<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/1990015.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Security Breach</title>

  <lastBuildDate>Mon, 13 Apr 2026 01:05:28 -0400</lastBuildDate>
  <link>https://www.manufacturing.net/cybersecurity</link>
  <language>en-us</language>
  <copyright>© 2026 Security Breach</copyright>
  <podcast:locked>no</podcast:locked>
    <podcast:guid>61dad7fd-e30f-559a-a5fd-6f21be7f8e82</podcast:guid>
  <itunes:author>Eric Sorensen</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime</itunes:keywords>
  <itunes:owner>
    <itunes:name>Eric Sorensen</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/jwksz826otqfos9wnx3dpzuiswfr?.jpg</url>
     <title>Security Breach</title>
     <link>https://www.manufacturing.net/cybersecurity</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/jwksz826otqfos9wnx3dpzuiswfr?.jpg" />
  <itunes:category text="News">
    <itunes:category text="Tech News" />
  </itunes:category>
  <itunes:category text="Technology" />
  <itunes:category text="News">
    <itunes:category text="Business News" />
  </itunes:category>
  <podcast:person role="host" href="https://www.linkedin.com/in/jeff-reinke-414ab75/" img="https://storage.buzzsprout.com/d60scvi0t4a1rlq9kz1epl5cr8ro">Jeff Reinke</podcast:person>
  <item>
    <itunes:title>The Bad Guy&#39;s Different Set of Rules</itunes:title>
    <title>The Bad Guy&#39;s Different Set of Rules</title>
    <itunes:summary><![CDATA[Send us Fan Mail Not to continue to beat our collective heads into the same wall, but by now everyone knows that manufacturing leads the way in targeted cyberattacks, as well as year-over-year increases in areas like ransomware attacks, DDoS shutdowns and data breaches.  Yet, the industry continues to demonstrate some troubling behaviors in the face of these realities.  Kiteworks recently found that only 36% of organizations have visibility into where their data is utilized by exter...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Not to continue to beat our collective heads into the same wall, but by now everyone knows that manufacturing leads the way in targeted cyberattacks, as well as year-over-year increases in areas like ransomware attacks, DDoS shutdowns and data breaches. </p><p>Yet, the industry continues to demonstrate some troubling behaviors in the face of these realities. </p><p>Kiteworks recently found that only 36% of organizations have visibility into where their data is utilized by external partners. So, think supply chains, distributor fulfillment agreements and technology contractors that have access to your data, but may not be applying the appropriate security strategies. </p><p>This means you could be the victim of an attack, but remain in the dark about its origins, enabling the intrusion to happen again and again.</p><p>Fortunately, we do have some good guys working to correct these vulnerabilities, and we’ll talk with one in this episode. Watch/listen as Tim Freestone, the Chief Strategy Officer at the aforementioned Kiteworks, discusses:</p><ul><li>How attackers are leveraging new technology more quickly than the white hats, and why AI might be the tool that evens the playing field.</li><li>Why response plans need to focus more on &quot;the big rocks than the little ones.&quot;</li><li>The difference between input from &quot;champions&quot; versus &quot;complainers.&quot;</li><li>How CMMC could have an impact beyond just the defense supply chain.</li><li>The continued use of IT and OT silos that might might make sense from a business perspective, but demand a paradigm shift when dealing with cybersecurity.</li><li>Why regulations might be the most important agents of change.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Not to continue to beat our collective heads into the same wall, but by now everyone knows that manufacturing leads the way in targeted cyberattacks, as well as year-over-year increases in areas like ransomware attacks, DDoS shutdowns and data breaches. </p><p>Yet, the industry continues to demonstrate some troubling behaviors in the face of these realities. </p><p>Kiteworks recently found that only 36% of organizations have visibility into where their data is utilized by external partners. So, think supply chains, distributor fulfillment agreements and technology contractors that have access to your data, but may not be applying the appropriate security strategies. </p><p>This means you could be the victim of an attack, but remain in the dark about its origins, enabling the intrusion to happen again and again.</p><p>Fortunately, we do have some good guys working to correct these vulnerabilities, and we’ll talk with one in this episode. Watch/listen as Tim Freestone, the Chief Strategy Officer at the aforementioned Kiteworks, discusses:</p><ul><li>How attackers are leveraging new technology more quickly than the white hats, and why AI might be the tool that evens the playing field.</li><li>Why response plans need to focus more on &quot;the big rocks than the little ones.&quot;</li><li>The difference between input from &quot;champions&quot; versus &quot;complainers.&quot;</li><li>How CMMC could have an impact beyond just the defense supply chain.</li><li>The continued use of IT and OT silos that might might make sense from a business perspective, but demand a paradigm shift when dealing with cybersecurity.</li><li>Why regulations might be the most important agents of change.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18954745-the-bad-guy-s-different-set-of-rules.mp3" length="21059487" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/44i5j3a46yjny57j8t9sb9ff2ekh?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18954745</guid>
    <pubDate>Fri, 03 Apr 2026 17:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1990015/18954745/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1990015/18954745/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1990015/18954745/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1990015/18954745/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/1990015/18954745/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="The Bad Guy&#39;s Different Set of Rules" />
  <psc:chapter start="1:51" title="Why Manufacturers Get Targeted" />
  <psc:chapter start="3:35" title="OT Connectivity And Common Missteps" />
  <psc:chapter start="3:52" title="Silos That Block Real Security" />
  <psc:chapter start="6:46" title="Champions Who Move The C Suite" />
  <psc:chapter start="8:26" title="Regulators As The Change Lever" />
  <psc:chapter start="11:12" title="More Spend Still More Breaches" />
  <psc:chapter start="13:30" title="AI As A Cyber Force Multiplier" />
  <psc:chapter start="15:58" title="Beating Tool Sprawl With AI" />
  <psc:chapter start="18:58" title="Protecting Data In Transit" />
  <psc:chapter start="20:46" title="Microlearning That Prevents Mistakes" />
  <psc:chapter start="22:57" title="Secure By Design Needs Proof" />
  <psc:chapter start="25:22" title="Incident Response Starts With Data" />
  <psc:chapter start="27:18" title="The Next Wave: AI Agents" />
  <psc:chapter start="29:09" title="Where To Learn More And Connect" />
</psc:chapters>
    <itunes:duration>1741</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Finding the Soul of a Pirate</itunes:title>
    <title>Finding the Soul of a Pirate</title>
    <itunes:summary><![CDATA[Send us Fan Mail We all know that cybersecurity, and industrial cybersecurity in particular, is facing a huge talent deficit.  Finding an individual who not only understands the technical elements of cybersecurity, but also appreciates the dynamics of keeping a manufacturing operation up and running is extremely difficult, as they need to balance security with uptime, defense with productivity, and investment with implementation timelines.  Our guest for today’s episode can empathiz...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We all know that cybersecurity, and industrial cybersecurity in particular, is facing a huge talent deficit. </p><p>Finding an individual who not only understands the technical elements of cybersecurity, but also appreciates the dynamics of keeping a manufacturing operation up and running is extremely difficult, as they need to balance security with uptime, defense with productivity, and investment with implementation timelines. </p><p>Our guest for today’s episode can empathize. Watch/listen as Yaniv Kapluto, the Chief Revenue Officer at Nukudo, offers insight on the unique ways his company trains cybersecurity talent, including:</p><ul><li>Why he looks for individuals who work with the precision of a Navy SEAL and the soul of a pirate.</li><li>The challenges of placing someone who sees how to break things amongst organizations charged with creating new products every day.</li><li>The value in viewing tests or challenges as games or puzzles.</li><li>The importance of developing and contributing to a culture focused on cybersecurity.</li><li>Making training fun in order to keep people engaged.</li><li>The unique impacts of artificial intelligence on cybersecurity.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We all know that cybersecurity, and industrial cybersecurity in particular, is facing a huge talent deficit. </p><p>Finding an individual who not only understands the technical elements of cybersecurity, but also appreciates the dynamics of keeping a manufacturing operation up and running is extremely difficult, as they need to balance security with uptime, defense with productivity, and investment with implementation timelines. </p><p>Our guest for today’s episode can empathize. Watch/listen as Yaniv Kapluto, the Chief Revenue Officer at Nukudo, offers insight on the unique ways his company trains cybersecurity talent, including:</p><ul><li>Why he looks for individuals who work with the precision of a Navy SEAL and the soul of a pirate.</li><li>The challenges of placing someone who sees how to break things amongst organizations charged with creating new products every day.</li><li>The value in viewing tests or challenges as games or puzzles.</li><li>The importance of developing and contributing to a culture focused on cybersecurity.</li><li>Making training fun in order to keep people engaged.</li><li>The unique impacts of artificial intelligence on cybersecurity.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18870419-finding-the-soul-of-a-pirate.mp3" length="27226891" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qvaa90fhocd0b75gos10dhif0yk6?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18870419</guid>
    <pubDate>Thu, 19 Mar 2026 09:00:00 -0400</pubDate>
    <itunes:duration>2255</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Analyzing, Responding to the Inevitable Uptick in Iranian Cyberattacks</itunes:title>
    <title>Analyzing, Responding to the Inevitable Uptick in Iranian Cyberattacks</title>
    <itunes:summary><![CDATA[Send us Fan Mail Although discussing the military activities currently taking place in Iran runs the risk or bringing up polarizing political views, the cybersecurity realities simply can’t be ignored. And they absolutely have to be discussed.  One of these realities is that Iran has a legacy of supporting organizations involved with cyberattacks on networks, infrastructure and companies in Israel and the United States. Companies that utilize industrial control systems. Companies like yo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Although discussing the military activities currently taking place in Iran runs the risk or bringing up polarizing political views, the cybersecurity realities simply can’t be ignored. And they absolutely have to be discussed. </p><p>One of these realities is that Iran has a legacy of supporting organizations involved with cyberattacks on networks, infrastructure and companies in Israel and the United States. Companies that utilize industrial control systems. Companies like yours. </p><p>In light of current events, there is absolutely no question that these groups will escalate their efforts. Although the bombs are falling thousands of miles beyond U.S. borders, know that U.S. manufacturing is a primary target. </p><p>Historically, many of the groups carrying out these types of cyberattacks were hacktivists or outliers, operating independent of any government or country. They followed their own agenda in realizing personal or political goals. </p><p>However, as highlighted by the war in Ukraine, these groups have begun to pick sides. They’re embracing financial support from nation states and successfully executing attacks meant to shut down, steal data, extort money and/or disrupt critical production or infrastructure operations – regardless of size, sector or location. </p><p>Thankfully, there are also guys like our guest for today’s episode. JP Castellanos is the Director of Threat Intelligence at Binary Defense. Watch/listen as he discusses:</p><ul><li>The evolving hacktivist community and what recent events could mean for industrial cybersecurity.</li><li>How manufacturers can prepare and respond to an inevitable uptick in attacks.</li><li>How IT/OT silos perpetuate these attacks and make manufacturing a more lucrative and appealing target.</li><li>The motives and operational strategies of state-sponsored Iranian hacker groups.</li><li>The soft spots in your defenses that these groups take advantage of in targeting the industrial sector.</li><li>The simple solutions that can have far-reaching and extremely positive impacts on your defenses.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Although discussing the military activities currently taking place in Iran runs the risk or bringing up polarizing political views, the cybersecurity realities simply can’t be ignored. And they absolutely have to be discussed. </p><p>One of these realities is that Iran has a legacy of supporting organizations involved with cyberattacks on networks, infrastructure and companies in Israel and the United States. Companies that utilize industrial control systems. Companies like yours. </p><p>In light of current events, there is absolutely no question that these groups will escalate their efforts. Although the bombs are falling thousands of miles beyond U.S. borders, know that U.S. manufacturing is a primary target. </p><p>Historically, many of the groups carrying out these types of cyberattacks were hacktivists or outliers, operating independent of any government or country. They followed their own agenda in realizing personal or political goals. </p><p>However, as highlighted by the war in Ukraine, these groups have begun to pick sides. They’re embracing financial support from nation states and successfully executing attacks meant to shut down, steal data, extort money and/or disrupt critical production or infrastructure operations – regardless of size, sector or location. </p><p>Thankfully, there are also guys like our guest for today’s episode. JP Castellanos is the Director of Threat Intelligence at Binary Defense. Watch/listen as he discusses:</p><ul><li>The evolving hacktivist community and what recent events could mean for industrial cybersecurity.</li><li>How manufacturers can prepare and respond to an inevitable uptick in attacks.</li><li>How IT/OT silos perpetuate these attacks and make manufacturing a more lucrative and appealing target.</li><li>The motives and operational strategies of state-sponsored Iranian hacker groups.</li><li>The soft spots in your defenses that these groups take advantage of in targeting the industrial sector.</li><li>The simple solutions that can have far-reaching and extremely positive impacts on your defenses.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18791250-analyzing-responding-to-the-inevitable-uptick-in-iranian-cyberattacks.mp3" length="26539020" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xbuq9xe7nfwwux6fbjhls4ju7sch?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18791250</guid>
    <pubDate>Thu, 05 Mar 2026 08:00:00 -0500</pubDate>
    <itunes:duration>2198</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hybrid Warfare is Upon You</itunes:title>
    <title>Hybrid Warfare is Upon You</title>
    <itunes:summary><![CDATA[Send us Fan Mail Last December the Cybersecurity and Infrastructure Security Agency, or CISA, issued an advisory warning manufacturers, operators of critical infrastructure, and really anybody associated with industrial control systems about the threats being presented by pro-Russian hacktivist groups. The advisory, issued in conjunction with numerous federal and international agencies, called out groups like the Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057 and Sector16 for taking...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Last December the Cybersecurity and Infrastructure Security Agency, or CISA, issued an <a href='https://www.mbtmag.com/cybersecurity/blog/22956579/opportunistic-prorussia-hacktivists-attack-us-and-global-critical-infrastructure'>advisory</a> warning manufacturers, operators of critical infrastructure, and really anybody associated with industrial control systems about the threats being presented by pro-Russian hacktivist groups.</p><p><a href='https://www.mbtmag.com/cybersecurity/blog/22956579/opportunistic-prorussia-hacktivists-attack-us-and-global-critical-infrastructure'>The advisory</a>, issued in conjunction with numerous federal and international agencies, called out groups like the Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057 and Sector16 for taking advantage of insecure connection points and other vulnerabilities that allowed these state-sponsored actors to infiltrate, shut down, and ransom their targets in the United States.</p><p>Historically, many manufacturers would find it hard to believe that their mid-size business in the heartland of America would be on the radar of foreign terrorist groups, but as our guest for today’s episode explains, that is exactly the case.</p><p><a href='https://www.linkedin.com/in/william-james-dixon/?originalSubdomain=ch'>Will Dixon</a> is a senior executive of Government &amp; Law Enforcement at Intel 471 – a leading authority on the OT threat landscape. Watch/listen as he explains:</p><ul><li>How these group’s initial plans to disrupt water treatment and other critical infrastructure has evolved into the strategic targeting of the U.S. manufacturing sector.</li><li>Why hacktivist no longer applies to these &quot;strategically aligned state groups.&quot;</li><li>Why AI will not be as impactful for either side as many think.</li><li>How these groups are part of Russia&apos;s bigger plans against the West.</li><li>The important role vendors and suppliers can play in establishing cyber defenses.</li><li>The ongoing challenges of breaking down IT-OT silos, and how hackers are using this dynamic against you.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Last December the Cybersecurity and Infrastructure Security Agency, or CISA, issued an <a href='https://www.mbtmag.com/cybersecurity/blog/22956579/opportunistic-prorussia-hacktivists-attack-us-and-global-critical-infrastructure'>advisory</a> warning manufacturers, operators of critical infrastructure, and really anybody associated with industrial control systems about the threats being presented by pro-Russian hacktivist groups.</p><p><a href='https://www.mbtmag.com/cybersecurity/blog/22956579/opportunistic-prorussia-hacktivists-attack-us-and-global-critical-infrastructure'>The advisory</a>, issued in conjunction with numerous federal and international agencies, called out groups like the Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057 and Sector16 for taking advantage of insecure connection points and other vulnerabilities that allowed these state-sponsored actors to infiltrate, shut down, and ransom their targets in the United States.</p><p>Historically, many manufacturers would find it hard to believe that their mid-size business in the heartland of America would be on the radar of foreign terrorist groups, but as our guest for today’s episode explains, that is exactly the case.</p><p><a href='https://www.linkedin.com/in/william-james-dixon/?originalSubdomain=ch'>Will Dixon</a> is a senior executive of Government &amp; Law Enforcement at Intel 471 – a leading authority on the OT threat landscape. Watch/listen as he explains:</p><ul><li>How these group’s initial plans to disrupt water treatment and other critical infrastructure has evolved into the strategic targeting of the U.S. manufacturing sector.</li><li>Why hacktivist no longer applies to these &quot;strategically aligned state groups.&quot;</li><li>Why AI will not be as impactful for either side as many think.</li><li>How these groups are part of Russia&apos;s bigger plans against the West.</li><li>The important role vendors and suppliers can play in establishing cyber defenses.</li><li>The ongoing challenges of breaking down IT-OT silos, and how hackers are using this dynamic against you.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18706117-hybrid-warfare-is-upon-you.mp3" length="22891815" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pn8ehtcf9hsqojdgdmnuawtav4wu?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18706117</guid>
    <pubDate>Wed, 18 Feb 2026 16:00:00 -0500</pubDate>
    <itunes:duration>1894</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security Breach: Strengthening Your Weakest Links</itunes:title>
    <title>Security Breach: Strengthening Your Weakest Links</title>
    <itunes:summary><![CDATA[Send us Fan Mail When we talk about the challenges presented to those trying to secure the operational landscape of manufacturing, it’s tough to avoid what I’d call the usual suspects - endpoints, connection points, credentials, vulnerabilities, silos and, of course, the impact of artificial intelligence. And just as there are benefits to discussing these individual aspects, it’s equally important to look at things from a bigger picture in tying them all together. This not only helps us stren...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When we talk about the challenges presented to those trying to secure the operational landscape of manufacturing, it’s tough to avoid what I’d call the usual suspects - endpoints, connection points, credentials, vulnerabilities, silos and, of course, the impact of artificial intelligence.</p><p>And just as there are benefits to discussing these individual aspects, it’s equally important to look at things from a bigger picture in tying them all together. This not only helps us strengthen the chain, but appreciate the significance of reinforcing each of those links.</p><p>Perhaps no one has helped tie all of these different players together better than our guest for this episode. <a href='https://www.linkedin.com/in/vinoddsouza?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAbK9kBdXgu84SjTVCM8oBglvc_He52lWM&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BEyj4AH6WSRO1DyaA9OoqNg%3D%3D'>Vinod D’Souza</a> leads the manufacturing and industry vertical for Google Cloud’s Office of the CISO. Watch/listen as we discuss:</p><ul><li>Emerging vulnerabilities and response plans.</li><li>Segmentation challenges in the era of constant technological expansion.</li><li>New-age approaches to patching.</li><li>The connected fibers of artificial intelligence and the human factors of cybersecurity.</li><li>Addressing IT and OT silos.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When we talk about the challenges presented to those trying to secure the operational landscape of manufacturing, it’s tough to avoid what I’d call the usual suspects - endpoints, connection points, credentials, vulnerabilities, silos and, of course, the impact of artificial intelligence.</p><p>And just as there are benefits to discussing these individual aspects, it’s equally important to look at things from a bigger picture in tying them all together. This not only helps us strengthen the chain, but appreciate the significance of reinforcing each of those links.</p><p>Perhaps no one has helped tie all of these different players together better than our guest for this episode. <a href='https://www.linkedin.com/in/vinoddsouza?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAbK9kBdXgu84SjTVCM8oBglvc_He52lWM&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BEyj4AH6WSRO1DyaA9OoqNg%3D%3D'>Vinod D’Souza</a> leads the manufacturing and industry vertical for Google Cloud’s Office of the CISO. Watch/listen as we discuss:</p><ul><li>Emerging vulnerabilities and response plans.</li><li>Segmentation challenges in the era of constant technological expansion.</li><li>New-age approaches to patching.</li><li>The connected fibers of artificial intelligence and the human factors of cybersecurity.</li><li>Addressing IT and OT silos.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18620175-security-breach-strengthening-your-weakest-links.mp3" length="23900934" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fi6cmrpty43bicf5vsg51k5ah2n1?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18620175</guid>
    <pubDate>Thu, 05 Feb 2026 10:00:00 -0500</pubDate>
    <itunes:duration>1978</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Clarifying the Big-Picture Impacts of CMMC</itunes:title>
    <title>Clarifying the Big-Picture Impacts of CMMC</title>
    <itunes:summary><![CDATA[Send us Fan Mail Back in 2020, the Department of Defense, as it was called at the time, introduced the Cybersecurity Maturity Model Certification (CMMC). It carried the goal of ensuring companies would be able to protect sensitive information when working on government contracts.  The program requires contractors handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) to meet specified cybersecurity standards. Prior to CMMC, DoD contractors were required...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Back in 2020, the Department of Defense, as it was called at the time, introduced the Cybersecurity Maturity Model Certification<b> </b>(CMMC). It carried the goal of ensuring companies would be able to protect sensitive information when working on government contracts. </p><p>The program requires contractors handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) to meet specified cybersecurity standards. Prior to CMMC, DoD contractors were required to self-attest cybersecurity compliance with frameworks set up by the National Institute of Standards of Technology (NIST). </p><p>Fast forward to September 10 of last year and the Department of War as it’s now known, published an update to the CMMC – basically launching a three-year rollout of elevated cybersecurity requirements. </p><p>To help clarify some of the challenges and benefits associated with CMMC, I invited Mark Knight to the program. He&apos;s a Partner and Cybersecurity Risk Advisory Leader at Armanino. Listen as he offers:</p><ul><li>Details on what the updated CMMC is all about.</li><li>The challenges of meeting these new compliance standards.</li><li>Embracing the good and bad of government ambiguity in complying with CMMC.</li><li>The impact this certification could have on all manufacturers, regardless of whether or not you’re going after DOW contracts.</li><li>The good and bad of utilizing AI for compliance work.</li><li>How CMMC could spur M&amp;A activity within the cybersecurity tool sector.</li><li>The potential supply chain impacts of companies deciding against pursuing CMMC compliance.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Back in 2020, the Department of Defense, as it was called at the time, introduced the Cybersecurity Maturity Model Certification<b> </b>(CMMC). It carried the goal of ensuring companies would be able to protect sensitive information when working on government contracts. </p><p>The program requires contractors handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) to meet specified cybersecurity standards. Prior to CMMC, DoD contractors were required to self-attest cybersecurity compliance with frameworks set up by the National Institute of Standards of Technology (NIST). </p><p>Fast forward to September 10 of last year and the Department of War as it’s now known, published an update to the CMMC – basically launching a three-year rollout of elevated cybersecurity requirements. </p><p>To help clarify some of the challenges and benefits associated with CMMC, I invited Mark Knight to the program. He&apos;s a Partner and Cybersecurity Risk Advisory Leader at Armanino. Listen as he offers:</p><ul><li>Details on what the updated CMMC is all about.</li><li>The challenges of meeting these new compliance standards.</li><li>Embracing the good and bad of government ambiguity in complying with CMMC.</li><li>The impact this certification could have on all manufacturers, regardless of whether or not you’re going after DOW contracts.</li><li>The good and bad of utilizing AI for compliance work.</li><li>How CMMC could spur M&amp;A activity within the cybersecurity tool sector.</li><li>The potential supply chain impacts of companies deciding against pursuing CMMC compliance.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18549053-clarifying-the-big-picture-impacts-of-cmmc.mp3" length="29955374" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/t357gede4k1ois233k6bdpp87vz6?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18549053</guid>
    <pubDate>Thu, 22 Jan 2026 18:00:00 -0500</pubDate>
    <itunes:duration>2483</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Shiny Objects and the Power of Preparation</itunes:title>
    <title>Shiny Objects and the Power of Preparation</title>
    <itunes:summary><![CDATA[Send us Fan Mail "You don't have to get hacked to understand how you can get hacked." While I utilize that editorial director title to introduce myself before every episode of Security Breach, it’s not the title that I’ve used the longest, think about the most, or with which I would hope to obtain the most acclaim. Rather, the job descriptor that meets all those requirements is the title of ... Dad.  And perhaps the phrase most commonly utilized during my ongoing tenure in this position ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>&quot;You don&apos;t have to get hacked to understand how you can get hacked.&quot;</p><p>While I utilize that editorial director title to introduce myself before every episode of <em>Security Breach</em>, it’s not the title that I’ve used the longest, think about the most, or with which I would hope to obtain the most acclaim. Rather, the job descriptor that meets all those requirements is the title of ... Dad. </p><p>And perhaps the phrase most commonly utilized during my ongoing tenure in this position is some form of &quot;are you ready?&quot; </p><p>Whether it was preparing to push a swing, toss a pitch or start a car, inquiring as to the state of my daughter’s readiness was always the first, most important, and yet most basic action I took. </p><p>I was reminded of this when speaking with our guest for this episode, Itzik Kotler, the co-founder and CTO of SafeBreach. While our conversation took us down a number of paths in discussing “shiny objects”, the problems with silos, and the evolution of hackers, he kept coming back to the basics, or what I like to constantly describe as the blocking and tackling of cybersecurity.</p><p>At the heart of the focus on the basics is taking steps to be prepared for when, not if, you’re targeted by hackers. </p><p>So, if you&apos;re ready, listen as we discuss:</p><ul><li>Why every manufacturer is either a target or connected to a bigger target via their supply chain connections.</li><li>The lure of &quot;shiny objects&quot;, and how they can distract from the best approaches to cybersecurity upgrades.</li><li>How hackers are exploiting the complexities of your environment.</li><li>Why security strategies need to start with understanding what is truly at risk, and what level of risk is acceptable.</li><li>The growing need for detection engineering.</li><li>Evolving your enterprise in realizing that &quot;hackers don&apos;t work in silos.&quot;</li><li>The role AI can play in addressing alert fatigue.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>&quot;You don&apos;t have to get hacked to understand how you can get hacked.&quot;</p><p>While I utilize that editorial director title to introduce myself before every episode of <em>Security Breach</em>, it’s not the title that I’ve used the longest, think about the most, or with which I would hope to obtain the most acclaim. Rather, the job descriptor that meets all those requirements is the title of ... Dad. </p><p>And perhaps the phrase most commonly utilized during my ongoing tenure in this position is some form of &quot;are you ready?&quot; </p><p>Whether it was preparing to push a swing, toss a pitch or start a car, inquiring as to the state of my daughter’s readiness was always the first, most important, and yet most basic action I took. </p><p>I was reminded of this when speaking with our guest for this episode, Itzik Kotler, the co-founder and CTO of SafeBreach. While our conversation took us down a number of paths in discussing “shiny objects”, the problems with silos, and the evolution of hackers, he kept coming back to the basics, or what I like to constantly describe as the blocking and tackling of cybersecurity.</p><p>At the heart of the focus on the basics is taking steps to be prepared for when, not if, you’re targeted by hackers. </p><p>So, if you&apos;re ready, listen as we discuss:</p><ul><li>Why every manufacturer is either a target or connected to a bigger target via their supply chain connections.</li><li>The lure of &quot;shiny objects&quot;, and how they can distract from the best approaches to cybersecurity upgrades.</li><li>How hackers are exploiting the complexities of your environment.</li><li>Why security strategies need to start with understanding what is truly at risk, and what level of risk is acceptable.</li><li>The growing need for detection engineering.</li><li>Evolving your enterprise in realizing that &quot;hackers don&apos;t work in silos.&quot;</li><li>The role AI can play in addressing alert fatigue.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18471173-shiny-objects-and-the-power-of-preparation.mp3" length="32108096" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1ejwc92sgq0yx5kcz4fguq6adlkc?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18471173</guid>
    <pubDate>Fri, 09 Jan 2026 11:00:00 -0500</pubDate>
    <itunes:duration>2662</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>You Don&#39;t Have to Out-Tech the Hacker</itunes:title>
    <title>You Don&#39;t Have to Out-Tech the Hacker</title>
    <itunes:summary><![CDATA[Send us Fan Mail We’ve all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I’ve referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for today’s episode. Evan Dornbush is the CEO of Desired Effect. A former DoD-trained state hacker, he’s now working with cyber researchers to help p...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We’ve all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I’ve referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for today’s episode.</p><p>Evan Dornbush is the CEO of Desired Effect. A former DoD-trained state hacker, he’s now working with cyber researchers to help promote their findings and get the vulnerabilities they detect into the hands of the software, network or equipment suppliers before hackers can leverage these findings, and wreak havoc on industrial control systems and production workflows. </p><p>Listen as we discuss this strategy, as well:</p><ul><li>How to define roles and responsibilities in pushing Secure-by-Design initiatives forward.</li><li>Why manufactures shouldn&apos;t look to out-tech the hacker.</li><li>Strategies to help defenders from having to keep playing catch-up.</li><li>How cybersecurity can be utilized as an operational tool.</li><li>The ongoing challenges created by Zero Day vulnerabilities.</li><li>Creating a culture that goes beyond just &quot;spending for the cyber nerd.&quot;</li><li>New ways to calculate ROI in advancing cybersecurity priorities.</li><li>The cost benefits of investing in cyber talent.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We’ve all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I’ve referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for today’s episode.</p><p>Evan Dornbush is the CEO of Desired Effect. A former DoD-trained state hacker, he’s now working with cyber researchers to help promote their findings and get the vulnerabilities they detect into the hands of the software, network or equipment suppliers before hackers can leverage these findings, and wreak havoc on industrial control systems and production workflows. </p><p>Listen as we discuss this strategy, as well:</p><ul><li>How to define roles and responsibilities in pushing Secure-by-Design initiatives forward.</li><li>Why manufactures shouldn&apos;t look to out-tech the hacker.</li><li>Strategies to help defenders from having to keep playing catch-up.</li><li>How cybersecurity can be utilized as an operational tool.</li><li>The ongoing challenges created by Zero Day vulnerabilities.</li><li>Creating a culture that goes beyond just &quot;spending for the cyber nerd.&quot;</li><li>New ways to calculate ROI in advancing cybersecurity priorities.</li><li>The cost benefits of investing in cyber talent.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18367016-you-don-t-have-to-out-tech-the-hacker.mp3" length="29619479" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7tbce8e1lifhrb4tbxkpf7xwfmrj?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18367016</guid>
    <pubDate>Fri, 19 Dec 2025 10:00:00 -0500</pubDate>
    <itunes:duration>2455</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Speaking the Right Language</itunes:title>
    <title>Speaking the Right Language</title>
    <itunes:summary><![CDATA[Send us Fan Mail Perhaps you’re familiar with the quote, “The greatest trick the Devil ever pulled was convincing the world he didn’t exist.” While its use in the movie The Usual Suspects might resonate with most, the original attribution goes to French poet Charles Baudelaire. The quote came to mind in preparing for my conversation with Tim Chase, Principal Technical Evangelist for Orca Security. I knew we were going to be discussing topics where the biggest implementation challenges typical...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Perhaps you’re familiar with the quote, “The greatest trick the Devil ever pulled was convincing the world he didn’t exist.” While its use in the movie <em>The Usual Suspects</em> might resonate with most, the original attribution goes to French poet Charles Baudelaire.</p><p>The quote came to mind in preparing for my conversation with Tim Chase, Principal Technical Evangelist for Orca Security. I knew we were going to be discussing topics where the biggest implementation challenges typically resonate from OT asset owners who don’t see the need to address these topics.</p><p>Or, with all due respect to Baudelaire, the greatest trick hackers ever pulled was convincing the industrial sector that they didn’t care.</p><p>The good news is that folks like Tim are aware of these situations, and working to offer some new solutions. Watch/listen as we discuss:</p><ul><li>How vital it is to define security responsibilities.</li><li>The growing need for cloud security education.</li><li>Why a top-down approach is vital for creating a security-focused culture.</li><li>The benefits of creating internal security champions.</li><li>The annoying, but growing significance of SBOMs.</li><li>Combatting alert fatigue.</li><li>The biggest challenges AI is creating for cybersecurity.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Perhaps you’re familiar with the quote, “The greatest trick the Devil ever pulled was convincing the world he didn’t exist.” While its use in the movie <em>The Usual Suspects</em> might resonate with most, the original attribution goes to French poet Charles Baudelaire.</p><p>The quote came to mind in preparing for my conversation with Tim Chase, Principal Technical Evangelist for Orca Security. I knew we were going to be discussing topics where the biggest implementation challenges typically resonate from OT asset owners who don’t see the need to address these topics.</p><p>Or, with all due respect to Baudelaire, the greatest trick hackers ever pulled was convincing the industrial sector that they didn’t care.</p><p>The good news is that folks like Tim are aware of these situations, and working to offer some new solutions. Watch/listen as we discuss:</p><ul><li>How vital it is to define security responsibilities.</li><li>The growing need for cloud security education.</li><li>Why a top-down approach is vital for creating a security-focused culture.</li><li>The benefits of creating internal security champions.</li><li>The annoying, but growing significance of SBOMs.</li><li>Combatting alert fatigue.</li><li>The biggest challenges AI is creating for cybersecurity.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18278665-speaking-the-right-language.mp3" length="33748624" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/n8oskm88thgijd9dlhbocfwmn8bs?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18278665</guid>
    <pubDate>Thu, 04 Dec 2025 14:00:00 -0500</pubDate>
    <itunes:duration>2799</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why People Are Not the Biggest Risk</itunes:title>
    <title>Why People Are Not the Biggest Risk</title>
    <itunes:summary><![CDATA[Send us Fan Mail While I’ll resist drawing comparisons about industrial cybersecurity to butterflies and bees, producing this episode did remind me of another great Muhammad Ali quote: "The hands can't hit what the eyes can't see.” This could provide an easy segue into the ongoing challenges about asset visibility, but really, it goes a bit deeper than that. In addition to being able to see all the things we need to defend against, we also have to understand what to look for in establishing t...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While I’ll resist drawing comparisons about industrial cybersecurity to butterflies and bees, producing this episode did remind me of another great Muhammad Ali quote: &quot;The hands can&apos;t hit what the eyes can&apos;t see.”</p><p>This could provide an easy segue into the ongoing challenges about asset visibility, but really, it goes a bit deeper than that. In addition to being able to see all the things we need to defend against, we also have to understand what to look for in establishing those defenses. </p><p>In this episode, we discuss  these challenges and solutions with Bryson Bort, the founder and CEO of SCYTHE, a leading provider of Adversarial Exposure Validation (AEV) solutions. Watch/listen as we also discuss:</p><ul><li>The increasing impact of hacktivists.</li><li>The rise of ransomware gangs.</li><li>What AEV is all about.</li><li>Why there is no such thing as an accidental hack.</li><li>The human impact on cybersecurity and why it is rarely the human&apos;s fault.</li><li>How his former military life has impacted his cybersecurity career.</li><li>Why supply chains could be the most important threat landscape going forward.</li></ul><p>To check out the work he and his colleagues are up to, you can go to <a href='https://scythe.io/'>scythe.io</a>, as well as<a href='https://www.icsvillage.com/'> icsvillage.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While I’ll resist drawing comparisons about industrial cybersecurity to butterflies and bees, producing this episode did remind me of another great Muhammad Ali quote: &quot;The hands can&apos;t hit what the eyes can&apos;t see.”</p><p>This could provide an easy segue into the ongoing challenges about asset visibility, but really, it goes a bit deeper than that. In addition to being able to see all the things we need to defend against, we also have to understand what to look for in establishing those defenses. </p><p>In this episode, we discuss  these challenges and solutions with Bryson Bort, the founder and CEO of SCYTHE, a leading provider of Adversarial Exposure Validation (AEV) solutions. Watch/listen as we also discuss:</p><ul><li>The increasing impact of hacktivists.</li><li>The rise of ransomware gangs.</li><li>What AEV is all about.</li><li>Why there is no such thing as an accidental hack.</li><li>The human impact on cybersecurity and why it is rarely the human&apos;s fault.</li><li>How his former military life has impacted his cybersecurity career.</li><li>Why supply chains could be the most important threat landscape going forward.</li></ul><p>To check out the work he and his colleagues are up to, you can go to <a href='https://scythe.io/'>scythe.io</a>, as well as<a href='https://www.icsvillage.com/'> icsvillage.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18177558-why-people-are-not-the-biggest-risk.mp3" length="35483724" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i12v4ra8dp3wl3f0hhpm3slbgfeb?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18177558</guid>
    <pubDate>Fri, 14 Nov 2025 11:00:00 -0500</pubDate>
    <itunes:duration>2943</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Preserving Uptime in the Face of Evolving Attacks</itunes:title>
    <title>Preserving Uptime in the Face of Evolving Attacks</title>
    <itunes:summary><![CDATA[Send us Fan Mail Uptime.  It’s the lifeblood of manufacturing and the precise target of industrial sector hackers. By knocking systems offline, stealing credentials, holding data for ransom, or crippling supply chains, the bad guys know their ultimate goals of disruption or extortion will be realized. And as we’ve discussed numerous times here on Security Breach, keeping these bad actors out has become more and more difficult as new technology, connectivity and endpoints are added to the...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Uptime. </p><p>It’s the lifeblood of manufacturing and the precise target of industrial sector hackers. By knocking systems offline, stealing credentials, holding data for ransom, or crippling supply chains, the bad guys know their ultimate goals of disruption or extortion will be realized.</p><p>And as we’ve discussed numerous times here on <a href='https://www.mbtmag.com/podcast'><em>Security Breach</em></a>, keeping these bad actors out has become more and more difficult as new technology, connectivity and endpoints are added to the OT landscape.</p><p>Hackers are getting smarter and more complex, but the good news is so are the tools and strategies for the good guys. Here to offer some perspective on dealing with the leading threats targeting the people, systems and data of the industrial sector is a collection of experts focused on minimizing disruptions and preparing you to react and respond to cyberattacks.</p><p>Watch/listen as:</p><ul><li>Max Clausen, senior VP of Network Connectivity at Zayo dives into the factors and strategies driving DDoS or distributed denial of service attacks.</li><li>John Carse, Field CISO at SquareX discusses the ongoing impact of developing and legacy vulnerabilities, as well as some of the novel strategies hackers are using to introduce new strands of highly disruptive malware.</li><li>Amit Hammer, CEO of Salvador Tech talks about lessons learned from the recent <a href='https://www.mbtmag.com/cybersecurity/news/22951773/jaguar-land-rover-faces-real-danger-during-manufacturing-restart'>Jaguar Land Rover</a> attack and how response strategies will continue to play a key role in minimizing attack-related downtime.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Uptime. </p><p>It’s the lifeblood of manufacturing and the precise target of industrial sector hackers. By knocking systems offline, stealing credentials, holding data for ransom, or crippling supply chains, the bad guys know their ultimate goals of disruption or extortion will be realized.</p><p>And as we’ve discussed numerous times here on <a href='https://www.mbtmag.com/podcast'><em>Security Breach</em></a>, keeping these bad actors out has become more and more difficult as new technology, connectivity and endpoints are added to the OT landscape.</p><p>Hackers are getting smarter and more complex, but the good news is so are the tools and strategies for the good guys. Here to offer some perspective on dealing with the leading threats targeting the people, systems and data of the industrial sector is a collection of experts focused on minimizing disruptions and preparing you to react and respond to cyberattacks.</p><p>Watch/listen as:</p><ul><li>Max Clausen, senior VP of Network Connectivity at Zayo dives into the factors and strategies driving DDoS or distributed denial of service attacks.</li><li>John Carse, Field CISO at SquareX discusses the ongoing impact of developing and legacy vulnerabilities, as well as some of the novel strategies hackers are using to introduce new strands of highly disruptive malware.</li><li>Amit Hammer, CEO of Salvador Tech talks about lessons learned from the recent <a href='https://www.mbtmag.com/cybersecurity/news/22951773/jaguar-land-rover-faces-real-danger-during-manufacturing-restart'>Jaguar Land Rover</a> attack and how response strategies will continue to play a key role in minimizing attack-related downtime.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18107553-preserving-uptime-in-the-face-of-evolving-attacks.mp3" length="22533904" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/v2o6kpnb5mso2r0u2wuj27x22jrl?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18107553</guid>
    <pubDate>Fri, 31 Oct 2025 09:00:00 -0400</pubDate>
    <itunes:duration>1865</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>New Patching Strategies for Old Vulnerabilities</itunes:title>
    <title>New Patching Strategies for Old Vulnerabilities</title>
    <itunes:summary><![CDATA[Send us Fan Mail While there are plenty to pick from, one of the biggest challenges for cybersecurity professionals in the industrial realm can be getting financial support. In manufacturing there are always a number of viable spending options, and working to make cybersecurity a priority can be tough, especially when enterprises are faced with initiatives seen as more fundamental to the core mission of getting finished product out the door. However, a couple of recent reports could help conn...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While there are plenty to pick from, one of the biggest challenges for cybersecurity professionals in the industrial realm can be getting financial support. In manufacturing there are always a number of viable spending options, and working to make cybersecurity a priority can be tough, especially when enterprises are faced with initiatives seen as more fundamental to the core mission of getting finished product out the door.</p><p>However, a couple of recent reports could help connect the dots between production and security, and the need to fund both.</p><p>First, there’s Adaptiva’s <em>State of Patch Management Report</em> that found 75 percent of manufacturing companies have critical vulnerabilities with a CVSS score of 8 or higher, and 65 percent have at least one vulnerability listed in the CISA Known Exploited Vulnerabilities Catalog. So, hackers know about these weaknesses and they’re taking advantage of them.</p><p>And, according to Black Kite’s <em>2025 Manufacturing Report</em>, 51 percent of those surveyed indicate that patching has become a bigger challenge than intrusion detection, and more than 75 percent indicate that both IT and security must approve patches before deployment.</p><p>Reading between the lines – patching takes too long and is too complicated, so the vulnerabilities persist and the hackers keep winning.</p><p>Watch/listen as we discuss these and other topics with Chaz Spahn, the Director of Product Management at Adaptiva. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While there are plenty to pick from, one of the biggest challenges for cybersecurity professionals in the industrial realm can be getting financial support. In manufacturing there are always a number of viable spending options, and working to make cybersecurity a priority can be tough, especially when enterprises are faced with initiatives seen as more fundamental to the core mission of getting finished product out the door.</p><p>However, a couple of recent reports could help connect the dots between production and security, and the need to fund both.</p><p>First, there’s Adaptiva’s <em>State of Patch Management Report</em> that found 75 percent of manufacturing companies have critical vulnerabilities with a CVSS score of 8 or higher, and 65 percent have at least one vulnerability listed in the CISA Known Exploited Vulnerabilities Catalog. So, hackers know about these weaknesses and they’re taking advantage of them.</p><p>And, according to Black Kite’s <em>2025 Manufacturing Report</em>, 51 percent of those surveyed indicate that patching has become a bigger challenge than intrusion detection, and more than 75 percent indicate that both IT and security must approve patches before deployment.</p><p>Reading between the lines – patching takes too long and is too complicated, so the vulnerabilities persist and the hackers keep winning.</p><p>Watch/listen as we discuss these and other topics with Chaz Spahn, the Director of Product Management at Adaptiva. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/18022614-new-patching-strategies-for-old-vulnerabilities.mp3" length="19026575" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/oxoh6xysgz17rbmcdem70lw9g7nq?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18022614</guid>
    <pubDate>Thu, 16 Oct 2025 16:00:00 -0400</pubDate>
    <itunes:duration>1572</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Wild &amp; Weird of Industrial Cybersecurity</itunes:title>
    <title>The Wild &amp; Weird of Industrial Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail When talking to the experts and leading authorities that have participated in the 140+ episodes of Security Breach, there’s always a slight pause when directing their attention specifically to the industrial sector. That’s because, well, we’re special.  There’s the unique juxtaposition of old and bleeding edge technology.  There’s the influx of greater connectivity combatting the struggles to identify and secure the growing number of endpoints.  And there are t...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When talking to the experts and leading authorities that have participated in the 140+ episodes of <em>Security Breach</em>, there’s always a slight pause when directing their attention specifically to the industrial sector. That’s because, well, we’re special. </p><p>There’s the unique juxtaposition of old and bleeding edge technology. </p><p>There’s the influx of greater connectivity combatting the struggles to identify and secure the growing number of endpoints. </p><p>And there are the ongoing battles related to secure-by-design responsibilities, cloud networks and the ever popular building and breaking down of IT/OT silos. </p><p>The good news is that we’re getting better. Better at identifying the problems and better at elevating solutions from some of the sharpest minds in the sector. And we’re fortunate to be able share these insights from an incredible collective on today’s episode.</p><p>Watch/listen as Max Clausen, senior VP of Network Connectivity at Zayo, John Carse, Field CISO at SquareX, Sophos’ Chester Wisniewski and ExtraHop’s Chad Lemaire tackle topics that include:</p><ul><li>Visibility</li><li>Secure-by-Design</li><li>Artificial Intelligence</li><li>IT/OT Silos</li><li>Patching</li><li>LOTL and Phishing Attacks</li><li>Non-standard OT Architecture</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When talking to the experts and leading authorities that have participated in the 140+ episodes of <em>Security Breach</em>, there’s always a slight pause when directing their attention specifically to the industrial sector. That’s because, well, we’re special. </p><p>There’s the unique juxtaposition of old and bleeding edge technology. </p><p>There’s the influx of greater connectivity combatting the struggles to identify and secure the growing number of endpoints. </p><p>And there are the ongoing battles related to secure-by-design responsibilities, cloud networks and the ever popular building and breaking down of IT/OT silos. </p><p>The good news is that we’re getting better. Better at identifying the problems and better at elevating solutions from some of the sharpest minds in the sector. And we’re fortunate to be able share these insights from an incredible collective on today’s episode.</p><p>Watch/listen as Max Clausen, senior VP of Network Connectivity at Zayo, John Carse, Field CISO at SquareX, Sophos’ Chester Wisniewski and ExtraHop’s Chad Lemaire tackle topics that include:</p><ul><li>Visibility</li><li>Secure-by-Design</li><li>Artificial Intelligence</li><li>IT/OT Silos</li><li>Patching</li><li>LOTL and Phishing Attacks</li><li>Non-standard OT Architecture</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17941752-the-wild-weird-of-industrial-cybersecurity.mp3" length="22162476" type="audio/mpeg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17941752</guid>
    <pubDate>Fri, 03 Oct 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1833</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Using AI to Stay Ahead of the Hack</itunes:title>
    <title>Using AI to Stay Ahead of the Hack</title>
    <itunes:summary><![CDATA[Send us Fan Mail I know that we’re constantly talking about artificial intelligence - the best ways to use it, the ways hackers are using it, and the overall good, bad and ugly of implementing AI into your security infrastructure. But what if we took a little different route. In this episode we're going to explore how AI can help make your people better at managing cybersecurity. We know there’s a huge talent pool shortage, and the challenges of keeping employees vigilant against repeated att...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>I know that we’re constantly talking about artificial intelligence - the best ways to use it, the ways hackers are using it, and the overall good, bad and ugly of implementing AI into your security infrastructure.</p><p>But what if we took a little different route.</p><p>In this episode we&apos;re going to explore how AI can help make your people better at managing cybersecurity. We know there’s a huge talent pool shortage, and the challenges of keeping employees vigilant against repeated attacks continues to grow.</p><p>So, watch/listen as I explore these dynamics, well as many others, with Grant Oviatt - Head of Security Operations for <a href='https://www.prophetsecurity.ai'>Prophet Security</a> – a company that recently unveiled their <em>State of AI in SecOps 2025</em> research report. A lot of the data from the report was rather shocking, especially when the survey repeatedly uncovered how many SOCs, inundated with constant intrusion alerts, have experienced numerous breaches simply because the volume of critical alert notifications has made them easier to ignore.</p><p>It was a great conversation, with numerous takeaways, including:</p><ul><li>Why 60 percent of security teams have experienced critical breaches stemming from overlooked alerts.</li><li>How security leaders anticipate AI solutions handling more tasks within the SOC over the next 3 years.</li><li>Reasons for 57 percent of organizations deliberately suppressing detection rules and accepting higher risks to keep operations moving.</li><li>How hackers are using AI beyond just phishing campaigns to get access to critical assets and networks.</li><li>How the industrial sector can better implement AI without yielding to internal pressures.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>I know that we’re constantly talking about artificial intelligence - the best ways to use it, the ways hackers are using it, and the overall good, bad and ugly of implementing AI into your security infrastructure.</p><p>But what if we took a little different route.</p><p>In this episode we&apos;re going to explore how AI can help make your people better at managing cybersecurity. We know there’s a huge talent pool shortage, and the challenges of keeping employees vigilant against repeated attacks continues to grow.</p><p>So, watch/listen as I explore these dynamics, well as many others, with Grant Oviatt - Head of Security Operations for <a href='https://www.prophetsecurity.ai'>Prophet Security</a> – a company that recently unveiled their <em>State of AI in SecOps 2025</em> research report. A lot of the data from the report was rather shocking, especially when the survey repeatedly uncovered how many SOCs, inundated with constant intrusion alerts, have experienced numerous breaches simply because the volume of critical alert notifications has made them easier to ignore.</p><p>It was a great conversation, with numerous takeaways, including:</p><ul><li>Why 60 percent of security teams have experienced critical breaches stemming from overlooked alerts.</li><li>How security leaders anticipate AI solutions handling more tasks within the SOC over the next 3 years.</li><li>Reasons for 57 percent of organizations deliberately suppressing detection rules and accepting higher risks to keep operations moving.</li><li>How hackers are using AI beyond just phishing campaigns to get access to critical assets and networks.</li><li>How the industrial sector can better implement AI without yielding to internal pressures.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17855700-using-ai-to-stay-ahead-of-the-hack.mp3" length="22968065" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mbv9neagy5pbbek2qo4x9gmwxyru?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17855700</guid>
    <pubDate>Thu, 18 Sep 2025 14:00:00 -0400</pubDate>
    <itunes:duration>1901</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Threat Landscape Update</itunes:title>
    <title>Threat Landscape Update</title>
    <itunes:summary><![CDATA[Send us Fan Mail Discussing the ever-expanding threat landscape is something we do a lot on Security Breach, but this episode is dedicated exclusively to topics like zero-day vulnerabilities, nation-state threats, phishing schemes, ransomware, and of course, the role artificial intelligence continues to play in making the good guys smarter and the bad guys tougher to pin down. But we’re not doing to dwell on the doom and gloom, we’ll also touch on the growing number of solutions and strategie...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Discussing the ever-expanding threat landscape is something we do a lot on <em>Security Breach</em>, but this episode is dedicated exclusively to topics like zero-day vulnerabilities, nation-state threats, phishing schemes, ransomware, and of course, the role artificial intelligence continues to play in making the good guys smarter and the bad guys tougher to pin down.</p><p>But we’re not doing to dwell on the doom and gloom, we’ll also touch on the growing number of solutions and strategies that can help ensure your OT environment is as secure as possible.</p><p>To help guide us on this journey, we’ll first hear from Chad LeMaire at ExtraHop, followed by Chester (Chet) Wisniewski at Sophos. Watch/listen as we discuss:</p><ul><li>Llegacy and human-based vulnerabilities.</li><li>Ransomware.</li><li>Deepfakes.</li><li>Patch management.</li><li>Supply chain defenses.</li><li>Social engineering ploys.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Discussing the ever-expanding threat landscape is something we do a lot on <em>Security Breach</em>, but this episode is dedicated exclusively to topics like zero-day vulnerabilities, nation-state threats, phishing schemes, ransomware, and of course, the role artificial intelligence continues to play in making the good guys smarter and the bad guys tougher to pin down.</p><p>But we’re not doing to dwell on the doom and gloom, we’ll also touch on the growing number of solutions and strategies that can help ensure your OT environment is as secure as possible.</p><p>To help guide us on this journey, we’ll first hear from Chad LeMaire at ExtraHop, followed by Chester (Chet) Wisniewski at Sophos. Watch/listen as we discuss:</p><ul><li>Llegacy and human-based vulnerabilities.</li><li>Ransomware.</li><li>Deepfakes.</li><li>Patch management.</li><li>Supply chain defenses.</li><li>Social engineering ploys.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17789742-threat-landscape-update.mp3" length="35848718" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5zn9f00m4y0w3crval8ald1h48d7?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17789742</guid>
    <pubDate>Fri, 05 Sep 2025 12:00:00 -0400</pubDate>
    <itunes:duration>2972</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cure Me or Kill Me - The Little Things That Escalate Attacks</itunes:title>
    <title>Cure Me or Kill Me - The Little Things That Escalate Attacks</title>
    <itunes:summary><![CDATA[Send us Fan Mail As loyal listeners of this podcast know, I’m a big believer in paying close attention to the little things, the blocking and tackling, the basics, the fundamentals. All those elementary elements that comprise the building blocks of stronger cybersecurity plans and successful defensive strategies.  Spoiler alert – that comes through again … and again in this episode, but what makes it worth your time is how my guest, Jesper Sønderby Andersen, the Global Head of Customer S...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As loyal listeners of this podcast know, I’m a big believer in paying close attention to the little things, the blocking and tackling, the basics, the fundamentals. All those elementary elements that comprise the building blocks of stronger cybersecurity plans and successful defensive strategies. </p><p>Spoiler alert – that comes through again … and again in this episode, but what makes it worth your time is how my guest, Jesper Sønderby Andersen, the Global Head of Customer Success at Secomea, goes beyond just discussing how all these little things can both kill and cure you cyber defenses, but how they all should fit together. </p><p>If you’ll allow me to channel a childhood hero, Hannibal Smith from TV’s <em>The A-Team</em>, it’s not just about the plan, but how it comes together. Listen as Jesper and I discuss:</p><ul><li>How football coach Bill Belichick influenced his cybersecurity philosophy.</li><li>The growing importance of breaking down silos in establishing accountability for remote access management.</li><li>Why IT approaches do not work in OT.</li><li>The similar and unique challenges of managing remote access with employees and vendors.</li><li>Why proper segmentation strategies are vital, but must start with asset visibility and a true understanding of your crown jewels.</li><li>How attacks are continuing to increase due to the &quot;little stuff&quot; that goes unprotected, and why AI will help escalate the severity and success of these hacks.</li><li>Why Jesper believes larger attacks will be felt from supply chain vulnerabilities.</li><li>Reinforcing the competitive advantages of investing in cybersecurity.</li><li>The importance of being a tool and technology enabler to improve security.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As loyal listeners of this podcast know, I’m a big believer in paying close attention to the little things, the blocking and tackling, the basics, the fundamentals. All those elementary elements that comprise the building blocks of stronger cybersecurity plans and successful defensive strategies. </p><p>Spoiler alert – that comes through again … and again in this episode, but what makes it worth your time is how my guest, Jesper Sønderby Andersen, the Global Head of Customer Success at Secomea, goes beyond just discussing how all these little things can both kill and cure you cyber defenses, but how they all should fit together. </p><p>If you’ll allow me to channel a childhood hero, Hannibal Smith from TV’s <em>The A-Team</em>, it’s not just about the plan, but how it comes together. Listen as Jesper and I discuss:</p><ul><li>How football coach Bill Belichick influenced his cybersecurity philosophy.</li><li>The growing importance of breaking down silos in establishing accountability for remote access management.</li><li>Why IT approaches do not work in OT.</li><li>The similar and unique challenges of managing remote access with employees and vendors.</li><li>Why proper segmentation strategies are vital, but must start with asset visibility and a true understanding of your crown jewels.</li><li>How attacks are continuing to increase due to the &quot;little stuff&quot; that goes unprotected, and why AI will help escalate the severity and success of these hacks.</li><li>Why Jesper believes larger attacks will be felt from supply chain vulnerabilities.</li><li>Reinforcing the competitive advantages of investing in cybersecurity.</li><li>The importance of being a tool and technology enabler to improve security.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17706755-cure-me-or-kill-me-the-little-things-that-escalate-attacks.mp3" length="31338715" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hyvzlj3b2frjruac3a64ocr1o2yt?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17706755</guid>
    <pubDate>Thu, 21 Aug 2025 18:00:00 -0400</pubDate>
    <itunes:duration>2598</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Being &#39;Proactively Paranoid, Not Paralyzed&#39;</itunes:title>
    <title>Being &#39;Proactively Paranoid, Not Paralyzed&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail As all of you know, there are no silver bullets when it comes to cybersecurity success in the industrial sector. Every enterprise has its own unique characteristics, each plant floor its different connectivity elements, and each business is comprised of diverse human dynamics that fuel its culture.  However, regardless of the environment, there continues to be a handful of best practices that can be universally applied. As I journey across the cybersecurity realm, one of...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As all of you know, there are no silver bullets when it comes to cybersecurity success in the industrial sector. Every enterprise has its own unique characteristics, each plant floor its different connectivity elements, and each business is comprised of diverse human dynamics that fuel its culture. </p><p>However, regardless of the environment, there continues to be a handful of best practices that can be universally applied. As I journey across the cybersecurity realm, one of these reoccurring themes is avoiding that urge to “eat the elephant” or “drink the ocean” when implementing cybersecurity strategies. </p><p>Rather, the thought process is to set priorities and check things off as you go. Our guest for this episode mentioned this numerous times, whether it comes to responding to an increasingly complex collection of threat actors, or tackling the right uses of artificial intelligence.</p><p>Watch/listen as we discuss a number of topics with Casey Ellis, Founder and Chief Strategy Officer of BugCrowd, including:</p><ul><li>The very real threat of IABs (initial access brokers) and state-sponsored hackers.</li><li>How his organization works to reinforce why it&apos;s cool to be a White Hat.</li><li>How thinking like a criminal helps improve defenses through penetration testing and other exercises.</li><li>Developing strategies that prioritize resilience over perfection.</li><li>Integrating new technologies with patching in mind.</li><li>Using AI to develop faster response times and focusing on &quot;which part of the elephant to eat first,&quot; instead of doing &quot;stupid stuff&quot; because of the pressure to implement it.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As all of you know, there are no silver bullets when it comes to cybersecurity success in the industrial sector. Every enterprise has its own unique characteristics, each plant floor its different connectivity elements, and each business is comprised of diverse human dynamics that fuel its culture. </p><p>However, regardless of the environment, there continues to be a handful of best practices that can be universally applied. As I journey across the cybersecurity realm, one of these reoccurring themes is avoiding that urge to “eat the elephant” or “drink the ocean” when implementing cybersecurity strategies. </p><p>Rather, the thought process is to set priorities and check things off as you go. Our guest for this episode mentioned this numerous times, whether it comes to responding to an increasingly complex collection of threat actors, or tackling the right uses of artificial intelligence.</p><p>Watch/listen as we discuss a number of topics with Casey Ellis, Founder and Chief Strategy Officer of BugCrowd, including:</p><ul><li>The very real threat of IABs (initial access brokers) and state-sponsored hackers.</li><li>How his organization works to reinforce why it&apos;s cool to be a White Hat.</li><li>How thinking like a criminal helps improve defenses through penetration testing and other exercises.</li><li>Developing strategies that prioritize resilience over perfection.</li><li>Integrating new technologies with patching in mind.</li><li>Using AI to develop faster response times and focusing on &quot;which part of the elephant to eat first,&quot; instead of doing &quot;stupid stuff&quot; because of the pressure to implement it.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17618981-being-proactively-paranoid-not-paralyzed.mp3" length="26729901" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6fc69pv98hmzcisqcfjj90y47i4x?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17618981</guid>
    <pubDate>Fri, 08 Aug 2025 13:00:00 -0400</pubDate>
    <itunes:duration>2214</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why More Hackers Are Logging On Than Breaking In</itunes:title>
    <title>Why More Hackers Are Logging On Than Breaking In</title>
    <itunes:summary><![CDATA[Send us Fan Mail We’ve heard it before – hacker tactics are not changing, but the hackers are getting a lot smarter in how they deploy their time-tested attacks. Additionally, honing in on the human element of cybersecurity is nothing new. We’ve spoken with numerous guests about getting buy-in, improving training, and how creating a cyber-receptive culture is key in getting any cybersecurity plan to stick. But Dave Taku, Head of Product Management and User Experience at RSA, and our guest for...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We’ve heard it before – hacker tactics are not changing, but the hackers are getting a lot smarter in how they deploy their time-tested attacks.</p><p>Additionally, honing in on the human element of cybersecurity is nothing new. We’ve spoken with numerous guests about getting buy-in, improving training, and how creating a cyber-receptive culture is key in getting any cybersecurity plan to stick.</p><p>But Dave Taku, Head of Product Management and User Experience at <a href='https://www.rsa.com/'>RSA</a>, and our guest for this episode, offers some unique takes on how these two key variables are intersecting to create new challenges in industrial cybersecurity. He also discusses recent findings found in <a href='https://www.rsa.com/id-iq/'>RSA&apos;s <em>ID IQ Research</em> report</a>. Watch/listen as we discuss:</p><ul><li>How attacks are focusing more on humans than networks or systems.</li><li>Evolving hacking strategies like prompt bombing that&apos;s focused on stealing credentials or bypassing logins.</li><li>The role AI can play in establishing ways to improve employee training and address the biggest threat to OT security - people.</li><li>Ways to manage remote access without sacrificing identity security best practices.</li><li>Strategies that make zero trust and other identity security tools more user-friendly.</li><li>How AI is helping manufacturers establish priorities in achieving asset visibility.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We’ve heard it before – hacker tactics are not changing, but the hackers are getting a lot smarter in how they deploy their time-tested attacks.</p><p>Additionally, honing in on the human element of cybersecurity is nothing new. We’ve spoken with numerous guests about getting buy-in, improving training, and how creating a cyber-receptive culture is key in getting any cybersecurity plan to stick.</p><p>But Dave Taku, Head of Product Management and User Experience at <a href='https://www.rsa.com/'>RSA</a>, and our guest for this episode, offers some unique takes on how these two key variables are intersecting to create new challenges in industrial cybersecurity. He also discusses recent findings found in <a href='https://www.rsa.com/id-iq/'>RSA&apos;s <em>ID IQ Research</em> report</a>. Watch/listen as we discuss:</p><ul><li>How attacks are focusing more on humans than networks or systems.</li><li>Evolving hacking strategies like prompt bombing that&apos;s focused on stealing credentials or bypassing logins.</li><li>The role AI can play in establishing ways to improve employee training and address the biggest threat to OT security - people.</li><li>Ways to manage remote access without sacrificing identity security best practices.</li><li>Strategies that make zero trust and other identity security tools more user-friendly.</li><li>How AI is helping manufacturers establish priorities in achieving asset visibility.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17553736-why-more-hackers-are-logging-on-than-breaking-in.mp3" length="23526706" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1f8fq7i21xqlynqzub63h1lurvfj?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17553736</guid>
    <pubDate>Fri, 25 Jul 2025 17:00:00 -0400</pubDate>
    <itunes:duration>1947</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>You Think You Know Me</itunes:title>
    <title>You Think You Know Me</title>
    <itunes:summary><![CDATA[Send us Fan Mail Who are you? This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management.  My conversation with Brandon Traffanstedt, Sr. Director and Global Technology Officer at CyberArk, took us in two equally important directions. The first deals with individuals and how to properly manage those accessing your systems and networks. The second, equally as challenging, but potentially more complex, focused on machine or asset ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Who are you?</p><p>This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management. </p><p>My conversation with <a href='https://www.cyberark.com'>Brandon Traffanstedt</a>, Sr. Director and Global Technology Officer at CyberArk, took us in two equally important directions. The first deals with individuals and how to properly manage those accessing your systems and networks. The second, equally as challenging, but potentially more complex, focused on machine or asset identities and understanding how to keep this sprawling attack landscape more secure. </p><p>Perhaps most interestingly, Brandon also offers some insight on cookies-based attacks and how, like so many cybersecurity challenges, the answers doesn’t lie in the tech stack.</p><p>Watch/listen as we also discuss:</p><ul><li>Solving identify management strategies by finding baseline controls.</li><li>The unique dynamics of manufacturing when it comes to risk analysis and establishing these baselines.</li><li>The role of asset visibility when it comes to identity management strategies.</li><li>How to prevent those age-old turf battles between IT and OT.</li><li>Why machine identities might pose the greatest cybersecurity risk.</li><li>The importance of empathy in getting people to buy in to cybersecurity strategies and training.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Who are you?</p><p>This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management. </p><p>My conversation with <a href='https://www.cyberark.com'>Brandon Traffanstedt</a>, Sr. Director and Global Technology Officer at CyberArk, took us in two equally important directions. The first deals with individuals and how to properly manage those accessing your systems and networks. The second, equally as challenging, but potentially more complex, focused on machine or asset identities and understanding how to keep this sprawling attack landscape more secure. </p><p>Perhaps most interestingly, Brandon also offers some insight on cookies-based attacks and how, like so many cybersecurity challenges, the answers doesn’t lie in the tech stack.</p><p>Watch/listen as we also discuss:</p><ul><li>Solving identify management strategies by finding baseline controls.</li><li>The unique dynamics of manufacturing when it comes to risk analysis and establishing these baselines.</li><li>The role of asset visibility when it comes to identity management strategies.</li><li>How to prevent those age-old turf battles between IT and OT.</li><li>Why machine identities might pose the greatest cybersecurity risk.</li><li>The importance of empathy in getting people to buy in to cybersecurity strategies and training.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17410297-you-think-you-know-me.mp3" length="25437785" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a3pxvg515a6znj7jbfeimeoxqgq7?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17410297</guid>
    <pubDate>Wed, 02 Jul 2025 18:00:00 -0400</pubDate>
    <itunes:duration>2106</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Avoiding the Ostrich Approach</itunes:title>
    <title>Avoiding the Ostrich Approach</title>
    <itunes:summary><![CDATA[Send us Fan Mail I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again.  The difference is that Howard Grimes, the CEO of the Cybersecurity Manufacturing Innovation Institute (CyManII) is looking to help provide a lot of solutions for manufacturers. As we discuss workforce ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again. </p><p>The difference is that Howard Grimes, the CEO of the Cybersecurity Manufacturing Innovation Institute (CyManII) is looking to help provide a lot of solutions for manufacturers. As we discuss workforce challenges, secure-by-design, an evolving threat landscape and the ongoing struggles with legacy OT infrastructure, I’ll challenge you to find something that the Institute couldn’t help you and your organization jumpstart, solve or streamline.</p><p>Watch/listen as we discuss:</p><ul><li>The most significant vulnerabilities still impacting manufacturing.</li><li>Why the industrial sector struggles to find OT cybersecurity specialists, and strategies that are helping to fill this gap.</li><li>The growing prominence of secure-by-design and how the responsibilities for these strategies are shifting.</li><li>The areas where legacy OT technology are hampering cybersecurity efforts the most.</li><li>Why the &quot;Ostrich Approach&quot; can no longer be tolerated.</li><li>The new focal points of attackers and how these are shifting based on hacker resources.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again. </p><p>The difference is that Howard Grimes, the CEO of the Cybersecurity Manufacturing Innovation Institute (CyManII) is looking to help provide a lot of solutions for manufacturers. As we discuss workforce challenges, secure-by-design, an evolving threat landscape and the ongoing struggles with legacy OT infrastructure, I’ll challenge you to find something that the Institute couldn’t help you and your organization jumpstart, solve or streamline.</p><p>Watch/listen as we discuss:</p><ul><li>The most significant vulnerabilities still impacting manufacturing.</li><li>Why the industrial sector struggles to find OT cybersecurity specialists, and strategies that are helping to fill this gap.</li><li>The growing prominence of secure-by-design and how the responsibilities for these strategies are shifting.</li><li>The areas where legacy OT technology are hampering cybersecurity efforts the most.</li><li>Why the &quot;Ostrich Approach&quot; can no longer be tolerated.</li><li>The new focal points of attackers and how these are shifting based on hacker resources.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17360831-avoiding-the-ostrich-approach.mp3" length="36719994" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/57e33thrwrwahapwboqgsr2ksn1d?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17360831</guid>
    <pubDate>Fri, 20 Jun 2025 11:00:00 -0400</pubDate>
    <itunes:duration>3046</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&#39;We&#39;ve Made Our Own Prison&#39;</itunes:title>
    <title>&#39;We&#39;ve Made Our Own Prison&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge. Regardless of the situation or dynamic, everyone likes to think that they’re special. However, with experience we learn that appreciating both the shared similarities, as well as some of those unique traits, are how we can best solve problems.  A great example is a recent conversation I had with Umaimah Khan, founder and CEO of Opal Security – she goes by UK for short. ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge.</em></p><p>Regardless of the situation or dynamic, everyone likes to think that they’re special. However, with experience we learn that appreciating both the shared similarities, as well as some of those unique traits, are how we can best solve problems. </p><p>A great example is a recent conversation I had with Umaimah Khan, founder and CEO of <a href='https://c1a6292d.streaklinks.com/CYj30jLTU_QkHhMR_wvNr-Op/https%3A%2F%2Fwww.opal.dev%2F%3Futm_term%3Dopal%2520security%26utm_campaign%3DNAM-Branded-Search%26utm_source%3Dadwords%26utm_medium%3Dppc%26hsa_acc%3D6550939405%26hsa_cam%3D21180337112%26hsa_grp%3D162586701484%26hsa_ad%3D707509432001%26hsa_src%3Dg%26hsa_tgt%3Dkwd-430092332143%26hsa_kw%3Dopal%2520security%26hsa_mt%3De%26hsa_net%3Dadwords%26hsa_ver%3D3%26gad_source%3D1%26gclid%3DEAIaIQobChMIlIqn1rLuiwMVPU5HAR0ejQvREAAYASAAEgKuOvD_BwE'>Opal Security</a> – she goes by UK for short. Her firm focuses on the identify management sector of cybersecurity. </p><p>What UK constantly reinforced is that the industrial sector is not alone in trying to figure out the best ways to manage and secure human, equipment and asset identification. So, while some of the application challenges are unique, there’s a lot of strategies to draw from in determining what might be best for your enterprise.</p><p>Listen as we discuss:</p><ul><li>The challenges of identify management at both the human and machine levels.</li><li>The need for fluid change management when it comes to determining who can access what, and at what level.</li><li>Why the success of any cybersecurity initiative will be about what the human can or can&apos;t do, not the machine.</li><li>How many security vulnerabilities are created by a &quot;perfect storm of poor communication.&quot;</li><li>Breaking down silos, which have created &quot;security by obscurity.&quot;</li><li>The new attack vectors poor identity management is creating.</li><li>The evolving role of agentic AI in industrial cybersecurity. </li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge.</em></p><p>Regardless of the situation or dynamic, everyone likes to think that they’re special. However, with experience we learn that appreciating both the shared similarities, as well as some of those unique traits, are how we can best solve problems. </p><p>A great example is a recent conversation I had with Umaimah Khan, founder and CEO of <a href='https://c1a6292d.streaklinks.com/CYj30jLTU_QkHhMR_wvNr-Op/https%3A%2F%2Fwww.opal.dev%2F%3Futm_term%3Dopal%2520security%26utm_campaign%3DNAM-Branded-Search%26utm_source%3Dadwords%26utm_medium%3Dppc%26hsa_acc%3D6550939405%26hsa_cam%3D21180337112%26hsa_grp%3D162586701484%26hsa_ad%3D707509432001%26hsa_src%3Dg%26hsa_tgt%3Dkwd-430092332143%26hsa_kw%3Dopal%2520security%26hsa_mt%3De%26hsa_net%3Dadwords%26hsa_ver%3D3%26gad_source%3D1%26gclid%3DEAIaIQobChMIlIqn1rLuiwMVPU5HAR0ejQvREAAYASAAEgKuOvD_BwE'>Opal Security</a> – she goes by UK for short. Her firm focuses on the identify management sector of cybersecurity. </p><p>What UK constantly reinforced is that the industrial sector is not alone in trying to figure out the best ways to manage and secure human, equipment and asset identification. So, while some of the application challenges are unique, there’s a lot of strategies to draw from in determining what might be best for your enterprise.</p><p>Listen as we discuss:</p><ul><li>The challenges of identify management at both the human and machine levels.</li><li>The need for fluid change management when it comes to determining who can access what, and at what level.</li><li>Why the success of any cybersecurity initiative will be about what the human can or can&apos;t do, not the machine.</li><li>How many security vulnerabilities are created by a &quot;perfect storm of poor communication.&quot;</li><li>Breaking down silos, which have created &quot;security by obscurity.&quot;</li><li>The new attack vectors poor identity management is creating.</li><li>The evolving role of agentic AI in industrial cybersecurity. </li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17234401-we-ve-made-our-own-prison.mp3" length="30634186" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jcakbtnirsedmicvrfrrdz1w7bey?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17234401</guid>
    <pubDate>Mon, 02 Jun 2025 11:00:00 -0400</pubDate>
    <itunes:duration>2539</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Dark AI Speeding Hacker Evolution</itunes:title>
    <title>Dark AI Speeding Hacker Evolution</title>
    <itunes:summary><![CDATA[Send us Fan Mail In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people? I recently sat down with Securin's Lead Threat Intelligence Analyst - Aviral Verma. And while I anticipated a conversation focused on vulnerabilities and the threat landscape, discussing these topics led to deeper dives on a range of topics that also included b...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people?</p><p>I recently sat down with<a href='https://manage.ien.com/www.securin.io'> Securin&apos;s</a> Lead Threat Intelligence Analyst - <a href='https://www.linkedin.com/in/aviral18/'>Aviral Verma</a>. And while I anticipated a conversation focused on <a href='https://www.securin.io/ransomware-index-report-2024-download'>vulnerabilities and the threat landscape</a>, discussing these topics led to deeper dives on a range of topics that also included breaking down IT/OT silos, artificial intelligence, the dark web and patching strategies. </p><p>Listen as we discuss:</p><ul><li>The transformation of threat actors and how they&apos;ve been able to cut timelines for exploiting vulnerabilities to 15 days.</li><li>How hackers are using Dark Web versions of ChatGPT to design more effective credential and data harvesting schemes.</li><li>Why the security of every software platform, especially those embedded within industrial assets, cannot be assumed.</li><li>How the legacy dynamic of many OT assets has led hackers to exploit vulnerabilities that have been around for as long as five years.</li><li>Addressing patching challenges by breaking down silos and getting a deeper understanding of the unique elements of each OT environment.</li><li>How threat detection needs to evolve, especially with state-sponsored hackers executing &quot;quieter&quot; strategies for attacking manufacturing and critical infrastructure. </li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people?</p><p>I recently sat down with<a href='https://manage.ien.com/www.securin.io'> Securin&apos;s</a> Lead Threat Intelligence Analyst - <a href='https://www.linkedin.com/in/aviral18/'>Aviral Verma</a>. And while I anticipated a conversation focused on <a href='https://www.securin.io/ransomware-index-report-2024-download'>vulnerabilities and the threat landscape</a>, discussing these topics led to deeper dives on a range of topics that also included breaking down IT/OT silos, artificial intelligence, the dark web and patching strategies. </p><p>Listen as we discuss:</p><ul><li>The transformation of threat actors and how they&apos;ve been able to cut timelines for exploiting vulnerabilities to 15 days.</li><li>How hackers are using Dark Web versions of ChatGPT to design more effective credential and data harvesting schemes.</li><li>Why the security of every software platform, especially those embedded within industrial assets, cannot be assumed.</li><li>How the legacy dynamic of many OT assets has led hackers to exploit vulnerabilities that have been around for as long as five years.</li><li>Addressing patching challenges by breaking down silos and getting a deeper understanding of the unique elements of each OT environment.</li><li>How threat detection needs to evolve, especially with state-sponsored hackers executing &quot;quieter&quot; strategies for attacking manufacturing and critical infrastructure. </li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17167313-dark-ai-speeding-hacker-evolution.mp3" length="26210198" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ssi6yg4odkh898lc3c1ax8cmdwav?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17167313</guid>
    <pubDate>Fri, 16 May 2025 09:00:00 -0400</pubDate>
    <itunes:duration>2171</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Ransomware, Credential Theft and Phishing Schemes Persist</itunes:title>
    <title>Why Ransomware, Credential Theft and Phishing Schemes Persist</title>
    <itunes:summary><![CDATA[Send us Fan Mail One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends. The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best information. One source that I look forward to each year is IBM’s X-Force Threat Intelligence Index. It’s full of all that stuff I...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends.</p><p>The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best information.</p><p>One source that I look forward to each year is IBM’s <a href='https://www.ibm.com/reports/threat-intelligence?utm_content=SRCWW&amp;p1=Search&amp;p4=43700081185950605&amp;p5=p&amp;p9=58700008819983591&amp;gad_source=1&amp;gbraid=0AAAAAD-_QsSfLFyqVBLqyM2Q90cqQYhBr&amp;gclid=EAIaIQobChMI24Tbrq_sjAMVn07_AR0Y2QKfEAAYASABEgJ35fD_BwE&amp;gclsrc=aw.ds'><em>X-Force Threat Intelligence Index</em></a>. It’s full of all that stuff I just mentioned, but will special attention paid to the industrial sector. </p><p>Unfortunately, some of that attention results from manufacturing being the most highly attacked industry for the fourth consecutive year. Also, according to the Index, it had the most ransomware incidents in 2024.</p><p>But, as Chris Caridi, a Cyber Threat Analyst for the X-Force and our guest for today’s episode shared with me, the news is not all bad. Watch/listen as we discuss:</p><ul><li>The rise in infostealer malware, credential harvesting and phishing attacks.</li><li>The importance of understanding how to secure new technology before investing and implementing it.</li><li>Why most cybersecurity issues are a human problem, not a technical problem.</li><li>Why multi-factor authentication is now a must for OT connections.</li><li>The misconfiguration errors that continue to plague manufacturing, and how they create a series of other cybersecurity problems.</li><li>How manufacturing&apos;s cybersecurity journey is similar to the financial sector 10 years ago, and why this should be source of optimism.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends.</p><p>The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best information.</p><p>One source that I look forward to each year is IBM’s <a href='https://www.ibm.com/reports/threat-intelligence?utm_content=SRCWW&amp;p1=Search&amp;p4=43700081185950605&amp;p5=p&amp;p9=58700008819983591&amp;gad_source=1&amp;gbraid=0AAAAAD-_QsSfLFyqVBLqyM2Q90cqQYhBr&amp;gclid=EAIaIQobChMI24Tbrq_sjAMVn07_AR0Y2QKfEAAYASABEgJ35fD_BwE&amp;gclsrc=aw.ds'><em>X-Force Threat Intelligence Index</em></a>. It’s full of all that stuff I just mentioned, but will special attention paid to the industrial sector. </p><p>Unfortunately, some of that attention results from manufacturing being the most highly attacked industry for the fourth consecutive year. Also, according to the Index, it had the most ransomware incidents in 2024.</p><p>But, as Chris Caridi, a Cyber Threat Analyst for the X-Force and our guest for today’s episode shared with me, the news is not all bad. Watch/listen as we discuss:</p><ul><li>The rise in infostealer malware, credential harvesting and phishing attacks.</li><li>The importance of understanding how to secure new technology before investing and implementing it.</li><li>Why most cybersecurity issues are a human problem, not a technical problem.</li><li>Why multi-factor authentication is now a must for OT connections.</li><li>The misconfiguration errors that continue to plague manufacturing, and how they create a series of other cybersecurity problems.</li><li>How manufacturing&apos;s cybersecurity journey is similar to the financial sector 10 years ago, and why this should be source of optimism.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/17031446-why-ransomware-credential-theft-and-phishing-schemes-persist.mp3" length="28502338" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/b8m07uf9dih05uuzx3umh5t3s5ho?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17031446</guid>
    <pubDate>Fri, 25 Apr 2025 11:00:00 -0400</pubDate>
    <itunes:duration>2362</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Unsecure Webcam Was All a Ransomware Group Needed</itunes:title>
    <title>Unsecure Webcam Was All a Ransomware Group Needed</title>
    <itunes:summary><![CDATA[Send us Fan Mail Endpoint security tools worked, but the hackers worked harder for their payday. While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import elements of episodes like this one come from the in-depth conversations about new tactics and strategies that are being used by the bad guys, and simultaneously, the insight on new best practices for the good guys. So while I did enjoy diving into how the ransomware group Akira was ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Endpoint security tools worked, but the hackers worked harder for their payday.</em></p><p>While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import elements of episodes like this one come from the in-depth conversations about new tactics and strategies that are being used by the bad guys, and simultaneously, the insight on new best practices for the good guys.</p><p>So while I did enjoy diving into how the ransomware group Akira was able to use webcam access to infiltrate an organization, it was also great to discuss the evolution of these hacking groups, EDR tools, dark web monitoring and the need for better credential security with Steve Ross. He’s the director of cybersecurity at <a href='https://www.s-rminform.com/'>S-RM</a>, a leading provider or cyber intelligence and solutions.</p><p>Watch/listen as we also discuss:</p><ul><li>Endpoint Detection and Response (EDR) tools.</li><li>The rise of Akira, and the evolving symbiotic strategies used by this and other RaaS groups.</li><li>Patching challenges.</li><li>The growing need for dark web monitoring.</li><li>The continued rise in login/credential harvesting.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Endpoint security tools worked, but the hackers worked harder for their payday.</em></p><p>While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import elements of episodes like this one come from the in-depth conversations about new tactics and strategies that are being used by the bad guys, and simultaneously, the insight on new best practices for the good guys.</p><p>So while I did enjoy diving into how the ransomware group Akira was able to use webcam access to infiltrate an organization, it was also great to discuss the evolution of these hacking groups, EDR tools, dark web monitoring and the need for better credential security with Steve Ross. He’s the director of cybersecurity at <a href='https://www.s-rminform.com/'>S-RM</a>, a leading provider or cyber intelligence and solutions.</p><p>Watch/listen as we also discuss:</p><ul><li>Endpoint Detection and Response (EDR) tools.</li><li>The rise of Akira, and the evolving symbiotic strategies used by this and other RaaS groups.</li><li>Patching challenges.</li><li>The growing need for dark web monitoring.</li><li>The continued rise in login/credential harvesting.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16990094-unsecure-webcam-was-all-a-ransomware-group-needed.mp3" length="22752863" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/iw62eal29a6c0o5piz7wotbsjled?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16990094</guid>
    <pubDate>Wed, 16 Apr 2025 16:00:00 -0400</pubDate>
    <itunes:duration>1883</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>IABs, Dark Web Fueling Ransomware Surge</itunes:title>
    <title>IABs, Dark Web Fueling Ransomware Surge</title>
    <itunes:summary><![CDATA[Send us Fan Mail We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware.  The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web communities, and more are fueling ransomware-as-a-service groups and posing new cybersecurity challenges.  And while nume...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware. </p><p>The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web communities, and more are fueling ransomware-as-a-service groups and posing new cybersecurity challenges. </p><p>And while numerous reports detail the rise in ransomware attacks and the escalating amounts being paid in seeking a reprieve from denial of service, data extortion, and supply chain hacks, one recent finding really stood out. In their annual <a href='https://www.blackfog.com/the-state-of-ransomware-2024/'><em>State of Ransomware Report</em></a>, Blackfog stated that manufacturing had the highest number of undisclosed ransomware attacks, when compared to all other industries. </p><p>So, as tough as we know the ransomware challenge is – it’s actually a bit worse than we acknowledge because of the growing number of attacks that go unreported. Fortunately, we have an army of highly skilled individuals working to combat these threats. And that includes our guest for today’s episode - Fortra&apos;s senior manager of domain and dark web monitoring solutions, Nick Oram. Watch/listen as we discuss:</p><ul><li>The surge of new ransomware tactics and groups, like RansomHub.</li><li>The origins and continued growth of Initial Access Brokers (IABs) within the ransomware community.</li><li>How affiliate programs are helping both RaaS and IAB groups increase their rate of successful attacks.</li><li>Why dark web monitoring might be more important than ever for manufacturers.</li><li>The ongoing &quot;we adapt&quot;, &quot;they adapt&quot; dynamic.</li><li>How to better educate the workforce and shift from a &quot;blame and shame&quot; response to phishing and other types of attacks that leverage human error.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware. </p><p>The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web communities, and more are fueling ransomware-as-a-service groups and posing new cybersecurity challenges. </p><p>And while numerous reports detail the rise in ransomware attacks and the escalating amounts being paid in seeking a reprieve from denial of service, data extortion, and supply chain hacks, one recent finding really stood out. In their annual <a href='https://www.blackfog.com/the-state-of-ransomware-2024/'><em>State of Ransomware Report</em></a>, Blackfog stated that manufacturing had the highest number of undisclosed ransomware attacks, when compared to all other industries. </p><p>So, as tough as we know the ransomware challenge is – it’s actually a bit worse than we acknowledge because of the growing number of attacks that go unreported. Fortunately, we have an army of highly skilled individuals working to combat these threats. And that includes our guest for today’s episode - Fortra&apos;s senior manager of domain and dark web monitoring solutions, Nick Oram. Watch/listen as we discuss:</p><ul><li>The surge of new ransomware tactics and groups, like RansomHub.</li><li>The origins and continued growth of Initial Access Brokers (IABs) within the ransomware community.</li><li>How affiliate programs are helping both RaaS and IAB groups increase their rate of successful attacks.</li><li>Why dark web monitoring might be more important than ever for manufacturers.</li><li>The ongoing &quot;we adapt&quot;, &quot;they adapt&quot; dynamic.</li><li>How to better educate the workforce and shift from a &quot;blame and shame&quot; response to phishing and other types of attacks that leverage human error.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16892908-iabs-dark-web-fueling-ransomware-surge.mp3" length="28022480" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ayihdttcu1zd25n6akgwuaiocf4m?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16892908</guid>
    <pubDate>Mon, 31 Mar 2025 17:00:00 -0400</pubDate>
    <itunes:duration>2321</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Manufacturing’s Internal Cyber Struggles</itunes:title>
    <title>Manufacturing’s Internal Cyber Struggles</title>
    <itunes:summary><![CDATA[Send us Fan Mail Breaking down silos while securing the cloud and leveraging secure-by-design advancements. The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarter hacking groups, AI-driven phishing schemes and deceptive malware viruses head the list of concerns. And while these factors show no signs of fading, the reality is that there are just as many challenges facing industrial cybersecurity that are embed...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Breaking down silos while securing the cloud and leveraging secure-by-design advancements.</em></p><p>The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarter hacking groups, AI-driven phishing schemes and deceptive malware viruses head the list of concerns.</p><p>And while these factors show no signs of fading, the reality is that there are just as many challenges facing industrial cybersecurity that are embedded within the very foundation of our operations. These legacy dynamics have created internal battles that absorb valuable resources, waste precious talent and help the bad guys stay a step ahead. </p><p>With this in mind, we’re going to tap into two key industry leaders to get their take on pressing, internal liabilities that are ensuring key production assets remain exposed. We&apos;ll hear from Silverfort’s Rob Larsen, as he discusses the ongoing struggles created by IT/OT silos, as well secure-by-design initiatives. </p><p>Mandiant’s Paul Shaver will also offer his take on these silos, and how decisions related to cloud networking are impacting the security stature of key data, assets and network connections.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Breaking down silos while securing the cloud and leveraging secure-by-design advancements.</em></p><p>The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarter hacking groups, AI-driven phishing schemes and deceptive malware viruses head the list of concerns.</p><p>And while these factors show no signs of fading, the reality is that there are just as many challenges facing industrial cybersecurity that are embedded within the very foundation of our operations. These legacy dynamics have created internal battles that absorb valuable resources, waste precious talent and help the bad guys stay a step ahead. </p><p>With this in mind, we’re going to tap into two key industry leaders to get their take on pressing, internal liabilities that are ensuring key production assets remain exposed. We&apos;ll hear from Silverfort’s Rob Larsen, as he discusses the ongoing struggles created by IT/OT silos, as well secure-by-design initiatives. </p><p>Mandiant’s Paul Shaver will also offer his take on these silos, and how decisions related to cloud networking are impacting the security stature of key data, assets and network connections.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16786213-manufacturing-s-internal-cyber-struggles.mp3" length="19803283" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9ytyy46zzp6rki497vros97zkg71?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16786213</guid>
    <pubDate>Thu, 13 Mar 2025 19:00:00 -0400</pubDate>
    <itunes:duration>1638</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Observations of an Ethical Hacking Researcher</itunes:title>
    <title>Observations of an Ethical Hacking Researcher</title>
    <itunes:summary><![CDATA[Send us Fan Mail One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats and the evolving network of threat actors. And I can’t think of anyone better to break down the hacker landscape than an individual whose research has led to being followed by well-known data breachers on social media and considered pers...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats and the evolving network of threat actors.</p><p>And I can’t think of anyone better to break down the hacker landscape than an individual whose research has led to being followed by well-known data breachers on social media and considered persona-non-grata in countries housing many of the most notorious state-sponsored hacking groups in the world. </p><p>It’s my pleasure to welcome <a href='https://www.mbtmag.com/video/video/22917149/security-breach-theres-no-bulletproof-vest-in-cybersecurity'>Jeremiah Fowler</a> back to <em>Security Breach</em>. You might remember that we originally spoke to him regarding a huge ERP data vulnerability last summer.  </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats and the evolving network of threat actors.</p><p>And I can’t think of anyone better to break down the hacker landscape than an individual whose research has led to being followed by well-known data breachers on social media and considered persona-non-grata in countries housing many of the most notorious state-sponsored hacking groups in the world. </p><p>It’s my pleasure to welcome <a href='https://www.mbtmag.com/video/video/22917149/security-breach-theres-no-bulletproof-vest-in-cybersecurity'>Jeremiah Fowler</a> back to <em>Security Breach</em>. You might remember that we originally spoke to him regarding a huge ERP data vulnerability last summer.  </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16704183-observations-of-an-ethical-hacking-researcher.mp3" length="25795658" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7iw61ngvfju8e2t6o1d7ah6ndlwe?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16704183</guid>
    <pubDate>Fri, 28 Feb 2025 09:00:00 -0500</pubDate>
    <itunes:duration>2135</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Evolution of OT Vulnerabilities</itunes:title>
    <title>The Evolution of OT Vulnerabilities</title>
    <itunes:summary><![CDATA[Send us Fan Mail When we talk about the threat landscape for the industrial sector, the eye-catching, headline-grabbing hacking groups with nefarious names typically lead the list of concerns. And while understanding their well-publicized exploits are important, what is often overlooked are all the little things these groups were able to do before dropping malware, shutting down networks, extorting ransoms, and stealing data. This is where taking the time to address those insecure connection ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When we talk about the threat landscape for the industrial sector, the eye-catching, headline-grabbing hacking groups with nefarious names typically lead the list of concerns. And while understanding their well-publicized exploits are important, what is often overlooked are all the little things these groups were able to do before dropping malware, shutting down networks, extorting ransoms, and stealing data.</p><p>This is where taking the time to address those insecure connection points, update login credentials or patch zero and one-day vulnerabilities continue to be essential in the fight to safeguard operational technology and the industrial control system. But, the reasons these problems remain is that the solution is never as simple as it sounds. So, hopefully our collection of experts for this episode can help show you the way.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When we talk about the threat landscape for the industrial sector, the eye-catching, headline-grabbing hacking groups with nefarious names typically lead the list of concerns. And while understanding their well-publicized exploits are important, what is often overlooked are all the little things these groups were able to do before dropping malware, shutting down networks, extorting ransoms, and stealing data.</p><p>This is where taking the time to address those insecure connection points, update login credentials or patch zero and one-day vulnerabilities continue to be essential in the fight to safeguard operational technology and the industrial control system. But, the reasons these problems remain is that the solution is never as simple as it sounds. So, hopefully our collection of experts for this episode can help show you the way.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16616745-the-evolution-of-ot-vulnerabilities.mp3" length="26657027" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8i2655lgmeys7jzuc7fgh2rhejrm?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16616745</guid>
    <pubDate>Thu, 13 Feb 2025 17:00:00 -0500</pubDate>
    <itunes:duration>2207</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Legacy of AI in Cybersecurity</itunes:title>
    <title>The Legacy of AI in Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail While we’re still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we’re talking about cybersecurity or … other social topics. So, in continuing this trend, we tapped into a unique collection of voices to discuss a topic that has, and will continue to be, vital to industrial cybersecurity efforts – Artificial Intelligence.  First, we’ll hear from Mandiant’s Paul Shaver as he discusses the lega...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While we’re still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we’re talking about cybersecurity or … other social topics.</p><p>So, in continuing this trend, we tapped into a unique collection of voices to discuss a topic that has, and will continue to be, vital to industrial cybersecurity efforts – Artificial Intelligence. </p><p>First, we’ll hear from Mandiant’s Paul Shaver as he discusses the legacy dynamics of industrial cybersecurity, including ongoing obstacles associated with inventory, visibility and segmentation strategies – and the impact AI could have on all of them. </p><p>Then we’ll transition to HackerOne’s Will Kapcio for his take on AI and the ongoing evolution of cybersecurity tools. </p><p>We’ll wrap up with instructor and the author of the <a href='https://www.amazon.com/Hack-Back-Techniques-Hackers-Their/dp/1032818530/ref=sr_1_1?crid=JIVL1DHDOFGQ&amp;dib=eyJ2IjoiMSJ9.BkNA_IsHyONs2Kekewx-FQHosSK_0cowF5oSSDMagZ_c4EQd761m4JG5vP4ta5P-3myOa7GkV0SSHlvk52X1Xhi6P7V9luM-vq2gOaXPBL8CgKPjbC3n4XRLTJCOJ_DnRcOJ-xlUODfR-DLEJruXXqPwythfJkK0v2_p_9YffhJ_PdkphPvagpARnxHlUzPyxdCKisfpw1Sf3Aj2dfRxnl0tEhpovHiriw0bPdZFD4c.AQ2-E8FsPIJFE1rvcweVueViH3Q6z3HUo3h5XZ5o-ZE&amp;dib_tag=se&amp;keywords=The+Hack+is+Back&amp;qid=1738245850&amp;sprefix=the+hack+is+back%2Caps%2C118&amp;sr=8-1'><em>Hack is Back </em></a>as he discusses what drove his desire to write the book, the impact AI is having on the next generation of cybersecurity specialists, and the evolving vulnerabilities they can expect to face.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While we’re still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we’re talking about cybersecurity or … other social topics.</p><p>So, in continuing this trend, we tapped into a unique collection of voices to discuss a topic that has, and will continue to be, vital to industrial cybersecurity efforts – Artificial Intelligence. </p><p>First, we’ll hear from Mandiant’s Paul Shaver as he discusses the legacy dynamics of industrial cybersecurity, including ongoing obstacles associated with inventory, visibility and segmentation strategies – and the impact AI could have on all of them. </p><p>Then we’ll transition to HackerOne’s Will Kapcio for his take on AI and the ongoing evolution of cybersecurity tools. </p><p>We’ll wrap up with instructor and the author of the <a href='https://www.amazon.com/Hack-Back-Techniques-Hackers-Their/dp/1032818530/ref=sr_1_1?crid=JIVL1DHDOFGQ&amp;dib=eyJ2IjoiMSJ9.BkNA_IsHyONs2Kekewx-FQHosSK_0cowF5oSSDMagZ_c4EQd761m4JG5vP4ta5P-3myOa7GkV0SSHlvk52X1Xhi6P7V9luM-vq2gOaXPBL8CgKPjbC3n4XRLTJCOJ_DnRcOJ-xlUODfR-DLEJruXXqPwythfJkK0v2_p_9YffhJ_PdkphPvagpARnxHlUzPyxdCKisfpw1Sf3Aj2dfRxnl0tEhpovHiriw0bPdZFD4c.AQ2-E8FsPIJFE1rvcweVueViH3Q6z3HUo3h5XZ5o-ZE&amp;dib_tag=se&amp;keywords=The+Hack+is+Back&amp;qid=1738245850&amp;sprefix=the+hack+is+back%2Caps%2C118&amp;sr=8-1'><em>Hack is Back </em></a>as he discusses what drove his desire to write the book, the impact AI is having on the next generation of cybersecurity specialists, and the evolving vulnerabilities they can expect to face.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16529628-the-legacy-of-ai-in-cybersecurity.mp3" length="19425931" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ebplqhqcvqktx6zjrrwkzannq0y0?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16529628</guid>
    <pubDate>Thu, 30 Jan 2025 09:00:00 -0500</pubDate>
    <itunes:duration>1606</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A Happy Ending to the Latest ICS Hack</itunes:title>
    <title>A Happy Ending to the Latest ICS Hack</title>
    <itunes:summary><![CDATA[Send us Fan Mail The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware.  We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear our hair out. Well, this episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detected by Noam Moshe and Claroty’s Team82.  The malware is described as a custom-built IoT/OT strand created by the Iran-based ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware.<br/><br/></em>We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear our hair out. Well, this episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detected by Noam Moshe and Claroty’s Team82. </p><p>The malware is described as a custom-built IoT/OT strand created by the Iran-based hacktivist group, the <a href='https://www.manufacturing.net/cybersecurity/article/22883872/inside-the-cyber-av3ngers-global-plc-hack'>CyberAv3ngers.</a> The malware targeted OT/IoT devices in Israel and the U.S. Moshe’s team detected the malware being used to attack IoT and SCADA/OT devices of various types including IP cameras, routers, PLCs, HMIs and firewalls. </p><p>Typically, this is the part of the story that takes us down a dark and frustrating road, but as you’ll hear, that’s not necessarily the case this time.</p><p>For more information on Team82’s findings on IOCONTROL, click <a href='https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol?__hstc=51577270.e7ceba6ac84d33db2d877bf640646104.1736886412979.1736886412979.1736886412979.1&amp;__hssc=51577270.1.1736886412979&amp;__hsfp=424417210'>here.</a></p><p>Also, just a bit of housekeeping – we’re switching the frequency of <em>Security Breach</em> from weekly to bi-weekly. This change will allow me to spend more time on each episode, which will translate to greater depth and expanded coverage on all the pressing topics of industrial cybersecurity. </p><p>And remember, this is your podcast – let me know your thoughts and feelings on the change and anything else you’d like to see on the show.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware.<br/><br/></em>We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear our hair out. Well, this episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detected by Noam Moshe and Claroty’s Team82. </p><p>The malware is described as a custom-built IoT/OT strand created by the Iran-based hacktivist group, the <a href='https://www.manufacturing.net/cybersecurity/article/22883872/inside-the-cyber-av3ngers-global-plc-hack'>CyberAv3ngers.</a> The malware targeted OT/IoT devices in Israel and the U.S. Moshe’s team detected the malware being used to attack IoT and SCADA/OT devices of various types including IP cameras, routers, PLCs, HMIs and firewalls. </p><p>Typically, this is the part of the story that takes us down a dark and frustrating road, but as you’ll hear, that’s not necessarily the case this time.</p><p>For more information on Team82’s findings on IOCONTROL, click <a href='https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol?__hstc=51577270.e7ceba6ac84d33db2d877bf640646104.1736886412979.1736886412979.1736886412979.1&amp;__hssc=51577270.1.1736886412979&amp;__hsfp=424417210'>here.</a></p><p>Also, just a bit of housekeeping – we’re switching the frequency of <em>Security Breach</em> from weekly to bi-weekly. This change will allow me to spend more time on each episode, which will translate to greater depth and expanded coverage on all the pressing topics of industrial cybersecurity. </p><p>And remember, this is your podcast – let me know your thoughts and feelings on the change and anything else you’d like to see on the show.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16438936-a-happy-ending-to-the-latest-ics-hack.mp3" length="21331135" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/elf3qo0s1v80nqi14dztd39v6llr?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16438936</guid>
    <pubDate>Thu, 16 Jan 2025 18:00:00 -0500</pubDate>
    <itunes:duration>1765</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Biggest Hacks of 2024</itunes:title>
    <title>The Biggest Hacks of 2024</title>
    <itunes:summary><![CDATA[Send us Fan Mail Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.”  His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecurity climate. So, in an effort to ensure we repeat as few of 2024’s mistakes in 2025, we’re going to take a look at some of the industrial sector’s biggest exploits, and offer solutions and strategies in our ever-raging combat with the Black H...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.” </p><p>His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecurity climate. So, in an effort to ensure we repeat as few of 2024’s mistakes in 2025, we’re going to take a look at some of the industrial sector’s biggest exploits, and offer solutions and strategies in our ever-raging combat with the Black Hats. Watch/listen as we cover:</p><ul><li>A unique supply chain hack that came up during our conversation with <a href='https://www.mbtmag.com/video/video/22915800/security-breach-the-25m-wakeup-call-supply-chain-hack'>Theo Zafirakos</a>, a Cyber Risk and Information Security Expert at <a href='http://www.fortra.com/'>Fortra</a>.</li><li>The fall of 2024 brought security compromises to the front door of a number of prominent industrial enterprises, including <a href='https://www.mbtmag.com/cybersecurity/news/22920116/halliburton-hack-highlights-ongoing-security-threats-to-energy-firms'>Halliburton</a>.</li><li>In early August millions were impacted when <a href='https://www.mbtmag.com/cybersecurity/blog/22923672/despite-the-devastation-the-national-public-data-breach-is-anything-but-irregular'>National Public Data,</a> a major data broker that performs background checks, reported that 2.9 billion personal records from over a million individuals in the U.S., the U.K. and Canada were accessed.</li><li><a href='https://www.mbtmag.com/cybersecurity/news/22927780/ford-data-breach-embarassing-but-likely-minor'>Ford Motor Company</a> was also a target, with a data breach that saw hacking groups steal 44,000 records containing personal and product information.</li><li>Anna Wells, executive editor of Manufacturing.net and Manufacturing Business Technology, brought us coverage of a<a href='https://www.mbtmag.com/video/video/22928210/stoli-faces-bankruptcy-following-cyberattack'> hack that has crippled a global beverage maker.</a></li><li>We close out with a story from early this year describing how some of the basic tools found throughout a manufacturing plant can become <a href='https://www.mbtmag.com/video/video/22885028/security-breach-what-happens-when-a-torque-wrench-gets-hacked'>pathways for the innovative hacker.</a></li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.” </p><p>His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecurity climate. So, in an effort to ensure we repeat as few of 2024’s mistakes in 2025, we’re going to take a look at some of the industrial sector’s biggest exploits, and offer solutions and strategies in our ever-raging combat with the Black Hats. Watch/listen as we cover:</p><ul><li>A unique supply chain hack that came up during our conversation with <a href='https://www.mbtmag.com/video/video/22915800/security-breach-the-25m-wakeup-call-supply-chain-hack'>Theo Zafirakos</a>, a Cyber Risk and Information Security Expert at <a href='http://www.fortra.com/'>Fortra</a>.</li><li>The fall of 2024 brought security compromises to the front door of a number of prominent industrial enterprises, including <a href='https://www.mbtmag.com/cybersecurity/news/22920116/halliburton-hack-highlights-ongoing-security-threats-to-energy-firms'>Halliburton</a>.</li><li>In early August millions were impacted when <a href='https://www.mbtmag.com/cybersecurity/blog/22923672/despite-the-devastation-the-national-public-data-breach-is-anything-but-irregular'>National Public Data,</a> a major data broker that performs background checks, reported that 2.9 billion personal records from over a million individuals in the U.S., the U.K. and Canada were accessed.</li><li><a href='https://www.mbtmag.com/cybersecurity/news/22927780/ford-data-breach-embarassing-but-likely-minor'>Ford Motor Company</a> was also a target, with a data breach that saw hacking groups steal 44,000 records containing personal and product information.</li><li>Anna Wells, executive editor of Manufacturing.net and Manufacturing Business Technology, brought us coverage of a<a href='https://www.mbtmag.com/video/video/22928210/stoli-faces-bankruptcy-following-cyberattack'> hack that has crippled a global beverage maker.</a></li><li>We close out with a story from early this year describing how some of the basic tools found throughout a manufacturing plant can become <a href='https://www.mbtmag.com/video/video/22885028/security-breach-what-happens-when-a-torque-wrench-gets-hacked'>pathways for the innovative hacker.</a></li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16301984-the-biggest-hacks-of-2024.mp3" length="28974431" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8kwqcn7ddnyjz3mhmr2mra1tvjc6?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16301984</guid>
    <pubDate>Fri, 27 Dec 2024 12:00:00 -0500</pubDate>
    <itunes:duration>2401</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title> Looking Back to Move Forward</itunes:title>
    <title> Looking Back to Move Forward</title>
    <itunes:summary><![CDATA[Send us Fan Mail As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months. While I’m grateful for everyone we’ve had on the show, and all the support we continue to receive from the industrial cybersecurity community, I felt these comments were worth another listen, with special focus being given to a handful of the most critical issues confronting our OT environments.  First, we hear from Jon Ta...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months.</p><p>While I’m grateful for everyone we’ve had on the show, and all the support we continue to receive from the industrial cybersecurity community, I felt these comments were worth another listen, with special focus being given to a handful of the most critical issues confronting our OT environments. </p><p>First, we hear from <a href='https://www.mbtmag.com/video/video/22923516/security-breach-legacy-mindsets-are-helping-hackers-weaponize-networks'>Jon Taylor (1:16) at Versa</a>, as he discusses a unique approach to patching and secure-by-design strategies that involve the development embedded micro-segmentation approaches. </p><p>Next, we’ll hear from <a href='https://www.mbtmag.com/video/video/22925050/security-breach-the-little-things-that-kill'>Cloud Range’s Tom Marsland (11:18)</a>  as he discusses the continued challenges presented by data silos, and innovative ways to address the shortage of cybersecurity specialists. </p><p>Then we’ll turn to <a href='https://www.mbtmag.com/video/video/22920003/security-breach-inside-the-growing-complexity-of-ransomware-hacking-groups'>Baker Tilly’s Jeff Krull</a> (19:42) as he reports on ransomware gangs and their combination of new and old tactics. </p><p>And we’ll finish up with <a href='https://www.mbtmag.com/video/video/22917149/security-breach-theres-no-bulletproof-vest-in-cybersecurity'>cybersecurity researcher Jeremiah Fowler (29:40)</a> as he discusses some of the ongoing challenges about addressing persistent vulnerabilities.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months.</p><p>While I’m grateful for everyone we’ve had on the show, and all the support we continue to receive from the industrial cybersecurity community, I felt these comments were worth another listen, with special focus being given to a handful of the most critical issues confronting our OT environments. </p><p>First, we hear from <a href='https://www.mbtmag.com/video/video/22923516/security-breach-legacy-mindsets-are-helping-hackers-weaponize-networks'>Jon Taylor (1:16) at Versa</a>, as he discusses a unique approach to patching and secure-by-design strategies that involve the development embedded micro-segmentation approaches. </p><p>Next, we’ll hear from <a href='https://www.mbtmag.com/video/video/22925050/security-breach-the-little-things-that-kill'>Cloud Range’s Tom Marsland (11:18)</a>  as he discusses the continued challenges presented by data silos, and innovative ways to address the shortage of cybersecurity specialists. </p><p>Then we’ll turn to <a href='https://www.mbtmag.com/video/video/22920003/security-breach-inside-the-growing-complexity-of-ransomware-hacking-groups'>Baker Tilly’s Jeff Krull</a> (19:42) as he reports on ransomware gangs and their combination of new and old tactics. </p><p>And we’ll finish up with <a href='https://www.mbtmag.com/video/video/22917149/security-breach-theres-no-bulletproof-vest-in-cybersecurity'>cybersecurity researcher Jeremiah Fowler (29:40)</a> as he discusses some of the ongoing challenges about addressing persistent vulnerabilities.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16264208-looking-back-to-move-forward.mp3" length="30042789" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/susykcdo2kji8j131gwys04mv7tb?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16264208</guid>
    <pubDate>Thu, 12 Dec 2024 17:00:00 -0500</pubDate>
    <itunes:duration>2489</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI Is Exposing Your Most Vulnerable Attack Surface</itunes:title>
    <title>AI Is Exposing Your Most Vulnerable Attack Surface</title>
    <itunes:summary><![CDATA[Send us Fan Mail According to Fortinet’s 2024 State of Operational Technology and Cybersecurity Report, 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– a number this is up nearly 10 percent from last year.  And we all know what happens with this hijacked data.  Per the World Economic Forum’s May 2024 white paper, the number of ransomware attacks on industrial infrastructure doubled in 2023, boosting ransomware to the le...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>According to Fortinet’s <em>2024 State of Operational Technology and Cybersecurity Report,</em> 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– a number this is up nearly 10 percent from last year. </p><p>And we all know what happens with this hijacked data. </p><p>Per the World Economic Forum’s May 2024 white paper, the number of ransomware attacks on industrial infrastructure doubled in 2023, boosting ransomware to the leading concern for manufacturers, with 40 percent citing it as their top issue. While that may not surprise you, this might - due to the many challenges we’ve discussed here on <em>Security Breach</em>, the industrial sector now accounts for 71 percent of all ransomware attacks. </p><p>Our data is valuable and the hackers know it.</p><p>To offer some perspective on protecting this data, we sat down with Karthik Krishnan, CEO of Concentric.ai – a leading provider of data security posture management solutions. Watch/listen as he provides insight on:</p><ul><li>Prioritizing and limiting data access to lessen the blast radius.</li><li>How data, especially customer data, is essentially the &quot;new oil.&quot;</li><li>Reversing your mindset to think about &quot;data out&quot; instead of &quot;user in&quot;.</li><li>The generative AI advancements that continue to be made, and how they&apos;re producing more complex phishing and ransomware attacks.  </li><li>Why it has become easier for hackers to get a foothold on your network.</li><li>The best ways to shore up your weakest security link - employees.</li><li>How it all starts with data discovery and visualization, then prioritization.</li><li>A look at the money involved with remediation and response costs versus proper planning and defense prep.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>According to Fortinet’s <em>2024 State of Operational Technology and Cybersecurity Report,</em> 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– a number this is up nearly 10 percent from last year. </p><p>And we all know what happens with this hijacked data. </p><p>Per the World Economic Forum’s May 2024 white paper, the number of ransomware attacks on industrial infrastructure doubled in 2023, boosting ransomware to the leading concern for manufacturers, with 40 percent citing it as their top issue. While that may not surprise you, this might - due to the many challenges we’ve discussed here on <em>Security Breach</em>, the industrial sector now accounts for 71 percent of all ransomware attacks. </p><p>Our data is valuable and the hackers know it.</p><p>To offer some perspective on protecting this data, we sat down with Karthik Krishnan, CEO of Concentric.ai – a leading provider of data security posture management solutions. Watch/listen as he provides insight on:</p><ul><li>Prioritizing and limiting data access to lessen the blast radius.</li><li>How data, especially customer data, is essentially the &quot;new oil.&quot;</li><li>Reversing your mindset to think about &quot;data out&quot; instead of &quot;user in&quot;.</li><li>The generative AI advancements that continue to be made, and how they&apos;re producing more complex phishing and ransomware attacks.  </li><li>Why it has become easier for hackers to get a foothold on your network.</li><li>The best ways to shore up your weakest security link - employees.</li><li>How it all starts with data discovery and visualization, then prioritization.</li><li>A look at the money involved with remediation and response costs versus proper planning and defense prep.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16241584-ai-is-exposing-your-most-vulnerable-attack-surface.mp3" length="25569519" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rf0axlf5k51ov3dnc49gcm6i4vmr?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16241584</guid>
    <pubDate>Mon, 09 Dec 2024 10:00:00 -0500</pubDate>
    <itunes:duration>2118</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Minimizing Hacks by Focusing on Uptime</itunes:title>
    <title>Minimizing Hacks by Focusing on Uptime</title>
    <itunes:summary><![CDATA[Send us Fan Mail Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings.  Perhaps most frustrating is having to essentially reverse engineer a number of establi...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings. </p><p>Perhaps most frustrating is having to essentially reverse engineer a number of established products in order to quell security concerns. However, as frustrating as these efforts might be, the growing number of zero day hacks emanating from embedded security vulnerabilities will only continue to grow as we look to embed greater levels of sensor, software and AI-driven functionality. </p><p>In this episode we hear from Marcellus Buchheit, President and CEO of Wibu-Systems USA, a leading provider of security solutions for embedded data and intellectual property. Watch/listen as we discuss:</p><ul><li>How vulnerabilities and risks need to be assessed beyond their expense to focus on updates, reconfigurations and the growing number of OT connection points.</li><li>The need for SOPs that make it easier to assimilate cybersecurity into OT processes.</li><li>Ways to more safely update the growing number of devices on the plant floor.</li><li>Protecting IP and, more specifically, the software coding associated with it.</li><li>The impact AI continues to have on increasing the sophistication of hacking attempts.</li><li>Why all hacks are &quot;highly preventable.&quot;</li><li>The role of quantum computing and the steps to take in preparing for &quot;Q Day&quot;.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings. </p><p>Perhaps most frustrating is having to essentially reverse engineer a number of established products in order to quell security concerns. However, as frustrating as these efforts might be, the growing number of zero day hacks emanating from embedded security vulnerabilities will only continue to grow as we look to embed greater levels of sensor, software and AI-driven functionality. </p><p>In this episode we hear from Marcellus Buchheit, President and CEO of Wibu-Systems USA, a leading provider of security solutions for embedded data and intellectual property. Watch/listen as we discuss:</p><ul><li>How vulnerabilities and risks need to be assessed beyond their expense to focus on updates, reconfigurations and the growing number of OT connection points.</li><li>The need for SOPs that make it easier to assimilate cybersecurity into OT processes.</li><li>Ways to more safely update the growing number of devices on the plant floor.</li><li>Protecting IP and, more specifically, the software coding associated with it.</li><li>The impact AI continues to have on increasing the sophistication of hacking attempts.</li><li>Why all hacks are &quot;highly preventable.&quot;</li><li>The role of quantum computing and the steps to take in preparing for &quot;Q Day&quot;.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16146645-minimizing-hacks-by-focusing-on-uptime.mp3" length="27937250" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/u9wiq4uev5yydijz2o40ydujv6qy?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16146645</guid>
    <pubDate>Thu, 21 Nov 2024 10:00:00 -0500</pubDate>
    <itunes:duration>2315</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What Cybersecurity Can Learn from Tom Brady</itunes:title>
    <title>What Cybersecurity Can Learn from Tom Brady</title>
    <itunes:summary><![CDATA[Send us Fan Mail We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats.  Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies. While table top exercises are nothing new, we’re going to demonstrate how they’re evolving and can be customized according to your needs. We’re going to tackle the human element of c...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>We assembled some &quot;nerds from the basement&quot; to cover a key strategy in combatting evolving threats.</em><br/><br/>Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies.</p><p>While table top exercises are nothing new, we’re going to demonstrate how they’re evolving and can be customized according to your needs. We’re going to tackle the human element of cybersecurity by discussing communications strategies, and we’ll offer some insight on getting greater buy-in from throughout the organization, including the C-suite and those controlling the purse strings.</p><p>Joining me to discuss these topics and run through a mock exercise will be:</p><ul><li>Navroop Mitter, the CEO and founder of ArmorText. His firm is a leader in secure out-of-band communications.</li><li>Matthew Welling, a partner at Crowell &amp; Moring&apos;s Washington, D.C. office, where he works in the firm&apos;s Privacy &amp; Cybersecurity Group.</li><li>Timothy Chase, the director of the Manufacturing ISAC, a non-profit organization and leading provider of threat intelligence sharing solutions.</li></ul><p>In addition to the table top exercise, we&apos;ll discuss:</p><ul><li>Communication challenges before, during and after an attack.</li><li>Response strategies and the evolving dynamic of out-of-band communications.</li><li>The ongoing challenges of addressing the Human Element of cybersecurity.</li><li>The impact of regulatory efforts and how they&apos;re playing a bigger role in attack response plans.</li><li>The types of tools or solutions that can play the biggest role in helping organizations respond to attacks more effectively.</li><li>How to control the emotional responses that will undoubtedly emanate from an attack. </li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>We assembled some &quot;nerds from the basement&quot; to cover a key strategy in combatting evolving threats.</em><br/><br/>Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies.</p><p>While table top exercises are nothing new, we’re going to demonstrate how they’re evolving and can be customized according to your needs. We’re going to tackle the human element of cybersecurity by discussing communications strategies, and we’ll offer some insight on getting greater buy-in from throughout the organization, including the C-suite and those controlling the purse strings.</p><p>Joining me to discuss these topics and run through a mock exercise will be:</p><ul><li>Navroop Mitter, the CEO and founder of ArmorText. His firm is a leader in secure out-of-band communications.</li><li>Matthew Welling, a partner at Crowell &amp; Moring&apos;s Washington, D.C. office, where he works in the firm&apos;s Privacy &amp; Cybersecurity Group.</li><li>Timothy Chase, the director of the Manufacturing ISAC, a non-profit organization and leading provider of threat intelligence sharing solutions.</li></ul><p>In addition to the table top exercise, we&apos;ll discuss:</p><ul><li>Communication challenges before, during and after an attack.</li><li>Response strategies and the evolving dynamic of out-of-band communications.</li><li>The ongoing challenges of addressing the Human Element of cybersecurity.</li><li>The impact of regulatory efforts and how they&apos;re playing a bigger role in attack response plans.</li><li>The types of tools or solutions that can play the biggest role in helping organizations respond to attacks more effectively.</li><li>How to control the emotional responses that will undoubtedly emanate from an attack. </li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16101851-what-cybersecurity-can-learn-from-tom-brady.mp3" length="38086727" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/455zn1hz99s5bur8die2jolmhp75?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16101851</guid>
    <pubDate>Fri, 15 Nov 2024 13:00:00 -0500</pubDate>
    <itunes:duration>3161</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Threat Landscape Update</itunes:title>
    <title>Threat Landscape Update</title>
    <itunes:summary><![CDATA[Send us Fan Mail For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries responsible for next-generation malware, ransomware and phishing schemes.  To kick things off, we'll hear from: Tom Marsland, VP...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries responsible for next-generation malware, ransomware and phishing schemes. </p><p>To kick things off, we&apos;ll hear from:</p><ul><li><a href='https://www.mbtmag.com/video/video/22925050/security-breach-the-little-things-that-kill'>Tom Marsland, VP of Technology for Cloud Range</a> as he discusses threats to our infrastructure and state-sponsored groups from China.</li><li>(3:31) He’ll be followed by <a href='https://www.mbtmag.com/video/video/22924347/security-breach-preventing-phishing-attacks-not-rocket-science'>Cyberhoot’s Craig Taylor</a> as he updates us on phishing schemes.</li><li>(5:45) And then we’ll hear from <a href='https://www.mbtmag.com/video/video/22923516/security-breach-legacy-mindsets-are-helping-hackers-weaponize-networks'>Jon Taylor at Versa Networks</a> as he talks about strategies bad actors are taking in targeting legacy industrial control systems. </li></ul><p>While many of those topics are already at the top of our list of concerns, there are also a number of evolving threats that warrant an uptick in resources – from both a financial and skillset development perspective. We&apos;ll dive into comments from:</p><ul><li>(9:26) <a href='https://www.mbtmag.com/video/video/22922763/security-breach-leveraging-your-force-multipliers'>Corsha’s Anusha Iyer</a> as she discusses supply chain and dwelling attacks.</li><li>(15:33) <a href='https://www.mbtmag.com/video/video/22922069/security-breach-never-let-a-good-hack-go-to-waste'>Venafi’s Kevin Bocek</a> and his take on embedded software vulnerabilities and how hackers are taking advantage of them.</li><li>(22:18) <a href='https://www.mbtmag.com/video/video/22920003/security-breach-inside-the-growing-complexity-of-ransomware-hacking-groups'>Baker Tilly’s Jeff Krull </a>offers an update on the evolving complexity of ransomware groups and how they’re targeting the industrial sector.</li><li>(25:20) And finally, let’s wrap up with one of my favorite guests we’ve ever had on Security Breach – <a href='https://www.mbtmag.com/video/video/22917149/security-breach-theres-no-bulletproof-vest-in-cybersecurity'>researcher Jeremiah Fowler</a>. He’ll offer some insight on a number of unique, embedded threats and some of the lessons he’s learned in tangling with state-sponsored Russian hackers.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries responsible for next-generation malware, ransomware and phishing schemes. </p><p>To kick things off, we&apos;ll hear from:</p><ul><li><a href='https://www.mbtmag.com/video/video/22925050/security-breach-the-little-things-that-kill'>Tom Marsland, VP of Technology for Cloud Range</a> as he discusses threats to our infrastructure and state-sponsored groups from China.</li><li>(3:31) He’ll be followed by <a href='https://www.mbtmag.com/video/video/22924347/security-breach-preventing-phishing-attacks-not-rocket-science'>Cyberhoot’s Craig Taylor</a> as he updates us on phishing schemes.</li><li>(5:45) And then we’ll hear from <a href='https://www.mbtmag.com/video/video/22923516/security-breach-legacy-mindsets-are-helping-hackers-weaponize-networks'>Jon Taylor at Versa Networks</a> as he talks about strategies bad actors are taking in targeting legacy industrial control systems. </li></ul><p>While many of those topics are already at the top of our list of concerns, there are also a number of evolving threats that warrant an uptick in resources – from both a financial and skillset development perspective. We&apos;ll dive into comments from:</p><ul><li>(9:26) <a href='https://www.mbtmag.com/video/video/22922763/security-breach-leveraging-your-force-multipliers'>Corsha’s Anusha Iyer</a> as she discusses supply chain and dwelling attacks.</li><li>(15:33) <a href='https://www.mbtmag.com/video/video/22922069/security-breach-never-let-a-good-hack-go-to-waste'>Venafi’s Kevin Bocek</a> and his take on embedded software vulnerabilities and how hackers are taking advantage of them.</li><li>(22:18) <a href='https://www.mbtmag.com/video/video/22920003/security-breach-inside-the-growing-complexity-of-ransomware-hacking-groups'>Baker Tilly’s Jeff Krull </a>offers an update on the evolving complexity of ransomware groups and how they’re targeting the industrial sector.</li><li>(25:20) And finally, let’s wrap up with one of my favorite guests we’ve ever had on Security Breach – <a href='https://www.mbtmag.com/video/video/22917149/security-breach-theres-no-bulletproof-vest-in-cybersecurity'>researcher Jeremiah Fowler</a>. He’ll offer some insight on a number of unique, embedded threats and some of the lessons he’s learned in tangling with state-sponsored Russian hackers.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16060925-threat-landscape-update.mp3" length="27707773" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/k6m43ifikll3qeooyopki8tzuvn5?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16060925</guid>
    <pubDate>Fri, 08 Nov 2024 13:00:00 -0500</pubDate>
    <itunes:duration>2296</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Little Things That Kill</itunes:title>
    <title>The Little Things That Kill</title>
    <itunes:summary><![CDATA[Send us Fan Mail While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true. We know that the frequency of attacks will continue to increase. We know that it’s not if your ICS will be probed, but when. And we also know that asset and connection visibility is an ongoing challenge due to the implementation of more automated technology. Finally, we also know that one of the most important aspects of any cybersecurity plan ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true.</p><p>We know that the frequency of attacks will continue to increase.</p><p>We know that it’s not if your ICS will be probed, but when.</p><p>And we also know that asset and connection visibility is an ongoing challenge due to the implementation of more automated technology.</p><p>Finally, we also know that one of the most important aspects of any cybersecurity plan is the portion that lays out the response. </p><p>One of the most effective ways to address these concerns can be the use of attack simulations. In this episode we tap in to the expertise of Tom Marsland, VP of Technology for Cloud Range, a leading provider of live-fire cybersecurity exercises and training. Watch/listen as we discuss:</p><ul><li>All the little things that are continuing to pose challenges to industrial cybersecurity.</li><li>Why state-sponsored hacker groups in China are getting more of his attention lately.</li><li>Why successful incident response is about the people, not the tools.</li><li>The importance of &quot;training like you fight.&quot;</li><li>His role with <a href='https://www.vetsec.org/'>VetSec</a>, and the role it can play in filling cybersecurity talent gaps. </li><li>How to bring IT and OT together and why the onus on strengthening these bonds might fall more on IT.</li><li>Why the culture of security needs to permeate throughout the entire organization.</li><li>How AI can help make the most of your people.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true.</p><p>We know that the frequency of attacks will continue to increase.</p><p>We know that it’s not if your ICS will be probed, but when.</p><p>And we also know that asset and connection visibility is an ongoing challenge due to the implementation of more automated technology.</p><p>Finally, we also know that one of the most important aspects of any cybersecurity plan is the portion that lays out the response. </p><p>One of the most effective ways to address these concerns can be the use of attack simulations. In this episode we tap in to the expertise of Tom Marsland, VP of Technology for Cloud Range, a leading provider of live-fire cybersecurity exercises and training. Watch/listen as we discuss:</p><ul><li>All the little things that are continuing to pose challenges to industrial cybersecurity.</li><li>Why state-sponsored hacker groups in China are getting more of his attention lately.</li><li>Why successful incident response is about the people, not the tools.</li><li>The importance of &quot;training like you fight.&quot;</li><li>His role with <a href='https://www.vetsec.org/'>VetSec</a>, and the role it can play in filling cybersecurity talent gaps. </li><li>How to bring IT and OT together and why the onus on strengthening these bonds might fall more on IT.</li><li>Why the culture of security needs to permeate throughout the entire organization.</li><li>How AI can help make the most of your people.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/16025788-the-little-things-that-kill.mp3" length="27562755" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zl4j2zkmwrvzcyud87i241uphh8w?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16025788</guid>
    <pubDate>Thu, 31 Oct 2024 17:00:00 -0400</pubDate>
    <itunes:duration>2284</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Phishing Attack Defense &#39;Not Rocket Science&#39;</itunes:title>
    <title>Phishing Attack Defense &#39;Not Rocket Science&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a lot of hackers very happy. And based on Proofpoint’s 2024 State of Phish report, protecting against phishing schemes is simply not being reinforced or given the proper priority. For example, 71% of surveyed users admitted to taking a ri...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a lot of hackers very happy.</p><p>And based on Proofpoint’s <em>2024 State of Phish </em>report, protecting against phishing schemes is simply not being reinforced or given the proper priority. For example,</p><ul><li>71% of surveyed users admitted to taking a risky action, and 96% knew they were doing something risky when interacting with email or text messages.</li><li>85% of security professionals said that most employees know they are responsible for security, but 59% of employees weren’t sure or claimed that they’re not responsible.</li><li>Furthermore, 24% admitted to responding to emails or text messages from someone they don’t know, and 19% clicked on links in emails from people they don’t know.</li><li>Finally, 73% of surveyed companies reported a business email compromise, but only 29% are actively teaching users about BEC attacks. </li></ul><p>To address these and other phishing attack dynamics, I sat down with Craig Taylor, co-founder of Cyberhoot, a leading provider of phishing prevention solutions. Watch/listen as we discuss:</p><ul><li>How hackers are going after session tokens to steal valuable credential data.</li><li>Why phishing prevention training spends too much time on avoiding the click instead of positive reinforcement of proper actions.</li><li>The need for worker training to go beyond any impact to the company, to the individual cyber risks as well.</li><li>How adding &quot;friction&quot; to email could be a solution.</li><li>The bad password advice that many high-level organizations continue to distribute.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a lot of hackers very happy.</p><p>And based on Proofpoint’s <em>2024 State of Phish </em>report, protecting against phishing schemes is simply not being reinforced or given the proper priority. For example,</p><ul><li>71% of surveyed users admitted to taking a risky action, and 96% knew they were doing something risky when interacting with email or text messages.</li><li>85% of security professionals said that most employees know they are responsible for security, but 59% of employees weren’t sure or claimed that they’re not responsible.</li><li>Furthermore, 24% admitted to responding to emails or text messages from someone they don’t know, and 19% clicked on links in emails from people they don’t know.</li><li>Finally, 73% of surveyed companies reported a business email compromise, but only 29% are actively teaching users about BEC attacks. </li></ul><p>To address these and other phishing attack dynamics, I sat down with Craig Taylor, co-founder of Cyberhoot, a leading provider of phishing prevention solutions. Watch/listen as we discuss:</p><ul><li>How hackers are going after session tokens to steal valuable credential data.</li><li>Why phishing prevention training spends too much time on avoiding the click instead of positive reinforcement of proper actions.</li><li>The need for worker training to go beyond any impact to the company, to the individual cyber risks as well.</li><li>How adding &quot;friction&quot; to email could be a solution.</li><li>The bad password advice that many high-level organizations continue to distribute.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15984414-phishing-attack-defense-not-rocket-science.mp3" length="16263988" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/97wtfsw004r0cptg8eza513d1y1d?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15984414</guid>
    <pubDate>Thu, 24 Oct 2024 18:00:00 -0400</pubDate>
    <itunes:duration>1342</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Legacy Mindsets Are Helping Hackers Weaponize Networks</itunes:title>
    <title>Legacy Mindsets Are Helping Hackers Weaponize Networks</title>
    <itunes:summary><![CDATA[Send us Fan Mail So, my daughters like to give me a hard time about growing old.  Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines are still in place because they work. While the technology around these assets has evolved, their core functionality and value to the production process has remained constant.  But as sensors, network connections and access parameters have been upgraded to improve output,...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>So, my daughters like to give me a hard time about growing old. </p><p>Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines are still in place because they work. While the technology around these assets has evolved, their core functionality and value to the production process has remained constant. </p><p>But as sensors, network connections and access parameters have been upgraded to improve output, these highly prized pieces of equipment are showing their age from a cybersecurity perspective. The challenges they present are reinforced with findings from Fortinet’s <em>2024 State of Operational Technology and Cybersecurity Report. </em></p><p>A couple of key takeaways include findings that show nearly one-third of respondents experiencing six or more intrusions in the last year. Additionally, fewer respondents claimed 100 percent OT system visibility – with that number decreasing from 10 to five percent. On the bright side, we’re getting better in some areas, with 20 percent of organizations establishing visibility and implementing segmentation, up from only 13 percent the previous year.</p><p>Joining us to discuss these and other trends is <a href='https://versa-networks.com/blog/author/jon-taylor/'>Jon Taylor, Director</a> and Principal of Security with <a href='https://versa-networks.com/'>Versa Networks</a>, a leading provider of digital transformation and edge security solutions. Watch/listen as he discusses:</p><ul><li>Why the Purdue model might re outdated and preventing many from using new strategies like SASE.</li><li>Why he believes visibility is security - &quot;you have to see it  do defend it,&quot; and how AI could be the solution.</li><li>The need for OT to look at vulnerabilities from a network or architecture perspective, not by device or connection point.</li><li>How air gapping help feed the division between IT and OT.</li><li>The weaponizing of OT networks stems from the lack of an adaptive network strategy fed by archaic infrastructure.</li><li>Instead of Security by Design, we need to implement Patching by Design.</li><li>Why the industrial sector needs to be more vocal about the need for embedded security and embedded micro-segmentation.</li><li>How state-sponsored hackers are helping elevate the industrial sector&apos;s response and prioritization of cybersecurity.</li></ul><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>So, my daughters like to give me a hard time about growing old. </p><p>Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines are still in place because they work. While the technology around these assets has evolved, their core functionality and value to the production process has remained constant. </p><p>But as sensors, network connections and access parameters have been upgraded to improve output, these highly prized pieces of equipment are showing their age from a cybersecurity perspective. The challenges they present are reinforced with findings from Fortinet’s <em>2024 State of Operational Technology and Cybersecurity Report. </em></p><p>A couple of key takeaways include findings that show nearly one-third of respondents experiencing six or more intrusions in the last year. Additionally, fewer respondents claimed 100 percent OT system visibility – with that number decreasing from 10 to five percent. On the bright side, we’re getting better in some areas, with 20 percent of organizations establishing visibility and implementing segmentation, up from only 13 percent the previous year.</p><p>Joining us to discuss these and other trends is <a href='https://versa-networks.com/blog/author/jon-taylor/'>Jon Taylor, Director</a> and Principal of Security with <a href='https://versa-networks.com/'>Versa Networks</a>, a leading provider of digital transformation and edge security solutions. Watch/listen as he discusses:</p><ul><li>Why the Purdue model might re outdated and preventing many from using new strategies like SASE.</li><li>Why he believes visibility is security - &quot;you have to see it  do defend it,&quot; and how AI could be the solution.</li><li>The need for OT to look at vulnerabilities from a network or architecture perspective, not by device or connection point.</li><li>How air gapping help feed the division between IT and OT.</li><li>The weaponizing of OT networks stems from the lack of an adaptive network strategy fed by archaic infrastructure.</li><li>Instead of Security by Design, we need to implement Patching by Design.</li><li>Why the industrial sector needs to be more vocal about the need for embedded security and embedded micro-segmentation.</li><li>How state-sponsored hackers are helping elevate the industrial sector&apos;s response and prioritization of cybersecurity.</li></ul><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15937116-legacy-mindsets-are-helping-hackers-weaponize-networks.mp3" length="30507822" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/shhhyi1ynnmrba8la4u0bzfwagej?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15937116</guid>
    <pubDate>Fri, 18 Oct 2024 12:00:00 -0400</pubDate>
    <itunes:duration>2529</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Using Force Multipliers to Protect Against Next-Gen Stuxnet</itunes:title>
    <title>Using Force Multipliers to Protect Against Next-Gen Stuxnet</title>
    <itunes:summary><![CDATA[Send us Fan Mail While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controlling the purse strings. SonicWall’s Mid-Year Cyber Threat Report found that their firewalls were under attack 125 percent of the time during a 40-hour work week. And if that doesn’t get the attention of the powers that be, it might also be worth mentioning that during these attacks...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controlling the purse strings.</p><p>SonicWall’s <em>Mid-Year Cyber Threat Report</em> found that their firewalls were<b> under attack 125 percent of the time</b> during a 40-hour work week. And if that doesn’t get the attention of the powers that be, it might also be worth mentioning that during these attacks SonicWall also found that, at a minimum, 12.6 percent of all revenues were exposed to cyber threats that were not covered by security tools or procedures. </p><p>Extrahop’s <em>Global Cyber Confidence Index</em> also reported that 31 percent of cyber and IT leaders want more budget, or more accurately, a 50 percent increase in order to effectively manage and mitigate cyber risk. That number might seem a bit inflated, but it does help illustrate how we’re seemingly fighting the cyber battle on multiple fronts.</p><p>To help sort through some of these challenges and direct our resources as effectively as possible, I recently sat down with Anusha Iyer, the Founder and CEO of <a href='https://corsha.com/'>Corsha,</a> a leading provider of OT asset management and access security solutions.</p><p>Watch/listen as we discuss:        </p><ul><li>How to retrofit new practices for legacy assets in order to optimize uptime.</li><li>The false confidence generated by many air gap strategies.</li><li>The importance of machine identity strategies in order to understand the best ways to secure assets and their growing number of connections.</li><li>Increases in ICS-focused malware and live-off-the-land attacks.</li><li>The importance of focusing on the &quot;whys&quot; when conducting employee cybersecurity training.</li><li>Reinforcing the &quot;realities of the day&quot; in improving the entire cybersecurity community.</li><li>Using AI to assess more connection behaviors.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controlling the purse strings.</p><p>SonicWall’s <em>Mid-Year Cyber Threat Report</em> found that their firewalls were<b> under attack 125 percent of the time</b> during a 40-hour work week. And if that doesn’t get the attention of the powers that be, it might also be worth mentioning that during these attacks SonicWall also found that, at a minimum, 12.6 percent of all revenues were exposed to cyber threats that were not covered by security tools or procedures. </p><p>Extrahop’s <em>Global Cyber Confidence Index</em> also reported that 31 percent of cyber and IT leaders want more budget, or more accurately, a 50 percent increase in order to effectively manage and mitigate cyber risk. That number might seem a bit inflated, but it does help illustrate how we’re seemingly fighting the cyber battle on multiple fronts.</p><p>To help sort through some of these challenges and direct our resources as effectively as possible, I recently sat down with Anusha Iyer, the Founder and CEO of <a href='https://corsha.com/'>Corsha,</a> a leading provider of OT asset management and access security solutions.</p><p>Watch/listen as we discuss:        </p><ul><li>How to retrofit new practices for legacy assets in order to optimize uptime.</li><li>The false confidence generated by many air gap strategies.</li><li>The importance of machine identity strategies in order to understand the best ways to secure assets and their growing number of connections.</li><li>Increases in ICS-focused malware and live-off-the-land attacks.</li><li>The importance of focusing on the &quot;whys&quot; when conducting employee cybersecurity training.</li><li>Reinforcing the &quot;realities of the day&quot; in improving the entire cybersecurity community.</li><li>Using AI to assess more connection behaviors.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15897567-using-force-multipliers-to-protect-against-next-gen-stuxnet.mp3" length="28747104" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kxpuhygfgvm5l8pv249779uyq51b?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15897567</guid>
    <pubDate>Thu, 10 Oct 2024 10:00:00 -0400</pubDate>
    <itunes:duration>2383</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Never Let a Good Hack Go to Waste</itunes:title>
    <title>Never Let a Good Hack Go to Waste</title>
    <itunes:summary><![CDATA[Send us Fan Mail One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response. Of course, this is never simple due to the increasing amount of IIoT technology and the connection demands they place on industrial...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the most common topics we explore here on <em>Security Breach</em> is the ongoing challenge of asset visibility in the OT landscape. It&apos;s frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response.</p><p>Of course, this is never simple due to the increasing amount of IIoT technology and the connection demands they place on industrial systems. It’s a situation that promises to only get more complex, with Fortinet reporting that in 2023, only five percent of surveyed organizations have 100 percent visibility into their own OT activities – a number that is down from 13 percent in 2022. </p><p>To provide some insight on managing this growing number of machines, connections, access points and other vulnerable areas of the ICS, we connected with Kevin Bocek, the Chief Innovation Officer at Venafi, a leading provider of asset identity management. Watch/listen as he discusses:</p><ul><li>Why cyber incidents are a learning opportunity for everyone.</li><li>The benefits of showing the C-suite all those plant floor connections when working to get proper cybersecurity funding.</li><li>The rise in attacks that will be emanating from legacy software and coding.</li><li>Why software assets should be managed and secured in the same manner as machines or devices.</li><li>How manufacturing can bring Continuous Improvement strategies to OT security.</li><li>Stuxnet&apos;s long-term impact.</li><li>How quantum computing will dramatically alter authentication approaches and secure-by-design practices within the next five years.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the most common topics we explore here on <em>Security Breach</em> is the ongoing challenge of asset visibility in the OT landscape. It&apos;s frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response.</p><p>Of course, this is never simple due to the increasing amount of IIoT technology and the connection demands they place on industrial systems. It’s a situation that promises to only get more complex, with Fortinet reporting that in 2023, only five percent of surveyed organizations have 100 percent visibility into their own OT activities – a number that is down from 13 percent in 2022. </p><p>To provide some insight on managing this growing number of machines, connections, access points and other vulnerable areas of the ICS, we connected with Kevin Bocek, the Chief Innovation Officer at Venafi, a leading provider of asset identity management. Watch/listen as he discusses:</p><ul><li>Why cyber incidents are a learning opportunity for everyone.</li><li>The benefits of showing the C-suite all those plant floor connections when working to get proper cybersecurity funding.</li><li>The rise in attacks that will be emanating from legacy software and coding.</li><li>Why software assets should be managed and secured in the same manner as machines or devices.</li><li>How manufacturing can bring Continuous Improvement strategies to OT security.</li><li>Stuxnet&apos;s long-term impact.</li><li>How quantum computing will dramatically alter authentication approaches and secure-by-design practices within the next five years.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15856976-never-let-a-good-hack-go-to-waste.mp3" length="23896777" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/g9b0scai65ejra2fkyj67z0c8rk9?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15856976</guid>
    <pubDate>Thu, 03 Oct 2024 00:00:00 -0400</pubDate>
    <itunes:duration>1979</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Finding Your &#39;Creative Maliciousness&#39;</itunes:title>
    <title>Finding Your &#39;Creative Maliciousness&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail According to Veeam’s 2024 Ransomware Trends Report, cyber victims stated that they were unable to restore 43 percent of whatever data was affected by ransomware attacks. This reaffirms what a number of Security Breach guests have stated about trusting hackers after paying their extortion demands.  Another finding shows that 63 percent of ransomware attack victims restored the compromised systems directly back into their production environment, without some type of quaran...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>According to Veeam’s <em>2024 Ransomware Trends Report, </em>cyber victims stated that they were unable to restore 43 percent of whatever data was affected by ransomware attacks. This reaffirms what a number of <em>Security Breach</em> guests have stated about trusting hackers after paying their extortion demands. </p><p>Another finding shows that 63 percent of ransomware attack victims restored the compromised systems directly back into their production environment, without some type of quarantine or scanning method. The risk here, obviously, is simply bringing the ransomware right back to where you removed it. This is a big contributor to the ongoing frustrations associated with dwelling, or living-off-the-land attacks. </p><p>As much as we’d like it to, ransomware simply won’t go away. Some of this stems from a hacking community that continues to draw from a growing treasure chest of financial and technical resources. The other is that we continue to fall short in executing some of the basic blocking and tackling of cybersecurity, like protecting logins, improving visibility of our OT environment, and securing key devices.</p><p>In this episode, John Terrill, vice president of Phosphorus, a leading provider of security management services and solutions, offers his take on ransomware, as well as:</p><ul><li>How hackers are using replicable tool kits in moving from system to system or victim to victim in the industrial sector.</li><li>Moving past the mindset that vulnerabilities are only a problem if that can&apos;t be exploited - hackers will them.</li><li>How those in cyber defense need to unlock their &quot;creative maliciousness&quot;, or take a similar approach to hackers in not being afraid to move around the system and potentially break stuff in order to identify soft spots in defenses.</li><li>Why he prefers homegrown OT security expertise.</li><li>The increasing benefits emanating from political discourse on cybersecurity.</li><li>Remembering that non-OT systems, like HVAC or elevators, can be inroads to the ICS, and need to be defended as part of the OT landscape.</li><li>Why we need to look at OT assets like computers, not just machines.</li><li>How to overcome segmentation and micro-segmentation challenges.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>According to Veeam’s <em>2024 Ransomware Trends Report, </em>cyber victims stated that they were unable to restore 43 percent of whatever data was affected by ransomware attacks. This reaffirms what a number of <em>Security Breach</em> guests have stated about trusting hackers after paying their extortion demands. </p><p>Another finding shows that 63 percent of ransomware attack victims restored the compromised systems directly back into their production environment, without some type of quarantine or scanning method. The risk here, obviously, is simply bringing the ransomware right back to where you removed it. This is a big contributor to the ongoing frustrations associated with dwelling, or living-off-the-land attacks. </p><p>As much as we’d like it to, ransomware simply won’t go away. Some of this stems from a hacking community that continues to draw from a growing treasure chest of financial and technical resources. The other is that we continue to fall short in executing some of the basic blocking and tackling of cybersecurity, like protecting logins, improving visibility of our OT environment, and securing key devices.</p><p>In this episode, John Terrill, vice president of Phosphorus, a leading provider of security management services and solutions, offers his take on ransomware, as well as:</p><ul><li>How hackers are using replicable tool kits in moving from system to system or victim to victim in the industrial sector.</li><li>Moving past the mindset that vulnerabilities are only a problem if that can&apos;t be exploited - hackers will them.</li><li>How those in cyber defense need to unlock their &quot;creative maliciousness&quot;, or take a similar approach to hackers in not being afraid to move around the system and potentially break stuff in order to identify soft spots in defenses.</li><li>Why he prefers homegrown OT security expertise.</li><li>The increasing benefits emanating from political discourse on cybersecurity.</li><li>Remembering that non-OT systems, like HVAC or elevators, can be inroads to the ICS, and need to be defended as part of the OT landscape.</li><li>Why we need to look at OT assets like computers, not just machines.</li><li>How to overcome segmentation and micro-segmentation challenges.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15815868-finding-your-creative-maliciousness.mp3" length="27970213" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kgihz68h4x83n14ipf0434iwmygf?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15815868</guid>
    <pubDate>Thu, 26 Sep 2024 09:00:00 -0400</pubDate>
    <itunes:duration>2318</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Getting Past the Whack-A-Mole Approach</itunes:title>
    <title>Getting Past the Whack-A-Mole Approach</title>
    <itunes:summary><![CDATA[Send us Fan Mail The ongoing theme in industrial cybersecurity centers on two competing dynamics – the desire to expand our implementation of automation and Industry 4.0 technologies with the goal of using more and faster connections, along with the decision-making data each generates to improve the efficiency and quality of production. However, these goals now need to be counter-balanced against the heightened risks that all these connections spawn, and the doors they can open for hackers lo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The ongoing theme in industrial cybersecurity centers on two competing dynamics – the desire to expand our implementation of automation and Industry 4.0 technologies with the goal of using more and faster connections, along with the decision-making data each generates to improve the efficiency and quality of production.</p><p>However, these goals now need to be counter-balanced against the heightened risks that all these connections spawn, and the doors they can open for hackers looking to shut down, extort or steal data from manufacturers. </p><p>In this episode, Joe Saunders, the CEO and Founder of RunSafe Security, offers his take on securing these connections and data, as well:</p><ul><li>The on-going challenges associated with memory-based vulnerabilities.</li><li>Tactics for supporting legacy OT code and minimizing the potential disruptions that can accompany software upgrades.</li><li>Addressing vulnerabilities at a &quot;class&quot; level, instead of the one-at-a-time &quot;whack-a-mole&quot; approach.</li><li>Embracing CISA&apos;s secure-by-demand edicts.</li><li>The balancing act of more connections without lowering the security posture.</li><li>Warnings about China and other state-sponsored threat actors.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The ongoing theme in industrial cybersecurity centers on two competing dynamics – the desire to expand our implementation of automation and Industry 4.0 technologies with the goal of using more and faster connections, along with the decision-making data each generates to improve the efficiency and quality of production.</p><p>However, these goals now need to be counter-balanced against the heightened risks that all these connections spawn, and the doors they can open for hackers looking to shut down, extort or steal data from manufacturers. </p><p>In this episode, Joe Saunders, the CEO and Founder of RunSafe Security, offers his take on securing these connections and data, as well:</p><ul><li>The on-going challenges associated with memory-based vulnerabilities.</li><li>Tactics for supporting legacy OT code and minimizing the potential disruptions that can accompany software upgrades.</li><li>Addressing vulnerabilities at a &quot;class&quot; level, instead of the one-at-a-time &quot;whack-a-mole&quot; approach.</li><li>Embracing CISA&apos;s secure-by-demand edicts.</li><li>The balancing act of more connections without lowering the security posture.</li><li>Warnings about China and other state-sponsored threat actors.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15776716-getting-past-the-whack-a-mole-approach.mp3" length="25730122" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lqh880ywnt4bugw8jp8rcn5maa50?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15776716</guid>
    <pubDate>Thu, 19 Sep 2024 23:00:00 -0400</pubDate>
    <itunes:duration>2131</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside the Growing Complexity of Ransomware Hacking Groups</itunes:title>
    <title>Inside the Growing Complexity of Ransomware Hacking Groups</title>
    <itunes:summary><![CDATA[Send us Fan Mail We’re back to discuss an all-too-familiar topic – ransomware. Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for industrial organizations dealing with ransomware is that we have to divide our energy and resources between prevention, detection and response. Any one of those is a challenge, but managing all three is daunting, and hackers know this. But so...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We’re back to discuss an all-too-familiar topic – ransomware.</p><p>Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for industrial organizations dealing with ransomware is that we have to divide our energy and resources between prevention, detection and response. Any one of those is a challenge, but managing all three is daunting, and hackers know this. But so do the good guys - one of which is our guest for today’s episode. </p><p>Listen as Jeff Krull, principal and leader of Baker Tilly’s cybersecurity practice discusses their <a href='https://www.bakertilly.com/insights/ransomware-prevention-guide'><em>Guide to Ransomware Prevention,</em></a> as well as his thoughts on:</p><ul><li>The C-suite&apos;s growing appreciation of how cyberattacks are impacting profitability, which means cybersecurity has become more than just an IT issue.</li><li>How more resources have made RaaS groups increasingly difficult to detect and stop.</li><li>Paying vs. not paying the ransom.</li><li>Why more cyber regulation is on the way.</li><li>Manufacturing&apos;s lack of redundant assets is making it a more attractive target, but also fueling action around response and recovery plans.</li><li>Why not everyone needs access to everything.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We’re back to discuss an all-too-familiar topic – ransomware.</p><p>Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for industrial organizations dealing with ransomware is that we have to divide our energy and resources between prevention, detection and response. Any one of those is a challenge, but managing all three is daunting, and hackers know this. But so do the good guys - one of which is our guest for today’s episode. </p><p>Listen as Jeff Krull, principal and leader of Baker Tilly’s cybersecurity practice discusses their <a href='https://www.bakertilly.com/insights/ransomware-prevention-guide'><em>Guide to Ransomware Prevention,</em></a> as well as his thoughts on:</p><ul><li>The C-suite&apos;s growing appreciation of how cyberattacks are impacting profitability, which means cybersecurity has become more than just an IT issue.</li><li>How more resources have made RaaS groups increasingly difficult to detect and stop.</li><li>Paying vs. not paying the ransom.</li><li>Why more cyber regulation is on the way.</li><li>Manufacturing&apos;s lack of redundant assets is making it a more attractive target, but also fueling action around response and recovery plans.</li><li>Why not everyone needs access to everything.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15729417-inside-the-growing-complexity-of-ransomware-hacking-groups.mp3" length="23216518" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ipaezu6qcemhinywcfumj041ecnl?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15729417</guid>
    <pubDate>Wed, 11 Sep 2024 17:00:00 -0400</pubDate>
    <itunes:duration>1922</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Time to &#39;Rip off the Band-Aid&#39; to Ensure Security</itunes:title>
    <title>Time to &#39;Rip off the Band-Aid&#39; to Ensure Security</title>
    <itunes:summary><![CDATA[Send us Fan Mail A smarter, well-funded hacker community means embracing basic, yet daunting cyber challenges.  In manufacturing, regardless of your role, avoiding downtime is an obvious priority, and one of the motivating factors driving investments in cybersecurity. In working to mitigate potential DDoS attacks or malware drops, manufacturers are tapping into more resources in heightening their awareness of vulnerabilities and the associated remedies, which can include updating access proto...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>A smarter, well-funded hacker community means embracing basic, yet daunting cyber challenges.</em><br/><br/>In manufacturing, regardless of your role, avoiding downtime is an obvious priority, and one of the motivating factors driving investments in cybersecurity.</p><p>In working to mitigate potential DDoS attacks or malware drops, manufacturers are tapping into more resources in heightening their awareness of vulnerabilities and the associated remedies, which can include updating access protocols, applying patches and replacing old equipment and technology. </p><p>The problem is that the solutions can actually contribute to the problem you were originally trying to avoid – downtime. </p><p>Our guest for today’s episode looks to offer some solutions. Watch/listen as Gabe Dimeglio, VP of Global Security Services at Rimini Street, a leading provider of data security and managed services, offers his take on:</p><ul><li>Patching strategies that minimize downtime.</li><li>Getting employees engaged in cybersecurity strategies.</li><li>Ensuring buy-in from throughout the enterprise when security measures need to be implemented.</li><li>The evolving nature of hacker skills and the volume of attacks they are able to launch.</li><li>How nation states are developing an institutionalized approach to developing new and better-trained hackers.</li><li>Placing a priority on visibility, inventory and segmentation tools.</li><li>Why he&apos;s an advocate of better regulatory efforts, not necessarily more of them.</li><li>The under-utilized resources available to constructing response plans.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>A smarter, well-funded hacker community means embracing basic, yet daunting cyber challenges.</em><br/><br/>In manufacturing, regardless of your role, avoiding downtime is an obvious priority, and one of the motivating factors driving investments in cybersecurity.</p><p>In working to mitigate potential DDoS attacks or malware drops, manufacturers are tapping into more resources in heightening their awareness of vulnerabilities and the associated remedies, which can include updating access protocols, applying patches and replacing old equipment and technology. </p><p>The problem is that the solutions can actually contribute to the problem you were originally trying to avoid – downtime. </p><p>Our guest for today’s episode looks to offer some solutions. Watch/listen as Gabe Dimeglio, VP of Global Security Services at Rimini Street, a leading provider of data security and managed services, offers his take on:</p><ul><li>Patching strategies that minimize downtime.</li><li>Getting employees engaged in cybersecurity strategies.</li><li>Ensuring buy-in from throughout the enterprise when security measures need to be implemented.</li><li>The evolving nature of hacker skills and the volume of attacks they are able to launch.</li><li>How nation states are developing an institutionalized approach to developing new and better-trained hackers.</li><li>Placing a priority on visibility, inventory and segmentation tools.</li><li>Why he&apos;s an advocate of better regulatory efforts, not necessarily more of them.</li><li>The under-utilized resources available to constructing response plans.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15701360-time-to-rip-off-the-band-aid-to-ensure-security.mp3" length="28390617" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/950r6vj9qzmaelmtwzvexbao4pl2?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15701360</guid>
    <pubDate>Thu, 05 Sep 2024 18:00:00 -0400</pubDate>
    <itunes:duration>2353</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Combating the 20th Century Mafia with a Stronger Human Firewall</itunes:title>
    <title>Combating the 20th Century Mafia with a Stronger Human Firewall</title>
    <itunes:summary><![CDATA[Send us Fan Mail Sophos recently reported that 65 percent of manufacturing and production organizations were hit by ransomware last year, which, unlike other sectors, is an increase. Overall, these attacks have increased by 41 percent for manufacturing since 2020. Additionally, the cybersecurity firm found that 44 percent of computers used in manufacturing have been impacted by a ransomware attack, and over half of these intrusions can be directly linked to malicious emails and compromised cr...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Sophos recently reported that 65 percent of manufacturing and production organizations were hit by ransomware last year, which, unlike other sectors, is an increase. Overall, these attacks have increased by 41 percent for manufacturing since 2020. Additionally, the cybersecurity firm found that 44 percent of computers used in manufacturing have been impacted by a ransomware attack, and over half of these intrusions can be directly linked to malicious emails and compromised credentials. </p><p>These findings help illustrate what we’ve known for years – hackers would rather log in than break in. And stopping these types of attacks requires starting with your front line defenses – the workforce. </p><p>Our guest for today’s episode will look to offer some solutions for transitioning employees from a weak link to a key cybersecurity asset. Watch/listen as Shawn Waldman, CEO and Founder of Secure Cyber, a leading provider of secure network design solutions, discusses:</p><ul><li>Why he would give the industrial sector a low D when grading their ability to effectively communicate security processes and protocols.</li><li>How to address those employees that continue to click on every link in their emails.</li><li>Why cybersecurity should be treated like a trade.</li><li>Understanding the difference between security tools and IT services.</li><li>Implementing accountability without being overly punitive and rewarding employees for positive cybersecurity actions.</li><li>The concerns he has about 5G and quantum decryption.</li><li>Avoiding the AI &quot;easy button&quot;.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Sophos recently reported that 65 percent of manufacturing and production organizations were hit by ransomware last year, which, unlike other sectors, is an increase. Overall, these attacks have increased by 41 percent for manufacturing since 2020. Additionally, the cybersecurity firm found that 44 percent of computers used in manufacturing have been impacted by a ransomware attack, and over half of these intrusions can be directly linked to malicious emails and compromised credentials. </p><p>These findings help illustrate what we’ve known for years – hackers would rather log in than break in. And stopping these types of attacks requires starting with your front line defenses – the workforce. </p><p>Our guest for today’s episode will look to offer some solutions for transitioning employees from a weak link to a key cybersecurity asset. Watch/listen as Shawn Waldman, CEO and Founder of Secure Cyber, a leading provider of secure network design solutions, discusses:</p><ul><li>Why he would give the industrial sector a low D when grading their ability to effectively communicate security processes and protocols.</li><li>How to address those employees that continue to click on every link in their emails.</li><li>Why cybersecurity should be treated like a trade.</li><li>Understanding the difference between security tools and IT services.</li><li>Implementing accountability without being overly punitive and rewarding employees for positive cybersecurity actions.</li><li>The concerns he has about 5G and quantum decryption.</li><li>Avoiding the AI &quot;easy button&quot;.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15658489-combating-the-20th-century-mafia-with-a-stronger-human-firewall.mp3" length="33364751" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/boksei6n2tg258dc7yfqxfoiqzqx?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15658489</guid>
    <pubDate>Wed, 28 Aug 2024 18:00:00 -0400</pubDate>
    <itunes:duration>2767</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tearing Down the &#39;Set It and Forget It&#39; Mindset</itunes:title>
    <title>Tearing Down the &#39;Set It and Forget It&#39; Mindset</title>
    <itunes:summary><![CDATA[Send us Fan Mail I recently watched an interesting documentary called Turning Point: The Bomb and the Cold War on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-political event since World War II as fallout from the U.S. dropping the nuclear bomb on Japan to end World War II. Similarly, we can look at a number of recent, major cybersecurity events that have their origins in attacks on critical infrastructure. Whether you want to go all the...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>I recently watched an interesting documentary called <a href='https://www.netflix.com/title/81614129'><em>Turning Point: The Bomb and the Cold War</em></a> on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-political event since World War II as fallout from the U.S. dropping the nuclear bomb on Japan to end World War II.</p><p>Similarly, we can look at a number of recent, major cybersecurity events that have their origins in attacks on critical infrastructure. Whether you want to go all the way back to Stuxnet, or more recent developments like Colonial Pipeline, hackers realized that the control systems utilized in these environments mirror those used by manufacturers like Boeing, Clorox, Johnson Controls and many others who have been recent victims of high-profile hacks.</p><p>Joining me to discuss these dynamics is Bill Moore, the founder and CEO of XONA Systems, a leading provider of secure access solutions. Watch/listen as he dives into:</p><ul><li>The challenges of updating and securing the legacy tech found throughout manufacturing and critical infrastructure.</li><li>Getting past the &apos;set it and forget it&apos; mindset of industrial cybersecurity.</li><li>Strategies for implementing updates and patches without slowing operations or opening new doors to hackers.</li><li>Ways to improve funding processes to ensure security needs are met and keep pace with an evolving threat landscape.</li><li>How the more distributed dynamic of OT technology needs to be understood in developing new strategies and implementing new tools.</li><li>Lessons learned from Colonial Pipeline.</li><li>Ways to optimize regulatory efforts.</li><li>Why every industrial organization needs a dedicated Director of OT Security.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>I recently watched an interesting documentary called <a href='https://www.netflix.com/title/81614129'><em>Turning Point: The Bomb and the Cold War</em></a> on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-political event since World War II as fallout from the U.S. dropping the nuclear bomb on Japan to end World War II.</p><p>Similarly, we can look at a number of recent, major cybersecurity events that have their origins in attacks on critical infrastructure. Whether you want to go all the way back to Stuxnet, or more recent developments like Colonial Pipeline, hackers realized that the control systems utilized in these environments mirror those used by manufacturers like Boeing, Clorox, Johnson Controls and many others who have been recent victims of high-profile hacks.</p><p>Joining me to discuss these dynamics is Bill Moore, the founder and CEO of XONA Systems, a leading provider of secure access solutions. Watch/listen as he dives into:</p><ul><li>The challenges of updating and securing the legacy tech found throughout manufacturing and critical infrastructure.</li><li>Getting past the &apos;set it and forget it&apos; mindset of industrial cybersecurity.</li><li>Strategies for implementing updates and patches without slowing operations or opening new doors to hackers.</li><li>Ways to improve funding processes to ensure security needs are met and keep pace with an evolving threat landscape.</li><li>How the more distributed dynamic of OT technology needs to be understood in developing new strategies and implementing new tools.</li><li>Lessons learned from Colonial Pipeline.</li><li>Ways to optimize regulatory efforts.</li><li>Why every industrial organization needs a dedicated Director of OT Security.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15620539-tearing-down-the-set-it-and-forget-it-mindset.mp3" length="30321081" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pioqxsc05xlcgtblgzjik7wvnpwl?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15620539</guid>
    <pubDate>Thu, 22 Aug 2024 17:00:00 -0400</pubDate>
    <itunes:duration>2514</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Bridging the IT-OT Divide</itunes:title>
    <title>Bridging the IT-OT Divide</title>
    <itunes:summary><![CDATA[Send us Fan Mail When I was a kid, we always looked forward to my dad’s work picnic. He was a tool and dye maker for a leading caster manufacturer that would rent out a local park, make a ton of food and put on various games and activities for the families. One of the highlights of this day was a softball game pitting the office versus the shop. The good-natured shots that were fired across the dugouts of this summer classic reminds me of the challenges we see in industrial cybersecurity when...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When I was a kid, we always looked forward to my dad’s work picnic. He was a tool and dye maker for a leading caster manufacturer that would rent out a local park, make a ton of food and put on various games and activities for the families. One of the highlights of this day was a softball game pitting the office versus the shop.</p><p>The good-natured shots that were fired across the dugouts of this summer classic reminds me of the challenges we see in industrial cybersecurity when it comes to bringing OT and IT teams together. While great strides have been made and numerous lessons learned on why these groups need to sync up, the reality is that we still have a long way to go. </p><p>Over the last couple of months we’ve had some interesting takes on how to realize this need, so let’s revisit the following thoughts on the IT-OT working relationship from:</p><ul><li>Kris Lovejoy, Global Security and Resilience Leader at <a href='https://www.kyndryl.com/'>Kyndryl.</a></li><li>John Cusimano, VP of OT Security at <a href='https://www.mbtmag.com/video/video/22894135/security-breach-dmzs-alarm-floods-and-prepping-for-what-if'>Armexa.</a></li><li>Josh Williams, Strategic Account Manager at <a href='https://www.mbtmag.com/video/video/22893435/security-breach-weaponizing-securebydesign'>IriusRisk.</a></li><li>Rod Locke, director of project management at <a href='https://www.mbtmag.com/video/video/22892139/security-breach-hackers-learn-how-to-attack-you-from-you'>Fortinet. </a></li></ul><p>Our guests have also weighed in on some of the more challenging dynamics of improving the IT-OT relationship. These have included:</p><ul><li>Brian Deken, Commercial Manager of Cybersecurity Services at <a href='https://www.mbtmag.com/video/video/22890034/security-breach-cybersecuritys-greatest-weapon-awareness'>Rockwell Automation</a>.</li><li>Riley Groves, an engineer from <a href='https://www.mbtmag.com/video/video/22912468/security-breach-ots-legacy-tech-challenges'>Auvesy-MDT.</a></li><li>Theo Zafirakos, Cyber Risk and Information Security Expert at<a href='https://www.mbtmag.com/video/video/22915800/security-breach-the-25m-wakeup-call-supply-chain-hack'> Fortra.</a></li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When I was a kid, we always looked forward to my dad’s work picnic. He was a tool and dye maker for a leading caster manufacturer that would rent out a local park, make a ton of food and put on various games and activities for the families. One of the highlights of this day was a softball game pitting the office versus the shop.</p><p>The good-natured shots that were fired across the dugouts of this summer classic reminds me of the challenges we see in industrial cybersecurity when it comes to bringing OT and IT teams together. While great strides have been made and numerous lessons learned on why these groups need to sync up, the reality is that we still have a long way to go. </p><p>Over the last couple of months we’ve had some interesting takes on how to realize this need, so let’s revisit the following thoughts on the IT-OT working relationship from:</p><ul><li>Kris Lovejoy, Global Security and Resilience Leader at <a href='https://www.kyndryl.com/'>Kyndryl.</a></li><li>John Cusimano, VP of OT Security at <a href='https://www.mbtmag.com/video/video/22894135/security-breach-dmzs-alarm-floods-and-prepping-for-what-if'>Armexa.</a></li><li>Josh Williams, Strategic Account Manager at <a href='https://www.mbtmag.com/video/video/22893435/security-breach-weaponizing-securebydesign'>IriusRisk.</a></li><li>Rod Locke, director of project management at <a href='https://www.mbtmag.com/video/video/22892139/security-breach-hackers-learn-how-to-attack-you-from-you'>Fortinet. </a></li></ul><p>Our guests have also weighed in on some of the more challenging dynamics of improving the IT-OT relationship. These have included:</p><ul><li>Brian Deken, Commercial Manager of Cybersecurity Services at <a href='https://www.mbtmag.com/video/video/22890034/security-breach-cybersecuritys-greatest-weapon-awareness'>Rockwell Automation</a>.</li><li>Riley Groves, an engineer from <a href='https://www.mbtmag.com/video/video/22912468/security-breach-ots-legacy-tech-challenges'>Auvesy-MDT.</a></li><li>Theo Zafirakos, Cyber Risk and Information Security Expert at<a href='https://www.mbtmag.com/video/video/22915800/security-breach-the-25m-wakeup-call-supply-chain-hack'> Fortra.</a></li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15578774-bridging-the-it-ot-divide.mp3" length="15179541" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ttxgauaf7r8d2mvlyhr6bzl5fc6q?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15578774</guid>
    <pubDate>Thu, 15 Aug 2024 17:00:00 -0400</pubDate>
    <itunes:duration>1230</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&#39;There&#39;s No Bulletproof Vest&#39; in Cybersecurity</itunes:title>
    <title>&#39;There&#39;s No Bulletproof Vest&#39; in Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover.  When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our heads in the sand in trying to ignore the shortcomings of our current strategies, and I’d argue that a great deal of positive out...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>An ethical cyber researcher breaks down the &apos;tsunami of exposed data&apos; he continues to uncover.</em><br/><br/>When it comes to solving industrial cybersecurity&apos;s biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our heads in the sand in trying to ignore the shortcomings of our current strategies, and I’d argue that a great deal of positive outcomes couldn’t be realized without repeatedly asking questions and not being afraid of the potential findings. </p><p>I also think our guest for this episode would agree. It’s our pleasure to welcome Jeremiah Fowler to <em>Security Breach.</em> He’s a leading cybersecurity researcher who has a wealth of knowledge on the industrial threat landscape, and recently uncovered a data vulnerability exposing 769 million personal records and 380,000 email addresses. Left unaddressed, this could have had highly damaging impacts on a global scale.</p><p>Watch/listen as Jeremiah shares his thoughts on:</p><ul><li>The need to educate the C-Suite on risk, the real-world costs of cybersecurity shortcomings, and how you can&apos;t measure the loss of trust.</li><li>Why the human factor will always be the weakest link.</li><li>How nearly every issue in cybersecurity comes back to visibility.</li><li>The new challenges AI will continue to create.</li><li>The increasing threat stemming from new credential harvesting schemes that clone login pages.</li><li>The unintentional backdoor vulnerabilities created by legacy systems.</li><li>Why he misses the Golden Age of Bug Bounties.</li><li>The value of placing time limits on access to sensitive data.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>An ethical cyber researcher breaks down the &apos;tsunami of exposed data&apos; he continues to uncover.</em><br/><br/>When it comes to solving industrial cybersecurity&apos;s biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our heads in the sand in trying to ignore the shortcomings of our current strategies, and I’d argue that a great deal of positive outcomes couldn’t be realized without repeatedly asking questions and not being afraid of the potential findings. </p><p>I also think our guest for this episode would agree. It’s our pleasure to welcome Jeremiah Fowler to <em>Security Breach.</em> He’s a leading cybersecurity researcher who has a wealth of knowledge on the industrial threat landscape, and recently uncovered a data vulnerability exposing 769 million personal records and 380,000 email addresses. Left unaddressed, this could have had highly damaging impacts on a global scale.</p><p>Watch/listen as Jeremiah shares his thoughts on:</p><ul><li>The need to educate the C-Suite on risk, the real-world costs of cybersecurity shortcomings, and how you can&apos;t measure the loss of trust.</li><li>Why the human factor will always be the weakest link.</li><li>How nearly every issue in cybersecurity comes back to visibility.</li><li>The new challenges AI will continue to create.</li><li>The increasing threat stemming from new credential harvesting schemes that clone login pages.</li><li>The unintentional backdoor vulnerabilities created by legacy systems.</li><li>Why he misses the Golden Age of Bug Bounties.</li><li>The value of placing time limits on access to sensitive data.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15551212-there-s-no-bulletproof-vest-in-cybersecurity.mp3" length="37227170" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9cn869hnbwtx18a6kbnlvpz3fe2x?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15551212</guid>
    <pubDate>Thu, 08 Aug 2024 18:00:00 -0400</pubDate>
    <itunes:duration>3089</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Are We Over-Connected?</itunes:title>
    <title>Are We Over-Connected?</title>
    <itunes:summary><![CDATA[Send us Fan Mail The landscape of industrial cybersecurity continues to change and evolve, and demands a vigilant monitoring of the next threat, vulnerability or potential soft spot in our defenses. That’s why we continue to produce Security Breach, and, by the way, continue to be so appreciative of the growth and support we’ve received from each of you. That said, once in a while it’s good to take a look back at some of the ongoing lessons that we’re learning, especially when the input from ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The landscape of industrial cybersecurity continues to change and evolve, and demands a vigilant monitoring of the next threat, vulnerability or potential soft spot in our defenses. That’s why we continue to produce <em>Security Breach</em>, and, by the way, continue to be so appreciative of the growth and support we’ve received from each of you.</p><p>That said, once in a while it’s good to take a look back at some of the ongoing lessons that we’re learning, especially when the input from our guests offers such an interesting range of responses.</p><p>So, let’s hear from a collection of previous guests as they reflect on the challenges and opportunities of more connection points, and how they responded to the question – are we over-connected?</p><ul><li><a href='https://www.mbtmag.com/video/video/22892804/security-breach-overconnectivity-and-mobile-defeatism'>Joel Burleson-Davis, SVP of Cyber Engineering at Imprivata</a></li><li><a href='https://www.mbtmag.com/video/video/22893435/security-breach-weaponizing-securebydesign'>Josh Williams, Strategic Account Manager at IriusRisk</a></li><li><a href='https://www.mbtmag.com/video/video/22913149/security-breach-the-protection-and-productivity-of-zero-trust'>Roman Arutyunov, Co-founder of Xage Security</a></li><li><a href='https://www.mbtmag.com/video/video/22915213/security-breach-the-dollars-and-sense-of-cybersecurity'>Kris Lovejoy, Global Security and Resilience Leader at Kyndryl</a></li><li><a href='https://www.mbtmag.com/artificial-intelligence/video/22911178/security-breach-the-ot-threat-landscapes-infectious-nature'>Roland Cozzolino, CTO/CIO of InsightCyber</a></li><li><a href='https://www.mbtmag.com/video/video/22910331/security-breach-knowing-how-to-arm-yourself-for-battle'>Sharon Brizinov, Director of Research at Claroty’s research arm, Team82</a></li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The landscape of industrial cybersecurity continues to change and evolve, and demands a vigilant monitoring of the next threat, vulnerability or potential soft spot in our defenses. That’s why we continue to produce <em>Security Breach</em>, and, by the way, continue to be so appreciative of the growth and support we’ve received from each of you.</p><p>That said, once in a while it’s good to take a look back at some of the ongoing lessons that we’re learning, especially when the input from our guests offers such an interesting range of responses.</p><p>So, let’s hear from a collection of previous guests as they reflect on the challenges and opportunities of more connection points, and how they responded to the question – are we over-connected?</p><ul><li><a href='https://www.mbtmag.com/video/video/22892804/security-breach-overconnectivity-and-mobile-defeatism'>Joel Burleson-Davis, SVP of Cyber Engineering at Imprivata</a></li><li><a href='https://www.mbtmag.com/video/video/22893435/security-breach-weaponizing-securebydesign'>Josh Williams, Strategic Account Manager at IriusRisk</a></li><li><a href='https://www.mbtmag.com/video/video/22913149/security-breach-the-protection-and-productivity-of-zero-trust'>Roman Arutyunov, Co-founder of Xage Security</a></li><li><a href='https://www.mbtmag.com/video/video/22915213/security-breach-the-dollars-and-sense-of-cybersecurity'>Kris Lovejoy, Global Security and Resilience Leader at Kyndryl</a></li><li><a href='https://www.mbtmag.com/artificial-intelligence/video/22911178/security-breach-the-ot-threat-landscapes-infectious-nature'>Roland Cozzolino, CTO/CIO of InsightCyber</a></li><li><a href='https://www.mbtmag.com/video/video/22910331/security-breach-knowing-how-to-arm-yourself-for-battle'>Sharon Brizinov, Director of Research at Claroty’s research arm, Team82</a></li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15511064-are-we-over-connected.mp3" length="14672343" type="audio/mpeg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15511064</guid>
    <pubDate>Fri, 02 Aug 2024 00:00:00 -0400</pubDate>
    <itunes:duration>1191</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The $25M &#39;Wake-Up Call&#39; Supply Chain Hack</itunes:title>
    <title>The $25M &#39;Wake-Up Call&#39; Supply Chain Hack</title>
    <itunes:summary><![CDATA[Send us Fan Mail According to IBM’s Cost of a Data Breach Report, nearly 20 percent of the organizations surveyed stated that they have experienced a breach stemming from a compromise in their supply chain, or a vulnerability related to it. The average cost of these breaches was estimated at just under $4.5 million. Their data also found that attacks emanating from the supply chain had a longer lifecycle than average. The increased costs and complexities of addressing supply chain attacks is ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>According to IBM’s <em>Cost of a Data Breach Report</em>, nearly 20 percent of the organizations surveyed stated that they have experienced a breach stemming from a compromise in their supply chain, or a vulnerability related to it. The average cost of these breaches was estimated at just under $4.5 million. Their data also found that attacks emanating from the supply chain had a longer lifecycle than average.</p><p>The increased costs and complexities of addressing supply chain attacks is not a surprise when you consider that these intrusions not only impact the targeted company, but the logistics, distribution and retail elements that are dragged along on this difficult and painful ride. To help dive into the factors associated with supply chain attacks and other cybersecurity challenges, we welcome Theo Zafirakos, a Cyber Risk and Information Security Expert at <a href='http://www.fortra.com/'>Fortra</a> to the show.</p><p>Watch/listen as we discuss:</p><ul><li>The three primary soft spots from which supply chain hacks emanate - software, devices and people.</li><li>Why people are the most neglected of the three, and how they can be trained to identify attacks.</li><li>The expanded role AI is playing in email compromises that help fuel supply chain attacks.</li><li>Why IT and OT need to become more aware of each other&apos;s requirements and risks.</li><li>The important role cybersecurity plays in ensuring operational reliability.</li><li>The growing need for ransomware response plans, and how a national supply chain hack helped reinforce this need for all enterprises, regardless of size or sector.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>According to IBM’s <em>Cost of a Data Breach Report</em>, nearly 20 percent of the organizations surveyed stated that they have experienced a breach stemming from a compromise in their supply chain, or a vulnerability related to it. The average cost of these breaches was estimated at just under $4.5 million. Their data also found that attacks emanating from the supply chain had a longer lifecycle than average.</p><p>The increased costs and complexities of addressing supply chain attacks is not a surprise when you consider that these intrusions not only impact the targeted company, but the logistics, distribution and retail elements that are dragged along on this difficult and painful ride. To help dive into the factors associated with supply chain attacks and other cybersecurity challenges, we welcome Theo Zafirakos, a Cyber Risk and Information Security Expert at <a href='http://www.fortra.com/'>Fortra</a> to the show.</p><p>Watch/listen as we discuss:</p><ul><li>The three primary soft spots from which supply chain hacks emanate - software, devices and people.</li><li>Why people are the most neglected of the three, and how they can be trained to identify attacks.</li><li>The expanded role AI is playing in email compromises that help fuel supply chain attacks.</li><li>Why IT and OT need to become more aware of each other&apos;s requirements and risks.</li><li>The important role cybersecurity plays in ensuring operational reliability.</li><li>The growing need for ransomware response plans, and how a national supply chain hack helped reinforce this need for all enterprises, regardless of size or sector.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15468103-the-25m-wake-up-call-supply-chain-hack.mp3" length="22266949" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/23e8crk8bjmli05n6gom2003kom8?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15468103</guid>
    <pubDate>Wed, 24 Jul 2024 16:00:00 -0400</pubDate>
    <itunes:duration>1842</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Dollars and Sense of Cybersecurity</itunes:title>
    <title>The Dollars and Sense of Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a report entitled Building a Culture of Cyber Resilience in Manufacturing.  This initiative not only identified the sector’s primary challenges for developing a culture of cyber resilience, but also formulated three guiding principles for establishing an enduring strategy. They rev...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a report entitled <em>Building a Culture of Cyber Resilience in Manufacturing</em>. </p><p>This initiative not only identified the sector’s primary challenges for developing a culture of cyber resilience, but also formulated three guiding principles for establishing an enduring strategy. They revolve around people, processes and culture.</p><p>I was fortunate enough to have one of the key contributors to the creation of these strategies sit down with me for some unique takes on the biggest challenges facing industrial cybersecurity. Watch/listen to my conversation with Kris Lovejoy, Global Security and Resilience Leader at <a href='https://www.kyndryl.com/'>Kyndryl</a>, a leader in cyber resiliency strategies and services, as we discuss:</p><ul><li>How the capital investment process utilized throughout manufacturing could be leaving several key players behind, and the negative impacts this could have on the entire sector.</li><li>Why security is not a tool, but a process.</li><li>The ongoing issues associated with asset inventory and the first steps to take in correcting this issue.</li><li>The Trojan Horse dynamic that smaller enterprises need to embrace in order to improve their security posture.</li><li>How to know if you&apos;re the biggest risk or weakest link in a production environment or supply chain.</li><li>Why regulatory efforts focused on cybersecurity could dramatically change the composition of the industrial sector.</li><li>The difference between moving to the cloud and securely moving to cloud platforms.</li><li>How security should be a driver of digital transformation strategies.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a report entitled <em>Building a Culture of Cyber Resilience in Manufacturing</em>. </p><p>This initiative not only identified the sector’s primary challenges for developing a culture of cyber resilience, but also formulated three guiding principles for establishing an enduring strategy. They revolve around people, processes and culture.</p><p>I was fortunate enough to have one of the key contributors to the creation of these strategies sit down with me for some unique takes on the biggest challenges facing industrial cybersecurity. Watch/listen to my conversation with Kris Lovejoy, Global Security and Resilience Leader at <a href='https://www.kyndryl.com/'>Kyndryl</a>, a leader in cyber resiliency strategies and services, as we discuss:</p><ul><li>How the capital investment process utilized throughout manufacturing could be leaving several key players behind, and the negative impacts this could have on the entire sector.</li><li>Why security is not a tool, but a process.</li><li>The ongoing issues associated with asset inventory and the first steps to take in correcting this issue.</li><li>The Trojan Horse dynamic that smaller enterprises need to embrace in order to improve their security posture.</li><li>How to know if you&apos;re the biggest risk or weakest link in a production environment or supply chain.</li><li>Why regulatory efforts focused on cybersecurity could dramatically change the composition of the industrial sector.</li><li>The difference between moving to the cloud and securely moving to cloud platforms.</li><li>How security should be a driver of digital transformation strategies.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15430948-the-dollars-and-sense-of-cybersecurity.mp3" length="29272781" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/trxtqhu2je3f3e66fc95cjqfeo83?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15430948</guid>
    <pubDate>Fri, 19 Jul 2024 10:00:00 -0400</pubDate>
    <itunes:duration>2427</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>There&#39;s No &#39;Plant the Flag&#39; Moment in Cybersecurity</itunes:title>
    <title>There&#39;s No &#39;Plant the Flag&#39; Moment in Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail When looking at industrial cybersecurity, more attention is being paid to how workers are logging in to access critical machinery, software or data. And according to Trustwave Threat Intelligence’s recent Manufacturing Threat Landscape report, 45 percent of attacks experienced by manufacturers stemmed from the bad guys accessing credentials. Whether by utilizing brute-force tactics, submitting fake support tickets, or purchasing logins on the Dark Web, this seems to prove tha...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When looking at industrial cybersecurity, more attention is being paid to how workers are logging in to access critical machinery, software or data. And according to Trustwave Threat Intelligence’s recent <em>Manufacturing Threat Landscape</em> report, 45 percent of attacks experienced by manufacturers stemmed from the bad guys accessing credentials.</p><p>Whether by utilizing brute-force tactics, submitting fake support tickets, or purchasing logins on the Dark Web, this seems to prove that hackers would much rather log in than break in. </p><p>The report also cited the rise of Initial Access Brokers, or groups that focus specifically on obtaining and selling log-in data to other hackers. One example cited by Trustwave saw an IAB offering access to a leading steel manufacturer for just over $60,000. Unfortunately, this is not a unique circumstance, which is why we&apos;re talking to David Cottingham, president of rf IDEAS to weigh in on the ongoing challenges surrounding secure access throughout the OT environment.</p><p>Listen as we discuss:</p><ul><li>The importance of simplifying security processes to keep people engaged with them.</li><li>Why no manufacturer is too small to be a target for credential-based attacks.</li><li>Overcoming the bad behaviors that can result from operations personnel dealing with over 25 passwords.</li><li>Avoiding punitive actions surrounding people-based security vulnerabilities.</li><li>Why dual factor authentication strategies are key to ongoing security developments. </li><li>Best practices for mobile device use.</li><li>How VPNs, firewalls and password wallets are simultaneously solutions and vulnerabilities.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When looking at industrial cybersecurity, more attention is being paid to how workers are logging in to access critical machinery, software or data. And according to Trustwave Threat Intelligence’s recent <em>Manufacturing Threat Landscape</em> report, 45 percent of attacks experienced by manufacturers stemmed from the bad guys accessing credentials.</p><p>Whether by utilizing brute-force tactics, submitting fake support tickets, or purchasing logins on the Dark Web, this seems to prove that hackers would much rather log in than break in. </p><p>The report also cited the rise of Initial Access Brokers, or groups that focus specifically on obtaining and selling log-in data to other hackers. One example cited by Trustwave saw an IAB offering access to a leading steel manufacturer for just over $60,000. Unfortunately, this is not a unique circumstance, which is why we&apos;re talking to David Cottingham, president of rf IDEAS to weigh in on the ongoing challenges surrounding secure access throughout the OT environment.</p><p>Listen as we discuss:</p><ul><li>The importance of simplifying security processes to keep people engaged with them.</li><li>Why no manufacturer is too small to be a target for credential-based attacks.</li><li>Overcoming the bad behaviors that can result from operations personnel dealing with over 25 passwords.</li><li>Avoiding punitive actions surrounding people-based security vulnerabilities.</li><li>Why dual factor authentication strategies are key to ongoing security developments. </li><li>Best practices for mobile device use.</li><li>How VPNs, firewalls and password wallets are simultaneously solutions and vulnerabilities.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15396784-there-s-no-plant-the-flag-moment-in-cybersecurity.mp3" length="24003945" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/olrsrnznq693ge6ditjhjr2jkprh?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15396784</guid>
    <pubDate>Thu, 11 Jul 2024 17:00:00 -0400</pubDate>
    <itunes:duration>1988</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&#39;Nobody Should Get Ransomwared&#39;</itunes:title>
    <title>&#39;Nobody Should Get Ransomwared&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail As we’ve discussed numerous times on Security Breach, terms like change, evolution and constant are more than just buzz terms – they’re a simple reality of working in the industrial OT space. Whether we’re discussing threat actors from Stuxnet to Lockbit, tactics from social engineering to double-extortion ransomware, or vulnerability sources ranging from weak passwords to embedded secure-by design concerns, the ever-expanding attack surface is a constant reminder of change a...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As we’ve discussed numerous times on <em>Security Breach</em>, terms like change, evolution and constant are more than just buzz terms – they’re a simple reality of working in the industrial OT space.</p><p>Whether we’re discussing threat actors from Stuxnet to Lockbit, tactics from social engineering to double-extortion ransomware, or vulnerability sources ranging from weak passwords to embedded secure-by design concerns, the ever-expanding attack surface is a constant reminder of change and the evolving nature of threats. </p><p>In this episode we talk to Michael Haase, and draw on his extensive background and personal experiences as we discuss:</p><ul><li>The on-going balancing act between cost and security priorities.</li><li>Why he considers the need for phishing training, &quot;a massive failure on the part of the technical community.&quot;</li><li>How AI is laying the groundwork for attacks that haven&apos;t happened yet.</li><li>Why the growing complexity of hackers is actually a positive indicator.</li><li>Automation is the inflection point for cybersecurity - for both sides.</li><li>The shift from worrying about the ability to detect new attacks to focusing on the vulnerabilities being exploited.</li><li>The distinction between learning what needs to be done and actually taking action.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As we’ve discussed numerous times on <em>Security Breach</em>, terms like change, evolution and constant are more than just buzz terms – they’re a simple reality of working in the industrial OT space.</p><p>Whether we’re discussing threat actors from Stuxnet to Lockbit, tactics from social engineering to double-extortion ransomware, or vulnerability sources ranging from weak passwords to embedded secure-by design concerns, the ever-expanding attack surface is a constant reminder of change and the evolving nature of threats. </p><p>In this episode we talk to Michael Haase, and draw on his extensive background and personal experiences as we discuss:</p><ul><li>The on-going balancing act between cost and security priorities.</li><li>Why he considers the need for phishing training, &quot;a massive failure on the part of the technical community.&quot;</li><li>How AI is laying the groundwork for attacks that haven&apos;t happened yet.</li><li>Why the growing complexity of hackers is actually a positive indicator.</li><li>Automation is the inflection point for cybersecurity - for both sides.</li><li>The shift from worrying about the ability to detect new attacks to focusing on the vulnerabilities being exploited.</li><li>The distinction between learning what needs to be done and actually taking action.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15321943-nobody-should-get-ransomwared.mp3" length="27568551" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ed9pdk1hnh8lw78iahknu8uskd71?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15321943</guid>
    <pubDate>Thu, 27 Jun 2024 17:00:00 -0400</pubDate>
    <itunes:duration>2285</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Protection and Productivity of Zero Trust</itunes:title>
    <title>The Protection and Productivity of Zero Trust</title>
    <itunes:summary><![CDATA[Send us Fan Mail Over the last nearly 100 episodes of Security Breach we’ve discussed a wide range of strategies for protecting the manufacturing enterprise. But perhaps the most polarizing of these has been Zero Trust. While some unwaveringly champion the cause of this approach, others question the ways in which it is typically deployed.   Perhaps this dichotomy is best represented in Palo Alto and ABI Research’s The State of OT Security report. It found that 93 percent of those surveyed wer...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Over the last nearly 100 episodes of <em>Security Breach </em>we’ve discussed a wide range of strategies for protecting the manufacturing enterprise. But perhaps the most polarizing of these has been Zero Trust. While some unwaveringly champion the cause of this approach, others question the ways in which it is typically deployed. <br/><br/>Perhaps this dichotomy is best represented in Palo Alto and ABI Research’s <em>The State of OT Security </em>report. It found that 93 percent of those surveyed were familiar with Zero Trust, and 87 percent found the approach to be the right fit for protecting OT environments. However, half of those participating in the research also stated that there are practical blockers that prohibit implementation. <br/><br/>In the end, like most things in the cybersecurity world, the answer lies in striking a balance between restricting access and implementing safeguards against time-consuming processes. In this episode I talk to Roman Arutyunov, Co-founder and SVP of product at Xage Security, about zero trust and a number of other topics, including:</p><ul><li>How cybersecurity needs to be viewed as both a productivity and protection tool.</li><li>Overcoming the &quot;it won&apos;t happen to me&quot; mindset.</li><li>The sector&apos;s over-reliance on VPNs and firewalls.</li><li>Why manufacturing is missing regulatory guidance, and why that will change in the short-term.</li><li>Improving responses to attacks, including ransomware..</li><li>How AI can play a key role in shrinking the attack surface.</li><li>Avoiding tool implementations that can be an &quot;inverse pyramid of pain.&quot;</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Over the last nearly 100 episodes of <em>Security Breach </em>we’ve discussed a wide range of strategies for protecting the manufacturing enterprise. But perhaps the most polarizing of these has been Zero Trust. While some unwaveringly champion the cause of this approach, others question the ways in which it is typically deployed. <br/><br/>Perhaps this dichotomy is best represented in Palo Alto and ABI Research’s <em>The State of OT Security </em>report. It found that 93 percent of those surveyed were familiar with Zero Trust, and 87 percent found the approach to be the right fit for protecting OT environments. However, half of those participating in the research also stated that there are practical blockers that prohibit implementation. <br/><br/>In the end, like most things in the cybersecurity world, the answer lies in striking a balance between restricting access and implementing safeguards against time-consuming processes. In this episode I talk to Roman Arutyunov, Co-founder and SVP of product at Xage Security, about zero trust and a number of other topics, including:</p><ul><li>How cybersecurity needs to be viewed as both a productivity and protection tool.</li><li>Overcoming the &quot;it won&apos;t happen to me&quot; mindset.</li><li>The sector&apos;s over-reliance on VPNs and firewalls.</li><li>Why manufacturing is missing regulatory guidance, and why that will change in the short-term.</li><li>Improving responses to attacks, including ransomware..</li><li>How AI can play a key role in shrinking the attack surface.</li><li>Avoiding tool implementations that can be an &quot;inverse pyramid of pain.&quot;</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15286013-the-protection-and-productivity-of-zero-trust.mp3" length="31223325" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rw3jwb2l7igh3vjl6zraqne7oxws?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15286013</guid>
    <pubDate>Thu, 20 Jun 2024 16:00:00 -0400</pubDate>
    <itunes:duration>2589</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>OT&#39;s Legacy Tech Challenges</itunes:title>
    <title>OT&#39;s Legacy Tech Challenges</title>
    <itunes:summary><![CDATA[Send us Fan Mail One of the more common obstacles that we discuss here on Security Breach is how increased connectivity has combined with new Industry 4.0 technologies to constantly expand the OT attack surface. In the midst of all this expansion, it’s easy to either overlook cybersecurity concerns, or put too much trust in the embedded security features of the new assets.   So, while this usually brings up conversations about endpoint security, integration processes and secure-by-design...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the more common obstacles that we discuss here on <em>Security Breach</em> is how increased connectivity has combined with new Industry 4.0 technologies to constantly expand the OT attack surface. In the midst of all this expansion, it’s easy to either overlook cybersecurity concerns, or put too much trust in the embedded security features of the new assets. <br/><br/>So, while this usually brings up conversations about endpoint security, integration processes and secure-by-design protocols, let’s talk about something that our guest for today’s episode knows and understands all too well … time. <br/><br/>Industry experts value downtime on the plant floor at about $250k/hour. So, just like predictive maintenance has become part of a facility’s new normal, predictive cybersecurity needs to receive the same priority.<br/><br/>Here to discuss this concept is Riley Groves, an engineer at Auvesy-MDT, a leading providing of ICS and automation solutions. Listen as we also discuss:</p><ul><li>The improving convergence of IT and OT on the plant floor.</li><li>Getting ahead of vulnerabilities.</li><li>The factors driving greater buy-in from the C-suite on cybersecurity investments.</li><li>Why cybersecurity is the Special Teams of the industrial enterprise.</li><li>How legacy systems are providing &quot;function by disfunction&quot; from a security perspective.</li><li>The better ways to use AI.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the more common obstacles that we discuss here on <em>Security Breach</em> is how increased connectivity has combined with new Industry 4.0 technologies to constantly expand the OT attack surface. In the midst of all this expansion, it’s easy to either overlook cybersecurity concerns, or put too much trust in the embedded security features of the new assets. <br/><br/>So, while this usually brings up conversations about endpoint security, integration processes and secure-by-design protocols, let’s talk about something that our guest for today’s episode knows and understands all too well … time. <br/><br/>Industry experts value downtime on the plant floor at about $250k/hour. So, just like predictive maintenance has become part of a facility’s new normal, predictive cybersecurity needs to receive the same priority.<br/><br/>Here to discuss this concept is Riley Groves, an engineer at Auvesy-MDT, a leading providing of ICS and automation solutions. Listen as we also discuss:</p><ul><li>The improving convergence of IT and OT on the plant floor.</li><li>Getting ahead of vulnerabilities.</li><li>The factors driving greater buy-in from the C-suite on cybersecurity investments.</li><li>Why cybersecurity is the Special Teams of the industrial enterprise.</li><li>How legacy systems are providing &quot;function by disfunction&quot; from a security perspective.</li><li>The better ways to use AI.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15239141-ot-s-legacy-tech-challenges.mp3" length="20479166" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/oeoh9h793kemrdts95eer3i48ci8?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15239141</guid>
    <pubDate>Wed, 12 Jun 2024 13:00:00 -0400</pubDate>
    <itunes:duration>1694</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Shutting Down &#39;Spy Board&#39; Threats</itunes:title>
    <title>Shutting Down &#39;Spy Board&#39; Threats</title>
    <itunes:summary><![CDATA[Send us Fan Mail Those of you with a military or law enforcement connection are probably, and unfortunately, familiar with the term collateral damage. While this phrase has a legacy in these environments, it’s also become an unwelcome addition to the realm of cybersecurity.  Examples of this dynamic can be found in a number of hacktivist attacks that targeted infrastructure in a certain region, but either through unrealized connections or other bad actors simply following the blueprint, impac...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Those of you with a military or law enforcement connection are probably, and unfortunately, familiar with the term collateral damage. While this phrase has a legacy in these environments, it’s also become an unwelcome addition to the realm of cybersecurity.<br/><br/>Examples of this dynamic can be found in a number of hacktivist attacks that targeted infrastructure in a certain region, but either through unrealized connections or other bad actors simply following the blueprint, impacted facilities across the globe.  <br/><br/>Jason Oberg, the CTO of Cycuity, a leading provider of vulnerability mitigation solutions for semiconductor manufacturers, recently joined us to discuss some of the potential fallout from hacks, and how to prevent or respond to them in minimizing the collateral damage. We also talked about:</p><ul><li>How hackers are getting smarter in their hacks against chip makers.</li><li>Why awareness of hacker tactics is not enough, and how manufacturers of all types can enhance their knowledge level pertaining to the growing sophistication of hackers and attacks.</li><li>Addressing the baked-in compromises of hardware products, and the long-term impacts on all users and industries.</li><li>Focusing on the inherent vulnerabilities of production processes, not just the associated technology.</li><li>Balancing the goals of &quot;getting product out the door&quot; with embedding greater levels of security.</li><li>How greater transparency can help with secure-by-design challenges.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Those of you with a military or law enforcement connection are probably, and unfortunately, familiar with the term collateral damage. While this phrase has a legacy in these environments, it’s also become an unwelcome addition to the realm of cybersecurity.<br/><br/>Examples of this dynamic can be found in a number of hacktivist attacks that targeted infrastructure in a certain region, but either through unrealized connections or other bad actors simply following the blueprint, impacted facilities across the globe.  <br/><br/>Jason Oberg, the CTO of Cycuity, a leading provider of vulnerability mitigation solutions for semiconductor manufacturers, recently joined us to discuss some of the potential fallout from hacks, and how to prevent or respond to them in minimizing the collateral damage. We also talked about:</p><ul><li>How hackers are getting smarter in their hacks against chip makers.</li><li>Why awareness of hacker tactics is not enough, and how manufacturers of all types can enhance their knowledge level pertaining to the growing sophistication of hackers and attacks.</li><li>Addressing the baked-in compromises of hardware products, and the long-term impacts on all users and industries.</li><li>Focusing on the inherent vulnerabilities of production processes, not just the associated technology.</li><li>Balancing the goals of &quot;getting product out the door&quot; with embedding greater levels of security.</li><li>How greater transparency can help with secure-by-design challenges.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15198946-shutting-down-spy-board-threats.mp3" length="24887921" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7of2f9dv34ddsobgfjd434i1kt37?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15198946</guid>
    <pubDate>Wed, 05 Jun 2024 12:00:00 -0400</pubDate>
    <itunes:duration>2061</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The OT Threat Landscape&#39;s Infectious Nature</itunes:title>
    <title>The OT Threat Landscape&#39;s Infectious Nature</title>
    <itunes:summary><![CDATA[Send us Fan Mail Viewing hacks as diseases to address evolving threats, vulnerabilities and tools like AI.  Like many of you, I recently dove into Verizon’s 2024 Data Breach Investigations Report (DBIR).  And while there’s a plethora of data housed in the report that could fuel conversations on a multitude of topics, I chose the following two pieces of information: While credential harvesting and phishing attacks still led the way, the use of exploitable vulnerabilities to access network...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Viewing hacks as diseases to address evolving threats, vulnerabilities and tools like AI.</em><br/><br/>Like many of you, I recently dove into <a href='https://www.verizon.com/business/resources/reports/dbir/'><em>Verizon’s 2024 Data Breach Investigations Report (DBIR</em></a><em>)</em>.  And while there’s a plethora of data housed in the report that could fuel conversations on a multitude of topics, I chose the following two pieces of information:</p><ul><li>While credential harvesting and phishing attacks still led the way, the use of exploitable vulnerabilities to access networks tripled from last year, and were primarily leveraged by Ransomware and other Extortion-related threat actors.</li><li>The reported median time to click on a malicious link after an email is opened is 21 seconds, and then only another 28 seconds for the person caught in the phishing scheme to enter their data. So, basically, a successful phishing attack can be executed in less than 60 seconds. </li></ul><p>These two items caught my eye because they seem like the low-hanging fruit when it comes to cybersecurity. In this episode, Roland Cozzolino, CTO/CIO of InsightCyber, a global provider of asset visibility, risk management and security services delivered via an AI-driven platform, offers his perspective on these types of exploits, as well as:</p><ul><li>Why state-sponsored hacker groups are his biggest concern.</li><li>The problems caused by patient hackers and their live-off-the-land, or dwelling approach to network intrusions.</li><li>How manufacturers can and need to improve their use of AI tools for enhancing visibility, asset management and threat detection.</li><li>The advantages of designing OT security processes as though you&apos;re working in a disease-driven environment.</li><li>Viewing cybersecurity as less about saving money and more about not losing control of an operation.</li><li>Developing a strategy that goes beyond just &quot;unplugging the machine&quot;.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Viewing hacks as diseases to address evolving threats, vulnerabilities and tools like AI.</em><br/><br/>Like many of you, I recently dove into <a href='https://www.verizon.com/business/resources/reports/dbir/'><em>Verizon’s 2024 Data Breach Investigations Report (DBIR</em></a><em>)</em>.  And while there’s a plethora of data housed in the report that could fuel conversations on a multitude of topics, I chose the following two pieces of information:</p><ul><li>While credential harvesting and phishing attacks still led the way, the use of exploitable vulnerabilities to access networks tripled from last year, and were primarily leveraged by Ransomware and other Extortion-related threat actors.</li><li>The reported median time to click on a malicious link after an email is opened is 21 seconds, and then only another 28 seconds for the person caught in the phishing scheme to enter their data. So, basically, a successful phishing attack can be executed in less than 60 seconds. </li></ul><p>These two items caught my eye because they seem like the low-hanging fruit when it comes to cybersecurity. In this episode, Roland Cozzolino, CTO/CIO of InsightCyber, a global provider of asset visibility, risk management and security services delivered via an AI-driven platform, offers his perspective on these types of exploits, as well as:</p><ul><li>Why state-sponsored hacker groups are his biggest concern.</li><li>The problems caused by patient hackers and their live-off-the-land, or dwelling approach to network intrusions.</li><li>How manufacturers can and need to improve their use of AI tools for enhancing visibility, asset management and threat detection.</li><li>The advantages of designing OT security processes as though you&apos;re working in a disease-driven environment.</li><li>Viewing cybersecurity as less about saving money and more about not losing control of an operation.</li><li>Developing a strategy that goes beyond just &quot;unplugging the machine&quot;.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15163601-the-ot-threat-landscape-s-infectious-nature.mp3" length="31533730" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/29jcx3kexjbcbuf5224qqjz7pp91?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15163601</guid>
    <pubDate>Thu, 30 May 2024 10:00:00 -0400</pubDate>
    <itunes:duration>2615</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Knowing How to Arm Yourself for Battle</itunes:title>
    <title>Knowing How to Arm Yourself for Battle</title>
    <itunes:summary><![CDATA[Send us Fan Mail It starts with a dedication to enhanced visibility.  One of the big conversations regarding OT security revolves around the use of tools. Some have too many, others not enough and everyone is searching for the funds to mange and obtain the right ones for a constantly evolving threat landscape.  The key to understanding which tools are right for you and your organization not only demands a comprehensive understanding of your OT environment’s assets, APIs and connections, but a...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>It starts with a dedication to enhanced visibility.<br/><br/></em>One of the big conversations regarding OT security revolves around the use of tools. Some have too many, others not enough and everyone is searching for the funds to mange and obtain the right ones for a constantly evolving threat landscape.<br/><br/>The key to understanding which tools are right for you and your organization not only demands a comprehensive understanding of your OT environment’s assets, APIs and connections, but a working situational awareness. Here to discuss some of these topics, and more, is Sharon Brizinov, Director of Research at Claroty’s research arm, Team82.<br/><br/>Claroty is a leading provider of ICS and OT security, with partners that include Rockwell, Schneider Electric and Siemens. Watch/listen as we discuss:</p><ul><li>How creating patching windows can help address vulnerabilities more quickly.</li><li>How tools can help manage the proliferation of connected devices.</li><li>Why OT will benefit from IT&apos;s lessons-learned.</li><li>Creating a defense against your daughter&apos;s iPad.</li><li>Why manufacturers have to do a better job of knowing what they&apos;re defending against.</li><li>The non-complicated, but terrifying strategies of hacktivists and state-sponsored attack groups. <a href='https://claroty.com/team82/research/unpacking-the-blackjack-groups-fuxnet-malware'>(Click here to view the report </a>discussed in this episode breaking down a recent hack on Russian manufacturing.)</li><li>The evolution of component-level connectivity, and what that will mean for industrial cybersecurity.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>It starts with a dedication to enhanced visibility.<br/><br/></em>One of the big conversations regarding OT security revolves around the use of tools. Some have too many, others not enough and everyone is searching for the funds to mange and obtain the right ones for a constantly evolving threat landscape.<br/><br/>The key to understanding which tools are right for you and your organization not only demands a comprehensive understanding of your OT environment’s assets, APIs and connections, but a working situational awareness. Here to discuss some of these topics, and more, is Sharon Brizinov, Director of Research at Claroty’s research arm, Team82.<br/><br/>Claroty is a leading provider of ICS and OT security, with partners that include Rockwell, Schneider Electric and Siemens. Watch/listen as we discuss:</p><ul><li>How creating patching windows can help address vulnerabilities more quickly.</li><li>How tools can help manage the proliferation of connected devices.</li><li>Why OT will benefit from IT&apos;s lessons-learned.</li><li>Creating a defense against your daughter&apos;s iPad.</li><li>Why manufacturers have to do a better job of knowing what they&apos;re defending against.</li><li>The non-complicated, but terrifying strategies of hacktivists and state-sponsored attack groups. <a href='https://claroty.com/team82/research/unpacking-the-blackjack-groups-fuxnet-malware'>(Click here to view the report </a>discussed in this episode breaking down a recent hack on Russian manufacturing.)</li><li>The evolution of component-level connectivity, and what that will mean for industrial cybersecurity.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15103070-knowing-how-to-arm-yourself-for-battle.mp3" length="26564306" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dgbd1byb7vvm5j5pll0p1t5f6ro3?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15103070</guid>
    <pubDate>Mon, 20 May 2024 14:00:00 -0400</pubDate>
    <itunes:duration>2201</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Supply Chains Are a Hacker&#39;s Gateway</itunes:title>
    <title>Supply Chains Are a Hacker&#39;s Gateway</title>
    <itunes:summary><![CDATA[Send us Fan Mail Many attacks on manufacturers are just the first step in going after even bigger targets.  One of the inescapable truths about the industrial sector is that it is usually the ultimate proving ground for product performance. When we look at some of the technologies that have created seismic social shifts, tools like operational software, wireless connectivity and numerous monitoring devices were not ready for the demanding industrial environment right away.  When it comes to c...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Many attacks on manufacturers are just the first step in going after even bigger targets.</em><br/><br/>One of the inescapable truths about the industrial sector is that it is usually the ultimate proving ground for product performance. When we look at some of the technologies that have created seismic social shifts, tools like operational software, wireless connectivity and numerous monitoring devices were not ready for the demanding industrial environment right away.<br/><br/>When it comes to cybersecurity, that dynamic has done a 180. Hackers initially went after healthcare and financial institutions because they were seen as easy targets with deep pockets that would pay to make the problem go away as quickly as possible. <br/><br/>Then 2020 came and put many industries on pause – except for manufacturing. Like moths to a flame, the hackers were drawn to OT networks and found not only a vulnerable target, but a lucrative one. We tackle these issues and many others in this episode with Sam Moyer, MxD’s Lead Cybersecurity Engineer. Some of the topics we discuss include:</p><ul><li>The lingering (live-off-the-land) nature of many state-sponsored or hacktivist group attacks.</li><li>Finding the right ways to prioritize cybersecurity in manufacturing, and how the industry works &quot;in it&apos;s own time.&quot;</li><li>The disruptive or competitive push that manufacturing is missing.</li><li>AI, and the potential traps to avoid in eliminating too much human knowledge.</li><li>Why manufacturers are a target because of who they work with on a regular basis.</li><li>Improvements in landscape visibility.</li><li>The rise in frequency of manufactures paying ransomware demands.</li><li>Navigating the regulatory landscape, and learning from past mistakes.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Many attacks on manufacturers are just the first step in going after even bigger targets.</em><br/><br/>One of the inescapable truths about the industrial sector is that it is usually the ultimate proving ground for product performance. When we look at some of the technologies that have created seismic social shifts, tools like operational software, wireless connectivity and numerous monitoring devices were not ready for the demanding industrial environment right away.<br/><br/>When it comes to cybersecurity, that dynamic has done a 180. Hackers initially went after healthcare and financial institutions because they were seen as easy targets with deep pockets that would pay to make the problem go away as quickly as possible. <br/><br/>Then 2020 came and put many industries on pause – except for manufacturing. Like moths to a flame, the hackers were drawn to OT networks and found not only a vulnerable target, but a lucrative one. We tackle these issues and many others in this episode with Sam Moyer, MxD’s Lead Cybersecurity Engineer. Some of the topics we discuss include:</p><ul><li>The lingering (live-off-the-land) nature of many state-sponsored or hacktivist group attacks.</li><li>Finding the right ways to prioritize cybersecurity in manufacturing, and how the industry works &quot;in it&apos;s own time.&quot;</li><li>The disruptive or competitive push that manufacturing is missing.</li><li>AI, and the potential traps to avoid in eliminating too much human knowledge.</li><li>Why manufacturers are a target because of who they work with on a regular basis.</li><li>Improvements in landscape visibility.</li><li>The rise in frequency of manufactures paying ransomware demands.</li><li>Navigating the regulatory landscape, and learning from past mistakes.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15074281-supply-chains-are-a-hacker-s-gateway.mp3" length="24132130" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/j13zp6a1q7e5lyxgrmw68wagohtn?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15074281</guid>
    <pubDate>Thu, 16 May 2024 10:00:00 -0400</pubDate>
    <itunes:duration>1997</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Hacks!</itunes:title>
    <title>The Hacks!</title>
    <itunes:summary><![CDATA[Send us Fan Mail In this episode, we dive into some of the most notorious attacks to hit manufacturing over the last six months.  In addition to speaking with cybersecurity experts from around the world for this podcast, I’ve also been able to do a fair amount of reporting on our websites regarding several high-profile industrial attacks. So, I felt like it could be interesting to present some of these articles via the Security Breach podcast in helping further the conversation around tactics...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>In this episode, we dive into some of the most notorious attacks to hit manufacturing over the last six months.<br/><br/></em>In addition to speaking with cybersecurity experts from around the world for this podcast, I’ve also been able to do a fair amount of reporting on our websites regarding several high-profile industrial attacks. So, I felt like it could be interesting to present some of these articles via the <em>Security Breach</em> podcast in helping further the conversation around tactics and lessons learned.</p><p>So sit back and watch or listen as I dive into some of the most notorious attacks to hit the industrial community over the last six months.</p><ul><li>The first hack I’d like to cover is one that we’ve referenced several times here on the podcast – the  Cyber Av3ngers Unitronics PLC hack.</li><li>The second attack I&apos;m going to discuss involves a large player that those involved with industrial networking will immediately recognize – the Dark Angels penetration of Johnson Controls. This hack serves as a strong example of how a growing number of OT attacks can originate within IT systems or assets.</li><li>We&apos;ll also take a look at another familiar company within the ICS community, and how they responded to a double-extortion ransomware attack from the Cactus RaaS group.</li><li>Finally, we take a deep dive into another Dark Angels attack. This time the victim was Nexperia, a leading manufacturer of silicon-based processors based in The Netherlands, and a subsidiary of China-based Wingtech Technology.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>In this episode, we dive into some of the most notorious attacks to hit manufacturing over the last six months.<br/><br/></em>In addition to speaking with cybersecurity experts from around the world for this podcast, I’ve also been able to do a fair amount of reporting on our websites regarding several high-profile industrial attacks. So, I felt like it could be interesting to present some of these articles via the <em>Security Breach</em> podcast in helping further the conversation around tactics and lessons learned.</p><p>So sit back and watch or listen as I dive into some of the most notorious attacks to hit the industrial community over the last six months.</p><ul><li>The first hack I’d like to cover is one that we’ve referenced several times here on the podcast – the  Cyber Av3ngers Unitronics PLC hack.</li><li>The second attack I&apos;m going to discuss involves a large player that those involved with industrial networking will immediately recognize – the Dark Angels penetration of Johnson Controls. This hack serves as a strong example of how a growing number of OT attacks can originate within IT systems or assets.</li><li>We&apos;ll also take a look at another familiar company within the ICS community, and how they responded to a double-extortion ransomware attack from the Cactus RaaS group.</li><li>Finally, we take a deep dive into another Dark Angels attack. This time the victim was Nexperia, a leading manufacturer of silicon-based processors based in The Netherlands, and a subsidiary of China-based Wingtech Technology.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/15035531-the-hacks.mp3" length="11894006" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/v8yia2byrin7u89rl5t2tphd6yyx?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15035531</guid>
    <pubDate>Wed, 08 May 2024 15:00:00 -0400</pubDate>
    <itunes:duration>964</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security Breach: Predictions That Landed</itunes:title>
    <title>Security Breach: Predictions That Landed</title>
    <itunes:summary><![CDATA[Send us Fan Mail A look back at Security Breach guest's most accurate and timely industrial cybersecurity predictions.  As we near our 100th episode of Security Beach, I thought it would be a good time to take a look back at some of our guest’s predictions from the previous 12 months.  If you want to check out the full episodes from any of these previous guests, you can find them in the show archives, or by clicking through to our website. So, join me as we take a look back at a collecti...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>A look back at Security Breach guest&apos;s most accurate and timely industrial cybersecurity predictions.<br/><br/></em>As we near our 100th episode of <em>Security Beach</em>, I thought it would be a good time to take a look back at some of our guest’s predictions from the previous 12 months. </p><p>If you want to check out the full episodes from any of these previous guests, you can find them in the show archives, or by clicking through to our website. So, join me as we take a look back at a collection of predictions from:</p><ul><li><a href='https://www.mbtmag.com/video/video/22697724/security-breach-opswat'>Pete Lund at OPSWAT</a></li><li><a href='https://www.mbtmag.com/video/video/22751480/the-air-gap-lie-and-the-spectrum-of-extortion'>John Dwyer from IBM</a></li><li><a href='https://www.mbtmag.com/video/video/22793774/security-breach-balancing-the-light-and-dark-forces-of-technology'>Siemens’ Kimberly Cornwell</a></li><li><a href='https://www.mbtmag.com/video/video/22860884/security-breach-an-unlikely-assist-from-ransomware-and-the-looming-threats-of-ai'>Moty Kanias from Nanolock</a></li><li><a href='https://www.mbtmag.com/video/video/22861524/security-breach-stealing-extorting-your-competitive-advantages'>NovaCoast’s Elise Manna-Browne</a></li><li><a href='https://www.mbtmag.com/video/video/22862230/security-breach-making-hackers-pay-literally'>Brian Haugli from SideChannel</a></li><li><a href='https://www.mbtmag.com/video/video/22869319/security-breach-why-ot-is-insecure-by-design'>Huxley Barbee from runZero</a></li><li><a href='https://www.mbtmag.com/video/video/22871017/security-breach-knowing-what-is-good'>Forescout’s Daniel Trivellato</a></li><li><a href='https://www.mbtmag.com/video/video/22874596/security-breach-theyre-hitting-everyone-they-can'>Dragos’ Dawn Cappelli</a></li><li><a href='https://www.mbtmag.com/video/video/22882392/security-breach-learning-from-the-dark-side'>Impero’s Matthew Wolfe</a></li><li><a href='https://www.mbtmag.com/video/video/22883415/security-breach-updated-tactics-for-oldschool-hacks'>KnowBe4’s Erich Kron</a></li><li><a href='https://www.mbtmag.com/video/video/22883459/security-breach-ai-chatgpt-fueling-surge-in-ransomware'>Tony Pietrocola from Agileblue</a></li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>A look back at Security Breach guest&apos;s most accurate and timely industrial cybersecurity predictions.<br/><br/></em>As we near our 100th episode of <em>Security Beach</em>, I thought it would be a good time to take a look back at some of our guest’s predictions from the previous 12 months. </p><p>If you want to check out the full episodes from any of these previous guests, you can find them in the show archives, or by clicking through to our website. So, join me as we take a look back at a collection of predictions from:</p><ul><li><a href='https://www.mbtmag.com/video/video/22697724/security-breach-opswat'>Pete Lund at OPSWAT</a></li><li><a href='https://www.mbtmag.com/video/video/22751480/the-air-gap-lie-and-the-spectrum-of-extortion'>John Dwyer from IBM</a></li><li><a href='https://www.mbtmag.com/video/video/22793774/security-breach-balancing-the-light-and-dark-forces-of-technology'>Siemens’ Kimberly Cornwell</a></li><li><a href='https://www.mbtmag.com/video/video/22860884/security-breach-an-unlikely-assist-from-ransomware-and-the-looming-threats-of-ai'>Moty Kanias from Nanolock</a></li><li><a href='https://www.mbtmag.com/video/video/22861524/security-breach-stealing-extorting-your-competitive-advantages'>NovaCoast’s Elise Manna-Browne</a></li><li><a href='https://www.mbtmag.com/video/video/22862230/security-breach-making-hackers-pay-literally'>Brian Haugli from SideChannel</a></li><li><a href='https://www.mbtmag.com/video/video/22869319/security-breach-why-ot-is-insecure-by-design'>Huxley Barbee from runZero</a></li><li><a href='https://www.mbtmag.com/video/video/22871017/security-breach-knowing-what-is-good'>Forescout’s Daniel Trivellato</a></li><li><a href='https://www.mbtmag.com/video/video/22874596/security-breach-theyre-hitting-everyone-they-can'>Dragos’ Dawn Cappelli</a></li><li><a href='https://www.mbtmag.com/video/video/22882392/security-breach-learning-from-the-dark-side'>Impero’s Matthew Wolfe</a></li><li><a href='https://www.mbtmag.com/video/video/22883415/security-breach-updated-tactics-for-oldschool-hacks'>KnowBe4’s Erich Kron</a></li><li><a href='https://www.mbtmag.com/video/video/22883459/security-breach-ai-chatgpt-fueling-surge-in-ransomware'>Tony Pietrocola from Agileblue</a></li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14992904-security-breach-predictions-that-landed.mp3" length="22829622" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/po1psk8iclnsq0jkhtvg5cc8sk60?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14992904</guid>
    <pubDate>Wed, 01 May 2024 16:00:00 -0400</pubDate>
    <itunes:duration>1888</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>DMZs, Alarm Floods and Prepping for &#39;What If?&#39;</itunes:title>
    <title>DMZs, Alarm Floods and Prepping for &#39;What If?&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail The new factors impacting a growing attack surface, and how to evolve your cyber risk strategies.  The origins of what we talk about here on Security Breach can go back to any number of transformational events, but the reality is that all of them contributed an individual component to the unique mosaic that is the legacy of industrial cybersecurity. What is most interesting is that the first hacks of industrial control systems occurred at water treatment facilities, oil and g...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The new factors impacting a growing attack surface, and how to evolve your cyber risk strategies.</em><br/><br/>The origins of what we talk about here on <em>Security Breach</em> can go back to any number of transformational events, but the reality is that all of them contributed an individual component to the unique mosaic that is the legacy of industrial cybersecurity. What is most interesting is that the first hacks of industrial control systems occurred at water treatment facilities, oil and gas pipelines and energy plants.<br/><br/>These targets were chosen because they simultaneously provided great visibility, heightened social impact, and, most notably, easily exploitable vulnerabilities. In most cases, these attacks allowed the hackers to accomplish all of their early financial and self-promotional goals, along with longer-term benefits that we’re all dealing with now – how to successfully probe the ICS.<br/><br/>John Cusimano, VP of OT Security at Armexa is our guest for this episode. He&apos;s seen hackers apply these lessons learned about the industrial control system first-hand, and has some interesting thoughts on the current threat landscape, as well as solutions for keeping your systems secure. Watch/listen as we discuss:</p><ul><li>How he transitioned from a safety and automation engineer to a career in OT cybersecurity.</li><li>The benefits of failing in a safe manner.</li><li>The new dangers of remote monitoring.</li><li>Ways to implement application safe listing.</li><li>Always being prepared to answer the &apos;what if?&apos; question.</li><li>Micro-segmentation and DMZ strategies.</li><li>Best practices for patching and avoiding alarm floods.</li><li>Why his biggest concern lies in a large-scale, coordinate attack on the ICS.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The new factors impacting a growing attack surface, and how to evolve your cyber risk strategies.</em><br/><br/>The origins of what we talk about here on <em>Security Breach</em> can go back to any number of transformational events, but the reality is that all of them contributed an individual component to the unique mosaic that is the legacy of industrial cybersecurity. What is most interesting is that the first hacks of industrial control systems occurred at water treatment facilities, oil and gas pipelines and energy plants.<br/><br/>These targets were chosen because they simultaneously provided great visibility, heightened social impact, and, most notably, easily exploitable vulnerabilities. In most cases, these attacks allowed the hackers to accomplish all of their early financial and self-promotional goals, along with longer-term benefits that we’re all dealing with now – how to successfully probe the ICS.<br/><br/>John Cusimano, VP of OT Security at Armexa is our guest for this episode. He&apos;s seen hackers apply these lessons learned about the industrial control system first-hand, and has some interesting thoughts on the current threat landscape, as well as solutions for keeping your systems secure. Watch/listen as we discuss:</p><ul><li>How he transitioned from a safety and automation engineer to a career in OT cybersecurity.</li><li>The benefits of failing in a safe manner.</li><li>The new dangers of remote monitoring.</li><li>Ways to implement application safe listing.</li><li>Always being prepared to answer the &apos;what if?&apos; question.</li><li>Micro-segmentation and DMZ strategies.</li><li>Best practices for patching and avoiding alarm floods.</li><li>Why his biggest concern lies in a large-scale, coordinate attack on the ICS.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14950794-dmzs-alarm-floods-and-prepping-for-what-if.mp3" length="34596038" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/m35bwpktbhgcyuvitaaxysfx5tfv?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14950794</guid>
    <pubDate>Wed, 24 Apr 2024 15:00:00 -0400</pubDate>
    <itunes:duration>2870</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weaponizing Secure-By-Design</itunes:title>
    <title>Weaponizing Secure-By-Design</title>
    <itunes:summary><![CDATA[Send us Fan Mail How a greater focus on new and legacy OT connections could alter the cybersecurity battlefield.  Everything old … is new again. While that might seem like a natural lead-in for discussing hacker tactics, that same mantra rings true when discussing OT technology. Mordor Intelligence recently reported that U.S. manufacturing spent over $307 billion on digital transformation technologies last year, and nearly every research and consulting outlet around the world is predicting th...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How a greater focus on new and legacy OT connections could alter the cybersecurity battlefield.</em><br/><br/>Everything old … is new again. While that might seem like a natural lead-in for discussing hacker tactics, that same mantra rings true when discussing OT technology. Mordor Intelligence recently reported that U.S. manufacturing spent over $307 billion on digital transformation technologies last year, and nearly every research and consulting outlet around the world is predicting that those numbers will rise in 2024. <br/><br/>All this new software, connectivity, automation and equipment creates a familiar challenge when it comes to OT cybersecurity. This meshing of the old and new is something our guest for this episode is all too familiar with, and he’s here to break down everything associated with bringing legacy and next-gen together. <br/><br/>Listen as Josh Williams, Strategic Account Manager at IriusRisk, offers his thoughts on secure-by-design, as well as:</p><ul><li>How the industrial sector gets a C- when it comes to securely integrating new technology into the OT landscape.</li><li>Why the onus for secure-by-design concepts resides with the buyer.</li><li>How monitoring became a critical vulnerability.</li><li>The double-edged sword of connectivity.</li><li>How state-sponsored hackers are a threat to more than just political targets.</li><li>Why industrial OT is the front line in the cyber war.</li><li>Why he doesn&apos;t want to be the &quot;old man yelling at the clouds.&quot;.</li><li>How supply chains have become manufacturing&apos;s biggest cyber concerns.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How a greater focus on new and legacy OT connections could alter the cybersecurity battlefield.</em><br/><br/>Everything old … is new again. While that might seem like a natural lead-in for discussing hacker tactics, that same mantra rings true when discussing OT technology. Mordor Intelligence recently reported that U.S. manufacturing spent over $307 billion on digital transformation technologies last year, and nearly every research and consulting outlet around the world is predicting that those numbers will rise in 2024. <br/><br/>All this new software, connectivity, automation and equipment creates a familiar challenge when it comes to OT cybersecurity. This meshing of the old and new is something our guest for this episode is all too familiar with, and he’s here to break down everything associated with bringing legacy and next-gen together. <br/><br/>Listen as Josh Williams, Strategic Account Manager at IriusRisk, offers his thoughts on secure-by-design, as well as:</p><ul><li>How the industrial sector gets a C- when it comes to securely integrating new technology into the OT landscape.</li><li>Why the onus for secure-by-design concepts resides with the buyer.</li><li>How monitoring became a critical vulnerability.</li><li>The double-edged sword of connectivity.</li><li>How state-sponsored hackers are a threat to more than just political targets.</li><li>Why industrial OT is the front line in the cyber war.</li><li>Why he doesn&apos;t want to be the &quot;old man yelling at the clouds.&quot;.</li><li>How supply chains have become manufacturing&apos;s biggest cyber concerns.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14908553-weaponizing-secure-by-design.mp3" length="30687159" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lggvpw3dztch67cfble5xwlhrobw?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14908553</guid>
    <pubDate>Wed, 17 Apr 2024 15:00:00 -0400</pubDate>
    <itunes:duration>2545</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Impacts of Over-Connectivity and Mobile Defeatism</itunes:title>
    <title>The Impacts of Over-Connectivity and Mobile Defeatism</title>
    <itunes:summary><![CDATA[Send us Fan Mail The good, the bad and the ugly of mobile device security in the expanding OT attack landscape.  Included in the challenges associated with securing an ever-expanding OT attack surface is the role played by the increasing use of mobile devices – at both the enterprise and individual level. In fact, according to a recent report from Imprivata, only 46 percent of manufacturing organizations have the ability to maintain control over who has access to such devices and when, and 61...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The good, the bad and the ugly of mobile device security in the expanding OT attack landscape.</em><br/><br/>Included in the challenges associated with securing an ever-expanding OT attack surface is the role played by the increasing use of mobile devices – at both the enterprise and individual level. In fact, according to <a href='https://security.imprivata.com/mobile-access-control-best-practices-odw.html'>a recent report from Imprivata</a>, only 46 percent of manufacturing organizations have the ability to maintain control over who has access to such devices and when, and 61 percent are using shared pin numbers to secure these devices. </p><p>Additionally, an average of 16 percent of these devices are lost each year, costing organizations over $5M annually, not to mention the collateral damage from a security perspective.  This translates to an opportunity for hackers to unleash catastrophic damage by leveraging any vulnerabilities in areas like remote monitoring, and potentially new ways to worm into the networks associated with controlling your machines and systems.<br/><br/>Watch/listen as Joel Burleson-Davis, SVP of Cyber Engineering at Imprivata, returns to Security Breach to discuss OT mobile device security, as well as:</p><ul><li>The journey the industrial sector has made from devices that were never intended to be connected, to what Joel describes as OT &quot;super connectivity&quot;.</li><li>Why OT continues to be an easy target for hackers.</li><li>The evolution of hacking groups.</li><li>How we might be over-doing all the connectivity.</li><li>The double-edged sword that is mobile use in the industrial sector.</li><li>Avoiding &apos;mobile defeatism&apos;.</li><li>Combatting the growing number of dwelling or living-off-the-land attacks.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The good, the bad and the ugly of mobile device security in the expanding OT attack landscape.</em><br/><br/>Included in the challenges associated with securing an ever-expanding OT attack surface is the role played by the increasing use of mobile devices – at both the enterprise and individual level. In fact, according to <a href='https://security.imprivata.com/mobile-access-control-best-practices-odw.html'>a recent report from Imprivata</a>, only 46 percent of manufacturing organizations have the ability to maintain control over who has access to such devices and when, and 61 percent are using shared pin numbers to secure these devices. </p><p>Additionally, an average of 16 percent of these devices are lost each year, costing organizations over $5M annually, not to mention the collateral damage from a security perspective.  This translates to an opportunity for hackers to unleash catastrophic damage by leveraging any vulnerabilities in areas like remote monitoring, and potentially new ways to worm into the networks associated with controlling your machines and systems.<br/><br/>Watch/listen as Joel Burleson-Davis, SVP of Cyber Engineering at Imprivata, returns to Security Breach to discuss OT mobile device security, as well as:</p><ul><li>The journey the industrial sector has made from devices that were never intended to be connected, to what Joel describes as OT &quot;super connectivity&quot;.</li><li>Why OT continues to be an easy target for hackers.</li><li>The evolution of hacking groups.</li><li>How we might be over-doing all the connectivity.</li><li>The double-edged sword that is mobile use in the industrial sector.</li><li>Avoiding &apos;mobile defeatism&apos;.</li><li>Combatting the growing number of dwelling or living-off-the-land attacks.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14867098-the-impacts-of-over-connectivity-and-mobile-defeatism.mp3" length="35241000" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8z31615yhed4v3m4fxxmd38k92ns?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14867098</guid>
    <pubDate>Wed, 10 Apr 2024 17:00:00 -0400</pubDate>
    <itunes:duration>2924</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hackers Learn How to Attack You, From You</itunes:title>
    <title>Hackers Learn How to Attack You, From You</title>
    <itunes:summary><![CDATA[Send us Fan Mail It's not always about the ransom, data theft or denial of service.  Many cheered with the recent crackdowns  on groups like LockBit, and rightfully so. However, the harsh reality is that most of these victories are short-lived. For example, after law enforcement seized control of multiple LockBit websites and stolen data, the group was back to running extortion campaigns within a week.  And the same can be said for many other high-profile busts of groups like Hive and Vo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>It&apos;s not always about the ransom, data theft or denial of service.</em><br/><br/>Many cheered with the recent crackdowns  on groups like LockBit, and rightfully so. However, the harsh reality is that most of these victories are short-lived. For example, after law enforcement seized control of multiple LockBit websites and stolen data, the group was back to running extortion campaigns within a week.<br/><br/>And the same can be said for many other high-profile busts of groups like Hive and Volt Typhoon. These groups re-build or re-brand, as was the case with the Conti Group offshoot Black Basta. After Conti disbanded, Black Basta reformed from the ashes and tallied over $100 million in ransomware payments last year. <br/><br/>My point is not to belittle the incredible work that global agencies are performing, but to illustrate that while the industrial sector continues to make tremendous gains - the war continues. And as we evolve and improve, so will the bad guys. <br/><br/>And perhaps no one knows this better than our guest for this episode - Rod Locke. He’s the director of project management at Fortinet, a leading provider of OT cybersecurity solutions. Watch/listen as Rod shares his thoughts on:</p><ul><li>The growing influence of state-sponsored hacker groups.</li><li>The rise of dwelling or live-off-the-land attacks and how some hackers are more focused on learning about their victims than harming them.</li><li>Why OT can&apos;t always place the blame on IT, and the value in understanding both environments.</li><li>How some regulatory efforts might have &quot;swung too far.&quot;</li><li>How to attract more &quot;unique individuals&quot; to cybersecurity.</li><li>An anticipated rise in cloud infrastructure and the ways it will impact data security.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>It&apos;s not always about the ransom, data theft or denial of service.</em><br/><br/>Many cheered with the recent crackdowns  on groups like LockBit, and rightfully so. However, the harsh reality is that most of these victories are short-lived. For example, after law enforcement seized control of multiple LockBit websites and stolen data, the group was back to running extortion campaigns within a week.<br/><br/>And the same can be said for many other high-profile busts of groups like Hive and Volt Typhoon. These groups re-build or re-brand, as was the case with the Conti Group offshoot Black Basta. After Conti disbanded, Black Basta reformed from the ashes and tallied over $100 million in ransomware payments last year. <br/><br/>My point is not to belittle the incredible work that global agencies are performing, but to illustrate that while the industrial sector continues to make tremendous gains - the war continues. And as we evolve and improve, so will the bad guys. <br/><br/>And perhaps no one knows this better than our guest for this episode - Rod Locke. He’s the director of project management at Fortinet, a leading provider of OT cybersecurity solutions. Watch/listen as Rod shares his thoughts on:</p><ul><li>The growing influence of state-sponsored hacker groups.</li><li>The rise of dwelling or live-off-the-land attacks and how some hackers are more focused on learning about their victims than harming them.</li><li>Why OT can&apos;t always place the blame on IT, and the value in understanding both environments.</li><li>How some regulatory efforts might have &quot;swung too far.&quot;</li><li>How to attract more &quot;unique individuals&quot; to cybersecurity.</li><li>An anticipated rise in cloud infrastructure and the ways it will impact data security.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14822011-hackers-learn-how-to-attack-you-from-you.mp3" length="25060208" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6dyr83b6fs7q336uk8ictldt65z9?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14822011</guid>
    <pubDate>Wed, 03 Apr 2024 13:00:00 -0400</pubDate>
    <itunes:duration>2076</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Largest Attack Surface - People</itunes:title>
    <title>The Largest Attack Surface - People</title>
    <itunes:summary><![CDATA[Send us Fan Mail How we're failing to properly support and train our most important cybersecurity asset.  According to Nozomi Networks February 2024 OT-IoT Security Report, manufacturing was exposed to more common vulnerabilities and exposures, or CVEs, than any other sector - realizing a 230 percent year-over-year increase in this area. Addressing even a fraction of these CVEs would be daunting, which is why understanding your assets is so basic, but so vital in establishing priorities and i...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How we&apos;re failing to properly support and train our most important cybersecurity asset.<br/><br/></em>According to Nozomi Networks <em>February 2024 OT-IoT Security Report</em>, manufacturing was exposed to more common vulnerabilities and exposures, or CVEs, than any other sector - realizing a 230 percent year-over-year increase in this area. Addressing even a fraction of these CVEs would be daunting, which is why understanding your assets is so basic, but so vital in establishing priorities and implementing approaches best suited to your security needs. </p><p>To discuss these topics, and more, we welcome Jeff Nathan, Director of Detection Engineering at Netography, a leading provider of network security solutions, to the show. Watch/listen as he discusses:</p><ul><li>How social engineering tactics play a key role in manipulating emotional responses that trigger certain actions.</li><li>The phishable weaknesses of MFA, and how its workflow might not be strengthening your security posture.</li><li>Limiting your blast radius.</li><li>The potential of encrypting endpoint data.</li><li>Why cybersecurity needs to take a more scientific approach to defensive tactics.</li><li>The industry&apos;s biggest miss on AI.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How we&apos;re failing to properly support and train our most important cybersecurity asset.<br/><br/></em>According to Nozomi Networks <em>February 2024 OT-IoT Security Report</em>, manufacturing was exposed to more common vulnerabilities and exposures, or CVEs, than any other sector - realizing a 230 percent year-over-year increase in this area. Addressing even a fraction of these CVEs would be daunting, which is why understanding your assets is so basic, but so vital in establishing priorities and implementing approaches best suited to your security needs. </p><p>To discuss these topics, and more, we welcome Jeff Nathan, Director of Detection Engineering at Netography, a leading provider of network security solutions, to the show. Watch/listen as he discusses:</p><ul><li>How social engineering tactics play a key role in manipulating emotional responses that trigger certain actions.</li><li>The phishable weaknesses of MFA, and how its workflow might not be strengthening your security posture.</li><li>Limiting your blast radius.</li><li>The potential of encrypting endpoint data.</li><li>Why cybersecurity needs to take a more scientific approach to defensive tactics.</li><li>The industry&apos;s biggest miss on AI.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14788218-the-largest-attack-surface-people.mp3" length="32151760" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5hxamh14g0lhq223f7p8s8rbfbgn?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14788218</guid>
    <pubDate>Thu, 28 Mar 2024 15:00:00 -0400</pubDate>
    <itunes:duration>2665</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Avoiding a &#39;Chicken Little&#39; Cybersecurity Strategy</itunes:title>
    <title>Avoiding a &#39;Chicken Little&#39; Cybersecurity Strategy</title>
    <itunes:summary><![CDATA[Send us Fan Mail Threat intelligence is important, but why manufacturers should focus on risk factors first.  When it comes to the industrial sector’s ongoing cybersecurity challenges, we all know that there's more to defend, but what is most concerning is that we’re not responding quickly enough to the expanding threat landscape. In case you needed proof, here are some of the recent stats from Dragos 2023 Year in Review Report. It found that: 80 percent of industrial sector vulnerabilities r...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Threat intelligence is important, but why manufacturers should focus on risk factors first.</em><br/><br/>When it comes to the industrial sector’s ongoing cybersecurity challenges, we all know that there&apos;s more to defend, but what is most concerning is that we’re not responding quickly enough to the expanding threat landscape. In case you needed proof, here are some of the recent stats from Dragos <em>2023 Year in Review Report.</em> It found that:</p><ul><li>80 percent of industrial sector vulnerabilities reside deep within the ICS network, making them difficult to see and harder to kick out.</li><li>53 percent of the advisories Dragos analyzed could cause both a loss of visibility and control.</li><li>Ransomware attacks against industrial organizations increased by 50 percent last year, and Dragos tracked 28 percent more ransomware groups focused on the ICS/OT environment.</li><li>Attacks were confirmed in 33 unique manufacturing sectors.</li><li>74 percent of all vulnerability advisories had no mitigation strategy.</li></ul><p>I’m not going to promise solutions for all of these challenges, but we’ve definitely found a guy interested in trying. Scott Sarris is an Information Security, Compliance and Privacy Solutions Advisor at Aprio, a leading advisory and business consulting firm. Watch/listen as we discuss:</p><ul><li>Why OT could affectionately be known as &quot;Old Tech&quot;.</li><li>The political factors impacting IT/OT divisiveness in the industrial sector, but why Scott is optimistic about the progress being made in bringing the two segments together.</li><li>Why cybersecurity planning and investments needs to start with assessing and prioritizing risk.</li><li>How slowing down can help ramp up security efforts.</li><li>Why dwelling or living-off-the-land attacks will escalate.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Threat intelligence is important, but why manufacturers should focus on risk factors first.</em><br/><br/>When it comes to the industrial sector’s ongoing cybersecurity challenges, we all know that there&apos;s more to defend, but what is most concerning is that we’re not responding quickly enough to the expanding threat landscape. In case you needed proof, here are some of the recent stats from Dragos <em>2023 Year in Review Report.</em> It found that:</p><ul><li>80 percent of industrial sector vulnerabilities reside deep within the ICS network, making them difficult to see and harder to kick out.</li><li>53 percent of the advisories Dragos analyzed could cause both a loss of visibility and control.</li><li>Ransomware attacks against industrial organizations increased by 50 percent last year, and Dragos tracked 28 percent more ransomware groups focused on the ICS/OT environment.</li><li>Attacks were confirmed in 33 unique manufacturing sectors.</li><li>74 percent of all vulnerability advisories had no mitigation strategy.</li></ul><p>I’m not going to promise solutions for all of these challenges, but we’ve definitely found a guy interested in trying. Scott Sarris is an Information Security, Compliance and Privacy Solutions Advisor at Aprio, a leading advisory and business consulting firm. Watch/listen as we discuss:</p><ul><li>Why OT could affectionately be known as &quot;Old Tech&quot;.</li><li>The political factors impacting IT/OT divisiveness in the industrial sector, but why Scott is optimistic about the progress being made in bringing the two segments together.</li><li>Why cybersecurity planning and investments needs to start with assessing and prioritizing risk.</li><li>How slowing down can help ramp up security efforts.</li><li>Why dwelling or living-off-the-land attacks will escalate.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14737230-avoiding-a-chicken-little-cybersecurity-strategy.mp3" length="28526380" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dlu78azdrytx2d4jspa7ug4yosdf?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14737230</guid>
    <pubDate>Thu, 21 Mar 2024 10:00:00 -0400</pubDate>
    <itunes:duration>2364</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity&#39;s Greatest Weapon - Awareness</itunes:title>
    <title>Cybersecurity&#39;s Greatest Weapon - Awareness</title>
    <itunes:summary><![CDATA[Send us Fan Mail The sector's (forced) cyber awakening needs to focus on making it harder to be a hacker.  Regardless of how complex the attack, how organized the hacker, or how advanced the tools and tactics, security solutions usually lie in very fundamental practices. So, while you might think you already know enough about segmentation strategies, framework development, asset visibility or enhanced access controls, it’s these things that get overlooked and then exploited by hackers.  ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The sector&apos;s (forced) cyber awakening needs to focus on making it harder to be a hacker.<br/><br/></em>Regardless of how complex the attack, how organized the hacker, or how advanced the tools and tactics, security solutions usually lie in very fundamental practices. So, while you might think you already know enough about segmentation strategies, framework development, asset visibility or enhanced access controls, it’s these things that get overlooked and then exploited by hackers. </p><p>It’s the evolution of these little things that our guest for today’s show likes to emphasize in helping to keep the OT environment secure. Watch/listen as Brian Deken, Commercial Manager of Cybersecurity Services at Rockwell Automation offers perspective on topics that include:</p><ul><li>How increased coverage and awareness of industrial cybersecurity has helped improve OT visibility, and incited more manufacturers to take real action.</li><li>Why constantly evolving simple cyber strategies, like frameworks, segmentation and access hygiene are essential.</li><li>What video gamers can teach us about finding OT security expertise.</li><li>The status of IT-OT convergence.</li><li>The attack from which some manufacturers will never recover.</li><li>The positive impacts of supply chain vulnerabilities.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The sector&apos;s (forced) cyber awakening needs to focus on making it harder to be a hacker.<br/><br/></em>Regardless of how complex the attack, how organized the hacker, or how advanced the tools and tactics, security solutions usually lie in very fundamental practices. So, while you might think you already know enough about segmentation strategies, framework development, asset visibility or enhanced access controls, it’s these things that get overlooked and then exploited by hackers. </p><p>It’s the evolution of these little things that our guest for today’s show likes to emphasize in helping to keep the OT environment secure. Watch/listen as Brian Deken, Commercial Manager of Cybersecurity Services at Rockwell Automation offers perspective on topics that include:</p><ul><li>How increased coverage and awareness of industrial cybersecurity has helped improve OT visibility, and incited more manufacturers to take real action.</li><li>Why constantly evolving simple cyber strategies, like frameworks, segmentation and access hygiene are essential.</li><li>What video gamers can teach us about finding OT security expertise.</li><li>The status of IT-OT convergence.</li><li>The attack from which some manufacturers will never recover.</li><li>The positive impacts of supply chain vulnerabilities.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14685637-cybersecurity-s-greatest-weapon-awareness.mp3" length="26746937" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0l857yj2eptdvf7uf9zzc6gvfh6u?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14685637</guid>
    <pubDate>Wed, 13 Mar 2024 16:00:00 -0400</pubDate>
    <itunes:duration>2216</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Chasing Cyber Ghosts</itunes:title>
    <title>Chasing Cyber Ghosts</title>
    <itunes:summary><![CDATA[Send us Fan Mail How thinking like a hacker can lead to better cybersecurity ROI and avoid the dreaded "hope" strategy.  Regardless of what you might hear from some, ransomware in the industrial sector is at an all-time high in terms of frequency and cost. Zero day and day one vulnerabilities are being discovered at a historic level and patching continues to be a challenge.  Asset visualization and endpoint security have become more daunting thanks to technology-driven expansions of the indus...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How thinking like a hacker can lead to better cybersecurity ROI and avoid the dreaded &quot;hope&quot; strategy.</em><br/><br/>Regardless of what you might hear from some, ransomware in the industrial sector is at an all-time high in terms of frequency and cost. Zero day and day one vulnerabilities are being discovered at a historic level and patching continues to be a challenge.<br/><br/>Asset visualization and endpoint security have become more daunting thanks to technology-driven expansions of the industrial attack surface. And then there’s AI, SBOMs and botnets all waiting to wreak havoc on the ICS.<br/><br/>All of these factors, along with the growing complexity of the hacker community, means that industrial cybersecurity is no longer just about white and black hats. In fact, some would argue that perhaps the most important player in the cybersecurity arena now wears red.<br/><br/>Joining us to discuss his approach to &quot;red teams on steroids&quot; is Guy Bejerano, CEO of SafeBreach, a leading provider of Breach and Attack Simulation tools and services. Listen as we discuss:</p><ul><li>What it means to think like a hacker, but defend like a CISO.</li><li>Developing security with a focus on running a business.</li><li>Connecting the dots between the technical aspects of an attack and the impact of it on the business.</li><li>Improving cybersecurity ROI by demonstrating the value of closing &quot;gaps.&quot;</li><li>Focusing on known attacks, as opposed to the &quot;ghost&quot; vulnerabilities.</li><li>The growth of collaboration between IT and OT.</li><li>Why manufacturing is still susceptible to legacy attacks.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How thinking like a hacker can lead to better cybersecurity ROI and avoid the dreaded &quot;hope&quot; strategy.</em><br/><br/>Regardless of what you might hear from some, ransomware in the industrial sector is at an all-time high in terms of frequency and cost. Zero day and day one vulnerabilities are being discovered at a historic level and patching continues to be a challenge.<br/><br/>Asset visualization and endpoint security have become more daunting thanks to technology-driven expansions of the industrial attack surface. And then there’s AI, SBOMs and botnets all waiting to wreak havoc on the ICS.<br/><br/>All of these factors, along with the growing complexity of the hacker community, means that industrial cybersecurity is no longer just about white and black hats. In fact, some would argue that perhaps the most important player in the cybersecurity arena now wears red.<br/><br/>Joining us to discuss his approach to &quot;red teams on steroids&quot; is Guy Bejerano, CEO of SafeBreach, a leading provider of Breach and Attack Simulation tools and services. Listen as we discuss:</p><ul><li>What it means to think like a hacker, but defend like a CISO.</li><li>Developing security with a focus on running a business.</li><li>Connecting the dots between the technical aspects of an attack and the impact of it on the business.</li><li>Improving cybersecurity ROI by demonstrating the value of closing &quot;gaps.&quot;</li><li>Focusing on known attacks, as opposed to the &quot;ghost&quot; vulnerabilities.</li><li>The growth of collaboration between IT and OT.</li><li>Why manufacturing is still susceptible to legacy attacks.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14641179-chasing-cyber-ghosts.mp3" length="20728295" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wy4skh8oj7o39ppr79ng0wrbj6jt?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14641179</guid>
    <pubDate>Wed, 06 Mar 2024 15:00:00 -0500</pubDate>
    <itunes:duration>1715</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Missteps Creating &#39;An Internal Collection of Hackers&#39;</itunes:title>
    <title>Missteps Creating &#39;An Internal Collection of Hackers&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail Creating an OT vision, and why hackers are "like water."  With hackers repeatedly demonstrating that that they play no favorites in terms of the sector of manufacturing, its location, or the size of the enterprise, detection and response strategies can be universally dissected in addressing ransomware, phishing or any number of social engineering approaches.  And this data, along with the potential solutions it fuels, can be made available to the industry as a whole – no...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Creating an OT vision, and why hackers are &quot;like water.&quot;</em><br/><br/>With hackers repeatedly demonstrating that that they play no favorites in terms of the sector of manufacturing, its location, or the size of the enterprise, detection and response strategies can be universally dissected in addressing ransomware, phishing or any number of social engineering approaches. </p><p>And this data, along with the potential solutions it fuels, can be made available to the industry as a whole – not just the largest or most well-known entities. Universal problems typically generate the most response. And what I’m seeing is a much more aggressive response from big players throughout the industry – including the employer of today’s guest, Alexandre Peixoto, Cybersecurity Business Director at Emerson Automation Solutions.</p><p>Listen/watch as we discuss:</p><ul><li>Why recent cybersecurity developments are less about how the hackers have changed and much more about attack surface evolution.</li><li>How, why and when to bring IT into the cybersecurity conversation.</li><li>How OT can learn from IT in developing a vision for ongoing cybersecurity needs.</li><li>The importance of going through the cybersecurity journey, similar to digital transformation, in order to really understand needs and priorities.</li><li>Why OT cybersecurity often forgets about the basics.</li><li>How &quot;hackers are like water.&quot;</li><li>Tackling the legacy dynamics of SBOMs.</li><li>The future role of over-the-air (OTA) software updates, and how they could impact security priorities.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Creating an OT vision, and why hackers are &quot;like water.&quot;</em><br/><br/>With hackers repeatedly demonstrating that that they play no favorites in terms of the sector of manufacturing, its location, or the size of the enterprise, detection and response strategies can be universally dissected in addressing ransomware, phishing or any number of social engineering approaches. </p><p>And this data, along with the potential solutions it fuels, can be made available to the industry as a whole – not just the largest or most well-known entities. Universal problems typically generate the most response. And what I’m seeing is a much more aggressive response from big players throughout the industry – including the employer of today’s guest, Alexandre Peixoto, Cybersecurity Business Director at Emerson Automation Solutions.</p><p>Listen/watch as we discuss:</p><ul><li>Why recent cybersecurity developments are less about how the hackers have changed and much more about attack surface evolution.</li><li>How, why and when to bring IT into the cybersecurity conversation.</li><li>How OT can learn from IT in developing a vision for ongoing cybersecurity needs.</li><li>The importance of going through the cybersecurity journey, similar to digital transformation, in order to really understand needs and priorities.</li><li>Why OT cybersecurity often forgets about the basics.</li><li>How &quot;hackers are like water.&quot;</li><li>Tackling the legacy dynamics of SBOMs.</li><li>The future role of over-the-air (OTA) software updates, and how they could impact security priorities.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14594023-missteps-creating-an-internal-collection-of-hackers.mp3" length="28963838" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jma8llk5m6tilo4tnc6y6po3593c?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14594023</guid>
    <pubDate>Wed, 28 Feb 2024 11:00:00 -0500</pubDate>
    <itunes:duration>2401</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Leveraging Threat Intelligence Data</itunes:title>
    <title>Leveraging Threat Intelligence Data</title>
    <itunes:summary><![CDATA[Send us Fan Mail Hacker insight and vulnerability updates are great, but that's only half the battle.  An ever-expanding attack surface has created a number of complexities when it comes to combining the benefits of new automation technologies with the challenges of securing the OT environment and supply chain. This led Cybersixgill to predict that in 2024, more companies will adopt Threat Exposure Management, a holistic, proactive approach to cybersecurity where cyber threat intelligence is ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Hacker insight and vulnerability updates are great, but that&apos;s only half the battle.<br/><br/></em>An ever-expanding attack surface has created a number of complexities when it comes to combining the benefits of new automation technologies with the challenges of securing the OT environment and supply chain. This led Cybersixgill to predict that in 2024, more companies will adopt Threat Exposure Management, a holistic, proactive approach to cybersecurity where cyber threat intelligence is a foundational component.<br/><br/>To discuss this perspective, and more, we sat down with Gabi Reish, Global Head of Product Development at Cybersixgill , a leading provider of industrial cybersecurity solutions. Listen as we discuss:</p><ul><li>How data breaches have grown to average $4.7M per attack in manufacturing - which is $300K more than other industries.</li><li>Why the biggest benefit of threat intelligence might be gaining a better understanding of how to position cyber assets.</li><li>The latest SEC regs and how disclosing incidents makes the industry better.</li><li>The potential impact of virtual patching.</li><li>Why some OT specialists are being asked to &quot;predict the weather without any forecasting tools.&quot;</li><li>How and why ransomware attacks are getting more complicated.</li><li>&quot;Human nature is a problem.&quot;</li><li>How AI is allowing hackers to &quot;seem more human&quot; and why that&apos;s a huge problem.</li><li>We need more technology that works like a guardrail.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Hacker insight and vulnerability updates are great, but that&apos;s only half the battle.<br/><br/></em>An ever-expanding attack surface has created a number of complexities when it comes to combining the benefits of new automation technologies with the challenges of securing the OT environment and supply chain. This led Cybersixgill to predict that in 2024, more companies will adopt Threat Exposure Management, a holistic, proactive approach to cybersecurity where cyber threat intelligence is a foundational component.<br/><br/>To discuss this perspective, and more, we sat down with Gabi Reish, Global Head of Product Development at Cybersixgill , a leading provider of industrial cybersecurity solutions. Listen as we discuss:</p><ul><li>How data breaches have grown to average $4.7M per attack in manufacturing - which is $300K more than other industries.</li><li>Why the biggest benefit of threat intelligence might be gaining a better understanding of how to position cyber assets.</li><li>The latest SEC regs and how disclosing incidents makes the industry better.</li><li>The potential impact of virtual patching.</li><li>Why some OT specialists are being asked to &quot;predict the weather without any forecasting tools.&quot;</li><li>How and why ransomware attacks are getting more complicated.</li><li>&quot;Human nature is a problem.&quot;</li><li>How AI is allowing hackers to &quot;seem more human&quot; and why that&apos;s a huge problem.</li><li>We need more technology that works like a guardrail.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14554261-leveraging-threat-intelligence-data.mp3" length="27471370" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jhl0df6xfehdez2c0goj0un454ng?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14554261</guid>
    <pubDate>Thu, 22 Feb 2024 10:00:00 -0500</pubDate>
    <itunes:duration>2277</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Hacker&#39;s Most Lucrative Attack</itunes:title>
    <title>The Hacker&#39;s Most Lucrative Attack</title>
    <itunes:summary><![CDATA[Send us Fan Mail The tech that's helping social engineers expand current exploits, including credential harvesting.  In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber risk solutions, to the show. The conversation spanned a number of topics, including: The double-edged sword of credential harvesting hacks.How data theft is providing greater visibility of an organization's supply chain and partners in helping cybercriminals accumulate more poten...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The tech that&apos;s helping social engineers expand current exploits, including credential harvesting.<br/><br/></em>In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber risk solutions, to the show. The conversation spanned a number of topics, including:</p><ul><li>The double-edged sword of credential harvesting hacks.</li><li>How data theft is providing greater visibility of an organization&apos;s supply chain and partners in helping cybercriminals accumulate more potential targets.</li><li>The challenges of implementing and sustaining data hygiene practices.</li><li>Using AI to to fill cybersecurity jobs.</li><li>How new technology, like AI, is helping cybercriminals lower their operating costs.</li><li>Understanding that you can&apos;t defend what you don&apos;t know or understand about your internal landscape.</li><li>Embracing the benefits of IIoT, but understanding the security risks it carries.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The tech that&apos;s helping social engineers expand current exploits, including credential harvesting.<br/><br/></em>In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber risk solutions, to the show. The conversation spanned a number of topics, including:</p><ul><li>The double-edged sword of credential harvesting hacks.</li><li>How data theft is providing greater visibility of an organization&apos;s supply chain and partners in helping cybercriminals accumulate more potential targets.</li><li>The challenges of implementing and sustaining data hygiene practices.</li><li>Using AI to to fill cybersecurity jobs.</li><li>How new technology, like AI, is helping cybercriminals lower their operating costs.</li><li>Understanding that you can&apos;t defend what you don&apos;t know or understand about your internal landscape.</li><li>Embracing the benefits of IIoT, but understanding the security risks it carries.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14505800-the-hacker-s-most-lucrative-attack.mp3" length="26209942" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/le06njstz3yxml1rpbfjtpxktf6t?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14505800</guid>
    <pubDate>Thu, 15 Feb 2024 09:00:00 -0500</pubDate>
    <itunes:duration>2172</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SBOMs, AI and the Crown Jewels</itunes:title>
    <title>SBOMs, AI and the Crown Jewels</title>
    <itunes:summary><![CDATA[Send us Fan Mail How prioritizing the wrong data and assets is leading to more cyber risk.  When it comes to OT security, the cruel reality is that the bad guys are doing what most predators do over time – they continue to hunt and evolve. This evolution allows hackers to constantly adjust to new security protocols and more rapidly react to common vulnerabilities – often days, weeks or months before a suitable patch or solution can be put in place.   It’s the black hat’s constant drive t...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How prioritizing the wrong data and assets is leading to more cyber risk.<br/><br/></em>When it comes to OT security, the cruel reality is that the bad guys are doing what most predators do over time – they continue to hunt and evolve. This evolution allows hackers to constantly adjust to new security protocols and more rapidly react to common vulnerabilities – often days, weeks or months before a suitable patch or solution can be put in place. <br/><br/>It’s the black hat’s constant drive to enhance their attacks that led us to this episode&apos;s discussion and guest. I recently sat down with Rick Kaun, VP of Solutions at Verve Industrial Protection. Verve is a leading provider of endpoint security, vulnerability testing and network segmentation strategies.<br/><br/>Join us as Rick discusses:</p><ul><li>What &apos;done&apos; looks like.</li><li>Why nobody wants to be a CISO right now.</li><li>The opportunities represented by former military personnel coming into cybersecurity.</li><li>Why there&apos;s too much attention around SBOMs ... right now.</li><li>The best ways to use AI.</li><li>How identifying the &quot;crown jewels&quot; is the most important step to protecting them, and why this is consistently overlooked.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How prioritizing the wrong data and assets is leading to more cyber risk.<br/><br/></em>When it comes to OT security, the cruel reality is that the bad guys are doing what most predators do over time – they continue to hunt and evolve. This evolution allows hackers to constantly adjust to new security protocols and more rapidly react to common vulnerabilities – often days, weeks or months before a suitable patch or solution can be put in place. <br/><br/>It’s the black hat’s constant drive to enhance their attacks that led us to this episode&apos;s discussion and guest. I recently sat down with Rick Kaun, VP of Solutions at Verve Industrial Protection. Verve is a leading provider of endpoint security, vulnerability testing and network segmentation strategies.<br/><br/>Join us as Rick discusses:</p><ul><li>What &apos;done&apos; looks like.</li><li>Why nobody wants to be a CISO right now.</li><li>The opportunities represented by former military personnel coming into cybersecurity.</li><li>Why there&apos;s too much attention around SBOMs ... right now.</li><li>The best ways to use AI.</li><li>How identifying the &quot;crown jewels&quot; is the most important step to protecting them, and why this is consistently overlooked.</li></ul><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14458269-sboms-ai-and-the-crown-jewels.mp3" length="24111582" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gre0swi3y42hdhdzwvv3tsdcixia?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14458269</guid>
    <pubDate>Wed, 07 Feb 2024 10:00:00 -0500</pubDate>
    <itunes:duration>1997</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tech Debt and the Unsexy Side of Cybersecurity</itunes:title>
    <title>Tech Debt and the Unsexy Side of Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail How the legacy of OT innovation contributes to cyber challenges.  Vulnerabilities across the cybersecurity landscape are obviously trending in an upward direction. Perhaps most concerning, however, is the number of zero and one-day vulnerabilities being uncovered in key industrial control systems by many of the sector’s leading providers of software, automation and system integration services.  These vulnerabilities not only open the door for potential attacks, but lend crede...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How the legacy of OT innovation contributes to cyber challenges.<br/><br/></em>Vulnerabilities across the cybersecurity landscape are obviously trending in an upward direction. Perhaps most concerning, however, is the number of zero and one-day vulnerabilities being uncovered in key industrial control systems by many of the sector’s leading providers of software, automation and system integration services.<br/><br/>These vulnerabilities not only open the door for potential attacks, but lend credence to other cybersecurity challenges, such as patching, proper segmentation strategies and trying to accommodate the potential downtime associated with identifying and rectifying these embedded problems. <br/><br/>Constantine Antoniou, Cybersecurity Business Consultant in Schneider Electric&apos;s Global Cybersecurity Solutions and Services business, promises to offer a unique perspective on these challenges and potential solutions.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How the legacy of OT innovation contributes to cyber challenges.<br/><br/></em>Vulnerabilities across the cybersecurity landscape are obviously trending in an upward direction. Perhaps most concerning, however, is the number of zero and one-day vulnerabilities being uncovered in key industrial control systems by many of the sector’s leading providers of software, automation and system integration services.<br/><br/>These vulnerabilities not only open the door for potential attacks, but lend credence to other cybersecurity challenges, such as patching, proper segmentation strategies and trying to accommodate the potential downtime associated with identifying and rectifying these embedded problems. <br/><br/>Constantine Antoniou, Cybersecurity Business Consultant in Schneider Electric&apos;s Global Cybersecurity Solutions and Services business, promises to offer a unique perspective on these challenges and potential solutions.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14416006-tech-debt-and-the-unsexy-side-of-cybersecurity.mp3" length="29492106" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/x8p0dr2321d0y4ei3zo3g29tle0y?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14416006</guid>
    <pubDate>Wed, 31 Jan 2024 15:00:00 -0500</pubDate>
    <itunes:duration>2445</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What Happens When a Torque Wrench Gets Hacked</itunes:title>
    <title>What Happens When a Torque Wrench Gets Hacked</title>
    <itunes:summary><![CDATA[Send us Fan Mail Two recent vulnerabilities, one traditional and one frighteningly unique, could reshape industrial cybersecurity.  In this episode, we’re going to dive into two recently detected vulnerabilities that could have a significant impact on the industrial sector, as they involve two companies with wide-reaching influence on manufacturers of all sizes.   One involves the Siemens Automation License Manager, and the potential threats a vulnerability poses to industrial control sy...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Two recent vulnerabilities, one traditional and one frighteningly unique, could reshape industrial cybersecurity.<br/><br/></em>In this episode, we’re going to dive into two recently detected vulnerabilities that could have a significant impact on the industrial sector, as they involve two companies with wide-reaching influence on manufacturers of all sizes. <br/><br/>One involves the Siemens Automation License Manager, and the potential threats a vulnerability poses to industrial control system data security for its users.<br/><br/>The second stems from a unique source – a Bosch assembly tool. More specifically, we’re talking about a very popular nutrunner/pneumatic torque wrench that could potentially be exploited by hackers to create extortion campaigns. <br/><br/>We discuss these security challenges with Andrea Palanca, a security researcher at Nozomi Networks, and Eran Jacob from OTORIO.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Two recent vulnerabilities, one traditional and one frighteningly unique, could reshape industrial cybersecurity.<br/><br/></em>In this episode, we’re going to dive into two recently detected vulnerabilities that could have a significant impact on the industrial sector, as they involve two companies with wide-reaching influence on manufacturers of all sizes. <br/><br/>One involves the Siemens Automation License Manager, and the potential threats a vulnerability poses to industrial control system data security for its users.<br/><br/>The second stems from a unique source – a Bosch assembly tool. More specifically, we’re talking about a very popular nutrunner/pneumatic torque wrench that could potentially be exploited by hackers to create extortion campaigns. <br/><br/>We discuss these security challenges with Andrea Palanca, a security researcher at Nozomi Networks, and Eran Jacob from OTORIO.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14375853-what-happens-when-a-torque-wrench-gets-hacked.mp3" length="20872556" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lro1qr1yo3zpq7ql2ctthjuk1rqo?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14375853</guid>
    <pubDate>Thu, 25 Jan 2024 09:00:00 -0500</pubDate>
    <itunes:duration>1725</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI, ChatGPT Fueling Surge in Ransomware</itunes:title>
    <title>AI, ChatGPT Fueling Surge in Ransomware</title>
    <itunes:summary><![CDATA[Send us Fan Mail Elevated social engineering, more connections and growing extortion amounts will drive attack growth.  Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted in a large quantity of the aerospace giant’s data being stolen. One of the experts we tapped into in breaking down the attack, and its fallout, was Tony Pietrocola.  In addition to serving as the president of AgileBlue, he also heads the Northern Ohio chapter of ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Elevated social engineering, more connections and growing extortion amounts will drive attack growth.<br/><br/></em>Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted in a large quantity of the aerospace giant’s data being stolen. One of the experts we tapped into in breaking down the attack, and its fallout, was Tony Pietrocola.<br/><br/>In addition to serving as the president of AgileBlue, he also heads the Northern Ohio chapter of InfraGard, which works directly with the FBI on cybercrime.<br/><br/>You can check that Boeing episode out <a href='https://www.mbtmag.com/video/video/22879832/security-breach-breaking-down-the-boeing-hack'>in our archives</a>.<br/><br/>In addition to his extensive knowledge on threat actors like Lockbit, Tony also has a tremendous amount of insight on ways to improve attack surface visibility, especially as hackers are beginning to utilize next-gen tools like AI.<br/><br/>For more information on the work AgileBlue does, you can check them out at <a href='https://www.agileblue.com/'>agileblue.com</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Elevated social engineering, more connections and growing extortion amounts will drive attack growth.<br/><br/></em>Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted in a large quantity of the aerospace giant’s data being stolen. One of the experts we tapped into in breaking down the attack, and its fallout, was Tony Pietrocola.<br/><br/>In addition to serving as the president of AgileBlue, he also heads the Northern Ohio chapter of InfraGard, which works directly with the FBI on cybercrime.<br/><br/>You can check that Boeing episode out <a href='https://www.mbtmag.com/video/video/22879832/security-breach-breaking-down-the-boeing-hack'>in our archives</a>.<br/><br/>In addition to his extensive knowledge on threat actors like Lockbit, Tony also has a tremendous amount of insight on ways to improve attack surface visibility, especially as hackers are beginning to utilize next-gen tools like AI.<br/><br/>For more information on the work AgileBlue does, you can check them out at <a href='https://www.agileblue.com/'>agileblue.com</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14280013-ai-chatgpt-fueling-surge-in-ransomware.mp3" length="16252078" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/josy2eu4psafd9muckggb9fajemy?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14280013</guid>
    <pubDate>Tue, 09 Jan 2024 13:00:00 -0500</pubDate>
    <itunes:duration>1333</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>New Strategies for Old-School Hacks</itunes:title>
    <title>New Strategies for Old-School Hacks</title>
    <itunes:summary><![CDATA[Send us Fan Mail Coordinating patches, covering the basics and not falling for 'pinky promises.'  Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted. One of the experts we tapped into in breaking down the attack, and its fallout, was KnowBe4’s Erich Kron.  You can check that episode out in our archives.   In addition to his extensive knowledge on threat actors like Lockbit, Erich also has a tremendous amount of insight on a number...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Coordinating patches, covering the basics and not falling for &apos;pinky promises.&apos;<br/><br/></em>Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted. One of the experts we tapped into in breaking down the attack, and its fallout, was KnowBe4’s Erich Kron.<br/><br/>You can check that <a href='https://www.mbtmag.com/video/video/22879832/security-breach-breaking-down-the-boeing-hack'>episode out in our archives.</a> <br/><br/>In addition to his extensive knowledge on threat actors like Lockbit, Erich also has a tremendous amount of insight on a number of cybersecurity challenges that continue to plaque the industrial sector, including the human elements. His knowledge seems especially timely given that one of the most significant vulnerabilities uncovered in the last month stems from <a href='https://www.manufacturing.net/cybersecurity/article/22883872/inside-the-cyber-av3ngers-global-plc-hack'>a hacktivist group using unchanged default passwords</a> to access PLCs in water treatment facilities and manufacturing plants. <br/><br/>Just like Colonial Pipeline and numerous other attacks, this global vulnerability started with the actions, or inactions, of a human being. This episode offers some additional insight from Erich Kron at <a href='https://www.knowbe4.com/'>KnowBe4. </a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Coordinating patches, covering the basics and not falling for &apos;pinky promises.&apos;<br/><br/></em>Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted. One of the experts we tapped into in breaking down the attack, and its fallout, was KnowBe4’s Erich Kron.<br/><br/>You can check that <a href='https://www.mbtmag.com/video/video/22879832/security-breach-breaking-down-the-boeing-hack'>episode out in our archives.</a> <br/><br/>In addition to his extensive knowledge on threat actors like Lockbit, Erich also has a tremendous amount of insight on a number of cybersecurity challenges that continue to plaque the industrial sector, including the human elements. His knowledge seems especially timely given that one of the most significant vulnerabilities uncovered in the last month stems from <a href='https://www.manufacturing.net/cybersecurity/article/22883872/inside-the-cyber-av3ngers-global-plc-hack'>a hacktivist group using unchanged default passwords</a> to access PLCs in water treatment facilities and manufacturing plants. <br/><br/>Just like Colonial Pipeline and numerous other attacks, this global vulnerability started with the actions, or inactions, of a human being. This episode offers some additional insight from Erich Kron at <a href='https://www.knowbe4.com/'>KnowBe4. </a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14279229-new-strategies-for-old-school-hacks.mp3" length="20609937" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/s4q1any6f52asz8xagq4uc1tkeun?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14279229</guid>
    <pubDate>Tue, 09 Jan 2024 11:00:00 -0500</pubDate>
    <itunes:duration>1704</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Learning from the Dark Side</itunes:title>
    <title>Learning from the Dark Side</title>
    <itunes:summary><![CDATA[Send us Fan Mail A former black hat offers insight on defending against hackers that "go for the throat every time."  One of the mindsets shared by hackers and their corporate victims is the desire to put a successful bow on the calendar year. For you this could mean hitting a collection of shipping dates, production quantities or equipment implementations. What many are beginning to realize is that the black hat community has a number of year-end targets to hit as well.   The focus on closin...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>A former black hat offers insight on defending against hackers that &quot;go for the throat every time.&quot;<br/><br/></em>One of the mindsets shared by hackers and their corporate victims is the desire to put a successful bow on the calendar year. For you this could mean hitting a collection of shipping dates, production quantities or equipment implementations. What many are beginning to realize is that the black hat community has a number of year-end targets to hit as well. <br/><br/>The focus on closing out orders, dealing with holiday-related slowdowns and potentially fewer employees on the plant floor often leave doors open to hackers. It’s no surprise that these dynamics often result in the last quarter of the year producing large spikes in ransomware, DDoS and credential harvesting attacks.<br/><br/>Our guest, Matthew Wolfe, Director of Cybersecurity Operations at Impero, offers insight on these attacks and how some of his previous experiences have given him a unique take on the bad guy&apos;s tactics.<br/><br/>We’re also excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security'>www.paloaltonetworks.com/network-security</a>.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>A former black hat offers insight on defending against hackers that &quot;go for the throat every time.&quot;<br/><br/></em>One of the mindsets shared by hackers and their corporate victims is the desire to put a successful bow on the calendar year. For you this could mean hitting a collection of shipping dates, production quantities or equipment implementations. What many are beginning to realize is that the black hat community has a number of year-end targets to hit as well. <br/><br/>The focus on closing out orders, dealing with holiday-related slowdowns and potentially fewer employees on the plant floor often leave doors open to hackers. It’s no surprise that these dynamics often result in the last quarter of the year producing large spikes in ransomware, DDoS and credential harvesting attacks.<br/><br/>Our guest, Matthew Wolfe, Director of Cybersecurity Operations at Impero, offers insight on these attacks and how some of his previous experiences have given him a unique take on the bad guy&apos;s tactics.<br/><br/>We’re also excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security'>www.paloaltonetworks.com/network-security</a>.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14182536-learning-from-the-dark-side.mp3" length="29876223" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/addty31p707sfasu9kpp75ou6vuj?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14182536</guid>
    <pubDate>Wed, 20 Dec 2023 16:00:00 -0500</pubDate>
    <itunes:duration>2476</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Growing Impact of Hacktivists and State-Sponsored Groups</itunes:title>
    <title>The Growing Impact of Hacktivists and State-Sponsored Groups</title>
    <itunes:summary><![CDATA[Send us Fan Mail Accidental advancements by state-sponsored hackers are impacting ICS security, and elevating network visibility needs.  Amongst the traditional threats to manufacturing enterprises and industrial control systems are the escalating roles of state-sponsored hacker groups. Refined through recent hostilities in the Ukraine and Gaza Strip, more and more cyber attacks against critical infrastructure around the world has cybersecurity experts looking beyond independent RaaS groups a...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Accidental advancements by state-sponsored hackers are impacting ICS security, and elevating network visibility needs.<br/><br/></em>Amongst the traditional threats to manufacturing enterprises and industrial control systems are the escalating roles of state-sponsored hacker groups. Refined through recent hostilities in the Ukraine and Gaza Strip, more and more cyber attacks against critical infrastructure around the world has cybersecurity experts looking beyond independent RaaS groups and malware drops.<br/><br/>What makes these organizations so concerning is that they are more focused on stealing data and manipulating operations than extorting funds. This means the challenges associated with dwell time and asset visibility now take on even greater prominence.<br/><br/>That’s why we’ve invited Paul Ernst to the show. Paul will call upon his military experience, as well as his current role, to help us better understand these nation-state threats and vital ICS vulnerabilities.<br/><br/>We’re also excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security.'>www.paloaltonetworks.com/network-security</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Accidental advancements by state-sponsored hackers are impacting ICS security, and elevating network visibility needs.<br/><br/></em>Amongst the traditional threats to manufacturing enterprises and industrial control systems are the escalating roles of state-sponsored hacker groups. Refined through recent hostilities in the Ukraine and Gaza Strip, more and more cyber attacks against critical infrastructure around the world has cybersecurity experts looking beyond independent RaaS groups and malware drops.<br/><br/>What makes these organizations so concerning is that they are more focused on stealing data and manipulating operations than extorting funds. This means the challenges associated with dwell time and asset visibility now take on even greater prominence.<br/><br/>That’s why we’ve invited Paul Ernst to the show. Paul will call upon his military experience, as well as his current role, to help us better understand these nation-state threats and vital ICS vulnerabilities.<br/><br/>We’re also excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security.'>www.paloaltonetworks.com/network-security</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14143877-the-growing-impact-of-hacktivists-and-state-sponsored-groups.mp3" length="30525344" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ovmeraepa1uz5tbgrkb6u25zidw2?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14143877</guid>
    <pubDate>Wed, 13 Dec 2023 17:00:00 -0500</pubDate>
    <itunes:duration>2531</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Vulnerability Data from &#39;The Wild&#39;</itunes:title>
    <title>Vulnerability Data from &#39;The Wild&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail MITRE’s ATT&amp;CK knowledgebase, and the intrusion patterns, hacker tactics and response data it provides.  While there are a number of indicators showing the positive direction in which industrial cybersecurity is heading, it's still worth taking a look at some of the more alarming facts impacting our current situation. For example, Fortinet is reporting that: Three-fourths of industrial enterprises reported at least one OT intrusion in the last year.Nearly one-third of all...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>MITRE’s ATT&amp;CK knowledgebase, and the intrusion patterns, hacker tactics and response data it provides.<br/><br/></em>While there are a number of indicators showing the positive direction in which industrial cybersecurity is heading, it&apos;s still worth taking a look at some of the more alarming facts impacting our current situation. For example, Fortinet is reporting that:</p><ul><li>Three-fourths of industrial enterprises reported at least one OT intrusion in the last year.</li><li>Nearly one-third of all ransomware attacks continue to target the industrial sector, with a nearly 10 percent uptick in attacks going undetected until the extortion or blackmail note arrives.</li><li>Intrusions from malware and phishing attacks have increased by one-third.</li></ul><p>But there is good news. Fortinet reports that 98 percent of organizations now include its OT cybersecurity posture in briefings with executive leadership. We also know more about the bad guys today, then we ever have before, with some of this progress attributed to the work being done by today’s guests - Adam Pennington and Jake Steele from MITRE’s ATT&amp;CK knowledge database.<br/><br/>We’re excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://manage.ien.com/www.paloaltonetworks.com/network-security.'>www.paloaltonetworks.com/network-security.</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>MITRE’s ATT&amp;CK knowledgebase, and the intrusion patterns, hacker tactics and response data it provides.<br/><br/></em>While there are a number of indicators showing the positive direction in which industrial cybersecurity is heading, it&apos;s still worth taking a look at some of the more alarming facts impacting our current situation. For example, Fortinet is reporting that:</p><ul><li>Three-fourths of industrial enterprises reported at least one OT intrusion in the last year.</li><li>Nearly one-third of all ransomware attacks continue to target the industrial sector, with a nearly 10 percent uptick in attacks going undetected until the extortion or blackmail note arrives.</li><li>Intrusions from malware and phishing attacks have increased by one-third.</li></ul><p>But there is good news. Fortinet reports that 98 percent of organizations now include its OT cybersecurity posture in briefings with executive leadership. We also know more about the bad guys today, then we ever have before, with some of this progress attributed to the work being done by today’s guests - Adam Pennington and Jake Steele from MITRE’s ATT&amp;CK knowledge database.<br/><br/>We’re excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://manage.ien.com/www.paloaltonetworks.com/network-security.'>www.paloaltonetworks.com/network-security.</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14104630-vulnerability-data-from-the-wild.mp3" length="29755505" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/eqljrm7ywr8md9k2trp0nrma9pm5?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14104630</guid>
    <pubDate>Thu, 07 Dec 2023 00:00:00 -0500</pubDate>
    <itunes:duration>2466</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Walking the Line</itunes:title>
    <title>Walking the Line</title>
    <itunes:summary><![CDATA[Send us Fan Mail Balancing resources to keep the bad guys out, improve real-time visibility, and develop quicker responses to new attacks.  In what might be legendary singer Johnny Cash's most famous song, he speaks of keeping his eyes wide open all the time, and those tasked with OT security responsibilities are finding that they too need to walk the line.   In the cybersecurity world this means balancing between the priorities of different operational environments, selecting tools and ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Balancing resources to keep the bad guys out, improve real-time visibility, and develop quicker responses to new attacks.<br/><br/></em>In what might be legendary singer Johnny Cash&apos;s most famous song, he speaks of keeping his eyes wide open all the time, and those tasked with OT security responsibilities are finding that they too need to walk the line. <br/><br/>In the cybersecurity world this means balancing between the priorities of different operational environments, selecting tools and technologies that best match these priorities, and then understanding how all these investments can be intertwined to carry out your strategy. Unfortunately, this makes it bit more difficult to stay true to original plans. <br/><br/>Navigating that line also entails an understanding that keeping the bad guys out is not the sole function of cyber defense, because the evolution of threats and an expanding OT attack surface has created an incredibly complex environment – a fact that is as obvious as night is dark and day is light. <br/><br/>So, to keep us walking that line in understanding how to adapt our tools and strategies, we welcome Stephen Tutterow, a team lead at Pentera, to the show. Pentera is a leading provider of automated security validation solutions.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. <br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Balancing resources to keep the bad guys out, improve real-time visibility, and develop quicker responses to new attacks.<br/><br/></em>In what might be legendary singer Johnny Cash&apos;s most famous song, he speaks of keeping his eyes wide open all the time, and those tasked with OT security responsibilities are finding that they too need to walk the line. <br/><br/>In the cybersecurity world this means balancing between the priorities of different operational environments, selecting tools and technologies that best match these priorities, and then understanding how all these investments can be intertwined to carry out your strategy. Unfortunately, this makes it bit more difficult to stay true to original plans. <br/><br/>Navigating that line also entails an understanding that keeping the bad guys out is not the sole function of cyber defense, because the evolution of threats and an expanding OT attack surface has created an incredibly complex environment – a fact that is as obvious as night is dark and day is light. <br/><br/>So, to keep us walking that line in understanding how to adapt our tools and strategies, we welcome Stephen Tutterow, a team lead at Pentera, to the show. Pentera is a leading provider of automated security validation solutions.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. <br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14070341-walking-the-line.mp3" length="21596636" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4usul2954dsk5yq6f3caady7c6dc?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14070341</guid>
    <pubDate>Fri, 01 Dec 2023 09:00:00 -0500</pubDate>
    <itunes:duration>1784</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Breaking Down the Boeing Hack</itunes:title>
    <title>Breaking Down the Boeing Hack</title>
    <itunes:summary><![CDATA[Send us Fan Mail Industry experts assess the ransomware attack, the attacker, and critical takeaways for manufacturers of all sizes.  Recently, one of the most high-profile manufacturers in the world – Boeing – suffered what they’re describing as a “cyber incident”, which resulted in a large, but unknown quantity of data being stolen and held for ransom by the notorious Russian RaaS group, Lockbit.  Lockbit, which is highly recognized as one of the most prolific threat actors targeting the in...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Industry experts assess the ransomware attack, the attacker, and critical takeaways for manufacturers of all sizes.</em><br/><br/>Recently, one of the most high-profile manufacturers in the world – Boeing – suffered what they’re describing as a “cyber incident”, which resulted in a large, but unknown quantity of data being stolen and held for ransom by the notorious Russian RaaS group, Lockbit.<br/><br/>Lockbit, which is highly recognized as one of the most prolific threat actors targeting the industrial sector, obtained what is currently assessed as Citrix cloud files, security controls, email backups and corporate emails. The leak is potentially tied to a parts distribution company, Aviall, that Boeing purchased in 2006. <br/><br/>What remains to be seen, despite Boeing’s claims, is just how damage this leak could cause, what the ramifications might be moving forward, how Boeing might respond and what the industrial sector can learn from this incident.<br/><br/>We’ve assembled two leading industry experts to break down the attack - KnowBe4’s Erich Kron and Tony Pietrocola, president of <a href='https://agileblue.com/'>AgileBlue</a> and the Northern Ohio chapter of <a href='https://www.infragard.org/'>InfraGard</a>.<br/><br/>We’re also excited to announce that this episode is being sponsored by Palo Alto Networks. Protect your OT assets, networks and remote operations with Zero Trust OT Security from Palo Alto Networks. It’s powered by AI and machine learning while offering comprehensive visibility, zero trust security for all OT environments, and simplified operations. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security'>www.paloaltonetworks.com/network-security</a>.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Industry experts assess the ransomware attack, the attacker, and critical takeaways for manufacturers of all sizes.</em><br/><br/>Recently, one of the most high-profile manufacturers in the world – Boeing – suffered what they’re describing as a “cyber incident”, which resulted in a large, but unknown quantity of data being stolen and held for ransom by the notorious Russian RaaS group, Lockbit.<br/><br/>Lockbit, which is highly recognized as one of the most prolific threat actors targeting the industrial sector, obtained what is currently assessed as Citrix cloud files, security controls, email backups and corporate emails. The leak is potentially tied to a parts distribution company, Aviall, that Boeing purchased in 2006. <br/><br/>What remains to be seen, despite Boeing’s claims, is just how damage this leak could cause, what the ramifications might be moving forward, how Boeing might respond and what the industrial sector can learn from this incident.<br/><br/>We’ve assembled two leading industry experts to break down the attack - KnowBe4’s Erich Kron and Tony Pietrocola, president of <a href='https://agileblue.com/'>AgileBlue</a> and the Northern Ohio chapter of <a href='https://www.infragard.org/'>InfraGard</a>.<br/><br/>We’re also excited to announce that this episode is being sponsored by Palo Alto Networks. Protect your OT assets, networks and remote operations with Zero Trust OT Security from Palo Alto Networks. It’s powered by AI and machine learning while offering comprehensive visibility, zero trust security for all OT environments, and simplified operations. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security'>www.paloaltonetworks.com/network-security</a>.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/14011316-breaking-down-the-boeing-hack.mp3" length="18980721" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lj20twrzk7rh1afjz9i2a3s9xa0p?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14011316</guid>
    <pubDate>Tue, 21 Nov 2023 10:00:00 -0500</pubDate>
    <itunes:duration>1568</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Turning Up the Cat &amp; Mouse Game</itunes:title>
    <title>Turning Up the Cat &amp; Mouse Game</title>
    <itunes:summary><![CDATA[Send us Fan Mail Staying ahead of hackers as they look to infiltrate every new connection point.  The balancing act continues when it comes to industrial cybersecurity, with the focus of many organizations split between focusing on known internal weaknesses or harnessing a better understanding of the external black hat organizations wanting to shut them down, steal data or extort payments.  One stat that helps demonstrate this dynamic comes from the IBM Security X Force Threat Intelligence In...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Staying ahead of hackers as they look to infiltrate every new connection point.<br/><br/></em>The balancing act continues when it comes to industrial cybersecurity, with the focus of many organizations split between focusing on known internal weaknesses or harnessing a better understanding of the external black hat organizations wanting to shut them down, steal data or extort payments.<br/><br/>One stat that helps demonstrate this dynamic comes from the IBM Security <em>X Force Threat Intelligence Index</em>, which shows a 94 percent reduction in the average time for the deployment of ransomware attacks. What took attackers over two months in 2019, now takes less than four days. Another example comes from Open Text’s <em>2023 Cybersecurity Threat Report</em> that took a closer look at the notorious LockBit group. Not only have they dropped more malware than any other in the last year, but they’ve begun to implement triple-extortion tactics.<br/><br/>Joining us to discuss these and other topics related to threat intelligence and how to prioritize it, is Jonathan Tomek, VP of Research and Development at Digital Element, and co-founder of <a href='https://www.thotcon.org/'>THOTCON</a>, a hacking and security conference hosted in Chicago each spring.<br/><br/>We’re excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security'>www.paloaltonetworks.com/network-security</a>.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Staying ahead of hackers as they look to infiltrate every new connection point.<br/><br/></em>The balancing act continues when it comes to industrial cybersecurity, with the focus of many organizations split between focusing on known internal weaknesses or harnessing a better understanding of the external black hat organizations wanting to shut them down, steal data or extort payments.<br/><br/>One stat that helps demonstrate this dynamic comes from the IBM Security <em>X Force Threat Intelligence Index</em>, which shows a 94 percent reduction in the average time for the deployment of ransomware attacks. What took attackers over two months in 2019, now takes less than four days. Another example comes from Open Text’s <em>2023 Cybersecurity Threat Report</em> that took a closer look at the notorious LockBit group. Not only have they dropped more malware than any other in the last year, but they’ve begun to implement triple-extortion tactics.<br/><br/>Joining us to discuss these and other topics related to threat intelligence and how to prioritize it, is Jonathan Tomek, VP of Research and Development at Digital Element, and co-founder of <a href='https://www.thotcon.org/'>THOTCON</a>, a hacking and security conference hosted in Chicago each spring.<br/><br/>We’re excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security'>www.paloaltonetworks.com/network-security</a>.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13985563-turning-up-the-cat-mouse-game.mp3" length="18659408" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qixcyxz50sob37p4caj0oopaa89u?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13985563</guid>
    <pubDate>Thu, 16 Nov 2023 12:00:00 -0500</pubDate>
    <itunes:duration>1542</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>This is the Way ... to Beat Hackers</itunes:title>
    <title>This is the Way ... to Beat Hackers</title>
    <itunes:summary><![CDATA[Send us Fan Mail There are two common elements of a hacker’s strategy that show up regardless of whether it’s a ransomware attack on a local healthcare system or a malware drop on a global automotive manufacturer.   The first is speed. Once an exploit is detected by the bad guys, they will work as quickly as possible to take advantage of it, hopefully beating the deployment of any patches.   The second element is manipulation. Most commonly, hackers take advantage of well-establishe...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>There are two common elements of a hacker’s strategy that show up regardless of whether it’s a ransomware attack on a local healthcare system or a malware drop on a global automotive manufacturer. <br/><br/>The first is speed. Once an exploit is detected by the bad guys, they will work as quickly as possible to take advantage of it, hopefully beating the deployment of any patches. <br/><br/>The second element is manipulation. Most commonly, hackers take advantage of well-established systems that have unextraordinary access points, legacy connections or human management dynamics that are easily manipulated by altering software code, stealing login data or introducing malware. </p><p>Based on these fundamental dynamics, it would seem that hackers could benefit greatly from a tool that reduces a human being’s grunt work and utilizes algorithms and automation to produce the text for a phishing email, to re-write software code, or to develop data mining protocols to obtain logins and personal information.<br/><br/>That tool is obviously artificial intelligence, and the hackers are all too familiar on how to use AI platforms for their nefarious purposes.<br/><br/>Fortunately, the good guys have also become well-schooled in the art of AI, and one example is Gary Southwell, the VP and General Manager at ARIA Cybersecurity. He joins us to share some AI tricks that can slow down and defeat threat actors.<br/><br/>We’re excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security.'>www.paloaltonetworks.com/network-security.</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com<br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>There are two common elements of a hacker’s strategy that show up regardless of whether it’s a ransomware attack on a local healthcare system or a malware drop on a global automotive manufacturer. <br/><br/>The first is speed. Once an exploit is detected by the bad guys, they will work as quickly as possible to take advantage of it, hopefully beating the deployment of any patches. <br/><br/>The second element is manipulation. Most commonly, hackers take advantage of well-established systems that have unextraordinary access points, legacy connections or human management dynamics that are easily manipulated by altering software code, stealing login data or introducing malware. </p><p>Based on these fundamental dynamics, it would seem that hackers could benefit greatly from a tool that reduces a human being’s grunt work and utilizes algorithms and automation to produce the text for a phishing email, to re-write software code, or to develop data mining protocols to obtain logins and personal information.<br/><br/>That tool is obviously artificial intelligence, and the hackers are all too familiar on how to use AI platforms for their nefarious purposes.<br/><br/>Fortunately, the good guys have also become well-schooled in the art of AI, and one example is Gary Southwell, the VP and General Manager at ARIA Cybersecurity. He joins us to share some AI tricks that can slow down and defeat threat actors.<br/><br/>We’re excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security.'>www.paloaltonetworks.com/network-security.</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com<br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13947256-this-is-the-way-to-beat-hackers.mp3" length="28236617" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a81c3dqpm8fc0lxydu93ovwlyfiu?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13947256</guid>
    <pubDate>Fri, 10 Nov 2023 10:00:00 -0500</pubDate>
    <itunes:duration>2340</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Criminal Organizations Know You</itunes:title>
    <title>Criminal Organizations Know You</title>
    <itunes:summary><![CDATA[Send us Fan Mail Using hacker tactics against them by getting IT and OT on the same page.  One of the most recent, widespread and hardest hitting cyberattacks is the MOVEit exploit spearheaded by the ransomware gang Clop. The zero-day vulnerabilities associated with this file transfer tool impacted a number of global manufacturers, including Shell, Schneider Electric, Siemens Energy, Emerson, FANUC, Bristol Myers Squibb, TTI and Honeywell. Essentially,   Clop was able to infiltrate MOVEit fil...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Using hacker tactics against them by getting IT and OT on the same page.</em><br/><br/>One of the most recent, widespread and hardest hitting cyberattacks is the MOVEit exploit spearheaded by the ransomware gang Clop.</p><p>The zero-day vulnerabilities associated with this file transfer tool impacted a number of global manufacturers, including Shell, Schneider Electric, Siemens Energy, Emerson, FANUC, Bristol Myers Squibb, TTI and Honeywell. Essentially, <br/><br/>Clop was able to infiltrate MOVEit files and inject commands that allowed the hackers to access databases and steal a plethora of personal and operational data from over 300 companies.<br/><br/>Since its origins in 2019 Clop has targeted over 10,000 companies around the world.<br/><br/>To help offer some clarity on the depth of this attack, some lessons learned from this ordeal, and things manufacturers need to know about the evolving threat landscape, it’s our pleasure to welcome Mike DeNapoli to the show. Mike serves as the cybersecurity architect and director at <a href='https://cymulate.com/'>Cymulate</a> – a leading provider of attack surface management and cyber risk mitigation solutions.  <br/><br/>We’re excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://manage.ien.com/www.paloaltonetworks.com/network-security.'>www.paloaltonetworks.com/network-security.</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. <br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Using hacker tactics against them by getting IT and OT on the same page.</em><br/><br/>One of the most recent, widespread and hardest hitting cyberattacks is the MOVEit exploit spearheaded by the ransomware gang Clop.</p><p>The zero-day vulnerabilities associated with this file transfer tool impacted a number of global manufacturers, including Shell, Schneider Electric, Siemens Energy, Emerson, FANUC, Bristol Myers Squibb, TTI and Honeywell. Essentially, <br/><br/>Clop was able to infiltrate MOVEit files and inject commands that allowed the hackers to access databases and steal a plethora of personal and operational data from over 300 companies.<br/><br/>Since its origins in 2019 Clop has targeted over 10,000 companies around the world.<br/><br/>To help offer some clarity on the depth of this attack, some lessons learned from this ordeal, and things manufacturers need to know about the evolving threat landscape, it’s our pleasure to welcome Mike DeNapoli to the show. Mike serves as the cybersecurity architect and director at <a href='https://cymulate.com/'>Cymulate</a> – a leading provider of attack surface management and cyber risk mitigation solutions.  <br/><br/>We’re excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://manage.ien.com/www.paloaltonetworks.com/network-security.'>www.paloaltonetworks.com/network-security.</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. <br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13897334-criminal-organizations-know-you.mp3" length="28827393" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/m5rl4i53auf3mij7tcibupseg888?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13897334</guid>
    <pubDate>Thu, 02 Nov 2023 14:00:00 -0400</pubDate>
    <itunes:duration>2389</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Patches, PLCs and Making it Harder for Hackers</itunes:title>
    <title>Patches, PLCs and Making it Harder for Hackers</title>
    <itunes:summary><![CDATA[Send us Fan Mail The little things that can shore up cyber defenses and protect against evolving attack groups.  When it comes to assessing the threat landscape for OT cybersecurity environments, the challenge has become less about identifying possible sources of attack, and more about prioritizing them. Protection from external sources gets a lot of attention, and rightfully so. However, another source of these threats, which can be just as detrimental, lies within the walls of your facility...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The little things that can shore up cyber defenses and protect against evolving attack groups.<br/><br/></em>When it comes to assessing the threat landscape for OT cybersecurity environments, the challenge has become less about identifying possible sources of attack, and more about prioritizing them. Protection from external sources gets a lot of attention, and rightfully so. However, another source of these threats, which can be just as detrimental, lies within the walls of your facility.<br/><br/>Joining us today to discuss some of these internal vulnerabilities, and <a href='https://www.armis.com/solution-briefs/armis-threat-detection-and-analysis/'>a tremendous report</a> that details them, is Carlos Buenano, the chief technology officer of OT at Armis.<br/><br/>We’re also excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security'>www.paloaltonetworks.com/network-security.</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The little things that can shore up cyber defenses and protect against evolving attack groups.<br/><br/></em>When it comes to assessing the threat landscape for OT cybersecurity environments, the challenge has become less about identifying possible sources of attack, and more about prioritizing them. Protection from external sources gets a lot of attention, and rightfully so. However, another source of these threats, which can be just as detrimental, lies within the walls of your facility.<br/><br/>Joining us today to discuss some of these internal vulnerabilities, and <a href='https://www.armis.com/solution-briefs/armis-threat-detection-and-analysis/'>a tremendous report</a> that details them, is Carlos Buenano, the chief technology officer of OT at Armis.<br/><br/>We’re also excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to <a href='https://www.paloaltonetworks.com/network-security'>www.paloaltonetworks.com/network-security.</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13851630-patches-plcs-and-making-it-harder-for-hackers.mp3" length="26003152" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/us4292ni6e9b0wo59apciqtrgrqi?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13851630</guid>
    <pubDate>Thu, 26 Oct 2023 11:00:00 -0400</pubDate>
    <itunes:duration>2154</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why AI is Your Biggest Threat and Most Powerful Ally</itunes:title>
    <title>Why AI is Your Biggest Threat and Most Powerful Ally</title>
    <itunes:summary><![CDATA[Send us Fan Mail Artificial intelligence is an unrivaled cyber threat, but benefits are also emerging for the White Hats.  We’ve talked about a lot of challenges, vulnerabilities, attacks and hacker groups on Security Breach, but no topic generates greater consternation than Artificial Intelligence, and all the questions it brings to the table.    According to an IBM report, the average cost for a data breach was just under $5 million last year. But going a step further, organizations th...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Artificial intelligence is an unrivaled cyber threat, but benefits are also emerging for the White Hats.<br/><br/>We’ve talked about a lot of challenges, vulnerabilities, attacks and hacker groups on <em>Security Breach</em>, but no topic generates greater consternation than Artificial Intelligence, and all the questions it brings to the table.  <br/><br/>According to an IBM report, the average cost for a data breach was just under $5 million last year. But going a step further, organizations that deployed an AI-based security tools saw their breach cost over $3 million less than those without such a tool. <br/><br/>The report also indicated that it took 74 fewer days to identify and contain such a breach versus those who were not using AI technology for cybersecurity. Additionally, IBM found that the use of AI-fueled cybersecurity strategies have increased by 11 percent since 2020.<br/><br/>While these realizations have produced a number of answers, they’ve also created new questions. To help address those and other concerns surrounding AI in cybersecurity, we welcome Jeff Macre, an Industrial Security Solutions Architect from <a href='https://www.darktrace.com/'>Darktrace</a> to the show.  <br/><br/>Darktrace is a leading provider of incident response solutions and artificial intelligence applications.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Artificial intelligence is an unrivaled cyber threat, but benefits are also emerging for the White Hats.<br/><br/>We’ve talked about a lot of challenges, vulnerabilities, attacks and hacker groups on <em>Security Breach</em>, but no topic generates greater consternation than Artificial Intelligence, and all the questions it brings to the table.  <br/><br/>According to an IBM report, the average cost for a data breach was just under $5 million last year. But going a step further, organizations that deployed an AI-based security tools saw their breach cost over $3 million less than those without such a tool. <br/><br/>The report also indicated that it took 74 fewer days to identify and contain such a breach versus those who were not using AI technology for cybersecurity. Additionally, IBM found that the use of AI-fueled cybersecurity strategies have increased by 11 percent since 2020.<br/><br/>While these realizations have produced a number of answers, they’ve also created new questions. To help address those and other concerns surrounding AI in cybersecurity, we welcome Jeff Macre, an Industrial Security Solutions Architect from <a href='https://www.darktrace.com/'>Darktrace</a> to the show.  <br/><br/>Darktrace is a leading provider of incident response solutions and artificial intelligence applications.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13808532-why-ai-is-your-biggest-threat-and-most-powerful-ally.mp3" length="21011420" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/l1if3xesxe8oes0ab55590d7rz6l?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13808532</guid>
    <pubDate>Thu, 19 Oct 2023 09:00:00 -0400</pubDate>
    <itunes:duration>1738</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Ransomware Roller Coaster</itunes:title>
    <title>The Ransomware Roller Coaster</title>
    <itunes:summary><![CDATA[Send us Fan Mail How a dip in reported ransomware attacks could be disguising a push to target smaller manufacturers.  Today’s episode offers some new takes on a familiar topic – the rollercoaster-like dynamics of ransomware attacks. One of the latest updates comes via Kovrr and their Ransomware Threat Landscape report for the first half of 2023.   The firm found that while the number of reported ransomware attacks was down, manufacturing remains atop the most attacked sectors – with nearly o...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How a dip in reported ransomware attacks could be disguising a push to target smaller manufacturers.</em><br/><br/>Today’s episode offers some new takes on a familiar topic – the rollercoaster-like dynamics of ransomware attacks. One of the latest updates comes via Kovrr and their <a href='https://www.kovrr.com/reports/the-ransomware-threat-landscape-h123'><em>Ransomware Threat Landscape </em>report</a> for the first half of 2023. <br/><br/>The firm found that while the number of reported ransomware attacks was down, manufacturing remains atop the most attacked sectors – with nearly one out of every five ransomware attacks focusing on the industrial sector, and nearly 60 percent of targeted companies registering less than $50 million in annual revenues. The report also found a collection of the usual suspects amongst the most active RaaS groups and why manufacturers should be ready for another spike in attacks.<br/><br/>Guy Propper, a data team lead at Kovrr,  joins us to discuss these groups, how they often know more about your system than you do, and additional findings that show how these attacks have become more concentrated, more sophisticated and capable of evolving more quickly.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How a dip in reported ransomware attacks could be disguising a push to target smaller manufacturers.</em><br/><br/>Today’s episode offers some new takes on a familiar topic – the rollercoaster-like dynamics of ransomware attacks. One of the latest updates comes via Kovrr and their <a href='https://www.kovrr.com/reports/the-ransomware-threat-landscape-h123'><em>Ransomware Threat Landscape </em>report</a> for the first half of 2023. <br/><br/>The firm found that while the number of reported ransomware attacks was down, manufacturing remains atop the most attacked sectors – with nearly one out of every five ransomware attacks focusing on the industrial sector, and nearly 60 percent of targeted companies registering less than $50 million in annual revenues. The report also found a collection of the usual suspects amongst the most active RaaS groups and why manufacturers should be ready for another spike in attacks.<br/><br/>Guy Propper, a data team lead at Kovrr,  joins us to discuss these groups, how they often know more about your system than you do, and additional findings that show how these attacks have become more concentrated, more sophisticated and capable of evolving more quickly.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13761186-the-ransomware-roller-coaster.mp3" length="18296211" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/h35qr0n02i34398zm5fipg65cp6s?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13761186</guid>
    <pubDate>Wed, 11 Oct 2023 15:00:00 -0400</pubDate>
    <itunes:duration>1511</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&#39;There&#39;s A Train Wreck Coming&#39;</itunes:title>
    <title>&#39;There&#39;s A Train Wreck Coming&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail Quantum Computing is not a future need - how it impacts (positively and negatively) everything you want to keep secure.  Instead of setting things up with data about recent attacks or stats from industry reports, we're going to dive right into this episode's topic - Quantum Computing, and its short and long-term impact on every piece of personal, intellectual and operational data your enterprise values. Join us as we welcome Skip Sanzeri (Co-Founder) and Paul Fuegner (Directo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Quantum Computing is not a future need - how it impacts (positively and negatively) everything you want to keep secure.</em><br/><br/>Instead of setting things up with data about recent attacks or stats from industry reports, we&apos;re going to dive right into this episode&apos;s topic - Quantum Computing, and its short and long-term impact on every piece of personal, intellectual and operational data your enterprise values.</p><p>Join us as we welcome Skip Sanzeri (Co-Founder) and Paul Fuegner (Director of Corporate Communications) from QuSecure as we discuss what Quantum Computing is, how its cryptographic capabilities currently impact over 20 billion devices, and why the only way to combat the black hat&apos;s quantum capabilities are by implementing your own.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a><br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Quantum Computing is not a future need - how it impacts (positively and negatively) everything you want to keep secure.</em><br/><br/>Instead of setting things up with data about recent attacks or stats from industry reports, we&apos;re going to dive right into this episode&apos;s topic - Quantum Computing, and its short and long-term impact on every piece of personal, intellectual and operational data your enterprise values.</p><p>Join us as we welcome Skip Sanzeri (Co-Founder) and Paul Fuegner (Director of Corporate Communications) from QuSecure as we discuss what Quantum Computing is, how its cryptographic capabilities currently impact over 20 billion devices, and why the only way to combat the black hat&apos;s quantum capabilities are by implementing your own.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a><br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13717843-there-s-a-train-wreck-coming.mp3" length="26203048" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bqhbv4jcmnr27ft80rz9i76ige32?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13717843</guid>
    <pubDate>Wed, 04 Oct 2023 16:00:00 -0400</pubDate>
    <itunes:duration>2148</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&#39;They&#39;re Hitting Everyone They Can&#39;</itunes:title>
    <title>&#39;They&#39;re Hitting Everyone They Can&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail How and why hackers are targeting smaller enterprises, and one organization's efforts to defend manufacturing.  We all know that cyberattacks in the industrial sector continue to rise and create new production, supply chain and data management challenges throughout the industrial sector. And conversations on this podcast have covered numerous reasons as to why these numbers continue to grow, ranging from vulnerabilities being created by new IoT-based connection points and a l...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How and why hackers are targeting smaller enterprises, and one organization&apos;s efforts to defend manufacturing.<br/></em><br/>We all know that cyberattacks in the industrial sector continue to rise and create new production, supply chain and data management challenges throughout the industrial sector.</p><p>And conversations on this podcast have covered numerous reasons as to why these numbers continue to grow, ranging from vulnerabilities being created by new IoT-based connection points and a lack of visibility within the OT infrastructure, to an insufficient number of OT security specialists and the constantly evolving nature of hackers and cyber gangs that are growing smarter and more complex. <br/><br/>We’ve also discussed the need for transparency in sharing information related to ongoing attacks and the challenges they create, whether it be through regulation, industry standards or trade groups. <br/><br/>Well, our guest for today offers a great example of how one company is looking to arm manufacturers with data and insight that could prove invaluable in developing and adjusting their cybersecurity plans to meet new demands. Listen to our conversation with Dawn Cappelli, former Rockwell Automation CISO and current OT CERT Director at Dragos, a leading provider of industrial cybersecurity solutions.<br/><br/>To learn more about Dragos&apos; OT Cert program, click <a href='https://www.dragos.com/ot-cert/'>here</a>.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. <br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How and why hackers are targeting smaller enterprises, and one organization&apos;s efforts to defend manufacturing.<br/></em><br/>We all know that cyberattacks in the industrial sector continue to rise and create new production, supply chain and data management challenges throughout the industrial sector.</p><p>And conversations on this podcast have covered numerous reasons as to why these numbers continue to grow, ranging from vulnerabilities being created by new IoT-based connection points and a lack of visibility within the OT infrastructure, to an insufficient number of OT security specialists and the constantly evolving nature of hackers and cyber gangs that are growing smarter and more complex. <br/><br/>We’ve also discussed the need for transparency in sharing information related to ongoing attacks and the challenges they create, whether it be through regulation, industry standards or trade groups. <br/><br/>Well, our guest for today offers a great example of how one company is looking to arm manufacturers with data and insight that could prove invaluable in developing and adjusting their cybersecurity plans to meet new demands. Listen to our conversation with Dawn Cappelli, former Rockwell Automation CISO and current OT CERT Director at Dragos, a leading provider of industrial cybersecurity solutions.<br/><br/>To learn more about Dragos&apos; OT Cert program, click <a href='https://www.dragos.com/ot-cert/'>here</a>.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. <br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13685479-they-re-hitting-everyone-they-can.mp3" length="27183648" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ukxs8otrkbdirppc9irfpmk9npf8?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13685479</guid>
    <pubDate>Fri, 29 Sep 2023 10:00:00 -0400</pubDate>
    <itunes:duration>2238</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How Hackers are Targeting Vehicles and Fleets</itunes:title>
    <title>How Hackers are Targeting Vehicles and Fleets</title>
    <itunes:summary><![CDATA[Send us Fan Mail EV charging stations, telematics and infotainment offer tremendous benefits, and security vulnerabilities.  Typically, when we talk about the expanding attack surface being created by new, exciting and efficiency-driven technology, we’re referencing digital transformation’s impact on the plant floor and throughout the manufacturing enterprise.  Today, pun intended, we’re shifting gears to examine another operational technology environment that will continue to have a huge imp...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>EV charging stations, telematics and infotainment offer tremendous benefits, and security vulnerabilities.</em><br/><br/>Typically, when we talk about the expanding attack surface being created by new, exciting and efficiency-driven technology, we’re referencing digital transformation’s impact on the plant floor and throughout the manufacturing enterprise.<br/><br/>Today, pun intended, we’re shifting gears to examine another operational technology environment that will continue to have a huge impact on cybersecurity strategies and vulnerabilities throughout manufacturing – the automotive sector. Advancements in Bluetooth and other connectivity-driven functionality has turned your vehicle into a hub for communications, entertainment, commerce, and more – and the hackers know it.<br/><br/>According to Upstream and their <a href='https://upstream.auto/reports/h1-2023-automotive-cyber-trend-report/?_gl=1*1l1l7fn*_up*MQ..&amp;gclid=Cj0KCQjw06-oBhC6ARIsAGuzdw3bng9Prn0MddDb8_T3jc6qbn5bJ-um4ndo_WqVUKQAbTQlMbC7SqcaAvbLEALw_wcB'><em>2003 Global Automotive Cybersecurity Report</em></a>, the number of API-focus automotive hacks increased by 380 percent last year.<br/><br/>In this episode we discuss these trends with Shachar Azriel, Vice President of Data at Upstream, a provider of automotive cybersecurity and data management solutions for connected vehicles and smart mobility services.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>EV charging stations, telematics and infotainment offer tremendous benefits, and security vulnerabilities.</em><br/><br/>Typically, when we talk about the expanding attack surface being created by new, exciting and efficiency-driven technology, we’re referencing digital transformation’s impact on the plant floor and throughout the manufacturing enterprise.<br/><br/>Today, pun intended, we’re shifting gears to examine another operational technology environment that will continue to have a huge impact on cybersecurity strategies and vulnerabilities throughout manufacturing – the automotive sector. Advancements in Bluetooth and other connectivity-driven functionality has turned your vehicle into a hub for communications, entertainment, commerce, and more – and the hackers know it.<br/><br/>According to Upstream and their <a href='https://upstream.auto/reports/h1-2023-automotive-cyber-trend-report/?_gl=1*1l1l7fn*_up*MQ..&amp;gclid=Cj0KCQjw06-oBhC6ARIsAGuzdw3bng9Prn0MddDb8_T3jc6qbn5bJ-um4ndo_WqVUKQAbTQlMbC7SqcaAvbLEALw_wcB'><em>2003 Global Automotive Cybersecurity Report</em></a>, the number of API-focus automotive hacks increased by 380 percent last year.<br/><br/>In this episode we discuss these trends with Shachar Azriel, Vice President of Data at Upstream, a provider of automotive cybersecurity and data management solutions for connected vehicles and smart mobility services.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13629219-how-hackers-are-targeting-vehicles-and-fleets.mp3" length="30220841" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/j4xmuobe28xs7yq4cupomihfrfcu?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13629219</guid>
    <pubDate>Wed, 20 Sep 2023 15:00:00 -0400</pubDate>
    <itunes:duration>2491</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Doubling Down to Beat the Hackers</itunes:title>
    <title>Doubling Down to Beat the Hackers</title>
    <itunes:summary><![CDATA[Send us Fan Mail How the Industry IoT Consortium's new security framework offers a 'belt and suspenders' approach to cybersecurity.  One cybersecurity topic that gets me up on the soapbox quicker than most is the need for stakeholders within the industrial sector to collaborate and share more information on cyber attacks, hacker tactics and best practices for both in warding off intrusions and understanding how to respond to them.  Thankfully,  more local, national and international orga...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How the Industry IoT Consortium&apos;s new security framework offers a &apos;belt and suspenders&apos; approach to cybersecurity.<br/><br/></em>One cybersecurity topic that gets me up on the soapbox quicker than most is the need for stakeholders within the industrial sector to collaborate and share more information on cyber attacks, hacker tactics and best practices for both in warding off intrusions and understanding how to respond to them.<br/><br/>Thankfully,  more local, national and international organizations are growing in notoriety and impact to help address these evolving concerns, including this episode&apos;s guests from the Industry IoT Consortium <br/><br/>They joined us to discuss their recently updated Industry Internet of Things Security Framework, which offers broad industry consensus on securing the IIoT environment as ICS attacks continue to escalate and ransomware attacks drain billions of dollars from the industrial sector.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How the Industry IoT Consortium&apos;s new security framework offers a &apos;belt and suspenders&apos; approach to cybersecurity.<br/><br/></em>One cybersecurity topic that gets me up on the soapbox quicker than most is the need for stakeholders within the industrial sector to collaborate and share more information on cyber attacks, hacker tactics and best practices for both in warding off intrusions and understanding how to respond to them.<br/><br/>Thankfully,  more local, national and international organizations are growing in notoriety and impact to help address these evolving concerns, including this episode&apos;s guests from the Industry IoT Consortium <br/><br/>They joined us to discuss their recently updated Industry Internet of Things Security Framework, which offers broad industry consensus on securing the IIoT environment as ICS attacks continue to escalate and ransomware attacks drain billions of dollars from the industrial sector.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>. </p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13591485-doubling-down-to-beat-the-hackers.mp3" length="24306633" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/59hfxmah7wwqxoa51rurvpknz1xq?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13591485</guid>
    <pubDate>Thu, 14 Sep 2023 11:00:00 -0400</pubDate>
    <itunes:duration>1996</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside the Summer&#39;s Biggest Industrial Hacks</itunes:title>
    <title>Inside the Summer&#39;s Biggest Industrial Hacks</title>
    <itunes:summary><![CDATA[Send us Fan Mail Takeaways from two unique, yet similarly damaging attacks.  This episode takes a slightly different approach. Instead of a single leading voice discussing trends and strategies focused on addressing and responding to OT cyberattacks, we’re going to dive into a couple of recent hacks that impacted the manufacturing sector.   We’re going to start off with Matt Radolec. He’s an incident response team lead at Varonis and host of the State of Cybercrime podcast. Matt is going to s...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Takeaways from two unique, yet similarly damaging attacks.<br/><br/></em>This episode takes a slightly different approach. Instead of a single leading voice discussing trends and strategies focused on addressing and responding to OT cyberattacks, we’re going to dive into a couple of recent hacks that impacted the manufacturing sector. <br/><br/>We’re going to start off with Matt Radolec. He’s an incident response team lead at Varonis and host of the <a href='https://podcasts.apple.com/us/podcast/state-of-cybercrime/id1101894776'><em>State of Cybercrime</em></a> podcast. Matt is going to share some insights on the recent attack of watch manufacturer Seiko. <br/><br/>Then we’re going to check in with Mike DeNapoli, the cybersecurity architect and director at <a href='https://cymulate.com/'>Cymulate</a> – a leading provider of attack surface management and cyber risk mitigation solutions. He’ll be offering an inside look at the recent hack of the file transfer tool MOVEit.<br/><br/>To catch up on past episodes you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Takeaways from two unique, yet similarly damaging attacks.<br/><br/></em>This episode takes a slightly different approach. Instead of a single leading voice discussing trends and strategies focused on addressing and responding to OT cyberattacks, we’re going to dive into a couple of recent hacks that impacted the manufacturing sector. <br/><br/>We’re going to start off with Matt Radolec. He’s an incident response team lead at Varonis and host of the <a href='https://podcasts.apple.com/us/podcast/state-of-cybercrime/id1101894776'><em>State of Cybercrime</em></a> podcast. Matt is going to share some insights on the recent attack of watch manufacturer Seiko. <br/><br/>Then we’re going to check in with Mike DeNapoli, the cybersecurity architect and director at <a href='https://cymulate.com/'>Cymulate</a> – a leading provider of attack surface management and cyber risk mitigation solutions. He’ll be offering an inside look at the recent hack of the file transfer tool MOVEit.<br/><br/>To catch up on past episodes you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13548650-inside-the-summer-s-biggest-industrial-hacks.mp3" length="26911254" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o3e307n2uihp9irmcjst0vj74txx?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13548650</guid>
    <pubDate>Thu, 07 Sep 2023 12:00:00 -0400</pubDate>
    <itunes:duration>2229</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Avoiding &#39;Shiny New Objects&#39;</itunes:title>
    <title>Avoiding &#39;Shiny New Objects&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail Assessing the priorities, assets and technology strategies that make cybersecurity a journey, not a destination.  A recent report from OT cybersecurity solutions provider Cyolo discussed several factors related to secure remote access in the industrial sector. Specifically, it identified a lack of visibility, insufficient user education and training, and weak access control as the top three cybersecurity deficiencies currently facing Cyolo’s industrial customers – all of whic...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Assessing the priorities, assets and technology strategies that make cybersecurity a journey, not a destination.<br/><br/></em>A recent report from OT cybersecurity solutions provider Cyolo discussed several factors related to secure remote access in the industrial sector. Specifically, it identified a lack of visibility, insufficient user education and training, and weak access control as the top three cybersecurity deficiencies currently facing Cyolo’s industrial customers – all of which were referenced by more than 50 percent of those surveyed. <br/><br/>Cyolo also reported on the most highly implemented solutions, which survey respondents identified as defense in depth, network segmentation and multi-factor authentication. </p><p>The guest for this episode is Matthew Cosnek, senior business development manager of OT cybersecurity services at Eaton – a leading supplier and manufacturer of motion control and power management systems and components. <br/><br/>He offers some unique perspective on a number of these topics, and we were also able to delve into the growing use of artificial intelligence, secure by design initiatives, state-sponsored hackers, and much more.</p><p>To catch up on past episodes of <em>Security Breach</em>, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Assessing the priorities, assets and technology strategies that make cybersecurity a journey, not a destination.<br/><br/></em>A recent report from OT cybersecurity solutions provider Cyolo discussed several factors related to secure remote access in the industrial sector. Specifically, it identified a lack of visibility, insufficient user education and training, and weak access control as the top three cybersecurity deficiencies currently facing Cyolo’s industrial customers – all of which were referenced by more than 50 percent of those surveyed. <br/><br/>Cyolo also reported on the most highly implemented solutions, which survey respondents identified as defense in depth, network segmentation and multi-factor authentication. </p><p>The guest for this episode is Matthew Cosnek, senior business development manager of OT cybersecurity services at Eaton – a leading supplier and manufacturer of motion control and power management systems and components. <br/><br/>He offers some unique perspective on a number of these topics, and we were also able to delve into the growing use of artificial intelligence, secure by design initiatives, state-sponsored hackers, and much more.</p><p>To catch up on past episodes of <em>Security Breach</em>, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13501388-avoiding-shiny-new-objects.mp3" length="25284771" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hmvy86zt9tr75wyw3ulj9amtiank?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13501388</guid>
    <pubDate>Wed, 30 Aug 2023 19:00:00 -0400</pubDate>
    <itunes:duration>2081</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Knowing &#39;What is Good&#39;</itunes:title>
    <title>Knowing &#39;What is Good&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail Using data to break down silos, reverse engineer outcomes, and identify emerging threats like WormGPT.  According to recent report from Trellix, 31 percent of CISOs identified a lack of buy-in and use of cyber tools as one of their leading challenges. Additionally, of those who have experienced a large security incident, significant stress to the SecOps team and major attrition from these teams were identified as the most significant impacts of a cyber attack – outranking net...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Using <em>data to break down silos, reverse engineer outcomes, and identify emerging threats like WormGPT.<br/></em><br/>According to recent report from Trellix, 31 percent of CISOs identified a lack of buy-in and use of cyber tools as one of their leading challenges. Additionally, of those who have experienced a large security incident, significant stress to the SecOps team and major attrition from these teams were identified as the most significant impacts of a cyber attack – outranking network downtime and data loss. <br/><br/>These findings seem to indicate how important processes, and not just tools, have become in defending an ever-expanding threat landscape.<br/><br/>Our guest for this episode is Daniel Trivellato, Vice President of Product &amp; Engineering at Forescout – a leading provider of tools and solutions focused on increasing SOC efficiency. He&apos;s all too familiar with these dynamics and offers some interesting takes on how to address them.<br/><br/>The report Daniel references can be found <a href='https://www.forescout.com/threat-briefings/#2023-Riskiest-Devices'>here.</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a><em>.</em> You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'> <em>Security Breach</em> </a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Using <em>data to break down silos, reverse engineer outcomes, and identify emerging threats like WormGPT.<br/></em><br/>According to recent report from Trellix, 31 percent of CISOs identified a lack of buy-in and use of cyber tools as one of their leading challenges. Additionally, of those who have experienced a large security incident, significant stress to the SecOps team and major attrition from these teams were identified as the most significant impacts of a cyber attack – outranking network downtime and data loss. <br/><br/>These findings seem to indicate how important processes, and not just tools, have become in defending an ever-expanding threat landscape.<br/><br/>Our guest for this episode is Daniel Trivellato, Vice President of Product &amp; Engineering at Forescout – a leading provider of tools and solutions focused on increasing SOC efficiency. He&apos;s all too familiar with these dynamics and offers some interesting takes on how to address them.<br/><br/>The report Daniel references can be found <a href='https://www.forescout.com/threat-briefings/#2023-Riskiest-Devices'>here.</a><br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a><em>.</em> You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'> <em>Security Breach</em> </a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13457295-knowing-what-is-good.mp3" length="27856946" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8g7fwi3h3w5wodl8sy5xmkvy53f5?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13457295</guid>
    <pubDate>Wed, 23 Aug 2023 10:00:00 -0400</pubDate>
    <itunes:duration>2295</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security Breach: &#39;The Edge Always Goes to the Attacker&#39;</itunes:title>
    <title>Security Breach: &#39;The Edge Always Goes to the Attacker&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail Embracing the 'not if, but when' mindset.  Cybersecurity solutions provider Trellix recently unveiled their 2023 Voice of the CISO report. Among other topics, it explored the top 5 challenges cited by Chief Information Security Officers who responded to the Trellix survey. In order, they included: Too many different sources of information.A growing attack surface created by remote workers, increasingly complex supply chains and other social and business factors.Changing regul...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Embracing the &apos;not if, but when&apos; mindset.</em><br/><br/>Cybersecurity solutions provider Trellix recently unveiled their <em>2023 Voice of the CISO</em> report. Among other topics, it explored the top 5 challenges cited by Chief Information Security Officers who responded to the Trellix survey. In order, they included:</p><ul><li>Too many different sources of information.</li><li>A growing attack surface created by remote workers, increasingly complex supply chains and other social and business factors.</li><li>Changing regulatory mandates.</li><li>Difficulties retaining and recruiting staff with the necessary security skills.</li><li>A lack of buy-in from other parts of the company.</li></ul><p>These results not only help shine a light on the universal complications of defending IT and OT environments, but the importance of having such conversations in the light of day. Proactive measures and universal support needs to be a priority in order to accurately respond to the evolving regulatory and business continuity efforts that surround industrial cybersecurity.<br/><br/>Joining us to discuss these and other topics is Karan Sondhi, Trellix’s Chief Technology Officer. <a href='https://www.trellix.com/en-us/index.html'>Trellix</a> is a leading provider of Extended Detection and Response strategies.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Embracing the &apos;not if, but when&apos; mindset.</em><br/><br/>Cybersecurity solutions provider Trellix recently unveiled their <em>2023 Voice of the CISO</em> report. Among other topics, it explored the top 5 challenges cited by Chief Information Security Officers who responded to the Trellix survey. In order, they included:</p><ul><li>Too many different sources of information.</li><li>A growing attack surface created by remote workers, increasingly complex supply chains and other social and business factors.</li><li>Changing regulatory mandates.</li><li>Difficulties retaining and recruiting staff with the necessary security skills.</li><li>A lack of buy-in from other parts of the company.</li></ul><p>These results not only help shine a light on the universal complications of defending IT and OT environments, but the importance of having such conversations in the light of day. Proactive measures and universal support needs to be a priority in order to accurately respond to the evolving regulatory and business continuity efforts that surround industrial cybersecurity.<br/><br/>Joining us to discuss these and other topics is Karan Sondhi, Trellix’s Chief Technology Officer. <a href='https://www.trellix.com/en-us/index.html'>Trellix</a> is a leading provider of Extended Detection and Response strategies.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13428956-security-breach-the-edge-always-goes-to-the-attacker.mp3" length="36013250" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3q9fyj7orzv0bxitm9cvizoscbmt?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13428956</guid>
    <pubDate>Fri, 18 Aug 2023 10:00:00 -0400</pubDate>
    <itunes:duration>2975</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, NetworkSecurity, CyberThreats, CyberAttacks, DataPrivacy, ITSecurity, CyberAwareness, CyberDefense, CyberRisk, CyberCrime, HackerProtection, DigitalSecurity, CyberSafety, SecuritySolutions, PhishingProtection, Vulne</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Phishing Lessons and &#39;Shifting the Target&#39;</itunes:title>
    <title>Phishing Lessons and &#39;Shifting the Target&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail How a global manufacturer learned from past attacks, and the most critical benefit of security tools.  IBM research shows a 33 percent increase in cyberattacks against manufacturing companies between 2021-2022. Of those, according to IBM, 44 percent occurred because industrial companies failed to apply the appropriate software patches.   With this in mind, it’s not a surprise that additional data from The 2023 OpenText Cybersecurity Threat Report found that manufacturing is t...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How a global manufacturer learned from past attacks, and the most critical benefit of security tools.<br/><br/></em>IBM research shows a 33 percent increase in cyberattacks against manufacturing companies between 2021-2022. Of those, according to IBM, 44 percent occurred because industrial companies failed to apply the appropriate software patches. <br/><br/>With this in mind, it’s not a surprise that additional data from <em>The 2023 OpenText Cybersecurity Threat Report </em>found that manufacturing is the leader in terms of rate of malware infection – coming in at a rate that is more than 55 percent higher than the average for all industry verticals, including healthcare, banking and education.<br/><br/>A lack of endpoint protection via patching, simple firewalls and additional security protocols continue to be issues throughout the industrial sector. Randy Powell, director of cybersecurity at Rheem Manufacturing, a leading provider of HVAC equipment and hot water heaters, discussed all this and more on our latest episode of <em>Security Breach</em>.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.<br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How a global manufacturer learned from past attacks, and the most critical benefit of security tools.<br/><br/></em>IBM research shows a 33 percent increase in cyberattacks against manufacturing companies between 2021-2022. Of those, according to IBM, 44 percent occurred because industrial companies failed to apply the appropriate software patches. <br/><br/>With this in mind, it’s not a surprise that additional data from <em>The 2023 OpenText Cybersecurity Threat Report </em>found that manufacturing is the leader in terms of rate of malware infection – coming in at a rate that is more than 55 percent higher than the average for all industry verticals, including healthcare, banking and education.<br/><br/>A lack of endpoint protection via patching, simple firewalls and additional security protocols continue to be issues throughout the industrial sector. Randy Powell, director of cybersecurity at Rheem Manufacturing, a leading provider of HVAC equipment and hot water heaters, discussed all this and more on our latest episode of <em>Security Breach</em>.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.<br/><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13383502-phishing-lessons-and-shifting-the-target.mp3" length="38665461" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9t3lqm5fqu1fj4afpqs7rkenei7c?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13383502</guid>
    <pubDate>Thu, 10 Aug 2023 11:00:00 -0400</pubDate>
    <itunes:duration>3194</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Growing Problem of &#39;Insecure by Design&#39;</itunes:title>
    <title>The Growing Problem of &#39;Insecure by Design&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail "It just boggles the mind that things that are so important to how our world works are so shockingly unprotected."  According to ABI Research, less than five percent of critical industrial infrastructure is monitored for threats. The company also reports that by 2030 industrial environments will house more than 1.2 billion connection points for machines and production systems.   So, while it’s impossible to be in all places at all times, this growth in connectivity will place...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>&quot;It just boggles the mind that things that are so important to how our world works are so shockingly unprotected.&quot;<br/><br/></em>According to ABI Research, less than five percent of critical industrial infrastructure is monitored for threats. The company also reports that by 2030 industrial environments will house more than 1.2 billion connection points for machines and production systems. <br/><br/>So, while it’s impossible to be in all places at all times, this growth in connectivity will place a greater strain on security resources even after prioritizing data and network assets, and focusing on the most pressing potential vulnerabilities. Throw in data from Rapid, the largest API hub in the world, showing that over 60 percent of API users are in manufacturing, and it becomes easy to understand how the industrial attack surface continues to expand and create new opportunities for the bad guys.<br/><br/>These are dynamics that our guest for today’s episode knows all too well.  Huxley Barbee is the Security Evangelist at <a href='https://manage.ien.com/www.runzero.com'>runZero,</a> a leading provider of cyber asset management solutions. <br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>&quot;It just boggles the mind that things that are so important to how our world works are so shockingly unprotected.&quot;<br/><br/></em>According to ABI Research, less than five percent of critical industrial infrastructure is monitored for threats. The company also reports that by 2030 industrial environments will house more than 1.2 billion connection points for machines and production systems. <br/><br/>So, while it’s impossible to be in all places at all times, this growth in connectivity will place a greater strain on security resources even after prioritizing data and network assets, and focusing on the most pressing potential vulnerabilities. Throw in data from Rapid, the largest API hub in the world, showing that over 60 percent of API users are in manufacturing, and it becomes easy to understand how the industrial attack surface continues to expand and create new opportunities for the bad guys.<br/><br/>These are dynamics that our guest for today’s episode knows all too well.  Huxley Barbee is the Security Evangelist at <a href='https://manage.ien.com/www.runzero.com'>runZero,</a> a leading provider of cyber asset management solutions. <br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13349299-the-growing-problem-of-insecure-by-design.mp3" length="30198930" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2n7f60j0wfpobmft41hhxlbohk85?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13349299</guid>
    <pubDate>Fri, 04 Aug 2023 10:00:00 -0400</pubDate>
    <itunes:duration>2490</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, OnlineSafety, PrivacyMatters, CyberAwareness, HackersBeware, DigitalSecurity, ThreatDetection, NetworkDefense, MalwareProtection, CyberHygiene, DataBreach, SecureOnline, CyberEducation, PhishingPrevention, Ransomwar</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cloud Apps are Elevating Malware Threats</itunes:title>
    <title>Cloud Apps are Elevating Malware Threats</title>
    <itunes:summary><![CDATA[Send us Fan Mail Netskope Threat Labs, a leading provider of threat analysis and cyber defense strategies for cloud-based vulnerabilities, recently published their most recent Threat Labs Report. Findings specific to manufacturing include: Cloud-delivered malware increased from 32 percent to 66 percent in the past twelve months, led by downloads from popular apps like Microsoft OneDrive, Google Drive and Gmail.The report showed that 94 percent of users downloaded data from an average of 17 di...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><a href='https://www.netskope.com/'>Netskope Threat Labs</a>, a leading provider of threat analysis and cyber defense strategies for cloud-based vulnerabilities, recently published their most recent <em>Threat Labs Report.</em> Findings specific to manufacturing include:</p><ul><li>Cloud-delivered malware increased from 32 percent to 66 percent in the past twelve months, led by downloads from popular apps like Microsoft OneDrive, Google Drive and Gmail.</li><li>The report showed that 94 percent of users downloaded data from an average of 17 different cloud apps each month.</li><li>Over the past twelve months, the number of users uploading to cloud apps in manufacturing increased 27 percent.</li><li>Emotet, AgentTesla, and BlackBasta were among the top malware and ransomware groups targeting manufacturing in the past twelve months.</li><li>Malware described as file-based exploits saw a significant uptick in use by these black hat organizations.</li></ul><p>Our guest for today’s episode is Netskope&apos;s Threat Labs Director Ray Canzanese. He offers some insight on how the industrial sector can continue to utilize the cloud without negatively impacting security.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a>, <a href='https://www.ien.com/video'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast.<br/><br/>And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><a href='https://www.netskope.com/'>Netskope Threat Labs</a>, a leading provider of threat analysis and cyber defense strategies for cloud-based vulnerabilities, recently published their most recent <em>Threat Labs Report.</em> Findings specific to manufacturing include:</p><ul><li>Cloud-delivered malware increased from 32 percent to 66 percent in the past twelve months, led by downloads from popular apps like Microsoft OneDrive, Google Drive and Gmail.</li><li>The report showed that 94 percent of users downloaded data from an average of 17 different cloud apps each month.</li><li>Over the past twelve months, the number of users uploading to cloud apps in manufacturing increased 27 percent.</li><li>Emotet, AgentTesla, and BlackBasta were among the top malware and ransomware groups targeting manufacturing in the past twelve months.</li><li>Malware described as file-based exploits saw a significant uptick in use by these black hat organizations.</li></ul><p>Our guest for today’s episode is Netskope&apos;s Threat Labs Director Ray Canzanese. He offers some insight on how the industrial sector can continue to utilize the cloud without negatively impacting security.<br/><br/>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a>, <a href='https://www.ien.com/video'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast.<br/><br/>And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13287879-cloud-apps-are-elevating-malware-threats.mp3" length="25742198" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8ps4pw52qcbhpcqvn3el5ujyjo4i?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13287879</guid>
    <pubDate>Tue, 25 Jul 2023 14:00:00 -0400</pubDate>
    <itunes:duration>2119</itunes:duration>
    <itunes:keywords>CyberSecurity, InfoSec, DataProtection, OnlineSafety, PrivacyMatters, CyberAwareness, HackersBeware, DigitalSecurity, ThreatDetection, NetworkDefense, MalwareProtection, CyberHygiene, DataBreach, SecureOnline, CyberEducation, PhishingPrevention, Ransomwar</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI - Use It or Lose!</itunes:title>
    <title>AI - Use It or Lose!</title>
    <itunes:summary><![CDATA[Send us Fan Mail The latest tools and technology needed to create and defend your data fortress.  A couple of recent ransomware attacks offer perspective on evolving cybersecurity concerns within the industrial sector  Gentex is a Michigan-based manufacturer of electronic safety systems for the automotive sector. They were attacked by a ransomware gang called Dunghill, which is believed to be a rebranded version of the Dark Angels ransomware gang that had historically targeted the gaming and ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The latest tools and technology needed to create and defend your data fortress.<br/><br/></em>A couple of recent ransomware attacks offer perspective on evolving cybersecurity concerns within the industrial sector<br/><br/>Gentex is a Michigan-based manufacturer of electronic safety systems for the automotive sector. They were attacked by a ransomware gang called Dunghill, which is believed to be a rebranded version of the Dark Angels ransomware gang that had historically targeted the gaming and consumer electronics industry.<br/><br/>In early May, global industrial component and infrastructure systems manufacturer ABB confirmed that it had also been the victim of a ransomware attack. The group Black Basta reportedly hit the company’s Windows Active Directory, disrupting hundreds of devices.<br/><br/>The takeaways from these attacks are that ransomware groups continue to evolve, and in doing so are looking to hit new and more lucrative markets. The industrial sector, as you all know, certainly checks this box.<br/><br/>These are dynamics that our guest for today’s episode, Erik Alfonso Nilsen, Chief Technology Strategist at Flexxon, knows all too well.<br/><br/>We’re excited to announce that <em>Security Breach</em> is being sponsored by Pentera. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit <a href='https://www.pentera.io'>pentera.io.</a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>The latest tools and technology needed to create and defend your data fortress.<br/><br/></em>A couple of recent ransomware attacks offer perspective on evolving cybersecurity concerns within the industrial sector<br/><br/>Gentex is a Michigan-based manufacturer of electronic safety systems for the automotive sector. They were attacked by a ransomware gang called Dunghill, which is believed to be a rebranded version of the Dark Angels ransomware gang that had historically targeted the gaming and consumer electronics industry.<br/><br/>In early May, global industrial component and infrastructure systems manufacturer ABB confirmed that it had also been the victim of a ransomware attack. The group Black Basta reportedly hit the company’s Windows Active Directory, disrupting hundreds of devices.<br/><br/>The takeaways from these attacks are that ransomware groups continue to evolve, and in doing so are looking to hit new and more lucrative markets. The industrial sector, as you all know, certainly checks this box.<br/><br/>These are dynamics that our guest for today’s episode, Erik Alfonso Nilsen, Chief Technology Strategist at Flexxon, knows all too well.<br/><br/>We’re excited to announce that <em>Security Breach</em> is being sponsored by Pentera. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit <a href='https://www.pentera.io'>pentera.io.</a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13218590-ai-use-it-or-lose.mp3" length="14086010" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wnczbepjmaui4oy0jletrtngdtgu?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13218590</guid>
    <pubDate>Thu, 13 Jul 2023 14:00:00 -0400</pubDate>
    <itunes:duration>1150</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Best Way to Identify, Defeat Hackers</itunes:title>
    <title>The Best Way to Identify, Defeat Hackers</title>
    <itunes:summary><![CDATA[Send us Fan Mail Vital defensive tactics that go beyond the attacker.  The sensor and communication technology associated with remote monitoring has proven to be both a time-saving and productivity enhancing tool, as well as a potentially debilitating cyber defense vulnerability for the industrial sector.   The issues stem from a combination of internal failures and the evolution of highly innovative criminals, which was recently assessed in Cyolo’s State of Industrial Secure Remote Access re...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Vital defensive tactics that go beyond the attacker.<br/><br/></em>The sensor and communication technology associated with remote monitoring has proven to be both a time-saving and productivity enhancing tool, as well as a potentially debilitating cyber defense vulnerability for the industrial sector. <br/><br/>The issues stem from a combination of internal failures and the evolution of highly innovative criminals, which was recently assessed in Cyolo’s <em>State of Industrial Secure Remote Access</em> report <br/><br/>Their report shows that larger industrial organizations can have over 50 remote users every day. This quantity of off-site employees logging into industrial control systems reinforces the top three areas of deficiency – a lack of visibility, insufficient user training, and weak internal access controls.<br/><br/>Our guest for today’s episode, Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo, will offer some color on these challenges, as well as some potential solutions.<br/><br/>We’re excited to announce that <em>Security Breach</em> is being sponsored by Pentera. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit <a href='http://pentera.io/'>pentera.io</a>. <br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.<br/><br/><em>To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click </em><a href='https://ien.formstack.com/forms/the_industrial_sector_s_new_battlefield'><em>here.</em></a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Vital defensive tactics that go beyond the attacker.<br/><br/></em>The sensor and communication technology associated with remote monitoring has proven to be both a time-saving and productivity enhancing tool, as well as a potentially debilitating cyber defense vulnerability for the industrial sector. <br/><br/>The issues stem from a combination of internal failures and the evolution of highly innovative criminals, which was recently assessed in Cyolo’s <em>State of Industrial Secure Remote Access</em> report <br/><br/>Their report shows that larger industrial organizations can have over 50 remote users every day. This quantity of off-site employees logging into industrial control systems reinforces the top three areas of deficiency – a lack of visibility, insufficient user training, and weak internal access controls.<br/><br/>Our guest for today’s episode, Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo, will offer some color on these challenges, as well as some potential solutions.<br/><br/>We’re excited to announce that <em>Security Breach</em> is being sponsored by Pentera. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit <a href='http://pentera.io/'>pentera.io</a>. <br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.<br/><br/><em>To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click </em><a href='https://ien.formstack.com/forms/the_industrial_sector_s_new_battlefield'><em>here.</em></a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13132911-the-best-way-to-identify-defeat-hackers.mp3" length="30995452" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/d72lckwoeynnm0mo0z77zh25pl57?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13132911</guid>
    <pubDate>Thu, 29 Jun 2023 12:00:00 -0400</pubDate>
    <podcast:soundbite startTime="639.998" duration="48.0" />
    <itunes:duration>2554</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Impressive and Terrifying Evolution of Ransomware Gangs</itunes:title>
    <title>The Impressive and Terrifying Evolution of Ransomware Gangs</title>
    <itunes:summary><![CDATA[Send us Fan Mail How hackers are targeting ERP systems and automating more attacks.  Adding to the data supporting a surge in cyber-criminal activity is the FBI Crime Compliant Center’s most recent Internet Crime Report.  The IC3 data shows that while the number of reported complaints actually dipped by about five percent last year, the financial losses directly attributed with Ransomware, Phishing and other attacks increased by 49 percent – totaling over $10.3 billion.  The report goes on to...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How hackers are targeting ERP systems and automating more attacks.</em><br/><br/>Adding to the data supporting a surge in cyber-criminal activity is the FBI Crime Compliant Center’s most recent Internet Crime Report.<br/><br/>The IC3 data shows that while the number of reported complaints actually dipped by about five percent last year, the financial losses directly attributed with Ransomware, Phishing and other attacks increased by 49 percent – totaling over $10.3 billion.<br/><br/>The report goes on to state that, “we know not everyone who has experienced a ransomware incident has reported to the IC3.&quot; The report also called out the top three ransomware groups as LockBit, Blackcat, and Hive – none of which are new to the <em>Security Breach</em> audience.<br/><br/>These hacks, and the hackers involved, are all to familiar to JP Perez-Etchegoyen. He serves as the Chief Technology Officer for Onapsis, a leading provider of integrated cybersecurity offerings. In this episode he offers an in-depth look at new challenges and solutions focused on the ransomware pandemic. <br/><br/>We’re excited to announce that <em>Security Breach</em> is being sponsored by <a href='https://www.pentera.io/?utm_source=ien&amp;source=ien&amp;utm_medium=landing-page&amp;medium=landing-page&amp;utm_campaign=manufacturing-abx-2023&amp;campaign=manufacturing-abx-2023'>Pentera</a>. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit <a href='http://pentera.io/'>pentera.io.</a><br/><br/><em>To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click </em><a href='https://ien.formstack.com/forms/the_industrial_sector_s_new_battlefield'><em>here.</em></a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How hackers are targeting ERP systems and automating more attacks.</em><br/><br/>Adding to the data supporting a surge in cyber-criminal activity is the FBI Crime Compliant Center’s most recent Internet Crime Report.<br/><br/>The IC3 data shows that while the number of reported complaints actually dipped by about five percent last year, the financial losses directly attributed with Ransomware, Phishing and other attacks increased by 49 percent – totaling over $10.3 billion.<br/><br/>The report goes on to state that, “we know not everyone who has experienced a ransomware incident has reported to the IC3.&quot; The report also called out the top three ransomware groups as LockBit, Blackcat, and Hive – none of which are new to the <em>Security Breach</em> audience.<br/><br/>These hacks, and the hackers involved, are all to familiar to JP Perez-Etchegoyen. He serves as the Chief Technology Officer for Onapsis, a leading provider of integrated cybersecurity offerings. In this episode he offers an in-depth look at new challenges and solutions focused on the ransomware pandemic. <br/><br/>We’re excited to announce that <em>Security Breach</em> is being sponsored by <a href='https://www.pentera.io/?utm_source=ien&amp;source=ien&amp;utm_medium=landing-page&amp;medium=landing-page&amp;utm_campaign=manufacturing-abx-2023&amp;campaign=manufacturing-abx-2023'>Pentera</a>. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit <a href='http://pentera.io/'>pentera.io.</a><br/><br/><em>To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click </em><a href='https://ien.formstack.com/forms/the_industrial_sector_s_new_battlefield'><em>here.</em></a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13084452-the-impressive-and-terrifying-evolution-of-ransomware-gangs.mp3" length="25226750" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i4wp0yqgiu6kynvjd2dacpw56vrg?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13084452</guid>
    <pubDate>Wed, 21 Jun 2023 16:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1058.224" duration="51.0" />
    <itunes:duration>2079</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Humans, &#39;Promiscuous Devices&#39; Creating More Threats</itunes:title>
    <title>Humans, &#39;Promiscuous Devices&#39; Creating More Threats</title>
    <itunes:summary><![CDATA[Send us Fan Mail How increasingly complex attacks might demand taking humans out of the cybersecurity loop.  First published in 2014, the National Institute of Standards and Technology (NIST) recently announced updates to its Cybersecurity Framework (CSF). The goal of version 2.0 of the CSF is to better integrate areas like supply chain risk management and governance.   All of these measures would appear tailored towards greater inclusion of the industrial sector, and many of its unique chall...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How increasingly complex attacks might demand taking humans out of the cybersecurity loop.<br/><br/></em>First published in 2014, the National Institute of Standards and Technology (NIST) recently announced updates to its Cybersecurity Framework (CSF). The goal of version 2.0 of the CSF is to better integrate areas like supply chain risk management and governance. <br/><br/>All of these measures would appear tailored towards greater inclusion of the industrial sector, and many of its unique challenges. And the timing couldn’t be better. According to Proofpoint’s <em>2023 Voice of the CISO</em> report, 76 percent of industrial sector chief information security officers feel their organization is at risk for a cyber attack within the next 12 months.<br/><br/>Our guest for today’s episode is Ethan Schmertzler, CEO of Dispel, a leading provider of secure access solutions for industrial control systems.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by <a href='https://www.pentera.io/?utm_source=ien&amp;source=ien&amp;utm_medium=landing-page&amp;medium=landing-page&amp;utm_campaign=manufacturing-abx-2023&amp;campaign=manufacturing-abx-2023'>Pentera</a>. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit <a href='http://pentera.io/'>pentera.io</a></p><p><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>How increasingly complex attacks might demand taking humans out of the cybersecurity loop.<br/><br/></em>First published in 2014, the National Institute of Standards and Technology (NIST) recently announced updates to its Cybersecurity Framework (CSF). The goal of version 2.0 of the CSF is to better integrate areas like supply chain risk management and governance. <br/><br/>All of these measures would appear tailored towards greater inclusion of the industrial sector, and many of its unique challenges. And the timing couldn’t be better. According to Proofpoint’s <em>2023 Voice of the CISO</em> report, 76 percent of industrial sector chief information security officers feel their organization is at risk for a cyber attack within the next 12 months.<br/><br/>Our guest for today’s episode is Ethan Schmertzler, CEO of Dispel, a leading provider of secure access solutions for industrial control systems.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by <a href='https://www.pentera.io/?utm_source=ien&amp;source=ien&amp;utm_medium=landing-page&amp;medium=landing-page&amp;utm_campaign=manufacturing-abx-2023&amp;campaign=manufacturing-abx-2023'>Pentera</a>. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit <a href='http://pentera.io/'>pentera.io</a></p><p><br/></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/13033461-humans-promiscuous-devices-creating-more-threats.mp3" length="19581898" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yhfi6578youkom6z1t95ifxuj4u9?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13033461</guid>
    <pubDate>Tue, 13 Jun 2023 16:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1206.569" duration="41.0" />
    <itunes:duration>1607</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Enemies at the Gate</itunes:title>
    <title>Enemies at the Gate</title>
    <itunes:summary><![CDATA[Send us Fan Mail Credential harvesting, backdoor attacks and staying on top of who or what is logging into your networks.  While more connection points can create more security soft spots for industrial enterprises, it’s no surprise that hackers would generally prefer to log in, as opposed to break in. It’s rumored that credential theft via phishing schemes is how attackers were able to infiltrate Colonial Pipeline.  And as the industrial sector has added more technology, perhaps the greatest...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Credential harvesting, backdoor attacks and staying on top of who or what is logging into your networks.<br/><br/></em>While more connection points can create more security soft spots for industrial enterprises, it’s no surprise that hackers would generally prefer to log in, as opposed to break in. It’s rumored that credential theft via phishing schemes is how attackers were able to infiltrate Colonial Pipeline.<br/><br/>And as the industrial sector has added more technology, perhaps the greatest overall vulnerability is the login process. <br/><br/>Our guest for today’s episode is  Venkat Thummisi, CTO and Founder of Inside-Out Defense. He offers some first-hand expertise on the hows and whys of access abuse.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by <a href='https://www.pentera.io'>Pentera.</a> For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit <a href='http://pentera.io/'>pentera.io.</a></p><p><em>To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click </em><a href='https://ien.formstack.com/forms/the_industrial_sector_s_new_battlefield'><em>here.</em></a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Credential harvesting, backdoor attacks and staying on top of who or what is logging into your networks.<br/><br/></em>While more connection points can create more security soft spots for industrial enterprises, it’s no surprise that hackers would generally prefer to log in, as opposed to break in. It’s rumored that credential theft via phishing schemes is how attackers were able to infiltrate Colonial Pipeline.<br/><br/>And as the industrial sector has added more technology, perhaps the greatest overall vulnerability is the login process. <br/><br/>Our guest for today’s episode is  Venkat Thummisi, CTO and Founder of Inside-Out Defense. He offers some first-hand expertise on the hows and whys of access abuse.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by <a href='https://www.pentera.io'>Pentera.</a> For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit <a href='http://pentera.io/'>pentera.io.</a></p><p><em>To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click </em><a href='https://ien.formstack.com/forms/the_industrial_sector_s_new_battlefield'><em>here.</em></a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12997840-enemies-at-the-gate.mp3" length="28660525" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/h4n16x2nxlns6zza1ah1cfnl4pbn?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12997840</guid>
    <pubDate>Wed, 07 Jun 2023 15:00:00 -0400</pubDate>
    <itunes:duration>2364</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Bad Guys Are Salivating Over Manufacturing</itunes:title>
    <title>The Bad Guys Are Salivating Over Manufacturing</title>
    <itunes:summary><![CDATA[Send us Fan Mail Inside the resurgence of ransomware attacks and the rise of billion-dollar "unicorn" hacker gangs.  Believe it or not, there was a time in recent history when we actually experienced a reprieve in ransomware attacks. According to a report from Black Kite, a leading provider of third-party risk management and cyber intelligence, a number of factors contributed to a flattening of ransomware attack frequency in late 2021 and into 2022.  Unfortunately, the bad guys evolved and ra...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Inside the resurgence of ransomware attacks and the rise of billion-dollar &quot;unicorn&quot; hacker gangs.<br/><br/></em>Believe it or not, there was a time in recent history when we actually experienced a reprieve in ransomware attacks. According to a report from Black Kite, a leading provider of third-party risk management and cyber intelligence, a number of factors contributed to a flattening of ransomware attack frequency in late 2021 and into 2022.<br/><br/>Unfortunately, the bad guys evolved and ransomware attacks have surged in early 2023, with the number of ransomware victims in March of this year coming in at nearly twice that of April 2022, and 1.6 times higher than last year’s highest monthly total.<br/><br/>New players like Black Basta, as well as new strategies from well-known adversaries like LockBit once again brought manufacturing to the top of the list of favorite targets. According to the report, manufacturing represented nearly one out of every five attacks.<br/><br/>Our guest for today’s episode is Jeffrey Wheatman, a Cyber Risk Evangelist at Black Kite.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by <a href='https://pentera.io/'>Pentera</a>. For more information on their cybersecurity solutions, you can go to <a href='https://pentera.io/'>Pentara.io</a>.</p><p><em>To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click </em><a href='https://ien.formstack.com/forms/the_industrial_sector_s_new_battlefield'><em>here.</em></a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Inside the resurgence of ransomware attacks and the rise of billion-dollar &quot;unicorn&quot; hacker gangs.<br/><br/></em>Believe it or not, there was a time in recent history when we actually experienced a reprieve in ransomware attacks. According to a report from Black Kite, a leading provider of third-party risk management and cyber intelligence, a number of factors contributed to a flattening of ransomware attack frequency in late 2021 and into 2022.<br/><br/>Unfortunately, the bad guys evolved and ransomware attacks have surged in early 2023, with the number of ransomware victims in March of this year coming in at nearly twice that of April 2022, and 1.6 times higher than last year’s highest monthly total.<br/><br/>New players like Black Basta, as well as new strategies from well-known adversaries like LockBit once again brought manufacturing to the top of the list of favorite targets. According to the report, manufacturing represented nearly one out of every five attacks.<br/><br/>Our guest for today’s episode is Jeffrey Wheatman, a Cyber Risk Evangelist at Black Kite.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by <a href='https://pentera.io/'>Pentera</a>. For more information on their cybersecurity solutions, you can go to <a href='https://pentera.io/'>Pentara.io</a>.</p><p><em>To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click </em><a href='https://ien.formstack.com/forms/the_industrial_sector_s_new_battlefield'><em>here.</em></a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12960365-the-bad-guys-are-salivating-over-manufacturing.mp3" length="31469875" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1785597gzu7oenks694h1b8cd37g?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12960365</guid>
    <pubDate>Thu, 01 Jun 2023 10:00:00 -0400</pubDate>
    <podcast:soundbite startTime="879.067" duration="50.5" />
    <itunes:duration>2598</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>More than Security, Cyber Defense Is &#39;Life Safety&#39;</itunes:title>
    <title>More than Security, Cyber Defense Is &#39;Life Safety&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail Strategies for breaking down IT silos in learning how people, devices and networks can be attacked.  Providing a significant assist to transparency efforts in cybersecurity is the Strengthening American Cybersecurity Act, which was signed into law in March 2022.  Unlike other regulatory efforts focused on updating network security, or mandating agencies like CISA (Cybersecurity and Infrastructure Security Agency, which falls under the Department of Homeland Security) to devel...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Strategies for breaking down IT silos in learning how people, devices and networks can be attacked.<br/><br/></em>Providing a significant assist to transparency efforts in cybersecurity is the Strengthening American Cybersecurity Act, which was signed into law in March 2022.<br/><br/>Unlike other regulatory efforts focused on updating network security, or mandating agencies like CISA (Cybersecurity and Infrastructure Security Agency, which falls under the Department of Homeland Security) to develop cybersecurity plans, it requires “critical infrastructure entities” to report “substantial cyber incidents” within 72 hours, and any ransomware payment within 24 hours. <br/><br/>In addition to regulatory efforts and compliance, a bigger challenge, and one we’ve begun covering more here on <a href='https://www.mbtmag.com/security/video/22862230/security-breach-making-hackers-pay-literally'><em>Security Breach</em>,</a> is the significant lack of internal OT cybersecurity expertise within the industrial sector. <br/><br/>In general, this can be attributed to too many manufacturers feeling their IT security personnel can also be used on the OT side. This happens without an appreciation for how different the technology and operating environment is, and how a cut-and-paste approach will leave too many doors open to hackers. Recent findings from Fortinet show that 67 percent of OT security leaders come from an OT engineering background.<br/><br/>Knowing how to implement and connect OT technology does not make one an expert on keeping it secure.<br/><br/>To discuss these and other issues, like IT/OT silos and the impacts of ransomware, we&apos;re excited to have Debbie Gordon join us on this episode of <em>Security Breach</em>. She&apos;s the founder and CEO of Cloud Range, a leading provider of OT/ICS cyberattack simulations and training<em>.<br/><br/></em>We’re also excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com.</a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Strategies for breaking down IT silos in learning how people, devices and networks can be attacked.<br/><br/></em>Providing a significant assist to transparency efforts in cybersecurity is the Strengthening American Cybersecurity Act, which was signed into law in March 2022.<br/><br/>Unlike other regulatory efforts focused on updating network security, or mandating agencies like CISA (Cybersecurity and Infrastructure Security Agency, which falls under the Department of Homeland Security) to develop cybersecurity plans, it requires “critical infrastructure entities” to report “substantial cyber incidents” within 72 hours, and any ransomware payment within 24 hours. <br/><br/>In addition to regulatory efforts and compliance, a bigger challenge, and one we’ve begun covering more here on <a href='https://www.mbtmag.com/security/video/22862230/security-breach-making-hackers-pay-literally'><em>Security Breach</em>,</a> is the significant lack of internal OT cybersecurity expertise within the industrial sector. <br/><br/>In general, this can be attributed to too many manufacturers feeling their IT security personnel can also be used on the OT side. This happens without an appreciation for how different the technology and operating environment is, and how a cut-and-paste approach will leave too many doors open to hackers. Recent findings from Fortinet show that 67 percent of OT security leaders come from an OT engineering background.<br/><br/>Knowing how to implement and connect OT technology does not make one an expert on keeping it secure.<br/><br/>To discuss these and other issues, like IT/OT silos and the impacts of ransomware, we&apos;re excited to have Debbie Gordon join us on this episode of <em>Security Breach</em>. She&apos;s the founder and CEO of Cloud Range, a leading provider of OT/ICS cyberattack simulations and training<em>.<br/><br/></em>We’re also excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com.</a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12919200-more-than-security-cyber-defense-is-life-safety.mp3" length="25725687" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c7i911ae2rdb39rx871vtea83xxf?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12919200</guid>
    <pubDate>Thu, 25 May 2023 09:00:00 -0400</pubDate>
    <podcast:soundbite startTime="337.0" duration="46.5" />
    <itunes:duration>2118</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Making Hackers Pay (Literally)</itunes:title>
    <title>Making Hackers Pay (Literally)</title>
    <itunes:summary><![CDATA[Send us Fan Mail Why cybersecurity is all about ROI, and other "unsexy" stuff on which to build your defenses.  In previous episodes of Security Breach, we’ve discussed penetration testing, ethical hackers, cataloging connection points, and getting a handle on all those API connections.  These strategies are centered on developing defenses that reduce your attack surface, make attackers easier to spot, negate the dwell time of black hats looking to live inside your networks, and hopefully muc...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Why cybersecurity is all about ROI, and other &quot;unsexy&quot; stuff on which to build your defenses.<br/></em><br/>In previous episodes of <em>Security Breach</em>, we’ve discussed penetration testing, ethical hackers, cataloging connection points, and getting a handle on all those API connections.<br/><br/>These strategies are centered on developing defenses that reduce your attack surface, make attackers easier to spot, negate the dwell time of black hats looking to live inside your networks, and hopefully much more.<br/><br/>While obtaining all this data is critical, the next challenge is understanding what to do with it in forming a stronger cyber defense plan. This is where it gets tricky.<br/><br/>A lack of OT security expertise continues to permeate throughout the industrial sector. Throw in some cloudy and somewhat limited regulatory guidance, and knowing exactly what steps industrial cybersecurity leaders should take after getting all this data is even more complex.<br/><br/>Our guest for this episode not only understands these dynamics, but confronts them on a daily basis. Brian Haugli is a former CSO and cybersecurity leader for the Pentagon, as well as professor of Cybersecurity at Boston College. He currently serves as the CEO of <a href='https://sidechannel.com/'>SideChannel</a>, a cybersecurity services firm that offers risk assessments, virtual Chief Information Security Officers, and more.</p><p>We’re excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p><em>Why cybersecurity is all about ROI, and other &quot;unsexy&quot; stuff on which to build your defenses.<br/></em><br/>In previous episodes of <em>Security Breach</em>, we’ve discussed penetration testing, ethical hackers, cataloging connection points, and getting a handle on all those API connections.<br/><br/>These strategies are centered on developing defenses that reduce your attack surface, make attackers easier to spot, negate the dwell time of black hats looking to live inside your networks, and hopefully much more.<br/><br/>While obtaining all this data is critical, the next challenge is understanding what to do with it in forming a stronger cyber defense plan. This is where it gets tricky.<br/><br/>A lack of OT security expertise continues to permeate throughout the industrial sector. Throw in some cloudy and somewhat limited regulatory guidance, and knowing exactly what steps industrial cybersecurity leaders should take after getting all this data is even more complex.<br/><br/>Our guest for this episode not only understands these dynamics, but confronts them on a daily basis. Brian Haugli is a former CSO and cybersecurity leader for the Pentagon, as well as professor of Cybersecurity at Boston College. He currently serves as the CEO of <a href='https://sidechannel.com/'>SideChannel</a>, a cybersecurity services firm that offers risk assessments, virtual Chief Information Security Officers, and more.</p><p>We’re excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12870887-making-hackers-pay-literally.mp3" length="35813786" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tdzr5k9sqkch0rbm4qaw71zt1ydh?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12870887</guid>
    <pubDate>Wed, 17 May 2023 20:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1527.583" duration="35.0" />
    <itunes:duration>2958</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hackers Want to Steal, Extort Competitive Advantages</itunes:title>
    <title>Hackers Want to Steal, Extort Competitive Advantages</title>
    <itunes:summary><![CDATA[Send us Fan Mail Supply chain management has always been a priority for the industrial sector, but over the last three-plus years, its importance has been elevated for numerous reasons. The problem, from a cybersecurity perspective, is that as soon as an operational area starts to garner more attention, it also becomes a hotter target for hackers.  Elise Manna-Browne, director of advisory services at Novacoast, a leading provider of cybersecurity intelligence and response solutions, is all to...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Supply chain management has always been a priority for the industrial sector, but over the last three-plus years, its importance has been elevated for numerous reasons. The problem, from a cybersecurity perspective, is that as soon as an operational area starts to garner more attention, it also becomes a hotter target for hackers.<br/><br/>Elise Manna-Browne, director of advisory services at Novacoast, a leading provider of cybersecurity intelligence and response solutions, is all too familiar with this dynamic.<br/><br/>She joins the show to discuss how to prioritize risks and identify hackers like Industrial Spy and RansomHouse, while empowering employees and addressing partner pressures when facing a cyber attack on your supply chain.<br/><br/>We’re excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Supply chain management has always been a priority for the industrial sector, but over the last three-plus years, its importance has been elevated for numerous reasons. The problem, from a cybersecurity perspective, is that as soon as an operational area starts to garner more attention, it also becomes a hotter target for hackers.<br/><br/>Elise Manna-Browne, director of advisory services at Novacoast, a leading provider of cybersecurity intelligence and response solutions, is all too familiar with this dynamic.<br/><br/>She joins the show to discuss how to prioritize risks and identify hackers like Industrial Spy and RansomHouse, while empowering employees and addressing partner pressures when facing a cyber attack on your supply chain.<br/><br/>We’re excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a></p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12822263-hackers-want-to-steal-extort-competitive-advantages.mp3" length="25883548" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bt6uh78fu7x2370hxczsenk2vlc9?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12822263</guid>
    <pubDate>Wed, 10 May 2023 10:00:00 -0400</pubDate>
    <podcast:soundbite startTime="913.583" duration="60.0" />
    <itunes:duration>2127</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>An Unlikely Assist from Ransomware and the Looming Threats of AI</itunes:title>
    <title>An Unlikely Assist from Ransomware and the Looming Threats of AI</title>
    <itunes:summary><![CDATA[Send us Fan Mail One of the biggest challenges surrounding industrial cybersecurity is the size of the attack surface that must be monitored, assessed, and constantly updated in order to evolve with the rising number of complex threat actors. Throw in a growing number of connection points, APIs and new and legacy network component combinations, and the complexity only grows.   This makes improving visibility within the OT system not only vitally important, but a seemingly enormous concern.&nb...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the biggest challenges surrounding industrial cybersecurity is the size of the attack surface that must be monitored, assessed, and constantly updated in order to evolve with the rising number of complex threat actors. Throw in a growing number of connection points, APIs and new and legacy network component combinations, and the complexity only grows. <br/><br/>This makes improving visibility within the OT system not only vitally important, but a seemingly enormous concern.  Dragos recently reported that up to 80 percent of OT security personnel lack complete OT system visibility. <br/><br/>Our guest for this episode, Moty Kanias, VP of Cyber Strategy and Alliances at NanoLock Security, has seen firsthand the type of catastrophic results this lack of visibility and OT-specific security expertise can create.<br/><br/>We’re excited to announce that <em>Security Breach</em> is being sponsored by <a href='https://www.rockwellautomation.com/'>Rockwell Automation</a>. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a></p><p>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach </em>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the biggest challenges surrounding industrial cybersecurity is the size of the attack surface that must be monitored, assessed, and constantly updated in order to evolve with the rising number of complex threat actors. Throw in a growing number of connection points, APIs and new and legacy network component combinations, and the complexity only grows. <br/><br/>This makes improving visibility within the OT system not only vitally important, but a seemingly enormous concern.  Dragos recently reported that up to 80 percent of OT security personnel lack complete OT system visibility. <br/><br/>Our guest for this episode, Moty Kanias, VP of Cyber Strategy and Alliances at NanoLock Security, has seen firsthand the type of catastrophic results this lack of visibility and OT-specific security expertise can create.<br/><br/>We’re excited to announce that <em>Security Breach</em> is being sponsored by <a href='https://www.rockwellautomation.com/'>Rockwell Automation</a>. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a></p><p>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach </em>out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. <br><a href="https://ien.formstack.com/forms/security_breach_podcast_become_a_sponsor_apr_2024"><b><em>Click Here to Become a Sponsor.</em></b></a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12779555-an-unlikely-assist-from-ransomware-and-the-looming-threats-of-ai.mp3" length="26543412" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2movdqhjvah0qdtf3rd5x1tmpd7o?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12779555</guid>
    <pubDate>Wed, 03 May 2023 17:00:00 -0400</pubDate>
    <podcast:soundbite startTime="671.533" duration="58.5" />
    <itunes:duration>2186</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Trusting the Creative Hacker</itunes:title>
    <title>Trusting the Creative Hacker</title>
    <itunes:summary><![CDATA[Send us Fan Mail The industrial sector continues to be a hot target for hackers. Ransomware, malware and phishing attacks all continue to escalate in both frequency and potency. The on-going mixture of new technologies with legacy systems invites attention, and the reality is that it continues to pay dividends for hackers and ransomware groups.  However, there are solutions. One of which is to work with good guys who can think like the bad guys. It's an approach this episode's guest,  An...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The industrial sector continues to be a hot target for hackers. Ransomware, malware and phishing attacks all continue to escalate in both frequency and potency. The on-going mixture of new technologies with legacy systems invites attention, and the reality is that it continues to pay dividends for hackers and ransomware groups.<br/><br/>However, there are solutions. One of which is to work with good guys who can think like the bad guys. It&apos;s an approach this episode&apos;s guest,  Andra Zaharia, Head of Content &amp; Community at Pentest-Tools.com, has used to help some of the largest manufacturers in the world.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com<br/><br/></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The industrial sector continues to be a hot target for hackers. Ransomware, malware and phishing attacks all continue to escalate in both frequency and potency. The on-going mixture of new technologies with legacy systems invites attention, and the reality is that it continues to pay dividends for hackers and ransomware groups.<br/><br/>However, there are solutions. One of which is to work with good guys who can think like the bad guys. It&apos;s an approach this episode&apos;s guest,  Andra Zaharia, Head of Content &amp; Community at Pentest-Tools.com, has used to help some of the largest manufacturers in the world.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com<br/><br/></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12714137-trusting-the-creative-hacker.mp3" length="30082410" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/872k8808lz79se46qdlokan1rvvf?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12714137</guid>
    <pubDate>Mon, 24 Apr 2023 15:00:00 -0400</pubDate>
    <podcast:soundbite startTime="670.511" duration="48.0" />
    <itunes:duration>2491</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Cybercriminal&#39;s Favorite Pastime</itunes:title>
    <title>The Cybercriminal&#39;s Favorite Pastime</title>
    <itunes:summary><![CDATA[Send us Fan Mail Perhaps the only topic that solicits a uniform response is when my guests are asked about the most important part of a cybersecurity plan. The common mantra is that there has to be buy-in throughout the organization for any plan to be successful, and it starts at the top.  Obtaining C-level support is obviously vital when it comes to loosening the corporate purse strings for software, penetration testing and training resources. But beyond that, corporate leadership can set th...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Perhaps the only topic that solicits a uniform response is when my guests are asked about the most important part of a cybersecurity plan. The common mantra is that there has to be buy-in throughout the organization for any plan to be successful, and it starts at the top.<br/><br/>Obtaining C-level support is obviously vital when it comes to loosening the corporate purse strings for software, penetration testing and training resources. But beyond that, corporate leadership can set the overall tone for a company’s attitude towards cybersecurity and the threat it presents throughout the organization, not just for IT or OT personnel. <br/><br/>This comes as no surprise to this week&apos;s guest. Frank Riccardi is he author of <em>Mobilizing the C-Suite – Waging War Against Cyberattacks.<br/><br/></em>We’re excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Perhaps the only topic that solicits a uniform response is when my guests are asked about the most important part of a cybersecurity plan. The common mantra is that there has to be buy-in throughout the organization for any plan to be successful, and it starts at the top.<br/><br/>Obtaining C-level support is obviously vital when it comes to loosening the corporate purse strings for software, penetration testing and training resources. But beyond that, corporate leadership can set the overall tone for a company’s attitude towards cybersecurity and the threat it presents throughout the organization, not just for IT or OT personnel. <br/><br/>This comes as no surprise to this week&apos;s guest. Frank Riccardi is he author of <em>Mobilizing the C-Suite – Waging War Against Cyberattacks.<br/><br/></em>We’re excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12609818-the-cybercriminal-s-favorite-pastime.mp3" length="25274852" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2e2kake7ljbqk68a29nfo0gbl20p?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12609818</guid>
    <pubDate>Fri, 07 Apr 2023 17:00:00 -0400</pubDate>
    <podcast:soundbite startTime="467.597" duration="56.5" />
    <itunes:duration>2093</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Balancing The Light and Dark Forces of Technology</itunes:title>
    <title>Balancing The Light and Dark Forces of Technology</title>
    <itunes:summary><![CDATA[Send us Fan Mail As we continue to see an increase in attacks targeting the ICS, it’s about more than just the industrial sector creating cyber defense plans, cataloging connection points and shoring up vulnerabilities. The reality is that it’s going to take a communal effort to keep manufacturing – the largest single contributor to our country’s GDP – safe and secure.   As we’ve learned from a legacy of attacks spanning the last decade, the tactics used and organizations behind them continue...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As we continue to see an increase in attacks targeting the ICS, it’s about more than just the industrial sector creating cyber defense plans, cataloging connection points and shoring up vulnerabilities. The reality is that it’s going to take a communal effort to keep manufacturing – the largest single contributor to our country’s GDP – safe and secure. <br/><br/>As we’ve learned from a legacy of attacks spanning the last decade, the tactics used and organizations behind them continue to evolve, and we’ll need some help in order to prevent and respond to attacks that impact the livelihoods of thousands up and down stream of the initial intrusion.  <br/><br/>We welcome Kimberly Cornwell, an applications engineer at Siemens to discuss how the industrial community is working to meet new and evolving industrial cybersecurity challenges.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As we continue to see an increase in attacks targeting the ICS, it’s about more than just the industrial sector creating cyber defense plans, cataloging connection points and shoring up vulnerabilities. The reality is that it’s going to take a communal effort to keep manufacturing – the largest single contributor to our country’s GDP – safe and secure. <br/><br/>As we’ve learned from a legacy of attacks spanning the last decade, the tactics used and organizations behind them continue to evolve, and we’ll need some help in order to prevent and respond to attacks that impact the livelihoods of thousands up and down stream of the initial intrusion.  <br/><br/>We welcome Kimberly Cornwell, an applications engineer at Siemens to discuss how the industrial community is working to meet new and evolving industrial cybersecurity challenges.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12552072-balancing-the-light-and-dark-forces-of-technology.mp3" length="26108137" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/re7016q1rthdtmuqs434pgtgbkf3?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12552072</guid>
    <pubDate>Thu, 30 Mar 2023 17:00:00 -0400</pubDate>
    <podcast:soundbite startTime="132.25" duration="50.5" />
    <itunes:duration>2160</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Thinking Like the Bad Guy</itunes:title>
    <title>Thinking Like the Bad Guy</title>
    <itunes:summary><![CDATA[Send us Fan Mail The latest high-profile hack of Dole Foods reinforces the need to upgrade operational technology security, and not just for the manufacturer. The distributors, logistics providers, retailers and end-users that rely so heavily on the role manufacturing plays are beginning to understand how critical and far-reaching the effects of a production-ceasing hack can be.  And so do the bad guys.  According to a survey from Nozomi Networks, 63 percent of respondents classify current cy...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The latest <a href='https://www.mbtmag.com/security/video/22766618/security-breach-breaking-down-the-dole-foods-ransomware-attack'>high-profile hack of Dole Foods</a> reinforces the need to upgrade operational technology security, and not just for the manufacturer. The distributors, logistics providers, retailers and end-users that rely so heavily on the role manufacturing plays are beginning to understand how critical and far-reaching the effects of a production-ceasing hack can be.<br/><br/>And so do the bad guys.<br/><br/>According to a survey from Nozomi Networks, 63 percent of respondents classify current cybersecurity threats targeting industrial control systems as high, severe or critical. This would support findings from Fortinet that 93 percent of manufacturers responded to at least one OT intrusion between 2021-2022, and 78 percent dealt with more than three such incidents. Additionally, the firm found that 61 percent of intrusions targeted OT assets. <br/><br/>On this episode we&apos;re joined by Carlos-Raul Sanchez, Director of Operational Technology at Fortinet, a leading provider of OT Cybersecurity solutions to discuss these challenges.<br/><br/>We’re excited to announce that <em>Security Breac</em>h is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The latest <a href='https://www.mbtmag.com/security/video/22766618/security-breach-breaking-down-the-dole-foods-ransomware-attack'>high-profile hack of Dole Foods</a> reinforces the need to upgrade operational technology security, and not just for the manufacturer. The distributors, logistics providers, retailers and end-users that rely so heavily on the role manufacturing plays are beginning to understand how critical and far-reaching the effects of a production-ceasing hack can be.<br/><br/>And so do the bad guys.<br/><br/>According to a survey from Nozomi Networks, 63 percent of respondents classify current cybersecurity threats targeting industrial control systems as high, severe or critical. This would support findings from Fortinet that 93 percent of manufacturers responded to at least one OT intrusion between 2021-2022, and 78 percent dealt with more than three such incidents. Additionally, the firm found that 61 percent of intrusions targeted OT assets. <br/><br/>On this episode we&apos;re joined by Carlos-Raul Sanchez, Director of Operational Technology at Fortinet, a leading provider of OT Cybersecurity solutions to discuss these challenges.<br/><br/>We’re excited to announce that <em>Security Breac</em>h is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12501256-thinking-like-the-bad-guy.mp3" length="19224106" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yez8jvvtwcwm4ogj6e4r27dpw8z0?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12501256</guid>
    <pubDate>Thu, 23 Mar 2023 10:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1012.0" duration="51.5" />
    <itunes:duration>1588</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Breaking Down the Dole Foods Ransomware Attack</itunes:title>
    <title>Breaking Down the Dole Foods Ransomware Attack</title>
    <itunes:summary><![CDATA[Send us Fan Mail Joining the ranks of high-profile ransomware attacks at Nissan, Colonial Pipeline, JBS Foods, Schneider Electric and even Foxconn, is Dole Foods. The global food processor was the victim of a ransomware attack in early February that led to shutting down production systems throughout North America, and halted shipments to numerous retailers and distributors. As if this wasn’t enough to help illustrate the continuing rise in ransomware attacks on the manufacturing sector, Drago...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Joining the ranks of high-profile ransomware attacks at Nissan, Colonial Pipeline, JBS Foods, Schneider Electric and even Foxconn, is Dole Foods.</p><p>The global food processor was <a href='https://www.foodmanufacturing.com/facility/video/22724694/cyberattack-at-dole-leads-to-shutdown-delays'>the victim of a ransomware attack in early February</a> that led to shutting down production systems throughout North America, and halted shipments to numerous retailers and distributors.</p><p>As if this wasn’t enough to help illustrate the continuing rise in ransomware attacks on the manufacturing sector, Dragos recently reported that such attacks surged 87 percent in 2022. <br/><br/>Joining us to discuss the Dole Foods attack, and lessons learned from it, is Travis Wong, VP of Risk Engineering and Client Services at Resilience Insurance, a leading provider of cyber risk management solutions.<br/><br/>We&apos;re also excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Joining the ranks of high-profile ransomware attacks at Nissan, Colonial Pipeline, JBS Foods, Schneider Electric and even Foxconn, is Dole Foods.</p><p>The global food processor was <a href='https://www.foodmanufacturing.com/facility/video/22724694/cyberattack-at-dole-leads-to-shutdown-delays'>the victim of a ransomware attack in early February</a> that led to shutting down production systems throughout North America, and halted shipments to numerous retailers and distributors.</p><p>As if this wasn’t enough to help illustrate the continuing rise in ransomware attacks on the manufacturing sector, Dragos recently reported that such attacks surged 87 percent in 2022. <br/><br/>Joining us to discuss the Dole Foods attack, and lessons learned from it, is Travis Wong, VP of Risk Engineering and Client Services at Resilience Insurance, a leading provider of cyber risk management solutions.<br/><br/>We&apos;re also excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12454111-breaking-down-the-dole-foods-ransomware-attack.mp3" length="20776366" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ezy9539cdi0n7o7kre9q2cdw09qc?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12454111</guid>
    <pubDate>Thu, 16 Mar 2023 11:00:00 -0400</pubDate>
    <podcast:soundbite startTime="367.75" duration="59.0" />
    <itunes:duration>1713</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Air Gap Lie and The Spectrum of Extortion</itunes:title>
    <title>The Air Gap Lie and The Spectrum of Extortion</title>
    <itunes:summary><![CDATA[Send us Fan Mail While the growth of ransomware, phishing schemes and other nefarious cyber activities are obviously not positive developments for the industrial sector, the resulting exposure and fallout from high profile events like Colonial Pipeline, JBS and, most recently, Dole Foods, have mandated a need for more data on attack surfaces, hacker tactics and the bad actors themselves.   In this episode, we'll be taking a closer look at all of these topics via findings from IBM Security’s m...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While the growth of ransomware, phishing schemes and other nefarious cyber activities are obviously not positive developments for the industrial sector, the resulting exposure and fallout from high profile events like Colonial Pipeline, JBS and, most recently, Dole Foods, have mandated a need for more data on attack surfaces, hacker tactics and the bad actors themselves. <br/><br/>In this episode, we&apos;ll be taking a closer look at all of these topics via findings from IBM Security’s most recent Threat Intelligence Index as we sit down with John Dwyer, Head of Research for IBM Security’s X-Force.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a>.<br/><br/>For more information on the work IBM Security X Force is doing, you can go to <a href='https://www.ibm.com/security'>www.ibm.com/security</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, reach out at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While the growth of ransomware, phishing schemes and other nefarious cyber activities are obviously not positive developments for the industrial sector, the resulting exposure and fallout from high profile events like Colonial Pipeline, JBS and, most recently, Dole Foods, have mandated a need for more data on attack surfaces, hacker tactics and the bad actors themselves. <br/><br/>In this episode, we&apos;ll be taking a closer look at all of these topics via findings from IBM Security’s most recent Threat Intelligence Index as we sit down with John Dwyer, Head of Research for IBM Security’s X-Force.<br/><br/>We’re also excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a>.<br/><br/>For more information on the work IBM Security X Force is doing, you can go to <a href='https://www.ibm.com/security'>www.ibm.com/security</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, reach out at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12401101-the-air-gap-lie-and-the-spectrum-of-extortion.mp3" length="28723099" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2ndg1gtc6g74a8v8tcmydx8e2g69?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12401101</guid>
    <pubDate>Wed, 08 Mar 2023 12:00:00 -0500</pubDate>
    <podcast:soundbite startTime="718.0" duration="59.0" />
    <itunes:duration>2377</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Latest Ransomware Attacks Educate, then Humiliate</itunes:title>
    <title>Latest Ransomware Attacks Educate, then Humiliate</title>
    <itunes:summary><![CDATA[Send us Fan Mail One of the on-going topics that we cover here on Security Breach is ransomware attacks.  The risk of continually discussing a topic is that it can become like white noise – always present, but in the background and potentially easier to dismiss. Well, if that’s the case, recent findings from Dragos 2022 Cybersecurity Year in Review report should help to re-orient your perspective.  The report indicates that ransomware attacks against industrial organizations increased 87 perc...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the on-going topics that we cover here on <em>Security Breach</em> is ransomware attacks.<br/><br/>The risk of continually discussing a topic is that it can become like white noise – always present, but in the background and potentially easier to dismiss. Well, if that’s the case, recent findings from Dragos 2022 Cybersecurity Year in Review report should help to re-orient your perspective.<br/><br/>The report indicates that ransomware attacks against industrial organizations increased 87 percent last year, and over 70 percent of all ransomware attacks were directed towards manufacturers.  And Dragos is forecasting that 2023 will see more new ransomware groups materialize. <br/> <br/>Joining us to discuss some of the new concerns (Ransom House), and solutions, surrounding ransomware attacks is Wil Klusovsky, Avertium&apos;s Chief Security Architect. Avertium is a leading provider of cybersecurity strategy, response and compliance solutions.<br/><br/>We’re also  excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts. If you have a cybersecurity story or topic that you’d like to have us explore on<em> Security Breach</em>, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the on-going topics that we cover here on <em>Security Breach</em> is ransomware attacks.<br/><br/>The risk of continually discussing a topic is that it can become like white noise – always present, but in the background and potentially easier to dismiss. Well, if that’s the case, recent findings from Dragos 2022 Cybersecurity Year in Review report should help to re-orient your perspective.<br/><br/>The report indicates that ransomware attacks against industrial organizations increased 87 percent last year, and over 70 percent of all ransomware attacks were directed towards manufacturers.  And Dragos is forecasting that 2023 will see more new ransomware groups materialize. <br/> <br/>Joining us to discuss some of the new concerns (Ransom House), and solutions, surrounding ransomware attacks is Wil Klusovsky, Avertium&apos;s Chief Security Architect. Avertium is a leading provider of cybersecurity strategy, response and compliance solutions.<br/><br/>We’re also  excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts. If you have a cybersecurity story or topic that you’d like to have us explore on<em> Security Breach</em>, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12340342-latest-ransomware-attacks-educate-then-humiliate.mp3" length="19686646" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8gevqopwbybnf3vnqmczqzmaqlxi?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12340342</guid>
    <pubDate>Mon, 27 Feb 2023 17:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1211.0" duration="60.0" />
    <itunes:duration>1623</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hiding, Not Running from Hackers</itunes:title>
    <title>Hiding, Not Running from Hackers</title>
    <itunes:summary><![CDATA[Send us Fan Mail When it comes to securing the industrial enterprise, a great deal of focus is being paid to what might seem like the little things – such as passwords, logins or credentials that are used to limit access to networks or data platforms.  The problem has been the continued use of weak, easy to remember passwords and login workarounds that have created vulnerabilities, and contributed to numerous, successful malware, phishing and ransomware attacks.   The response has been the in...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When it comes to securing the industrial enterprise, a great deal of focus is being paid to what might seem like the little things – such as passwords, logins or credentials that are used to limit access to networks or data platforms.<br/><br/>The problem has been the continued use of weak, easy to remember passwords and login workarounds that have created vulnerabilities, and contributed to numerous, successful malware, phishing and ransomware attacks. <br/><br/>The response has been the infusion of protocols meant to strengthen these soft spots, but measures such as double-factor authentication and zero trust access have been met with resistance and the aforementioned workarounds.<br/><br/>Capterra, a provider of software selection guides, found that restricting data access without impacting workflows, the ability to develop new security policies, and selecting zero trust vendors continue to be significant obstacles in adopting zero trust strategies. So, the tools are there, but we need to figure out more effective ways of using them.<br/><br/>We’re excited to announce that <em>Security Breach </em>is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a> <br/><br/>Joining us to discuss some potentially new and better strategies is Tom Sego, CEO &amp; Co-Founder of BlastWave. <br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When it comes to securing the industrial enterprise, a great deal of focus is being paid to what might seem like the little things – such as passwords, logins or credentials that are used to limit access to networks or data platforms.<br/><br/>The problem has been the continued use of weak, easy to remember passwords and login workarounds that have created vulnerabilities, and contributed to numerous, successful malware, phishing and ransomware attacks. <br/><br/>The response has been the infusion of protocols meant to strengthen these soft spots, but measures such as double-factor authentication and zero trust access have been met with resistance and the aforementioned workarounds.<br/><br/>Capterra, a provider of software selection guides, found that restricting data access without impacting workflows, the ability to develop new security policies, and selecting zero trust vendors continue to be significant obstacles in adopting zero trust strategies. So, the tools are there, but we need to figure out more effective ways of using them.<br/><br/>We’re excited to announce that <em>Security Breach </em>is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a> <br/><br/>Joining us to discuss some potentially new and better strategies is Tom Sego, CEO &amp; Co-Founder of BlastWave. <br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12292352-hiding-not-running-from-hackers.mp3" length="21331257" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/d2ekkfhxst65kxan9ufnhv6oycj5?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12292352</guid>
    <pubDate>Mon, 20 Feb 2023 16:00:00 -0500</pubDate>
    <podcast:soundbite startTime="249.0" duration="41.0" />
    <itunes:duration>1761</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hacker&#39;s Insight: &#39;How Can I Make Stuff Worse&#39;</itunes:title>
    <title>Hacker&#39;s Insight: &#39;How Can I Make Stuff Worse&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail The potential of smarter factories driven by advanced technologies and greater connectivity is exciting … but equally daunting.  That’s because in our enthusiasm to embrace all the time and cost savings associated with the machines, automation and data associated with these advancements, the industrial sector often pushes one of the most important aspects of all this connectivity into the realm of tomorrow’s problems.  Well, tomorrow is here. There are over 20 billion connect...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The potential of smarter factories driven by advanced technologies and greater connectivity is exciting … but equally daunting.<br/><br/>That’s because in our enthusiasm to embrace all the time and cost savings associated with the machines, automation and data associated with these advancements, the industrial sector often pushes one of the most important aspects of all this connectivity into the realm of tomorrow’s problems.<br/><br/>Well, tomorrow is here. There are over 20 billion connected devices in the industrial sector – and that’s a number projected to nearly double in the next five years.<br/><br/>Joining us to discuss what all these connected devices will mean to cybersecurity planning is Jason Kent, Hacker in Residence at <a href='https://www.cequence.ai/'>Cequence Security</a>, a leader in API protection solutions.</p><p>We’re excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The potential of smarter factories driven by advanced technologies and greater connectivity is exciting … but equally daunting.<br/><br/>That’s because in our enthusiasm to embrace all the time and cost savings associated with the machines, automation and data associated with these advancements, the industrial sector often pushes one of the most important aspects of all this connectivity into the realm of tomorrow’s problems.<br/><br/>Well, tomorrow is here. There are over 20 billion connected devices in the industrial sector – and that’s a number projected to nearly double in the next five years.<br/><br/>Joining us to discuss what all these connected devices will mean to cybersecurity planning is Jason Kent, Hacker in Residence at <a href='https://www.cequence.ai/'>Cequence Security</a>, a leader in API protection solutions.</p><p>We’re excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com/'>rockwellautomation.com</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12244873-hacker-s-insight-how-can-i-make-stuff-worse.mp3" length="19464179" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/klt8lwtcteclm202cwway68xl00r?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12244873</guid>
    <pubDate>Mon, 13 Feb 2023 15:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1090.667" duration="43.0" />
    <itunes:duration>1606</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When Seeing the Attack Isn&#39;t Enough to Stop It</itunes:title>
    <title>When Seeing the Attack Isn&#39;t Enough to Stop It</title>
    <itunes:summary><![CDATA[Send us Fan Mail We’re excited to announce that Security Breach is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to rockwellautomation.com  According to a recent report from security provider Barracuda Networks, 94 percent of the industrial organizations they surveyed have reported a security incident since July 2021, with 60 percent of these enterprises saying their most significant incident resulted in downtime of at least two days...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We’re excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a><br/><br/>According to a recent report from security provider Barracuda Networks, 94 percent of the industrial organizations they surveyed have reported a security incident since July 2021, with 60 percent of these enterprises saying their most significant incident resulted in downtime of at least two days, with some extending longer.<br/><br/>Couple this with previous data from IBM placing average recovery times at close to three months, and the financial and production losses alone, saying nothing of the potential IP and data loses resulting from these hacks, should be making buy-in from executives easier to obtain.<br/><br/>And as the number of IoT-related connections, software integrations, AI-powered processes and expanded automation applications continue to grow, the need for smarter OT security tools and strategies will continue to escalate.<br/><br/>Joining us to discuss this situation is Pete Lund, VP of Products for OT Security at OPSWAT, a leading provider of cybersecurity and infrastructure defense. For more information on the work OPSWAT does, you can go to www.opswat.com<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com, and if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>We’re excited to announce that <em>Security Breach</em> is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a><br/><br/>According to a recent report from security provider Barracuda Networks, 94 percent of the industrial organizations they surveyed have reported a security incident since July 2021, with 60 percent of these enterprises saying their most significant incident resulted in downtime of at least two days, with some extending longer.<br/><br/>Couple this with previous data from IBM placing average recovery times at close to three months, and the financial and production losses alone, saying nothing of the potential IP and data loses resulting from these hacks, should be making buy-in from executives easier to obtain.<br/><br/>And as the number of IoT-related connections, software integrations, AI-powered processes and expanded automation applications continue to grow, the need for smarter OT security tools and strategies will continue to escalate.<br/><br/>Joining us to discuss this situation is Pete Lund, VP of Products for OT Security at OPSWAT, a leading provider of cybersecurity and infrastructure defense. For more information on the work OPSWAT does, you can go to www.opswat.com<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com, and if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12203786-when-seeing-the-attack-isn-t-enough-to-stop-it.mp3" length="18738037" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nsuq667kjj0bincqx3upgrjiw0ew?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12203786</guid>
    <pubDate>Tue, 07 Feb 2023 13:00:00 -0500</pubDate>
    <podcast:soundbite startTime="669.0" duration="56.0" />
    <itunes:duration>1546</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>People Are Part of the Damage</itunes:title>
    <title>People Are Part of the Damage</title>
    <itunes:summary><![CDATA[Send us Fan Mail I usually start each episode by listing off a number of escalating and intentionally frightening statistics about the rising number of cybersecurity threats facing the industrial sector. The goal is to get your attention and reinforce how your data, operations and all of your vital assets continue to be so vulnerable. Today’s guest, however, would argue that our strategies also need to acknowledge the human factor of cybersecurity. Instead of tailoring our strategy to focus e...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>I usually start each episode by listing off a number of escalating and intentionally frightening statistics about the rising number of cybersecurity threats facing the industrial sector. The goal is to get your attention and reinforce how your data, operations and all of your vital assets continue to be so vulnerable.</p><p>Today’s guest, however, would argue that our strategies also need to acknowledge the human factor of cybersecurity. Instead of tailoring our strategy to focus exclusively on what’s at risk, we also need to remember the people that will play such a crucial role in carrying out these strategies.<br/><br/>The hackers are focused on people and their activities, and according to Ken Fanger at On Technology Partners, so should we. He shares a number of personal experiences about a wide range of hacks, and the personal impact of them all.<br/><br/>For more information on the work On Technology does, you can go to <a href='https://manage.ien.com/www.ontechpartners.com'>www.ontechpartners.com</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>I usually start each episode by listing off a number of escalating and intentionally frightening statistics about the rising number of cybersecurity threats facing the industrial sector. The goal is to get your attention and reinforce how your data, operations and all of your vital assets continue to be so vulnerable.</p><p>Today’s guest, however, would argue that our strategies also need to acknowledge the human factor of cybersecurity. Instead of tailoring our strategy to focus exclusively on what’s at risk, we also need to remember the people that will play such a crucial role in carrying out these strategies.<br/><br/>The hackers are focused on people and their activities, and according to Ken Fanger at On Technology Partners, so should we. He shares a number of personal experiences about a wide range of hacks, and the personal impact of them all.<br/><br/>For more information on the work On Technology does, you can go to <a href='https://manage.ien.com/www.ontechpartners.com'>www.ontechpartners.com</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12164864-people-are-part-of-the-damage.mp3" length="24167983" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4qotnr7pxbuh5td461g8pxnfh3iy?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12164864</guid>
    <pubDate>Wed, 01 Feb 2023 14:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1260.583" duration="30.0" />
    <itunes:duration>1998</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Because Hackers are Working Harder</itunes:title>
    <title>Because Hackers are Working Harder</title>
    <itunes:summary><![CDATA[Send us Fan Mail The numbers continue to roll in, and they’re not getting better … yet.   Ransomware attack payouts continue to grow, with the average topping out at $4.5 million in 2022. Similarly, malware attacks continue to escalate and response times, due to smarter phishing schemes and harder-to-detect dormant infiltrations, are taking companies more than nine months to detect and another three months to contain.   This is resulting in lost data with immeasurable value, lost business opp...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The numbers continue to roll in, and they’re not getting better … yet. <br/><br/>Ransomware attack payouts continue to grow, with the average topping out at $4.5 million in 2022. Similarly, malware attacks continue to escalate and response times, due to smarter phishing schemes and harder-to-detect dormant infiltrations, are taking companies more than nine months to detect and another three months to contain. <br/><br/>This is resulting in lost data with immeasurable value, lost business opportunities worth over $1.5 million, and additional costs associated with controlling the data breach reaching upwards of $5 million per attack. <br/><br/>These are all stats sourced from IBM’s recent <em>Data Breach Costs </em>report. <br/><br/>However, there are solutions being developed for the industrial marketplace. And joining us today to discuss some of them is Erik Gross, Redzone’s VP of Security &amp; Application Support. Redzone is a leading provider of remote operations software and data storage and security. For more information on the work Redzone does, you can go to <a href='https://rzsoftware.com/'>https://rzsoftware.com/</a> <br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore,  you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The numbers continue to roll in, and they’re not getting better … yet. <br/><br/>Ransomware attack payouts continue to grow, with the average topping out at $4.5 million in 2022. Similarly, malware attacks continue to escalate and response times, due to smarter phishing schemes and harder-to-detect dormant infiltrations, are taking companies more than nine months to detect and another three months to contain. <br/><br/>This is resulting in lost data with immeasurable value, lost business opportunities worth over $1.5 million, and additional costs associated with controlling the data breach reaching upwards of $5 million per attack. <br/><br/>These are all stats sourced from IBM’s recent <em>Data Breach Costs </em>report. <br/><br/>However, there are solutions being developed for the industrial marketplace. And joining us today to discuss some of them is Erik Gross, Redzone’s VP of Security &amp; Application Support. Redzone is a leading provider of remote operations software and data storage and security. For more information on the work Redzone does, you can go to <a href='https://rzsoftware.com/'>https://rzsoftware.com/</a> <br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check <em>Security Breach</em> out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore,  you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12103214-because-hackers-are-working-harder.mp3" length="15468286" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ibu9h9bav0kvuumdflv9gj94vjfh?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12103214</guid>
    <pubDate>Mon, 23 Jan 2023 15:00:00 -0500</pubDate>
    <podcast:soundbite startTime="389.217" duration="56.0" />
    <itunes:duration>1276</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Our Cyber Defense Gets a D+</itunes:title>
    <title>Our Cyber Defense Gets a D+</title>
    <itunes:summary><![CDATA[Send us Fan Mail As the world of cybersecurity continues to spawn new threats and present the industrial sector with increasingly complex prevention, detection and response needs, we’re seeing similar advancements on the white hat side of things.  In an effort to combat the tactics of hackers and ransomware scammers, technology providers are stepping up with new tools and strategies. An example is Automated Control Concepts, and their AiRAID OT Cybersecurity Device.   AiRAID is described as a...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As the world of cybersecurity continues to spawn new threats and present the industrial sector with increasingly complex prevention, detection and response needs, we’re seeing similar advancements on the white hat side of things.<br/><br/>In an effort to combat the tactics of hackers and ransomware scammers, technology providers are stepping up with new tools and strategies. An example is Automated Control Concepts, and their AiRAID OT Cybersecurity Device. <br/><br/>AiRAID is described as a cyber-physical security device designed specifically for industrial OT systems.  I was able to catch up with Daniel Ward, Director of Cybersecurity and IIoT at the Rockwell Automation Fair last November. <br/><br/>In addition to taking about AiRAID, we discussed some of the biggest trends impacting industrial cybersecurity and why Daniel feels the industrial sector’s state of cyber defense would pull a D+ grade.<br/><br/>ACC is a Rockwell Gold System integrator, and if you’d like to learn more about the company, you can go to <a href='https://automated-control.com/'>automated-control.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.  And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As the world of cybersecurity continues to spawn new threats and present the industrial sector with increasingly complex prevention, detection and response needs, we’re seeing similar advancements on the white hat side of things.<br/><br/>In an effort to combat the tactics of hackers and ransomware scammers, technology providers are stepping up with new tools and strategies. An example is Automated Control Concepts, and their AiRAID OT Cybersecurity Device. <br/><br/>AiRAID is described as a cyber-physical security device designed specifically for industrial OT systems.  I was able to catch up with Daniel Ward, Director of Cybersecurity and IIoT at the Rockwell Automation Fair last November. <br/><br/>In addition to taking about AiRAID, we discussed some of the biggest trends impacting industrial cybersecurity and why Daniel feels the industrial sector’s state of cyber defense would pull a D+ grade.<br/><br/>ACC is a Rockwell Gold System integrator, and if you’d like to learn more about the company, you can go to <a href='https://automated-control.com/'>automated-control.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.  And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/12039162-our-cyber-defense-gets-a-d.mp3" length="15935129" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/90nkomiqlgohznk98h4z53n2jca9?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12039162</guid>
    <pubDate>Fri, 13 Jan 2023 16:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1079.499" duration="49.0" />
    <itunes:duration>1311</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Protecting Against &#39;Dormant Footholds&#39; and Knowing You&#39;re a Target</itunes:title>
    <title>Protecting Against &#39;Dormant Footholds&#39; and Knowing You&#39;re a Target</title>
    <itunes:summary><![CDATA[Send us Fan Mail There’s a reason the term industrial-grade is used to express the highest levels of reliability and durability for products. After all, if a material, technology or tool can handle the rigors and demands of manufacturing, chances are it can meet the needs of any other application.  We’ve been through these facts before, but they’re worth repeating. IBM has cited manufacturing as the number one target for cyberattacks. The FBI is expecting a 400 percent increase in phishing at...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>There’s a reason the term industrial-grade is used to express the highest levels of reliability and durability for products. After all, if a material, technology or tool can handle the rigors and demands of manufacturing, chances are it can meet the needs of any other application.<br/><br/>We’ve been through these facts before, but they’re worth repeating. IBM has cited manufacturing as the number one target for cyberattacks. The FBI is expecting a 400 percent increase in phishing attacks. The average ransomware attack demand has nearly tripled in the last two years. It’s fair to say that these attacks will continue to get more complex and occur even more frequently. <br/><br/>So, the strategies and software successfully implemented by manufacturing could serve as a model for countless other industries, institutions and individuals to emulate. <br/><br/>One of the companies looking to enhance all these vitally essential cybersecurity protocols for the most important sector of our global economy is Rockwell Automation. And joining us today from Rockwell is Quade Nettles, Cybersecurity Product Manager at Rockwell Automation.<br/><br/>For more information on the work Rockwell does, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>There’s a reason the term industrial-grade is used to express the highest levels of reliability and durability for products. After all, if a material, technology or tool can handle the rigors and demands of manufacturing, chances are it can meet the needs of any other application.<br/><br/>We’ve been through these facts before, but they’re worth repeating. IBM has cited manufacturing as the number one target for cyberattacks. The FBI is expecting a 400 percent increase in phishing attacks. The average ransomware attack demand has nearly tripled in the last two years. It’s fair to say that these attacks will continue to get more complex and occur even more frequently. <br/><br/>So, the strategies and software successfully implemented by manufacturing could serve as a model for countless other industries, institutions and individuals to emulate. <br/><br/>One of the companies looking to enhance all these vitally essential cybersecurity protocols for the most important sector of our global economy is Rockwell Automation. And joining us today from Rockwell is Quade Nettles, Cybersecurity Product Manager at Rockwell Automation.<br/><br/>For more information on the work Rockwell does, you can go to <a href='https://www.rockwellautomation.com'>rockwellautomation.com</a>.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11925329-protecting-against-dormant-footholds-and-knowing-you-re-a-target.mp3" length="27356546" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/19fjop8ezrixde6lntwqsbay1iua?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11925329</guid>
    <pubDate>Fri, 23 Dec 2022 16:00:00 -0500</pubDate>
    <podcast:soundbite startTime="225.5" duration="56.5" />
    <itunes:duration>2268</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Little Things Are Still Killing</itunes:title>
    <title>The Little Things Are Still Killing</title>
    <itunes:summary><![CDATA[Send us Fan Mail As the saying goes, it’s the little things that kill. And in cybersecurity, that little thing can be as innocent as a singular mouse click on the wrong URL from a familiar-looking email.   A recent report from Trend Micro shows that 75 percent of all cyberattacks start with phishing emails – or messages made to look like a non-threatening communication from a colleague, vendor or trusted source, but containing links meant to abstract vital personal data.   Additiona...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As the saying goes, it’s the little things that kill. And in cybersecurity, that little thing can be as innocent as a singular mouse click on the wrong URL from a familiar-looking email. <br/><br/>A recent report from Trend Micro shows that 75 percent of all cyberattacks start with phishing emails – or messages made to look like a non-threatening communication from a colleague, vendor or trusted source, but containing links meant to abstract vital personal data. <br/><br/>Additionally, research from Cybertalk.org states that about 90 percent of data breaches are the result of phishing schemes, and the FBI is projecting a year-over-year increase of 400 percent for these types of attacks.  Finally, cybersecurity software and services provider Mimecast found that 96 percent of respondents to their survey acknowledged having faced some form of phishing attack in the past year. <br/><br/>The key is to not associate the tool too closely with the evil intentions of hackers. Email remains a highly efficient and vitally important communication tool – but one that requires greater diligence than in the past.  <br/><br/>Joining us to discuss this situation is Fleming Shi, Chief Technology Officer at Barracuda Networks, a leading provider of data security products and services.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach us at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>As the saying goes, it’s the little things that kill. And in cybersecurity, that little thing can be as innocent as a singular mouse click on the wrong URL from a familiar-looking email. <br/><br/>A recent report from Trend Micro shows that 75 percent of all cyberattacks start with phishing emails – or messages made to look like a non-threatening communication from a colleague, vendor or trusted source, but containing links meant to abstract vital personal data. <br/><br/>Additionally, research from Cybertalk.org states that about 90 percent of data breaches are the result of phishing schemes, and the FBI is projecting a year-over-year increase of 400 percent for these types of attacks.  Finally, cybersecurity software and services provider Mimecast found that 96 percent of respondents to their survey acknowledged having faced some form of phishing attack in the past year. <br/><br/>The key is to not associate the tool too closely with the evil intentions of hackers. Email remains a highly efficient and vitally important communication tool – but one that requires greater diligence than in the past.  <br/><br/>Joining us to discuss this situation is Fleming Shi, Chief Technology Officer at Barracuda Networks, a leading provider of data security products and services.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach us at jeff@ien.com.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11911343-the-little-things-are-still-killing.mp3" length="21704919" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lh47nzbdle87429hw7fxkuoblb16?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11911343</guid>
    <pubDate>Wed, 21 Dec 2022 10:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1100.0" duration="59.0" />
    <itunes:duration>1795</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why the Good Guys are Losing</itunes:title>
    <title>Why the Good Guys are Losing</title>
    <itunes:summary><![CDATA[Send us Fan Mail The MIT Technology Review Insights recently reported that midsize companies, which would mean manufacturing enterprises with annual revenues of between $200 - $700 million, were almost 500 percent more likely to be targeted now, than just two years ago.   Similarly, Fortinet has released findings indicating that 93 percent of manufacturers have had to respond to at least one intrusion targeting operational technologies within the last 12 months, and 78 percent have experience...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The <em>MIT Technology Review Insights</em> recently reported that midsize companies, which would mean manufacturing enterprises with annual revenues of between $200 - $700 million, were almost 500 percent more likely to be targeted now, than just two years ago. <br/><br/>Similarly, Fortinet has released findings indicating that 93 percent of manufacturers have had to respond to at least one intrusion targeting operational technologies within the last 12 months, and 78 percent have experienced multiple attacks.<br/><br/>Remember, if U.S. manufacturing were its own country, it would have the eighth largest GDP in the world, and the lifeblood of this sector is the small and midsized manufacturer.  Keeping these businesses running without operational disruption, intellectual property theft or employee data theft has never been more important as we continue to struggle with inflation, logistics challenges and supply chain disruptions. <br/><br/>Joining us to discuss this situation is Jeff Engle, Chairman and President of Conquest Cyber, a leader in industrial cybersecurity solutions and services.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The <em>MIT Technology Review Insights</em> recently reported that midsize companies, which would mean manufacturing enterprises with annual revenues of between $200 - $700 million, were almost 500 percent more likely to be targeted now, than just two years ago. <br/><br/>Similarly, Fortinet has released findings indicating that 93 percent of manufacturers have had to respond to at least one intrusion targeting operational technologies within the last 12 months, and 78 percent have experienced multiple attacks.<br/><br/>Remember, if U.S. manufacturing were its own country, it would have the eighth largest GDP in the world, and the lifeblood of this sector is the small and midsized manufacturer.  Keeping these businesses running without operational disruption, intellectual property theft or employee data theft has never been more important as we continue to struggle with inflation, logistics challenges and supply chain disruptions. <br/><br/>Joining us to discuss this situation is Jeff Engle, Chairman and President of Conquest Cyber, a leader in industrial cybersecurity solutions and services.<br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. And if you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11843550-why-the-good-guys-are-losing.mp3" length="33804288" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/q27xne3et7atsvptmkudt42hi9pq?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11843550</guid>
    <pubDate>Fri, 09 Dec 2022 11:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1052.633" duration="56.0" />
    <itunes:duration>2812</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A Little Social Engineering Goes a Long Way</itunes:title>
    <title>A Little Social Engineering Goes a Long Way</title>
    <itunes:summary><![CDATA[Send us Fan Mail Recent data from cybersecurity software and services provider Mimecast offers some depth on the rising concerns presented by phishing attacks, with 96 percent of respondents acknowledging that their organization has faced some form of phishing attack in the past year. Additionally, this tactic is believed to be responsible for 36 percent of data breaches – with 84 percent of U.S. organizations have reported phishing or ransomware attacks in the past 12 months. And speaking of...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Recent data from cybersecurity software and services provider Mimecast offers some depth on the rising concerns presented by phishing attacks, with 96 percent of respondents acknowledging that their organization has faced some form of phishing attack in the past year.</p><p>Additionally, this tactic is believed to be responsible for 36 percent of data breaches – with 84 percent of U.S. organizations have reported phishing or ransomware attacks in the past 12 months.</p><p>And speaking of ransomware, the average payment climbed to $570,000 during the first half of 2021, up more than $200,000 from the previous year. Analysts predict that the frequency of these attacks will rise to one every two seconds.</p><p>Joining us to discuss what industrial organizations can do in response to these growing threats is Joe Tibbets, Senior Director of Technology Alliances &amp; API at Mimecast.</p><p>For more information on the work <a href='https://www.mimecast.com/'>Mimecast</a> does, you can go to mimecast.com.</p><p>If you’ve got a cybersecurity story to share or topic you’d like to have us cover, feel free to contact me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Recent data from cybersecurity software and services provider Mimecast offers some depth on the rising concerns presented by phishing attacks, with 96 percent of respondents acknowledging that their organization has faced some form of phishing attack in the past year.</p><p>Additionally, this tactic is believed to be responsible for 36 percent of data breaches – with 84 percent of U.S. organizations have reported phishing or ransomware attacks in the past 12 months.</p><p>And speaking of ransomware, the average payment climbed to $570,000 during the first half of 2021, up more than $200,000 from the previous year. Analysts predict that the frequency of these attacks will rise to one every two seconds.</p><p>Joining us to discuss what industrial organizations can do in response to these growing threats is Joe Tibbets, Senior Director of Technology Alliances &amp; API at Mimecast.</p><p>For more information on the work <a href='https://www.mimecast.com/'>Mimecast</a> does, you can go to mimecast.com.</p><p>If you’ve got a cybersecurity story to share or topic you’d like to have us cover, feel free to contact me at jeff@ien.com</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11775436-a-little-social-engineering-goes-a-long-way.mp3" length="14946423" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1pnzpkeaqz7heaxawfe5m4y517j6?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11775436</guid>
    <pubDate>Mon, 28 Nov 2022 14:00:00 -0500</pubDate>
    <podcast:soundbite startTime="309.05" duration="41.0" />
    <itunes:duration>1232</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Embracing The Devil Inside to Stifle Hackers</itunes:title>
    <title>Embracing The Devil Inside to Stifle Hackers</title>
    <itunes:summary><![CDATA[Send us Fan Mail One of the mantras that I’ve clung to from my childhood is drawn from one of my favorite toys and shows – GI Joe. Duke, Snake Eyes and the rest of the Joes always reinforced that “Knowing is half the battle.”   If that’s truly the case, then the industrial sector still has a ways to go in fully combatting the impact of cyber attacks, and shoring up their cyber security strategies.  Insurance provider Travelers has  unveiled their most recent Risk Index Survey, ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the mantras that I’ve clung to from my childhood is drawn from one of my favorite toys and shows – GI Joe. Duke, Snake Eyes and the rest of the Joes always reinforced that “Knowing is half the battle.”  </p><p>If that’s truly the case, then the industrial sector still has a ways to go in fully combatting the impact of cyber attacks, and shoring up their cyber security strategies. </p><p>Insurance provider Travelers has  unveiled their most recent Risk Index Survey, with cybersecurity ranking as the single biggest business concern. Included in their findings was that 57 percent of respondents think an attack is inevitable – with their biggest fears, in order, being a security breach, system glitch or ransomware attack.</p><p>Joining us to discuss these ongoing concerns and some of the simple solutions to help ward off these attacks, is Kirstin Simonson, Technology Lead at Travelers.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>One of the mantras that I’ve clung to from my childhood is drawn from one of my favorite toys and shows – GI Joe. Duke, Snake Eyes and the rest of the Joes always reinforced that “Knowing is half the battle.”  </p><p>If that’s truly the case, then the industrial sector still has a ways to go in fully combatting the impact of cyber attacks, and shoring up their cyber security strategies. </p><p>Insurance provider Travelers has  unveiled their most recent Risk Index Survey, with cybersecurity ranking as the single biggest business concern. Included in their findings was that 57 percent of respondents think an attack is inevitable – with their biggest fears, in order, being a security breach, system glitch or ransomware attack.</p><p>Joining us to discuss these ongoing concerns and some of the simple solutions to help ward off these attacks, is Kirstin Simonson, Technology Lead at Travelers.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11744231-embracing-the-devil-inside-to-stifle-hackers.mp3" length="15200998" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yrq8zkvqqj7nuza1xhth12frfjop?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11744231</guid>
    <pubDate>Tue, 22 Nov 2022 12:00:00 -0500</pubDate>
    <podcast:soundbite startTime="336.05" duration="52.0" />
    <itunes:duration>1253</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>No Place to Hide When You Have Money and Data</itunes:title>
    <title>No Place to Hide When You Have Money and Data</title>
    <itunes:summary><![CDATA[Send us Fan Mail On a daily basis I see a tremendous amount of data and research flow through my inbox, but a recent report from Rackspace Technology really caught my attention.  According to a recent survey performed by this provider of multi-cloud services and security, two of the top cybersecurity challenges facing companies is a shortage of workers with cybersecurity skills – listed by 39% of respondents, and a lack of visibility of vulnerabilities across all infrastructure – listed by 42...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>On a daily basis I see a tremendous amount of data and research flow through my inbox, but a recent report from Rackspace Technology really caught my attention.<br/><br/>According to a recent survey performed by this provider of multi-cloud services and security, two of the top cybersecurity challenges facing companies is a shortage of workers with cybersecurity skills – listed by 39% of respondents, and a lack of visibility of vulnerabilities across all infrastructure – listed by 42% of respondents.<br/><br/>While skills gap issues permeate throughout all sectors of the manufacturing landscape, it’s simultaneously encouraging and chilling to see that nearly 2 in 5 companies know they need more cybersecurity expertise, but are unable to find it.<br/><br/>Similarly, there are some positive takeaways from seeing that enterprises are aware of their lack of knowledge to key vulnerabilities, but concerning that such a higher percentage are dealing with this kind of problem. Both findings help reinforce the dangerous times in which the industrial sector continues to operate. </p><p>Joining us to discuss this situation is Gary Alterson, Vice President of Security at Rackspace Technology.<br/><br/>For more information on the work Rackspace does, you can go to <a href='https://www.rackspace.com/'>rackspace.com</a></p><p> To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>On a daily basis I see a tremendous amount of data and research flow through my inbox, but a recent report from Rackspace Technology really caught my attention.<br/><br/>According to a recent survey performed by this provider of multi-cloud services and security, two of the top cybersecurity challenges facing companies is a shortage of workers with cybersecurity skills – listed by 39% of respondents, and a lack of visibility of vulnerabilities across all infrastructure – listed by 42% of respondents.<br/><br/>While skills gap issues permeate throughout all sectors of the manufacturing landscape, it’s simultaneously encouraging and chilling to see that nearly 2 in 5 companies know they need more cybersecurity expertise, but are unable to find it.<br/><br/>Similarly, there are some positive takeaways from seeing that enterprises are aware of their lack of knowledge to key vulnerabilities, but concerning that such a higher percentage are dealing with this kind of problem. Both findings help reinforce the dangerous times in which the industrial sector continues to operate. </p><p>Joining us to discuss this situation is Gary Alterson, Vice President of Security at Rackspace Technology.<br/><br/>For more information on the work Rackspace does, you can go to <a href='https://www.rackspace.com/'>rackspace.com</a></p><p> To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11698455-no-place-to-hide-when-you-have-money-and-data.mp3" length="15856887" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7liev77inoz0i55bgluvenno9ohj?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11698455</guid>
    <pubDate>Tue, 15 Nov 2022 10:00:00 -0500</pubDate>
    <itunes:duration>1306</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>From Attacking ISIS to Industrial Controls - Is GhostSec a Hacktivist or Threat?</itunes:title>
    <title>From Attacking ISIS to Industrial Controls - Is GhostSec a Hacktivist or Threat?</title>
    <itunes:summary><![CDATA[Send us Fan Mail GhostSec describes itself as a hacktivist group. Formed around 2015, the organization’s initial focus was shutting down ISIS websites and infiltrating their social media platforms.  Recently, the organization has been linked to politically-motivated attacks involving PLCs and other industrial controls in Israel, Iran and Russia. All of which have focused on vulnerabilities found within industrial equipment controls. The biggest question for the industrial community is if...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>GhostSec describes itself as a hacktivist group. Formed around 2015, the organization’s initial focus was shutting down ISIS websites and infiltrating their social media platforms. </p><p>Recently, the organization has been linked to politically-motivated attacks involving PLCs and other industrial controls in Israel, Iran and Russia. All of which have focused on vulnerabilities found within industrial equipment controls.</p><p>The biggest question for the industrial community is if GhostSec can show others how relatively simple it is to take control of  industrial control systems – will those learning from GhostSec take it to another level? </p><p>Joining us to discuss this situation is Matan Dobrushin, VP of Research at OTORIO. Based in Israel, the company is a leader in industrial cybersecurity solutions and services.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>GhostSec describes itself as a hacktivist group. Formed around 2015, the organization’s initial focus was shutting down ISIS websites and infiltrating their social media platforms. </p><p>Recently, the organization has been linked to politically-motivated attacks involving PLCs and other industrial controls in Israel, Iran and Russia. All of which have focused on vulnerabilities found within industrial equipment controls.</p><p>The biggest question for the industrial community is if GhostSec can show others how relatively simple it is to take control of  industrial control systems – will those learning from GhostSec take it to another level? </p><p>Joining us to discuss this situation is Matan Dobrushin, VP of Research at OTORIO. Based in Israel, the company is a leader in industrial cybersecurity solutions and services.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11655465-from-attacking-isis-to-industrial-controls-is-ghostsec-a-hacktivist-or-threat.mp3" length="16135020" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4a18i6826ttefi8vhuzo8qioz0ai?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11655465</guid>
    <pubDate>Tue, 08 Nov 2022 11:00:00 -0500</pubDate>
    <podcast:soundbite startTime="194.35" duration="53.0" />
    <itunes:duration>1332</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware, industrial infrastructure, Stuxnet virus, usb stick, Tenable, FBI, Ransomware Ecosystem, digital crime, DarkSide, hacker, IBM,</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Darknet Diaries Host Lifts the Veil on Cyberattack Secrecy</itunes:title>
    <title>Darknet Diaries Host Lifts the Veil on Cyberattack Secrecy</title>
    <itunes:summary><![CDATA[Send us Fan Mail Ironically enough, one of the biggest challenges surrounding cyber defense in the industrial sector is a lack of data – data about the attacks, the attackers, their tactics and how they were able to successfully orchestrate the onslaught of ransomware, phishing and malware schemes that are costing manufacturers millions of dollars and priceless amounts of downtime.  Working to overcome the lack of transparency is the focus of today’s guest.   Jack Rhysider is the ho...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Ironically enough, one of the biggest challenges surrounding cyber defense in the industrial sector is a lack of data – data about the attacks, the attackers, their tactics and how they were able to successfully orchestrate the onslaught of ransomware, phishing and malware schemes that are costing manufacturers millions of dollars and priceless amounts of downtime. </p><p>Working to overcome the lack of transparency is the focus of today’s guest.  </p><p><a href='https://twitter.com/JackRhysider'>Jack Rhysider</a> is the host and founder of the <a href='https://darknetdiaries.com/'><em>Darknet Diaries</em></a> podcast, where he takes listeners on a journey through the world of hacking, data breaches, and cybercrimes. He’s talked to hackers, phishing scheme experts, NSA agents, penetration testers and just about any other player you can imagine. </p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net'>Manufacturing.net,</a> <a href='https://www.ien.com'>IEN.com</a> or <a href='https://www.mbtmag.com'>MBTmag.com</a>. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Ironically enough, one of the biggest challenges surrounding cyber defense in the industrial sector is a lack of data – data about the attacks, the attackers, their tactics and how they were able to successfully orchestrate the onslaught of ransomware, phishing and malware schemes that are costing manufacturers millions of dollars and priceless amounts of downtime. </p><p>Working to overcome the lack of transparency is the focus of today’s guest.  </p><p><a href='https://twitter.com/JackRhysider'>Jack Rhysider</a> is the host and founder of the <a href='https://darknetdiaries.com/'><em>Darknet Diaries</em></a> podcast, where he takes listeners on a journey through the world of hacking, data breaches, and cybercrimes. He’s talked to hackers, phishing scheme experts, NSA agents, penetration testers and just about any other player you can imagine. </p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net'>Manufacturing.net,</a> <a href='https://www.ien.com'>IEN.com</a> or <a href='https://www.mbtmag.com'>MBTmag.com</a>. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11580380-darknet-diaries-host-lifts-the-veil-on-cyberattack-secrecy.mp3" length="20372555" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o56vn5gt3vhjgw6xwnvw4mrkok47?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11580380</guid>
    <pubDate>Thu, 27 Oct 2022 12:00:00 -0400</pubDate>
    <podcast:soundbite startTime="393.017" duration="58.5" />
    <itunes:duration>1681</itunes:duration>
    <itunes:keywords>Darknet Diaries, Jack Rhysider, Darkcyber security, hackers, spam, ransomware, industrial infrastructure, Stuxnet virus, usb stick, Tenable, FBI, Ransomware Ecosystem, digital crime, DarkSide, hacker, IBM,</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Hack You Helped Create</itunes:title>
    <title>The Hack You Helped Create</title>
    <itunes:summary><![CDATA[Send us Fan Mail Welcome to Security Breach.  Today we’re going to discus a vulnerability within the industrial sector that is essentially a product of progress.   The enhanced data sharing capabilities and operational efficiencies that have been realized in establishing an estimated 20 billion device connections in manufacturing enterprises around the globe have come at a price for some.  In the sector’s zeal to push forward with digital transformation plans and realize the benefits of autom...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Welcome to Security Breach.<br/><br/>Today we’re going to discus a vulnerability within the industrial sector that is essentially a product of progress. <br/><br/>The enhanced data sharing capabilities and operational efficiencies that have been realized in establishing an estimated 20 billion device connections in manufacturing enterprises around the globe have come at a price for some.<br/><br/>In the sector’s zeal to push forward with digital transformation plans and realize the benefits of automation, software and data-driven production schemes, all of these connection points offer a soft spot for hackers to probe and pinpoint in launching various types of attacks.<br/><br/>Joining us to discuss this evolving situation and offer some in-depth analysis from his company’s recent report – The API Security Disconnect - is Filip Verloy, Technical Evangelist at <a href='https://nonamesecurity.com/'>Noname Security.</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Welcome to Security Breach.<br/><br/>Today we’re going to discus a vulnerability within the industrial sector that is essentially a product of progress. <br/><br/>The enhanced data sharing capabilities and operational efficiencies that have been realized in establishing an estimated 20 billion device connections in manufacturing enterprises around the globe have come at a price for some.<br/><br/>In the sector’s zeal to push forward with digital transformation plans and realize the benefits of automation, software and data-driven production schemes, all of these connection points offer a soft spot for hackers to probe and pinpoint in launching various types of attacks.<br/><br/>Joining us to discuss this evolving situation and offer some in-depth analysis from his company’s recent report – The API Security Disconnect - is Filip Verloy, Technical Evangelist at <a href='https://nonamesecurity.com/'>Noname Security.</a><br/><br/>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11524081-the-hack-you-helped-create.mp3" length="14009711" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o1axyuljivwahl2nf5w542jatsco?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11524081</guid>
    <pubDate>Tue, 18 Oct 2022 15:00:00 -0400</pubDate>
    <podcast:soundbite startTime="780.0" duration="52.0" />
    <itunes:duration>1153</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Cloud is on Fire - Promise vs. Problem</itunes:title>
    <title>The Cloud is on Fire - Promise vs. Problem</title>
    <itunes:summary><![CDATA[Send us Fan Mail Today we’re going to discuss an evolving vulnerability in the industrial sector – the security of cloud data and networks. We’re obviously talking about the use of IT infrastructure that’s not physically located within the plant or facility.  It’s a platform that is continuing to see an uptick in use. In fact, Netwrix, a leading cloud network security solutions provider, recently cited in their latest Cloud Data Security Report, that organizations expect to increase the ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Today we’re going to discuss an evolving vulnerability in the industrial sector – the security of cloud data and networks. We’re obviously talking about the use of IT infrastructure that’s not physically located within the plant or facility. </p><p>It’s a platform that is continuing to see an uptick in use. In fact, <a href='https://www.Netwrix.com'>Netwrix</a>, a leading cloud network security solutions provider, recently cited in their latest <em>Cloud Data Security Report,</em> that organizations expect to increase the amount of work done in the cloud from 41 percent to 54 percent by the end of 2023.<br/><br/>More specifically, this means an increased reliance on cloud storage for corporate financial information and intellectual property.</p><p>And while this is good news to cloud service providers, they’re apparently not the only ones enjoying this trend. Netwrix also cited that 53 percent of those surveyed suffered a cyberattack targeting their cloud network within the last 12 months.</p><p>But perhaps the most frightening statistic from the report is that despite these findings, 78 percent said they were satisfied with their cloud security. </p><p>Joining us to discuss these findings and the current state of industrial cybersecurity is Dirk Schrader, VP of Security Research at Netwrix.</p><p>For more information on the work Netwrix does, you can go to <a href='https://www.netwrix.com'>netwrix.com</a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Today we’re going to discuss an evolving vulnerability in the industrial sector – the security of cloud data and networks. We’re obviously talking about the use of IT infrastructure that’s not physically located within the plant or facility. </p><p>It’s a platform that is continuing to see an uptick in use. In fact, <a href='https://www.Netwrix.com'>Netwrix</a>, a leading cloud network security solutions provider, recently cited in their latest <em>Cloud Data Security Report,</em> that organizations expect to increase the amount of work done in the cloud from 41 percent to 54 percent by the end of 2023.<br/><br/>More specifically, this means an increased reliance on cloud storage for corporate financial information and intellectual property.</p><p>And while this is good news to cloud service providers, they’re apparently not the only ones enjoying this trend. Netwrix also cited that 53 percent of those surveyed suffered a cyberattack targeting their cloud network within the last 12 months.</p><p>But perhaps the most frightening statistic from the report is that despite these findings, 78 percent said they were satisfied with their cloud security. </p><p>Joining us to discuss these findings and the current state of industrial cybersecurity is Dirk Schrader, VP of Security Research at Netwrix.</p><p>For more information on the work Netwrix does, you can go to <a href='https://www.netwrix.com'>netwrix.com</a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11352572-the-cloud-is-on-fire-promise-vs-problem.mp3" length="15532558" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3qdibd5bs5gfgz45yf5mo6lhsdm4?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11352572</guid>
    <pubDate>Tue, 20 Sep 2022 11:00:00 -0400</pubDate>
    <podcast:soundbite startTime="249.0" duration="59.5" />
    <itunes:duration>1277</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware, industrial infrastructure, Stuxnet virus, usb stick, FBI, Ransomware Ecosystem, digital crime, DarkSide, hacker,</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When Cyber Gangs &#39;Get Loud&#39; - Responding to Dynamite Panda, LockBit and Others</itunes:title>
    <title>When Cyber Gangs &#39;Get Loud&#39; - Responding to Dynamite Panda, LockBit and Others</title>
    <itunes:summary><![CDATA[Send us Fan Mail When discussing the industrial sector’s threat landscape, we often detail events that result from vulnerabilities discovered by hackers probing for soft spots within an organization’s networks, connected infrastructure or data storage centers. However, taking a look at Nuspire’s latest Threat Landscape Report reiterates the need for manufacturers to keep their defenses up even when working with documents, files or websites that would appear to have limited interest from hacke...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When discussing the industrial sector’s threat landscape, we often detail events that result from vulnerabilities discovered by hackers probing for soft spots within an organization’s networks, connected infrastructure or data storage centers.</p><p>However, taking a look at Nuspire’s latest <a href='https://www.nuspire.com/blog/nuspire-sees-dramatic-uptick-in-q2-2022-threat-activity/'><em>Threat Landscape Report</em></a> reiterates the need for manufacturers to keep their defenses up even when working with documents, files or websites that would appear to have limited interest from hackers and no connection points to outside parties.<br/><br/>Nuspire reported a 28 percent increase in malware attacks – or about 52,000 detections a day during the second quarter of 2022. While many are being detected and blocked before being seen by the user, some are getting through by disguising themselves as add-ons or support tools for Microsoft Office documents. </p><p>Once the user clicks for additional information within these software programs, which contain embedded on-line connections in providing legitimate support and downloadable tools, the malware is downloaded, providing a gateway to any and all of that user’s network, cloud, system and software connections.</p><p>During this same period, the company reported a 100 percent increase in botnet activity – reaching a rate of nearly 20,000 attacks per day. This form of malware attaches itself to web pages and emails. Once it is unintentionally downloaded via the targeted user clicking on a link or agreeing to download a false asset, the bug can log keystrokes in stealing login and other personal information that often feeds into ransomware attacks.</p><p>Joining us to discuss these ongoing threats is Mike Pedrick, VP of Cybersecurity Consulting for <a href='https://www.nuspire.com'>Nuspire</a> – a leading managed security services provider.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When discussing the industrial sector’s threat landscape, we often detail events that result from vulnerabilities discovered by hackers probing for soft spots within an organization’s networks, connected infrastructure or data storage centers.</p><p>However, taking a look at Nuspire’s latest <a href='https://www.nuspire.com/blog/nuspire-sees-dramatic-uptick-in-q2-2022-threat-activity/'><em>Threat Landscape Report</em></a> reiterates the need for manufacturers to keep their defenses up even when working with documents, files or websites that would appear to have limited interest from hackers and no connection points to outside parties.<br/><br/>Nuspire reported a 28 percent increase in malware attacks – or about 52,000 detections a day during the second quarter of 2022. While many are being detected and blocked before being seen by the user, some are getting through by disguising themselves as add-ons or support tools for Microsoft Office documents. </p><p>Once the user clicks for additional information within these software programs, which contain embedded on-line connections in providing legitimate support and downloadable tools, the malware is downloaded, providing a gateway to any and all of that user’s network, cloud, system and software connections.</p><p>During this same period, the company reported a 100 percent increase in botnet activity – reaching a rate of nearly 20,000 attacks per day. This form of malware attaches itself to web pages and emails. Once it is unintentionally downloaded via the targeted user clicking on a link or agreeing to download a false asset, the bug can log keystrokes in stealing login and other personal information that often feeds into ransomware attacks.</p><p>Joining us to discuss these ongoing threats is Mike Pedrick, VP of Cybersecurity Consulting for <a href='https://www.nuspire.com'>Nuspire</a> – a leading managed security services provider.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11237055-when-cyber-gangs-get-loud-responding-to-dynamite-panda-lockbit-and-others.mp3" length="17432063" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3ugcfp7codjjuel2rywdi5485ftg?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11237055</guid>
    <pubDate>Wed, 31 Aug 2022 12:00:00 -0400</pubDate>
    <podcast:soundbite startTime="369.0" duration="53.0" />
    <itunes:duration>1437</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware, industrial infrastructure, Stuxnet virus, usb stick, FBI, Ransomware Ecosystem, digital crime, DarkSide, hacker,</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Lessons Learned from DarkSide and the Solar Winds Hack</itunes:title>
    <title>Lessons Learned from DarkSide and the Solar Winds Hack</title>
    <itunes:summary><![CDATA[Send us Fan Mail When the Eastern European hacker group DarkSide shut down the Colonial Pipeline in May of 2021, the ramifications were felt across numerous landscapes. In addition to impacting air travel and triggering panic over gasoline availability, the six-day interruption of fuel to much of the Eastern United States led to one of the highest profile ransomware payments in recent history.  Although law enforcement was able to track down and recover more than half of the $4.4 million in B...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When the Eastern European hacker group DarkSide shut down the Colonial Pipeline in May of 2021, the ramifications were felt across numerous landscapes.</p><p>In addition to impacting air travel and triggering panic over gasoline availability, the six-day interruption of fuel to much of the Eastern United States led to one of the highest profile ransomware payments in recent history.<br/><br/>Although law enforcement was able to track down and recover more than half of the $4.4 million in Bitcoin that Colonial paid the ransomware attackers, two critical points had been made: the U.S. industrial sector was vulnerable, and they were willing to pay to restore operations.</p><p>In support of the increasing concerns facing the industrial sector’s cybersecurity needs,<a href='https://www.ibm.com/security/data-breach/threat-intelligence/'> IBM</a> recently reported that manufacturing overtook financial institutions and insurance providers in becoming the most targeted industry by cyber criminals in 2021.</p><p>Joining us to discuss this ongoing threat is Eric Ervin, Global Director for Utilities and Manufacturing at 1898 &amp; Company, a leading provider of data management and business consulting services. </p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>When the Eastern European hacker group DarkSide shut down the Colonial Pipeline in May of 2021, the ramifications were felt across numerous landscapes.</p><p>In addition to impacting air travel and triggering panic over gasoline availability, the six-day interruption of fuel to much of the Eastern United States led to one of the highest profile ransomware payments in recent history.<br/><br/>Although law enforcement was able to track down and recover more than half of the $4.4 million in Bitcoin that Colonial paid the ransomware attackers, two critical points had been made: the U.S. industrial sector was vulnerable, and they were willing to pay to restore operations.</p><p>In support of the increasing concerns facing the industrial sector’s cybersecurity needs,<a href='https://www.ibm.com/security/data-breach/threat-intelligence/'> IBM</a> recently reported that manufacturing overtook financial institutions and insurance providers in becoming the most targeted industry by cyber criminals in 2021.</p><p>Joining us to discuss this ongoing threat is Eric Ervin, Global Director for Utilities and Manufacturing at 1898 &amp; Company, a leading provider of data management and business consulting services. </p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11229214-lessons-learned-from-darkside-and-the-solar-winds-hack.mp3" length="16657378" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jqwam8rkanrgw5ew734n62cx4gb2?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11229214</guid>
    <pubDate>Tue, 30 Aug 2022 10:00:00 -0400</pubDate>
    <itunes:duration>1372</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware, industrial infrastructure, Stuxnet virus, usb stick, Tenable, FBI, Ransomware Ecosystem, digital crime, DarkSide, hacker, IBM, </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Growing (and Frightening) Complexity of Ransomware Groups</itunes:title>
    <title>The Growing (and Frightening) Complexity of Ransomware Groups</title>
    <itunes:summary><![CDATA[Send us Fan Mail Tenable recently released their Ransomware Ecosystem white paper. So we sat down with Satnam Narang, a research engineer focused on security response at the company, to discuss some its findings, including: The FBI estimates that between 2013 and 2019, ransomware groups collectively earned over $144 million. That number skyrocketed in in 2020 with these groups reportedly raking in $692 million collectively.According to U.S. government data, the first half of 2021 saw ransomwa...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Tenable recently released their Ransomware Ecosystem white paper. So we sat down with Satnam Narang, a research engineer focused on security response at the company, to discuss some its findings, including:</p><ul><li>The FBI estimates that between 2013 and 2019, ransomware groups collectively earned over $144 million. That number skyrocketed in in 2020 with these groups reportedly raking in $692 million collectively.</li><li>According to U.S. government data, the first half of 2021 saw ransomware payments reach just under $600 million in the first six months, which included a record amount of $40 million paid out by an insurance company. And you can probably guess that these reported amounts are a fraction of the true total being paid to ransomware attackers and groups.</li><li>Additional data is available by downloading the white paper <a href='https://www.tenable.com/cyber-exposure/a-look-inside-the-ransomware-ecosystem'>here</a>.</li></ul><p>For more information on the work Tenable does, you can go to <a href='https://www.tenable.com'>www.tenable.com</a></p><p>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Tenable recently released their Ransomware Ecosystem white paper. So we sat down with Satnam Narang, a research engineer focused on security response at the company, to discuss some its findings, including:</p><ul><li>The FBI estimates that between 2013 and 2019, ransomware groups collectively earned over $144 million. That number skyrocketed in in 2020 with these groups reportedly raking in $692 million collectively.</li><li>According to U.S. government data, the first half of 2021 saw ransomware payments reach just under $600 million in the first six months, which included a record amount of $40 million paid out by an insurance company. And you can probably guess that these reported amounts are a fraction of the true total being paid to ransomware attackers and groups.</li><li>Additional data is available by downloading the white paper <a href='https://www.tenable.com/cyber-exposure/a-look-inside-the-ransomware-ecosystem'>here</a>.</li></ul><p>For more information on the work Tenable does, you can go to <a href='https://www.tenable.com'>www.tenable.com</a></p><p>To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/11030575-the-growing-and-frightening-complexity-of-ransomware-groups.mp3" length="12042298" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rm1dvx92msq5ho0meiscptxjct66?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11030575</guid>
    <pubDate>Tue, 26 Jul 2022 11:00:00 -0400</pubDate>
    <podcast:soundbite startTime="11.0" duration="60.0" />
    <itunes:duration>987</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware, industrial infrastructure, Stuxnet virus, usb stick, Tenable, FBI, Ransomware Ecosystem, digital crime</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Breaking Down the Silos</itunes:title>
    <title>Breaking Down the Silos</title>
    <itunes:summary><![CDATA[Send us Fan Mail A great deal of cybersecurity attention, and rightfully so, is paid to the role of defending against and responding to outside attackers. However, just as important to establishing and reinforcing cyber plans is ensuring that internal vulnerabilities are not created or made easier to detect through systems, networks and new technologies that are introduced to the industrial infrastructure, albeit with the best of intentions. However, the influx of handheld devices and mobile ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>A great deal of cybersecurity attention, and rightfully so, is paid to the role of defending against and responding to outside attackers. However, just as important to establishing and reinforcing cyber plans is ensuring that internal vulnerabilities are not created or made easier to detect through systems, networks and new technologies that are introduced to the industrial infrastructure, albeit with the best of intentions.</p><p>However, the influx of handheld devices and mobile computing power can lead to the unintentional injection of numerous cybersecurity issues. One only needs to look at the history of the Stuxnet virus for proof of how something as simple as a USB stick can lead to massive and often irreparable damage. </p><p>To help lend some insight on such potential security issues is Todd Greenwald. He serves as the president of Heartland – a McHenry, Illinois-based company that works with the industrial sector to improve business operations through technology integration, process implementation and network redesign. Heartland’s specialties include wireless infrastructure, network security, mobile computing, automated data collection systems, and more. </p><p>For more information on the work Heartland does, you can go to <a href='https://www.heartland-usa.com'>www.heartland-usa.com.</a> </p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>A great deal of cybersecurity attention, and rightfully so, is paid to the role of defending against and responding to outside attackers. However, just as important to establishing and reinforcing cyber plans is ensuring that internal vulnerabilities are not created or made easier to detect through systems, networks and new technologies that are introduced to the industrial infrastructure, albeit with the best of intentions.</p><p>However, the influx of handheld devices and mobile computing power can lead to the unintentional injection of numerous cybersecurity issues. One only needs to look at the history of the Stuxnet virus for proof of how something as simple as a USB stick can lead to massive and often irreparable damage. </p><p>To help lend some insight on such potential security issues is Todd Greenwald. He serves as the president of Heartland – a McHenry, Illinois-based company that works with the industrial sector to improve business operations through technology integration, process implementation and network redesign. Heartland’s specialties include wireless infrastructure, network security, mobile computing, automated data collection systems, and more. </p><p>For more information on the work Heartland does, you can go to <a href='https://www.heartland-usa.com'>www.heartland-usa.com.</a> </p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10986496-breaking-down-the-silos.mp3" length="13534397" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/z8qnxoynzef7vwxto78iewdq2qf2?.jpg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10986496</guid>
    <pubDate>Tue, 19 Jul 2022 11:00:00 -0400</pubDate>
    <itunes:duration>1112</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware, industrial infrastructure, Stuxnet virus, usb stick</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Latest Tools of Choice for Hackers: Raspberry Robin and BlackCat</itunes:title>
    <title>Latest Tools of Choice for Hackers: Raspberry Robin and BlackCat</title>
    <itunes:summary><![CDATA[Send us Fan Mail What else can we say as it relates to the industrial sector and the cybersecurity threats that continue to present themselves, other than – the battle wages on. The value of the sector’s IP, the plethora of personal information and the vital need to maintain uptime makes manufacturing a favorite target of hackers. And as those in the financial and healthcare markets know all too well, recognition of the threat only seems to spur the creation of new and better weapons focused ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>What else can we say as it relates to the industrial sector and the cybersecurity threats that continue to present themselves, other than – the battle wages on.</p><p>The value of the sector’s IP, the plethora of personal information and the vital need to maintain uptime makes manufacturing a favorite target of hackers. And as those in the financial and healthcare markets know all too well, recognition of the threat only seems to spur the creation of new and better weapons focused on wreaking havoc. </p><p>So, joining us today to discuss some of the latest threats to hit the industrial sector is Lauren Podber – she’s a Principal Intelligence Analyst at Red Canary, firm that specializes in managing cybersecurity endpoint detection, planning and response. They were also among the first to assess the first threat we’re going to discuss – Raspberry Robin.</p><p> For more information on the work Red Canary does, you can go to <a href='https://www.redcanary.com'>www.redcanary.com</a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>What else can we say as it relates to the industrial sector and the cybersecurity threats that continue to present themselves, other than – the battle wages on.</p><p>The value of the sector’s IP, the plethora of personal information and the vital need to maintain uptime makes manufacturing a favorite target of hackers. And as those in the financial and healthcare markets know all too well, recognition of the threat only seems to spur the creation of new and better weapons focused on wreaking havoc. </p><p>So, joining us today to discuss some of the latest threats to hit the industrial sector is Lauren Podber – she’s a Principal Intelligence Analyst at Red Canary, firm that specializes in managing cybersecurity endpoint detection, planning and response. They were also among the first to assess the first threat we’re going to discuss – Raspberry Robin.</p><p> For more information on the work Red Canary does, you can go to <a href='https://www.redcanary.com'>www.redcanary.com</a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10843250-latest-tools-of-choice-for-hackers-raspberry-robin-and-blackcat.mp3" length="8727387" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/aizle2sogthjw9lks1x9p3nb3cm5?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10843250</guid>
    <pubDate>Thu, 23 Jun 2022 11:00:00 -0400</pubDate>
    <podcast:soundbite startTime="266.0" duration="52.0" />
    <itunes:duration>723</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware, BlackCat</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Revisiting the JBS Ransomware Attack One Year Later</itunes:title>
    <title>Revisiting the JBS Ransomware Attack One Year Later</title>
    <itunes:summary><![CDATA[Send us Fan Mail JBS Foods is a $30B meat processor that most people didn’t know about until they paid ransomware attackers REvil $11M last June in order to get plants in the U.S. and Brazil up and running, and prevent what is believed to be up to 5 TB of data from being leaked. According to SecurityScorecard.com, the hackers obtained leaked credentials from employees in Australia and began probing the company’s network and extracting data three months prior to issuing their demands. Security...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>JBS Foods is a $30B meat processor that most people didn’t know about until they paid ransomware attackers REvil $11M last June in order to get plants in the U.S. and Brazil up and running, and prevent what is believed to be up to 5 TB of data from being leaked.</p><p>According to SecurityScorecard.com, the hackers obtained leaked credentials from employees in Australia and began probing the company’s network and extracting data three months prior to issuing their demands.</p><p>SecurityScorecard estimates that over 20 percent of food companies have a known vulnerability, and nearly 400 have suffered a breach and/or attack. </p><p>To help shed some light on these vulnerabilities, and how to prevent or respond to them, we’re excited to welcome Matt Parsons, Director of Network and Security Product Management at Sungard Availability Services to the program. Sungard is a leading provider of network and cloud computing security services.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>JBS Foods is a $30B meat processor that most people didn’t know about until they paid ransomware attackers REvil $11M last June in order to get plants in the U.S. and Brazil up and running, and prevent what is believed to be up to 5 TB of data from being leaked.</p><p>According to SecurityScorecard.com, the hackers obtained leaked credentials from employees in Australia and began probing the company’s network and extracting data three months prior to issuing their demands.</p><p>SecurityScorecard estimates that over 20 percent of food companies have a known vulnerability, and nearly 400 have suffered a breach and/or attack. </p><p>To help shed some light on these vulnerabilities, and how to prevent or respond to them, we’re excited to welcome Matt Parsons, Director of Network and Security Product Management at Sungard Availability Services to the program. Sungard is a leading provider of network and cloud computing security services.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10647011-revisiting-the-jbs-ransomware-attack-one-year-later.mp3" length="10914281" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yzey9dl85jynvc6tpsrtytq2s4jr?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10647011</guid>
    <pubDate>Thu, 19 May 2022 11:00:00 -0400</pubDate>
    <podcast:soundbite startTime="67.646" duration="56.0" />
    <itunes:duration>897</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Hygiene and Putin&#39;s Army of Criminal Hackers</itunes:title>
    <title>Cyber Hygiene and Putin&#39;s Army of Criminal Hackers</title>
    <itunes:summary><![CDATA[Send us Fan Mail The rise in ransomware attacks throughout the industrial sector has led to a surge in another, related activity – the purchasing of cyber insurance to help soften the blow of these attacks. But today’s guest emphasizes that beyond just insurance to cover the costs of these intrusions, the manufacturing sector needs to implement more proactive strategies that encompass prevention and recovery. I’m pleased to welcome Allen Jenkins, VP of Cybersecurity Consulting at InterVision ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The rise in ransomware attacks throughout the industrial sector has led to a surge in another, related activity – the purchasing of cyber insurance to help soften the blow of these attacks.</p><p>But today’s guest emphasizes that beyond just insurance to cover the costs of these intrusions, the manufacturing sector needs to implement more proactive strategies that encompass prevention and recovery.</p><p>I’m pleased to welcome Allen Jenkins, VP of Cybersecurity Consulting at InterVision to this episode of Security Breach. InterVision is a leading provider of services focused on enterprise network security. For more information on the work InterVision does, you can go to www<a href='https://www.intervision.com'>.intervision.com</a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The rise in ransomware attacks throughout the industrial sector has led to a surge in another, related activity – the purchasing of cyber insurance to help soften the blow of these attacks.</p><p>But today’s guest emphasizes that beyond just insurance to cover the costs of these intrusions, the manufacturing sector needs to implement more proactive strategies that encompass prevention and recovery.</p><p>I’m pleased to welcome Allen Jenkins, VP of Cybersecurity Consulting at InterVision to this episode of Security Breach. InterVision is a leading provider of services focused on enterprise network security. For more information on the work InterVision does, you can go to www<a href='https://www.intervision.com'>.intervision.com</a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10646996-cyber-hygiene-and-putin-s-army-of-criminal-hackers.mp3" length="13117360" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a5l2vrv8dbqzanuaf8rcyk2qoto2?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10646996</guid>
    <pubDate>Thu, 19 May 2022 11:00:00 -0400</pubDate>
    <podcast:soundbite startTime="54.0" duration="60.0" />
    <itunes:duration>1080</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Preventing Ransomware Attacks Through Cyber Maintenance</itunes:title>
    <title>Preventing Ransomware Attacks Through Cyber Maintenance</title>
    <itunes:summary><![CDATA[Send us Fan Mail There were a lot of trends emanating from the mid-1980s that thankfully died out over time, but one of them has not only persisted, but thrived. Although there were numerous samples of malware impacting early computer networks, the one that captured both headlines and the admiration of cyber criminals was the PC-Write Trojan virus.  Iterations would follow, with perhaps the best known example of industrial malware – Stuxnet – being introduced about 25 years later. It wou...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>There were a lot of trends emanating from the mid-1980s that thankfully died out over time, but one of them has not only persisted, but thrived. Although there were numerous samples of malware impacting early computer networks, the one that captured both headlines and the admiration of cyber criminals was the PC-Write Trojan virus. </p><p>Iterations would follow, with perhaps the best known example of industrial malware – Stuxnet – being introduced about 25 years later. It would be topped by WannaCry Ransomware just seven years after that. </p><p>In all these cases, bad actors were able to probe vulnerabilities, identify weak spots, and exploit these lapses in erasing data, eliminating access, or promising more extensive damage if their monetary demands were not met. </p><p>These viruses, worms and malicious coding is still present today, and those armed with this malware have gotten smarter, their attacks more complex, and their search for victims more intense. The industrial sector and municipal utilities, with their combination of lucrative IP, essential production models and lagging security protocols, have become a favorite target. </p><p>Joining us today to help navigate this minefield of bad actors is Marty Edwards. He’s the Vice President of OT Security at Tenable – a leading provider of infrastructure and cloud network software and security solutions. </p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>There were a lot of trends emanating from the mid-1980s that thankfully died out over time, but one of them has not only persisted, but thrived. Although there were numerous samples of malware impacting early computer networks, the one that captured both headlines and the admiration of cyber criminals was the PC-Write Trojan virus. </p><p>Iterations would follow, with perhaps the best known example of industrial malware – Stuxnet – being introduced about 25 years later. It would be topped by WannaCry Ransomware just seven years after that. </p><p>In all these cases, bad actors were able to probe vulnerabilities, identify weak spots, and exploit these lapses in erasing data, eliminating access, or promising more extensive damage if their monetary demands were not met. </p><p>These viruses, worms and malicious coding is still present today, and those armed with this malware have gotten smarter, their attacks more complex, and their search for victims more intense. The industrial sector and municipal utilities, with their combination of lucrative IP, essential production models and lagging security protocols, have become a favorite target. </p><p>Joining us today to help navigate this minefield of bad actors is Marty Edwards. He’s the Vice President of OT Security at Tenable – a leading provider of infrastructure and cloud network software and security solutions. </p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10646984-preventing-ransomware-attacks-through-cyber-maintenance.mp3" length="13271666" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/y00joitc405qlccxoy6anqozswfm?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10646984</guid>
    <pubDate>Thu, 19 May 2022 11:00:00 -0400</pubDate>
    <itunes:duration>1091</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&#39;The Industry&#39;s Attack Surface Has Exploded&#39;</itunes:title>
    <title>&#39;The Industry&#39;s Attack Surface Has Exploded&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail The surge in cyberattacks experienced by the industrial sector has been credited to a number of issues ranging from outdated security software to lagging protocols surrounding data access and storage. But, according to today’s guest, one of the main reasons we’ve seen an uptick in these attacks could simply be because they’re more profitable.   Joel Burleson Davis is the CTO of SecureLink – a leading provider of secure access management solutions. He notes that in addition to...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The surge in cyberattacks experienced by the industrial sector has been credited to a number of issues ranging from outdated security software to lagging protocols surrounding data access and storage. But, according to today’s guest, one of the main reasons we’ve seen an uptick in these attacks could simply be because they’re more profitable.</p><p><br/></p><p>Joel Burleson Davis is the CTO of <a href='https://www.securelink.com'>SecureLink</a> – a leading provider of secure access management solutions. He notes that in addition to manufacturing being the second-most targeted sector, it offers the largest average payout for ransomware attacks. </p><p><br/></p><p>So the industrial sector now faces the multi-faceted realities of attacks that are more complex, Russian hackers more emboldened by the Ukrainian conflict, and a greater number of vulnerabilities stemming from an uptick in connected devices throughout manufacturing.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The surge in cyberattacks experienced by the industrial sector has been credited to a number of issues ranging from outdated security software to lagging protocols surrounding data access and storage. But, according to today’s guest, one of the main reasons we’ve seen an uptick in these attacks could simply be because they’re more profitable.</p><p><br/></p><p>Joel Burleson Davis is the CTO of <a href='https://www.securelink.com'>SecureLink</a> – a leading provider of secure access management solutions. He notes that in addition to manufacturing being the second-most targeted sector, it offers the largest average payout for ransomware attacks. </p><p><br/></p><p>So the industrial sector now faces the multi-faceted realities of attacks that are more complex, Russian hackers more emboldened by the Ukrainian conflict, and a greater number of vulnerabilities stemming from an uptick in connected devices throughout manufacturing.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10635924-the-industry-s-attack-surface-has-exploded.mp3" length="13526565" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bs9y1d3lfa6ugllsb1xibna7jdsn?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10635924</guid>
    <pubDate>Tue, 17 May 2022 17:00:00 -0400</pubDate>
    <itunes:duration>1114</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&#39;The Bad Guys Are Smart, Too&#39;</itunes:title>
    <title>&#39;The Bad Guys Are Smart, Too&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail You’ve probably heard a number of reports citing ransomware as the leading attack strategy within the industrial sector. In some instances, it’s been reported that ransomware groups are focusing as much as 70 percent of their activity on manufacturing enterprises.  In one report from ICS security specialist Dragos, it was reported that 65 percent of all attacks thrown at the industrial sector were of the ransomware variety. And according to this episode's guest, cybersec...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>You’ve probably heard a number of reports citing ransomware as the leading attack strategy within the industrial sector. In some instances, it’s been reported that ransomware groups are focusing as much as 70 percent of their activity on manufacturing enterprises. </p><p>In one report from ICS security specialist <a href='https://hub.dragos.com/2021-year-in-review'>Dragos</a>, it was reported that 65 percent of all attacks thrown at the industrial sector were of the ransomware variety. And according to this episode&apos;s guest, cybersecurity attacks like these are never a one-and-done occurrence, meaning on-going vigilance against ransomware criminals and the like require on-going security diligence. </p><p>Greg Scasny is the CTO of <a href='https://www.blueshiftcyber.com/'>Blueshift Cybersecurity</a>, a provider of security solutions focused on helping small and medium-sized enterprises develop and maintain a security posture that simultaneously defends against attacks while working to preserve ongoing operations.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>You’ve probably heard a number of reports citing ransomware as the leading attack strategy within the industrial sector. In some instances, it’s been reported that ransomware groups are focusing as much as 70 percent of their activity on manufacturing enterprises. </p><p>In one report from ICS security specialist <a href='https://hub.dragos.com/2021-year-in-review'>Dragos</a>, it was reported that 65 percent of all attacks thrown at the industrial sector were of the ransomware variety. And according to this episode&apos;s guest, cybersecurity attacks like these are never a one-and-done occurrence, meaning on-going vigilance against ransomware criminals and the like require on-going security diligence. </p><p>Greg Scasny is the CTO of <a href='https://www.blueshiftcyber.com/'>Blueshift Cybersecurity</a>, a provider of security solutions focused on helping small and medium-sized enterprises develop and maintain a security posture that simultaneously defends against attacks while working to preserve ongoing operations.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10635911-the-bad-guys-are-smart-too.mp3" length="13684358" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9gf1kbvnzfg5br4222ma9tc2s0qk?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10635911</guid>
    <pubDate>Tue, 17 May 2022 17:00:00 -0400</pubDate>
    <podcast:soundbite startTime="63.0" duration="60.0" />
    <itunes:duration>1125</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>DDoS Attacks - (Part II): Preparation is Prevention</itunes:title>
    <title>DDoS Attacks - (Part II): Preparation is Prevention</title>
    <itunes:summary><![CDATA[Send us Fan Mail The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom.  Just as you continue to develop new strategies to respond to hacks and protect you digital presence, these bad actors are continuing to update ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom. </p><p>Just as you continue to develop new strategies to respond to hacks and protect you digital presence, these bad actors are continuing to update and enhance their schemes in order to improve the success rate of their attacks. </p><p>In an effort to help counter these bad actors and stay a step ahead, NETSCOUT Systems recently unveiled their bi-annual Threat Intelligence Report. It offers insight on the continued threats presented by Distributed Denial of Service and ransomware attacks. </p><p>To help walk us through the report and offer additional insight on some of the new tactics being utilized to carry out these legacy cybersecurity attacks is NETSCOUT’s Threat Intelligence Lead, Richard Hummel.</p><p>For more information on the work NETSCOUT does, you can go to <a href='http://www.netscout.com/'>netscout.com</a>. And to get a look at their recent report, you can go to <a href='https://www.netscout.com/threatreport'>https://www.netscout.com/threatreport</a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom. </p><p>Just as you continue to develop new strategies to respond to hacks and protect you digital presence, these bad actors are continuing to update and enhance their schemes in order to improve the success rate of their attacks. </p><p>In an effort to help counter these bad actors and stay a step ahead, NETSCOUT Systems recently unveiled their bi-annual Threat Intelligence Report. It offers insight on the continued threats presented by Distributed Denial of Service and ransomware attacks. </p><p>To help walk us through the report and offer additional insight on some of the new tactics being utilized to carry out these legacy cybersecurity attacks is NETSCOUT’s Threat Intelligence Lead, Richard Hummel.</p><p>For more information on the work NETSCOUT does, you can go to <a href='http://www.netscout.com/'>netscout.com</a>. And to get a look at their recent report, you can go to <a href='https://www.netscout.com/threatreport'>https://www.netscout.com/threatreport</a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10632920-ddos-attacks-part-ii-preparation-is-prevention.mp3" length="9063798" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/iohiex23hehy18gwf187put4hikg?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10632920</guid>
    <pubDate>Tue, 17 May 2022 09:00:00 -0400</pubDate>
    <itunes:duration>741</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>DDoS Attacks (Part 1): &#39;They&#39;re Super Easy and Free&#39;</itunes:title>
    <title>DDoS Attacks (Part 1): &#39;They&#39;re Super Easy and Free&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom.  Just as you continue to develop new strategies to respond to hacks and protect you digital presence, these bad actors are continuing to update ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom. </p><p>Just as you continue to develop new strategies to respond to hacks and protect you digital presence, these bad actors are continuing to update and enhance their schemes in order to improve the success rate of their attacks. </p><p>In an effort to help counter these bad actors and stay a step ahead, NETSCOUT Systems recently unveiled their bi-annual Threat Intelligence Report. It offers insight on the continued threats presented by Distributed Denial of Service and ransomware attacks. </p><p><br/></p><p>To help walk us through the report and offer additional insight on some of the new tactics being utilized to carry out these legacy cybersecurity attacks is NETSCOUT’s Threat Intelligence Lead, Richard Hummel.</p><p>For more information on the work NETSCOUT does, you can go to <a href='http://www.netscout.com'>netscout.com</a>. And to get a look at their recent report, you can go to <a href='https://www.netscout.com/threatreport'>https://www.netscout.com/threatreport</a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom. </p><p>Just as you continue to develop new strategies to respond to hacks and protect you digital presence, these bad actors are continuing to update and enhance their schemes in order to improve the success rate of their attacks. </p><p>In an effort to help counter these bad actors and stay a step ahead, NETSCOUT Systems recently unveiled their bi-annual Threat Intelligence Report. It offers insight on the continued threats presented by Distributed Denial of Service and ransomware attacks. </p><p><br/></p><p>To help walk us through the report and offer additional insight on some of the new tactics being utilized to carry out these legacy cybersecurity attacks is NETSCOUT’s Threat Intelligence Lead, Richard Hummel.</p><p>For more information on the work NETSCOUT does, you can go to <a href='http://www.netscout.com'>netscout.com</a>. And to get a look at their recent report, you can go to <a href='https://www.netscout.com/threatreport'>https://www.netscout.com/threatreport</a></p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10632915-ddos-attacks-part-1-they-re-super-easy-and-free.mp3" length="9092645" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/165u8ypdg3uu87hn2lw6hufifpu4?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10632915</guid>
    <pubDate>Tue, 17 May 2022 09:00:00 -0400</pubDate>
    <itunes:duration>745</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Know Your Enemy</itunes:title>
    <title>Know Your Enemy</title>
    <itunes:summary><![CDATA[Send us Fan Mail While rogue individuals with an agenda and advanced cybersecurity skills are still prevalent, most headline-grabbing hacks are now originating from well-organized, highly talented groups or organizations. Not only does this dynamic provide access to a greater pool of talent, but it makes stopping a multi-faceted attack more difficult. One of the most notorious of these cyber terrorist groups is BlackByte. The Ransomware-as-a-service group recently made headlines by hacking th...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While rogue individuals with an agenda and advanced cybersecurity skills are still prevalent, most headline-grabbing hacks are now originating from well-organized, highly talented groups or organizations. Not only does this dynamic provide access to a greater pool of talent, but it makes stopping a multi-faceted attack more difficult.</p><p>One of the most notorious of these cyber terrorist groups is BlackByte. The Ransomware-as-a-service group recently made headlines by <a href='https://www.mbtmag.com/security/news/22056055/ransomware-gang-says-it-hacked-san-francisco-49ers'>hacking the National Football League’s San Francisco 49ers</a> right before the league’s biggest weekend – the most recent Super Bowl.</p><p>The group was able to exploit a vulnerability in the team’s Microsoft Exchange server and implement a tool called Cobalt Strike. Users were then sent hourly ransom notes via a print bomb to all printers connected to the infected machine. </p><p>While the 49ers have downplayed the impact of the hack, it did result in the release of financial documents that BlackByte posted to a site on the dark web. No ransom demands were made public, but the amount of data actually stolen remains unknown.</p><p>The growing reach, ability and boldness of these groups should give everyone in the industrial sector pause – regardless of your role or job title. If they can access data from a billion-dollar franchise, your IP and financial data is, at least, just as vulnerable.</p><p>The good news is that we have people like Lauren Podber, Principal Intelligence Analyst at <a href='https://www.redcanary.com'>Red Canary</a>, to help guide us in getting ahead of groups like BlackByte. Lauren and her cohorts at Red Canary specialize in managing cybersecurity endpoint detection, planning and response. She recently sat down to discuss BlackByte, the importance of having a response plan at the ready, and what hacks to look out for over the next 12-18 months.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>While rogue individuals with an agenda and advanced cybersecurity skills are still prevalent, most headline-grabbing hacks are now originating from well-organized, highly talented groups or organizations. Not only does this dynamic provide access to a greater pool of talent, but it makes stopping a multi-faceted attack more difficult.</p><p>One of the most notorious of these cyber terrorist groups is BlackByte. The Ransomware-as-a-service group recently made headlines by <a href='https://www.mbtmag.com/security/news/22056055/ransomware-gang-says-it-hacked-san-francisco-49ers'>hacking the National Football League’s San Francisco 49ers</a> right before the league’s biggest weekend – the most recent Super Bowl.</p><p>The group was able to exploit a vulnerability in the team’s Microsoft Exchange server and implement a tool called Cobalt Strike. Users were then sent hourly ransom notes via a print bomb to all printers connected to the infected machine. </p><p>While the 49ers have downplayed the impact of the hack, it did result in the release of financial documents that BlackByte posted to a site on the dark web. No ransom demands were made public, but the amount of data actually stolen remains unknown.</p><p>The growing reach, ability and boldness of these groups should give everyone in the industrial sector pause – regardless of your role or job title. If they can access data from a billion-dollar franchise, your IP and financial data is, at least, just as vulnerable.</p><p>The good news is that we have people like Lauren Podber, Principal Intelligence Analyst at <a href='https://www.redcanary.com'>Red Canary</a>, to help guide us in getting ahead of groups like BlackByte. Lauren and her cohorts at Red Canary specialize in managing cybersecurity endpoint detection, planning and response. She recently sat down to discuss BlackByte, the importance of having a response plan at the ready, and what hacks to look out for over the next 12-18 months.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10628919-know-your-enemy.mp3" length="10256902" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/phhly6mme98sisz8mauw5bnt0bmi?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10628919</guid>
    <pubDate>Mon, 16 May 2022 17:00:00 -0400</pubDate>
    <itunes:duration>838</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Don&#39;t Fear the Hacker — Drop Some S-BOMs</itunes:title>
    <title>Don&#39;t Fear the Hacker — Drop Some S-BOMs</title>
    <itunes:summary><![CDATA[Send us Fan Mail Regardless of the report, survey or research, all data related to industrial cybersecurity makes one thing very clear – the last two years have presented a dangerous uptick in the number of cybersecurity attacks, and the severity of them. So, if knowing is half the battle, the other half is identifying tools to help accomplish the mission. With this in mind, we welcome David Nosibor, Platform Solutions Leads at UL – the well-known leader in global safety certification. Presen...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Regardless of the report, survey or research, all data related to industrial cybersecurity makes one thing very clear – the last two years have presented a dangerous uptick in the number of cybersecurity attacks, and the severity of them.</p><p>So, if knowing is half the battle, the other half is identifying tools to help accomplish the mission. With this in mind, we welcome David Nosibor, Platform Solutions Leads at UL – the well-known leader in global safety certification.</p><p>Presented with the frightening increase in the number of cyberattacks, the organization recently launched the SafeCyber platform to help organizations improve the cybersecurity of connected products throughout the entire lifecycle. This includes identifying current and future vulnerabilities and providing guidance to some of the obstacles currently preventing these issues from being addressed.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Regardless of the report, survey or research, all data related to industrial cybersecurity makes one thing very clear – the last two years have presented a dangerous uptick in the number of cybersecurity attacks, and the severity of them.</p><p>So, if knowing is half the battle, the other half is identifying tools to help accomplish the mission. With this in mind, we welcome David Nosibor, Platform Solutions Leads at UL – the well-known leader in global safety certification.</p><p>Presented with the frightening increase in the number of cyberattacks, the organization recently launched the SafeCyber platform to help organizations improve the cybersecurity of connected products throughout the entire lifecycle. This includes identifying current and future vulnerabilities and providing guidance to some of the obstacles currently preventing these issues from being addressed.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10628897-don-t-fear-the-hacker-drop-some-s-boms.mp3" length="9953626" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nekj6xne6io8388uwzfohxfm0c15?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10628897</guid>
    <pubDate>Mon, 16 May 2022 17:00:00 -0400</pubDate>
    <itunes:duration>783</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ransomware, Log4J and When — not if — You&#39;re Hacked</itunes:title>
    <title>Ransomware, Log4J and When — not if — You&#39;re Hacked</title>
    <itunes:summary><![CDATA[Send us Fan Mail Whether it's the infamous Colonial Pipeline ransomware attack last summer, or an ongoing number of water treatment facility hacks, there’s no doubt that infrastructure facilities have become a favorite target of cyber criminals.  In fact, according to a recent report from Skybox Security, the first half of 2021 saw a 46% year-over-year increase in new OT vulnerabilities within organizations charged with running and maintaining key portions of the U.S.'s infrastructure.  ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Whether it&apos;s the infamous Colonial Pipeline ransomware attack last summer, or an ongoing number of water treatment facility hacks, there’s no doubt that infrastructure facilities have become a favorite target of cyber criminals.<br/><br/>In fact, according to a recent report from <a href='https://www.skyboxsecurity.com/'>Skybox Security</a>, the first half of 2021 saw a 46% year-over-year increase in new OT vulnerabilities within organizations charged with running and maintaining key portions of the U.S.&apos;s infrastructure.   </p><p>In this episode of <em>Security Breach</em>, Alastair Williams, vice president of worldwide systems engineering at Skybox Security,  joins us to help break down some of the social and market factors driving these troubling cybersecurity dynamics. We also discuss ransomware attacks, Log4J challenges, and what he sees as the biggest cybersecurity trends to consider for 2022.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>Whether it&apos;s the infamous Colonial Pipeline ransomware attack last summer, or an ongoing number of water treatment facility hacks, there’s no doubt that infrastructure facilities have become a favorite target of cyber criminals.<br/><br/>In fact, according to a recent report from <a href='https://www.skyboxsecurity.com/'>Skybox Security</a>, the first half of 2021 saw a 46% year-over-year increase in new OT vulnerabilities within organizations charged with running and maintaining key portions of the U.S.&apos;s infrastructure.   </p><p>In this episode of <em>Security Breach</em>, Alastair Williams, vice president of worldwide systems engineering at Skybox Security,  joins us to help break down some of the social and market factors driving these troubling cybersecurity dynamics. We also discuss ransomware attacks, Log4J challenges, and what he sees as the biggest cybersecurity trends to consider for 2022.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10628861-ransomware-log4j-and-when-not-if-you-re-hacked.mp3" length="10248414" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/k25pagjncuypxginh1omdrug7374?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10628861</guid>
    <pubDate>Mon, 16 May 2022 17:00:00 -0400</pubDate>
    <podcast:soundbite startTime="63.0" duration="48.0" />
    <itunes:duration>841</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&#39;Hackers Are Heartless Bastards&#39;</itunes:title>
    <title>&#39;Hackers Are Heartless Bastards&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail If there’s one thing that has become very apparent in dealing with cybersecurity issues throughout the industrial sector, it’s that responding to these challenges means taking a look at things from a different perspective. I recently sat down with Johnny Young, a 35-year veteran of industrial IT and cybersecurity. He’s embraced his role as JohnE Upgrade and launched CyberD.TV - a streaming subscription service devoted to providing comprehensive cybersecurity training. What fo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>If there’s one thing that has become very apparent in dealing with cybersecurity issues throughout the industrial sector, it’s that responding to these challenges means taking a look at things from a different perspective.</p><p>I recently sat down with Johnny Young, a 35-year veteran of industrial IT and cybersecurity. He’s embraced his role as JohnE Upgrade and launched <a href='https://www.cyberd.tv/'>CyberD.TV</a> - a streaming subscription service devoted to providing comprehensive cybersecurity training.</p><p>What follows is the second of two episodes featuring JohnE. Here he talks about some of steps companies can take in guarding against any number of cyberattacks.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>If there’s one thing that has become very apparent in dealing with cybersecurity issues throughout the industrial sector, it’s that responding to these challenges means taking a look at things from a different perspective.</p><p>I recently sat down with Johnny Young, a 35-year veteran of industrial IT and cybersecurity. He’s embraced his role as JohnE Upgrade and launched <a href='https://www.cyberd.tv/'>CyberD.TV</a> - a streaming subscription service devoted to providing comprehensive cybersecurity training.</p><p>What follows is the second of two episodes featuring JohnE. Here he talks about some of steps companies can take in guarding against any number of cyberattacks.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10628837-hackers-are-heartless-bastards.mp3" length="12823454" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8dighno3b2bnz47z4t3m8zrr3183?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10628837</guid>
    <pubDate>Mon, 16 May 2022 17:00:00 -0400</pubDate>
    <itunes:duration>1054</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&#39;Hackers are Lazy. Scammers are Misfits.&#39;</itunes:title>
    <title>&#39;Hackers are Lazy. Scammers are Misfits.&#39;</title>
    <itunes:summary><![CDATA[Send us Fan Mail If there’s one thing that has become very apparent in dealing with cybersecurity issues throughout the industrial sector, it’s that responding to these challenges means taking a look at things from a different perspective. Well, that’s what we have with this episode. I recently sat down with Johnny Young, a 35-year veteran of industrial IT and cybersecurity. He’s embraced his role as JohnE Upgrade and launched CyberD.TV - a streaming subscription service devoted to providing ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>If there’s one thing that has become very apparent in dealing with cybersecurity issues throughout the industrial sector, it’s that responding to these challenges means taking a look at things from a different perspective.</p><p>Well, that’s what we have with this episode. I recently sat down with Johnny Young, a 35-year veteran of industrial IT and cybersecurity. He’s embraced his role as JohnE Upgrade and launched <a href='https://www.cyberd.tv'>CyberD.TV</a> - a streaming subscription service devoted to providing comprehensive cybersecurity training.</p><p>What follows is the first of two episodes featuring JohnE. Here he talks about some of the basic, yet vitally important measures every employee can take in guarding against any number of cyberattacks.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>If there’s one thing that has become very apparent in dealing with cybersecurity issues throughout the industrial sector, it’s that responding to these challenges means taking a look at things from a different perspective.</p><p>Well, that’s what we have with this episode. I recently sat down with Johnny Young, a 35-year veteran of industrial IT and cybersecurity. He’s embraced his role as JohnE Upgrade and launched <a href='https://www.cyberd.tv'>CyberD.TV</a> - a streaming subscription service devoted to providing comprehensive cybersecurity training.</p><p>What follows is the first of two episodes featuring JohnE. Here he talks about some of the basic, yet vitally important measures every employee can take in guarding against any number of cyberattacks.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10628819-hackers-are-lazy-scammers-are-misfits.mp3" length="14278399" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/oh3gdv75cs7o92mo2ysdfd84l5x9?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10628819</guid>
    <pubDate>Mon, 16 May 2022 17:00:00 -0400</pubDate>
    <podcast:soundbite startTime="631.0" duration="55.0" />
    <itunes:duration>1176</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Phishing Schemes Continue to Flourish</itunes:title>
    <title>Why Phishing Schemes Continue to Flourish</title>
    <itunes:summary><![CDATA[Send us Fan Mail In this episode we welcome Theo Zafirakos, the Chief Information Security Officer at Terranova Security, to discuss is company's recently report indicating that the success of phishing schemes continues to escalate. Their findings include data showing that: Nearly one in every five end users (19.8 percent) who received a phishing simulation email clicked on the initial message’s phishing link. 14.4 percent of all end users failed to recognize the simulation’s resulting w...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>In this episode we welcome Theo Zafirakos, the Chief Information Security Officer at Terranova Security, to discuss is company&apos;s recently report indicating that the success of phishing schemes continues to escalate. Their findings include data showing that:</p><ul><li>Nearly one in every five end users (19.8 percent) who received a phishing simulation email clicked on the initial message’s phishing link. </li><li>14.4 percent of all end users failed to recognize the simulation’s resulting webpage as unsafe,  and clicked on the malicious file’s download link.</li><li>This means that the number of initial clickers who ended up downloading the phishing simulation’s webpage file exceeded 70 percent. </li></ul><p>The growing number of remote workers, combined with the amount of personal and enterprise-level data that can be obtained makes the industrial sector an increasingly appealing target. </p><p>Going forward, the security firm feels that the industrial sector will need to do more to increase worker awareness of these attacks in understanding how to respond, or more importantly, how not to react to the messages these attackers use.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>In this episode we welcome Theo Zafirakos, the Chief Information Security Officer at Terranova Security, to discuss is company&apos;s recently report indicating that the success of phishing schemes continues to escalate. Their findings include data showing that:</p><ul><li>Nearly one in every five end users (19.8 percent) who received a phishing simulation email clicked on the initial message’s phishing link. </li><li>14.4 percent of all end users failed to recognize the simulation’s resulting webpage as unsafe,  and clicked on the malicious file’s download link.</li><li>This means that the number of initial clickers who ended up downloading the phishing simulation’s webpage file exceeded 70 percent. </li></ul><p>The growing number of remote workers, combined with the amount of personal and enterprise-level data that can be obtained makes the industrial sector an increasingly appealing target. </p><p>Going forward, the security firm feels that the industrial sector will need to do more to increase worker awareness of these attacks in understanding how to respond, or more importantly, how not to react to the messages these attackers use.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10628785-why-phishing-schemes-continue-to-flourish.mp3" length="10437913" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/s3jqlx0569sk8ym2bbzg7r4zxo2b?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10628785</guid>
    <pubDate>Mon, 16 May 2022 17:00:00 -0400</pubDate>
    <podcast:soundbite startTime="365.583" duration="56.5" />
    <itunes:duration>846</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside a Phishing Scheme</itunes:title>
    <title>Inside a Phishing Scheme</title>
    <itunes:summary><![CDATA[Send us Fan Mail In this episode of Security Breach, we're joined by Thierry Aubry, a Sales Executive at Open Systems.  Open Systems recently offered a look inside a phishing scheme and potential malware attack experienced by one of their customers. While this global manufacturer of home and commercial appliances will remain anonymous, Thierry will walk us through how the attack was instigated, how Open Systems was able to respond, and what steps you can take to avoid and respond to pote...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>In this episode of Security Breach, we&apos;re joined by Thierry Aubry, a Sales Executive at <a href='https://www.open-systems.com'>Open Systems</a>. </p><p>Open Systems recently offered a look inside a phishing scheme and potential malware attack experienced by one of their customers. While this global manufacturer of home and commercial appliances will remain anonymous, Thierry will walk us through how the attack was instigated, how Open Systems was able to respond, and what steps you can take to avoid and respond to potential attacks against your systems and proprietary data.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>In this episode of Security Breach, we&apos;re joined by Thierry Aubry, a Sales Executive at <a href='https://www.open-systems.com'>Open Systems</a>. </p><p>Open Systems recently offered a look inside a phishing scheme and potential malware attack experienced by one of their customers. While this global manufacturer of home and commercial appliances will remain anonymous, Thierry will walk us through how the attack was instigated, how Open Systems was able to respond, and what steps you can take to avoid and respond to potential attacks against your systems and proprietary data.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10628749-inside-a-phishing-scheme.mp3" length="11020305" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/azwbkq2wc6b1k36yue1lyelv4tw3?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10628749</guid>
    <pubDate>Mon, 16 May 2022 16:00:00 -0400</pubDate>
    <podcast:soundbite startTime="272.0" duration="58.0" />
    <itunes:duration>903</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Dangerous Reality of Your Cybersecurity Blast Radius</itunes:title>
    <title>The Dangerous Reality of Your Cybersecurity Blast Radius</title>
    <itunes:summary><![CDATA[Send us Fan Mail In this episode of Security Breach, we're joined by Brian Vecci, the Field CTO of Varonis,  - a leading provider of cyber threat detection and response compliance software. Varonis recently published their 2021 Manufacturing Data Risk Report, which offered analysis on threats, trends and potential solutions for a number of market sectors – including manufacturing. Included in their findings was that manufacturing was the fifth most targeted industry last year, with the a...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>In this episode of <em>Security Breach</em>, we&apos;re joined by Brian Vecci, the Field CTO of <a href='https://www.varonis.com/'>Varonis</a>,  - a leading provider of cyber threat detection and response compliance software.</p><p>Varonis recently published their <a href='https://info.varonis.com/hubfs/Files/docs/research_reports/2021-Manufacturing-Data-Risk-Report.pdf'><em>2021 Manufacturing Data Risk Report</em></a>, which offered analysis on threats, trends and potential solutions for a number of market sectors – including manufacturing. Included in their findings was that manufacturing was the fifth most targeted industry last year, with the average data breach costing nearly $5M, and taking over seven months to contain.</p><p><br/></p><p>Overall, Varonis feels the industrial sector’s level of cybersecurity sophistication lags behind many of its peers in the financial and healthcare sectors. We recently sat down to discuss the report, understanding your cybersecurity blast radius, data as a production asset, password protections, and more.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>In this episode of <em>Security Breach</em>, we&apos;re joined by Brian Vecci, the Field CTO of <a href='https://www.varonis.com/'>Varonis</a>,  - a leading provider of cyber threat detection and response compliance software.</p><p>Varonis recently published their <a href='https://info.varonis.com/hubfs/Files/docs/research_reports/2021-Manufacturing-Data-Risk-Report.pdf'><em>2021 Manufacturing Data Risk Report</em></a>, which offered analysis on threats, trends and potential solutions for a number of market sectors – including manufacturing. Included in their findings was that manufacturing was the fifth most targeted industry last year, with the average data breach costing nearly $5M, and taking over seven months to contain.</p><p><br/></p><p>Overall, Varonis feels the industrial sector’s level of cybersecurity sophistication lags behind many of its peers in the financial and healthcare sectors. We recently sat down to discuss the report, understanding your cybersecurity blast radius, data as a production asset, password protections, and more.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10628700-the-dangerous-reality-of-your-cybersecurity-blast-radius.mp3" length="14352436" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rqi34oh54hjs9ywoi82mu21inzy7?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10628700</guid>
    <pubDate>Mon, 16 May 2022 16:00:00 -0400</pubDate>
    <podcast:soundbite startTime="158.15" duration="39.0" />
    <itunes:duration>1180</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>There&#39;s a Lot of Reasons October Could Be Terrifying</itunes:title>
    <title>There&#39;s a Lot of Reasons October Could Be Terrifying</title>
    <itunes:summary><![CDATA[Send us Fan Mail In addition to supply chain challenges and labor shortages, one of the biggest issues emerging from the COVID-19 pandemic for the industrial sector has been the huge uptick in cyberattacks. To make things worse, the Center for Strategic and International Studies, after studying cyberattack trends since 2006, says there is a clear pattern wherein these attacks will increase during the month of October, with five offending countries or entities responsible for the majority of t...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>In addition to supply chain challenges and labor shortages, one of the biggest issues emerging from the COVID-19 pandemic for the industrial sector has been the huge uptick in cyberattacks.</p><p>To make things worse, the Center for Strategic and International Studies, after studying cyberattack trends since 2006, says there is a clear pattern wherein these attacks will increase during the month of October, with five offending countries or entities responsible for the majority of the incidents. </p><p><br/></p><p>Based upon analysis, it is predicted that cyberattacks originating in Russia, China, North Korea and Iran will increase this month.</p><p>Joining for the first in a series of episodes discussing new and prevailing cybersecurity challenges confronting the U.S. industrial sector is Adam Kohnke from Madison, WI-based <a href='https://www.infosecinstitute.com/'>Infosec Institute</a> - a leading cybersecurity training and education firm.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/1990015/fan_mail/new">Send us Fan Mail</a></p><p>In addition to supply chain challenges and labor shortages, one of the biggest issues emerging from the COVID-19 pandemic for the industrial sector has been the huge uptick in cyberattacks.</p><p>To make things worse, the Center for Strategic and International Studies, after studying cyberattack trends since 2006, says there is a clear pattern wherein these attacks will increase during the month of October, with five offending countries or entities responsible for the majority of the incidents. </p><p><br/></p><p>Based upon analysis, it is predicted that cyberattacks originating in Russia, China, North Korea and Iran will increase this month.</p><p>Joining for the first in a series of episodes discussing new and prevailing cybersecurity challenges confronting the U.S. industrial sector is Adam Kohnke from Madison, WI-based <a href='https://www.infosecinstitute.com/'>Infosec Institute</a> - a leading cybersecurity training and education firm.</p><p>To catch up on past episodes, you can go to <a href='https://www.manufacturing.net/cybersecurity'><em>Manufacturing.net</em></a><em>, </em><a href='https://www.ien.com/software'><em>IEN.com</em></a> or <a href='https://www.mbtmag.com/cybersecurity'><em>MBTmag.com</em></a>. You can also check<a href='https://ien.formstack.com/forms/industrial_media_security_breach_podcast'><em> Security Breach </em></a>out wherever you get your podcasts, including Apple, Amazon and Overcast. <br/><br/>If you have a cybersecurity story or topic that you’d like to have us explore on <em>Security Breach</em>, you can reach me at <a href='mailto:jeff@ien.com'>jeff@ien.com</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1990015/episodes/10628611-there-s-a-lot-of-reasons-october-could-be-terrifying.mp3" length="10042234" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jc6rxiagi3byba7n4sejjdtzowwb?.jpg" />
    <itunes:author>Eric Sorensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10628611</guid>
    <pubDate>Mon, 16 May 2022 16:00:00 -0400</pubDate>
    <itunes:duration>822</itunes:duration>
    <itunes:keywords>cyber security, hackers, spam, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
