discussions. From ransomware in critical infrastructure to OT security culture, we dive into real-world challenges, emerging threats, and the people behind the systems that keep industry running safely. This is an independent, passion-driven podcast created by cybersecurity professionals who love to share stories, insights, and lessons from the front lines of industry.
Show more...
Technology
RSS
All content for Cyber Brews - The Operational Technologies Podcast is the property of Dave A. and Chris F. and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cyber Brews explores the world of Cybersecurity in Industrial Control Systems (ICS) and Operational Technology (OT) — one conversation (and one brew) at a time. Each episode breaks down complex cyber topics into easy-to-digest discussions. From ransomware in critical infrastructure to OT security culture, we dive into real-world challenges, emerging threats, and the people behind the systems that keep industry running safely. This is an independent, passion-driven podcast created by cybersecurity professionals who love to share stories, insights, and lessons from the front lines of industry.
Show more...
Technology
Episodes (13/13)
Cyber Brews - The Operational Technologies Podcast
Halloween Special - Ghost In the Control Room

Something sinister is stirring in the systems…

In this Cyber Brews Halloween Special, we dive into the true story behind one of the most chilling cyber incidents in industrial history the Triton malware attack.

What began as a routine night in a control room turned into a digital nightmare, when rogue code infiltrated safety systems designed to prevent catastrophic industrial accidents.

With a Halloween twist, “Ghost in the Control Room” explores how a few hidden lines of code nearly turned a secure facility into a scene of chaos — and what this haunting real-world case teaches us about human error, resilience, and the invisible forces moving through our networks.

So grab your favourite brew, turn down the lights and settle in for a Halloween Special.

Show more...
4 days ago
17 minutes 57 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - What’s Brewing in IEC 62443-2-2?

Series 2 – Episode 6!


This month’s brew takes a fresh look at the latest updates in IEC 62443-2-2:2025 — The standard that sets out requirements for industrial automation and control system security programs.


If that sounds a bit dry, don’t worry — we’re serving it up in plain English, with a dash of Dave & Chris -style "banter".


In this episode, we break down what’s new in the revised standard, why it matters, and how these changes impact organizations looking to strengthen their OT security posture.

Key topics on tap this month include:

  • What IEC 62443-2-2 actually covers and why it’s important


  • The most significant changes in the latest update
  • How these updates affect compliance and real-world implementation

So grab your favourite brew and join us as we try to make sense of the updates in the new IEC 62443-2-2:2025 — hopefully without the headache.

Show more...
1 month ago
57 minutes 40 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - IEC-62443 Security Levels, Simplified?

Series 2 – Episode 5!

Cyber Brews: IEC-62443 Security Levels, Simplified?This month’s brew tackles the industrial cybersecurity standard that everyone talks about — but few really get: IEC 62443. If you’ve ever felt lost in a sea of FRs, SRs, and SLs, you’re not alone. We’re here to break it down, coffee (or pint) in hand.


In this episode, we unpack the core components of IEC 62443 — from Foundational Requirements (FRs) to Security Levels (SLs) — and explore what they actually mean for real-world OT environments.


Key topics on tap include:


  • What the different Security Levels (SL1 to SL4) actually represent — and why SL4 isn’t always the goal
  • The role of Foundational Requirements (FRs) and how they structure your cybersecurity baseline
  • How System Requirements (SRs) map to practical controls in the field
  • Why context matters: understanding your risk, your environment, and your realistic target level


So whether you’re just getting into IEC 62443 or trying to explain it to someone else without inducing a yawn, this episode’s for you.


Grab your brew of choice and join us as we demystify the standard — one security level at a time.

Show more...
3 months ago
42 minutes 51 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - Trust No One, Verify Everything (Zero Trust)

Series 2 – Episode 4!


Cyber Brews: Trust No One, Verify Everything (Zero Trust)

This month’s brew dives into a game-changing security model that’s making waves in both IT and OT: Zero Trust. Forget the old perimeter mindset — in this episode, we explore why trust is no longer a security strategy, especially when it comes to protecting critical industrial systems.

We kick off with a breakdown of what Zero Trust actually means, where it came from, and why it’s become essential in the world of Operational Technology. As OT and IT networks continue to converge, the traditional “trust but verify” approach just doesn’t cut it anymore.

Key topics on the table include:

  • Why OT environments need Zero Trust now more than ever.

  • How to apply Role-Based Access Control, Network Segmentation, MFA, and Continuous Monitoring in industrial settings.

  • The real-world benefits of Zero Trust: from reduced insider threats to better compliance and resilience.

  • Common challenges and how to start making progress, even in complex legacy environments.

So grab your favourite brew and join us as we unravel how Zero Trust could secure the future of OT — one segment, one policy, one verified connection at a time.

Show more...
5 months ago
41 minutes 8 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - CEOs meet Cyber

Series 2 - Episode 3!

Cyber Brews: CEOs meet CyberThis time, we’re flipping the script and taking cybersecurity straight to the top. That’s right — we’re talking senior management and the critical questions they need to be asking when it comes to protecting Operational Technology (OT).

In this episode, we unpack the essential governance-level questions that help leaders understand their organization's cyber risk posture.


From assessing the cyber threat landscape to defining roles and responsibilities the various teams, we dive into the high-level decisions that can make or break your organization’s resilience.


We will cover topics like:

  • Understanding your threat surface and who’s targeting your systems


  • The importance of a complete asset inventory and dealing with obsolete equipment


  • How to evaluate your risk management and incident response plans


  • Why clarity in responsibilities (especially between IT and OT) is non-negotiable


  • Using frameworks like IEC 62443 to guide your cybersecurity governance

So grab your favourite brew and join us as we arm the boardroom with the right questions to protect the control room.

Show more...
6 months ago
38 minutes 3 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - Lets Get Physical

Series 2 - Episode 2!


Lets get Physical, Physical. I wanna get Physical...

In this episode, we delve into the critical interplay between physical security and cyber security within Operational Technology (OT) environments.


In this months episode we discuss the importance of well-defined physical security policies, robust perimeter controls, and effective access management to protect sensitive areas and critical assets.


Key topics include establishing security perimeters, entry controls, and physical segmentation, along with the roles and responsibilities of personnel in maintaining these security measures.


We discus the need for a unified approach that integrates physical and cyber security strategies, ensuring that both realms work in harmony to protect against threats from all angles.


So as always grab your favourite brew and join us for another episode of Cyber Brews!

Show more...
8 months ago
45 minutes 29 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - From Hacks to Heroes: 2024 in OT Cyber security

Welcome everybody to Series 2 of Cyber Brews the series that tries to make OT Cyber–Security Interesting!!


In this episode of Cyber Brews, we take a deep dive into the biggest cybersecurity stories we covered in 2024.

From shocking insider threat statistics to the evolving tactics of ransomware groups like Ransomhub, we break down the key trends shaping the cyber landscape.

We also revisit wild stories like the Dieselgate scandal, hackers targeting air-gapped systems, and even how lava lamps and internal door pass-codes played a role in security breaches.

Plus, we explore the unexpected collaboration between Western hackers and Russian organised crime groups.


So grab your brew and join us for a recap you won’t want to miss!

Show more...
8 months ago
53 minutes 53 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - Cyber Management of Change

Welcome to the Final Episode of the Year—Episode Six!

In this closing episode of 2024, we dive into the critical topic of management of change (MoC) in the context of OT cybersecurity.


We kick things off with a look at the iconic failure of the Empire's Death Star and explore how its downfall can teach us valuable lessons for managing change in operational technology environments.


In this Episode we cover:


  • The Death Star Example: A discussion of one of the most iconic and catastrophic management of change (MoC) failures, analysing how overlooked risks and gaps in planning led to its downfall—and what lessons we can apply to cyber security today.


  • MoC Assessment Basics: Exploring the foundational elements of a robust MoC process, including conducting thorough risk assessments, maintaining accurate and up-to-date documentation, and identifying critical records essential to cyber security.


  • Supply Chain Risk: Understanding the risks posed by vendor-supplied default configurations—do you really know what’s in them? Examining how changes in the supply chain may impact current physical security controls and whether those changes could alter the criticality of your operations.


  • Employee Training: Highlighting the importance of employee education and preparedness in the MoC process. How do training programs ensure staff adapt to and manage changes effectively while maintaining a strong security posture?



Join us as we uncover the complex layers of OT cybersecurity, the importance of thorough risk assessments, and the real-world impacts of implementing robust change management strategies.


Thank you for tuning in throughout 2024. We wish you a Merry Christmas and look forward to bringing you Series 2 of the Cyber Brews Podcast in 2025, with even more exciting episodes planned!

Show more...
10 months ago
51 minutes 20 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - The Risk & Consequence Chronicles

Welcome to Episode Five of Our Podcast!

In this episode, we dive into the critical topic of Risk and Consequence in the context of OT cybersecurity. Here, we share our insights on cyber risks and the potential consequences organisations face.


In This Episode, We Cover:


  • Risk Assessment Basics: We discuss the foundations of cyber risk assessments, focusing on identifying deviations from normal operations and exploring key concepts like "attack vectors" and the "kill chain."

  • Example Incident: We examine the CrowdStrike case to understand how OT risk assessments account for insider threats and unintended consequences.

  • Likelihood and Attack Types: We look at the frequency and variety of cyber threats, considering how risk changes based on the type of attacker, from disgruntled employees to bot-driven attacks.

  • Mitigation Strategies: We wrap up with a look at prevention versus mitigation, discussing ways to prioritize actions and implement these countermeasures despite the challenge of quantifying cyber risks.

Join us in exploring the complex layers of OT cybersecurity risk assessments and the real-world impacts of these measures.

Thank you for tuning in, and don’t forget to rate our podcast as we continue our journey through the world of OT cybersecurity!

Show more...
1 year ago
56 minutes 30 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - NIS2: The Adventure Continues

Episode Four - NIS2 Unveiled: The Future of Cyber security Compliance.


Welcome to Episode Four of our podcast! In this podcast episode, we delve into the NIS2 directive, which aims to enhance cyber security resilience in critical sectors across the European Union & and maybe even some of the UK!

Investigate the facts behind the directive:

  • Impact: Strengthening Cyber Defenses in Energy, Transport, Banking, and More
  • Unpacked: How UK Companies Navigate Enhanced Cybersecurity Requirements
  • NIS2 and OT: Expanding Scope, Stricter Security, and Reporting Demands
  • Compliance: Establishing a Cyber Security Management System (CSMS) for Structured Resilience
  • Reporting: Understanding "Undue Delay" and Significance in Incident Notification
  • Directive: Proactive Measures for Cybersecurity Resilience in Critical Sectors


Join us as we uncover the Expanding layers of OT cybersecurity and the adventures of NIS2.


Thank you for tuning in to our exploration of OT cybersecurity and don't forget to rate our podcast!


Show more...
1 year ago
40 minutes 33 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - Organised Crime Groups

We made it to Episode Three - Revenge of the OCG - Unveiling the Dark World of Organized Crime Groups in OT Cybersecurity.


Welcome to Episode Three of our podcast! In this gripping episode, we dive deep into the shadowy realm of Organized Crime Groups (OCGs) within the Operational Technology (OT) sector. Discover the secrets behind:

  • The intricate web of the OCG industry and its diverse services.
  • The notorious groups and gangs that dominate the landscape.
  • The sophisticated methods used to utilize and manage OCG services.
  • The typical OCG kill chain strategies and their execution.
  • The cunning tactics OCGs employ to launder their ill-gotten gains.
  • The crucial role and operations of the Joint Cybercrime Action Taskforce.

Join us as we uncover the hidden layers of OT cybersecurity and the relentless threats posed by OCGs. Don’t miss this eye-opening episode!

Thank you for tuning in to our exploration of OT cybersecurity!

Show more...
1 year ago
41 minutes 42 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - Creating A Cyber Security Culture

Our second episode (Woo), we dive into the topic of 'Creating a cyber security culture'.


In this episode we look at how Cyber security is not just technical fixes.

A cyber security culture is as important as it reflects the actions of the human which is normally the weakest link.

This episode looks at:

• What culture is

• Organisational barriers

• Developing a good cyber security culture

Show more...
1 year ago
52 minutes 34 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews - Ransomware Resilience Podcast

Cyber Brews looks to take the topic of cyber security in the OT domain and break it down into sizable chunks.


This is our first episode (We are excited) dives into the Topic of cyber security ransomware in the OT industry. Join us as we explore the challenges, strategies, and solutions to safeguard critical infrastructure.

Show more...
1 year ago
38 minutes 4 seconds

Cyber Brews - The Operational Technologies Podcast
Cyber Brews explores the world of Cybersecurity in Industrial Control Systems (ICS) and Operational Technology (OT) — one conversation (and one brew) at a time. Each episode breaks down complex cyber topics into easy-to-digest discussions. From ransomware in critical infrastructure to OT security culture, we dive into real-world challenges, emerging threats, and the people behind the systems that keep industry running safely. This is an independent, passion-driven podcast created by cybersecurity professionals who love to share stories, insights, and lessons from the front lines of industry.