<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/286347.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Cyber Senate Podcast</title>

  <lastBuildDate>Wed, 25 Mar 2026 06:25:18 -0400</lastBuildDate>
  <link>http://www.cybersenate.com/podcast</link>
  <language>en-us</language>
  <copyright>© 2026 Cyber Senate Podcast</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>8921ff24-c8fd-5c77-99f3-b41f44951d6f</podcast:guid>
  <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[The Cyber Senate is a niche, high-value platform dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure. Our podcasts and conferences facilitate information sharing, they educate and inspire public and private sectors to work collectively to overcome barriers to their success. Our audience and guests consist of the most knowledgable high profile subject matter experts in the cybersecurity domain. The Cyber Senate is considered by our community as one of the few platforms "where conversations count." Our focus is on the quality of engagement; quality of guests and attendees, actionable intelligence and relationships that foster progress.]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>critical infrastructure cyber security podcast, cyber senate podcast, industrial control cybersecurity podcast, critical asset cybersecurity</itunes:keywords>
  <itunes:owner>
    <itunes:name>James Nesbitt / Cyber Senate</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/pztihbtsikob10eadvftj20b0dh6?.jpg</url>
     <title>Cyber Senate Podcast</title>
     <link>http://www.cybersenate.com/podcast</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/pztihbtsikob10eadvftj20b0dh6?.jpg" />
  <itunes:category text="Business" />
  <itunes:category text="Technology" />
  <itunes:category text="Business">
    <itunes:category text="Marketing" />
  </itunes:category>
  <item>
    <itunes:title>Investing in Cybersecurity: The ROI Dilemma</itunes:title>
    <title>Investing in Cybersecurity: The ROI Dilemma</title>
    <itunes:summary><![CDATA[In this conversation, David Raviv interviews Jamison Nesbitt, who shares insights from his extensive experience in cybersecurity and event management. They discuss the importance of events for information sharing among C-level executives, the challenges posed by ransomware and supply chain issues, and the role of regulation in ensuring accountability in critical infrastructure.   Jamison emphasizes that collaboration and content-driven discussions are key to successful events, while also...]]></itunes:summary>
    <description><![CDATA[<p>In this conversation, David Raviv interviews Jamison Nesbitt, who shares insights from his extensive experience in cybersecurity and event management. They discuss the importance of events for information sharing among C-level executives, the challenges posed by ransomware and supply chain issues, and the role of regulation in ensuring accountability in critical infrastructure. <br/><br/>Jamison emphasizes that collaboration and content-driven discussions are key to successful events, while also highlighting the need for organizations to be proactive in their cybersecurity measures. In this conversation, David Raviv and Jamison discuss the complexities of data privacy regulations like GDPR, the challenges of balancing airline costs with regulatory compliance, and the importance of cybersecurity investment. T<br/><br/>hey explore the role of AI in cybersecurity, emphasizing the need for responsible use and the human element in innovation. The discussion also highlights the significance of engaging with cybersecurity events and communities to foster collaboration and awareness in critical infrastructure sectors.<br/><br/>Next Cyber Senate events can be found at www.cybersenate.com</p>]]></description>
    <content:encoded><![CDATA[<p>In this conversation, David Raviv interviews Jamison Nesbitt, who shares insights from his extensive experience in cybersecurity and event management. They discuss the importance of events for information sharing among C-level executives, the challenges posed by ransomware and supply chain issues, and the role of regulation in ensuring accountability in critical infrastructure. <br/><br/>Jamison emphasizes that collaboration and content-driven discussions are key to successful events, while also highlighting the need for organizations to be proactive in their cybersecurity measures. In this conversation, David Raviv and Jamison discuss the complexities of data privacy regulations like GDPR, the challenges of balancing airline costs with regulatory compliance, and the importance of cybersecurity investment. T<br/><br/>hey explore the role of AI in cybersecurity, emphasizing the need for responsible use and the human element in innovation. The discussion also highlights the significance of engaging with cybersecurity events and communities to foster collaboration and awareness in critical infrastructure sectors.<br/><br/>Next Cyber Senate events can be found at www.cybersenate.com</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/16288933-investing-in-cybersecurity-the-roi-dilemma.mp3" length="39284972" type="audio/mpeg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16288933</guid>
    <pubDate>Tue, 17 Dec 2024 08:00:00 +0000</pubDate>
    <itunes:duration>3270</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mapping Regulatory Framework with Cybersecurity for Railways short interview European Union Agency for Railways </itunes:title>
    <title>Mapping Regulatory Framework with Cybersecurity for Railways short interview European Union Agency for Railways </title>
    <itunes:summary><![CDATA[ERTMS Unit Project Officer for European Union Agency for Railways discusses Cybersecurity with Cyber Senate at the 10th annual Rail Cybersecurity UK EU conference in London 2024. Learn more at www.railcybersecurity.com or www.cybersenate.com #railcybersecurity ]]></itunes:summary>
    <description><![CDATA[<p>ERTMS Unit Project Officer for European Union Agency for Railways discusses Cybersecurity with Cyber Senate at the 10th annual Rail Cybersecurity UK EU conference in London 2024. Learn more at www.railcybersecurity.com or www.cybersenate.com<br/><a href='https://www.youtube.com/hashtag/railcybersecurity'>#railcybersecurity</a></p>]]></description>
    <content:encoded><![CDATA[<p>ERTMS Unit Project Officer for European Union Agency for Railways discusses Cybersecurity with Cyber Senate at the 10th annual Rail Cybersecurity UK EU conference in London 2024. Learn more at www.railcybersecurity.com or www.cybersenate.com<br/><a href='https://www.youtube.com/hashtag/railcybersecurity'>#railcybersecurity</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/15002200-mapping-regulatory-framework-with-cybersecurity-for-railways-short-interview-european-union-agency-for-railways.mp3" length="1021758" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/s4yyhtl05fdfi4jjmvl8hu4ml45r?.jpg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15002200</guid>
    <pubDate>Fri, 03 May 2024 11:00:00 +0100</pubDate>
    <itunes:duration>80</itunes:duration>
    <itunes:keywords>rail regulation, cybersecurity, rail cybersecurity, mapping framework, cyber senate conferences</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>NIS 2 legistlation and Supply Chain Risk Management for Railways interview with NS Rail Deputy CISO</itunes:title>
    <title>NIS 2 legistlation and Supply Chain Risk Management for Railways interview with NS Rail Deputy CISO</title>
    <itunes:summary><![CDATA[A interview with Joseph Mager, Deputy CISO, NS Cybersecurity for NS Rail Netherlands. This interview took place at the Cyber Senate Rail Cybersecurity UK EU Summit in London 2024. www.railcybersecurity.com or www.cybersenate.com Two main topics that rail sector professionals consider their biggest challenges: NIS 2 legistlation and Supply Chain Risk Management  We hope you enjoy this interview as much as we did working with NS Rail. ]]></itunes:summary>
    <description><![CDATA[<p>A interview with Joseph Mager, Deputy CISO, NS Cybersecurity for NS Rail Netherlands. This interview took place at the Cyber Senate Rail Cybersecurity UK EU Summit in London 2024. www.railcybersecurity.com or www.cybersenate.com<br/>Two main topics that rail sector professionals consider their biggest challenges:<br/>NIS 2 legistlation and Supply Chain Risk Management<br/><br/>We hope you enjoy this interview as much as we did working with NS Rail.</p>]]></description>
    <content:encoded><![CDATA[<p>A interview with Joseph Mager, Deputy CISO, NS Cybersecurity for NS Rail Netherlands. This interview took place at the Cyber Senate Rail Cybersecurity UK EU Summit in London 2024. www.railcybersecurity.com or www.cybersenate.com<br/>Two main topics that rail sector professionals consider their biggest challenges:<br/>NIS 2 legistlation and Supply Chain Risk Management<br/><br/>We hope you enjoy this interview as much as we did working with NS Rail.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/15002189-nis-2-legistlation-and-supply-chain-risk-management-for-railways-interview-with-ns-rail-deputy-ciso.mp3" length="1276582" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kuvox6txpz58b396ljnybs9t82kw?.jpg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15002189</guid>
    <pubDate>Fri, 03 May 2024 11:00:00 +0100</pubDate>
    <itunes:duration>101</itunes:duration>
    <itunes:keywords>NS Rail, netherlands rail cybersecurity, railcybersecurity, NIS2 legislation, Supply Chain Risk Management, </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Securing and Simplifying Privileged Remote Operations in the Rail Industry interview with Cyolo</itunes:title>
    <title>Securing and Simplifying Privileged Remote Operations in the Rail Industry interview with Cyolo</title>
    <itunes:summary><![CDATA[Cyolo recently presented at the Rail Cybersecurity UK EU conference 2024 in London. Their presentation was highly valued, "Securing and Simplifying Privileged Remote Operations in the Rail Industry" In this interview they discuss why their solution is a great fit for the rail sector.  Their presentation touched on the following points: Understand how traditional IT remote access and PAM solutions cannot effectively secure operational technology environmentsLearn from the experience of other i...]]></itunes:summary>
    <description><![CDATA[<p>Cyolo recently presented at the Rail Cybersecurity UK EU conference 2024 in London. Their presentation was highly valued, &quot;<em>Securing and Simplifying Privileged Remote Operations in the Rail Industry&quot;<br/></em><b><em>In this interview they discuss why their solution is a great fit for the rail sector. </em></b><em><br/></em>Their presentation touched on the following points:</p><ul><li>Understand how traditional IT remote access and PAM solutions cannot effectively secure operational technology environments</li><li>Learn from the experience of other industry peers in CNI and manufacturing how best to provide simplified yet secure remote access</li><li>Understand how best of breed Remote Privileged Remote Access does not require the cloud</li><li>Understand the challenges being faced by Critical National Infrastructure providers securing access to privileged environments</li></ul>]]></description>
    <content:encoded><![CDATA[<p>Cyolo recently presented at the Rail Cybersecurity UK EU conference 2024 in London. Their presentation was highly valued, &quot;<em>Securing and Simplifying Privileged Remote Operations in the Rail Industry&quot;<br/></em><b><em>In this interview they discuss why their solution is a great fit for the rail sector. </em></b><em><br/></em>Their presentation touched on the following points:</p><ul><li>Understand how traditional IT remote access and PAM solutions cannot effectively secure operational technology environments</li><li>Learn from the experience of other industry peers in CNI and manufacturing how best to provide simplified yet secure remote access</li><li>Understand how best of breed Remote Privileged Remote Access does not require the cloud</li><li>Understand the challenges being faced by Critical National Infrastructure providers securing access to privileged environments</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/15002072-securing-and-simplifying-privileged-remote-operations-in-the-rail-industry-interview-with-cyolo.mp3" length="1639258" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cqn7ewboy09n6iys8xmm4lwlbbqh?.jpg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15002072</guid>
    <pubDate>Fri, 03 May 2024 10:00:00 +0100</pubDate>
    <itunes:duration>131</itunes:duration>
    <itunes:keywords>cyolo, rail cybersecurity, railways, cybersecurity for rail, railcybersecurity</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cracking the code for cybersecurity with Siemens Mobility for the Rail Cybersecurity UK EU conference with Cyber Senate</itunes:title>
    <title>Cracking the code for cybersecurity with Siemens Mobility for the Rail Cybersecurity UK EU conference with Cyber Senate</title>
    <itunes:summary><![CDATA[Cracking the code for cybersecurity, interview from the Rail Cybersecurity UK EU 10th annual conference, with Johannes Emmelheinz, CEO Siemens Mobility Customer Services  Cracking the code for cybersecurity  Legislation, such as NIS2, the Cyber Resilience Act and other national cyber regulation, require cybersecurity to be sustained actively by the rail industry. This challenge must be managed by suppliers, integrators and operators jointly with automated, coordinated work...]]></itunes:summary>
    <description><![CDATA[<p>Cracking the code for cybersecurity, interview from the Rail Cybersecurity UK EU 10th annual conference, with Johannes Emmelheinz, CEO Siemens Mobility Customer Services<br/><br/><b>Cracking the code for cybersecurity</b> </p><p>Legislation, such as NIS2, the Cyber Resilience Act and other national cyber regulation, require cybersecurity to be sustained actively by the rail industry.</p><p>This challenge must be managed by suppliers, integrators and operators jointly with automated, coordinated work processes which are supported by tools adapted to the assets.</p><p>The presentation will provide an overview of Siemens Mobility&apos;s comprehensive approach to increase the resilience of its customers.</p><p>Presented through practical examples such as cloud security, vulnerability monitoring and management with decision support for the operators, security monitoring and incident response.</p>]]></description>
    <content:encoded><![CDATA[<p>Cracking the code for cybersecurity, interview from the Rail Cybersecurity UK EU 10th annual conference, with Johannes Emmelheinz, CEO Siemens Mobility Customer Services<br/><br/><b>Cracking the code for cybersecurity</b> </p><p>Legislation, such as NIS2, the Cyber Resilience Act and other national cyber regulation, require cybersecurity to be sustained actively by the rail industry.</p><p>This challenge must be managed by suppliers, integrators and operators jointly with automated, coordinated work processes which are supported by tools adapted to the assets.</p><p>The presentation will provide an overview of Siemens Mobility&apos;s comprehensive approach to increase the resilience of its customers.</p><p>Presented through practical examples such as cloud security, vulnerability monitoring and management with decision support for the operators, security monitoring and incident response.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/15002041-cracking-the-code-for-cybersecurity-with-siemens-mobility-for-the-rail-cybersecurity-uk-eu-conference-with-cyber-senate.mp3" length="1577866" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/sal9xyri52d66v8fsbq1vb197tec?.jpg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15002041</guid>
    <pubDate>Fri, 03 May 2024 10:00:00 +0100</pubDate>
    <itunes:duration>126</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Rail Cybersecurity with DB Regio AG</itunes:title>
    <title>Rail Cybersecurity with DB Regio AG</title>
    <itunes:summary><![CDATA[Cyber Senate had the privilige of having Dr. Andreas Hamprecht, CIO/CDO DB Regio AG join us as a presenter and speaker at the Rail Cybersecurity UK EU conference in London 2024. Here is an extract of an interview our team did with him at the event. We hope you enjoy his insight as much as we enjoyed hearing it and working with him.    ]]></itunes:summary>
    <description><![CDATA[<p>Cyber Senate had the privilige of having Dr. Andreas Hamprecht, CIO/CDO DB Regio AG join us as a presenter and speaker at the Rail Cybersecurity UK EU conference in London 2024. Here is an extract of an interview our team did with him at the event. We hope you enjoy his insight as much as we enjoyed hearing it and working with him. <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Cyber Senate had the privilige of having Dr. Andreas Hamprecht, CIO/CDO DB Regio AG join us as a presenter and speaker at the Rail Cybersecurity UK EU conference in London 2024. Here is an extract of an interview our team did with him at the event. We hope you enjoy his insight as much as we enjoyed hearing it and working with him. <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/15001970-rail-cybersecurity-with-db-regio-ag.mp3" length="2022511" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/z1kz9b3ucs3frpoc37vlramlu6z1?.jpg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15001970</guid>
    <pubDate>Fri, 03 May 2024 10:00:00 +0100</pubDate>
    <itunes:duration>163</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What is it about Operational Technology that makes overcoming the fundamentals so difficult to achieve?</itunes:title>
    <title>What is it about Operational Technology that makes overcoming the fundamentals so difficult to achieve?</title>
    <itunes:summary><![CDATA[As defenders, how are we implementing controls and how do we do it better? Join Jamison Nesbitt and Stefan Liversage for this educational, thought provoking and controversial conversation. The fundamentals are simple; patching, segmentation, malware controls, visibility – but what we are trying to achieve is no easy feat when you look to dismantle more than 20 years of ad hoc OT security measures as there is still risk during the implementation phase. Key points to be discussed: Technical con...]]></itunes:summary>
    <description><![CDATA[<p>As defenders, how are we implementing controls and how do we do it better? Join Jamison Nesbitt and Stefan Liversage for this educational, thought provoking and controversial conversation.</p><p>The fundamentals are simple; patching, segmentation, malware controls, visibility – but what we are trying to achieve is no easy feat when you look to dismantle more than 20 years of ad hoc OT security measures as there is still risk during the implementation phase.</p><p><b>Key points to be discussed:</b></p><ul><li>Technical controls / process and people</li><li>Poor visibility (automation)</li><li>Organisational structure to support OT</li><li>Manage risk faster</li><li>Contain threats quicker</li><li>Minimise impact</li><li>Green field vs brown field</li><li>Skills from the ground up</li><li>Managed services</li><li>Managing multiple streams of activity</li><li>Iterative, agile process, we learn, we move forward</li><li>Rapid threat containment</li></ul>]]></description>
    <content:encoded><![CDATA[<p>As defenders, how are we implementing controls and how do we do it better? Join Jamison Nesbitt and Stefan Liversage for this educational, thought provoking and controversial conversation.</p><p>The fundamentals are simple; patching, segmentation, malware controls, visibility – but what we are trying to achieve is no easy feat when you look to dismantle more than 20 years of ad hoc OT security measures as there is still risk during the implementation phase.</p><p><b>Key points to be discussed:</b></p><ul><li>Technical controls / process and people</li><li>Poor visibility (automation)</li><li>Organisational structure to support OT</li><li>Manage risk faster</li><li>Contain threats quicker</li><li>Minimise impact</li><li>Green field vs brown field</li><li>Skills from the ground up</li><li>Managed services</li><li>Managing multiple streams of activity</li><li>Iterative, agile process, we learn, we move forward</li><li>Rapid threat containment</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/11824122-what-is-it-about-operational-technology-that-makes-overcoming-the-fundamentals-so-difficult-to-achieve.mp3" length="26114711" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xbyyry1693chj8mzcb0bh7egtes3?.jpg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11824122</guid>
    <pubDate>Tue, 06 Dec 2022 16:00:00 +0000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/286347/11824122/transcript" type="text/html" />
    <podcast:soundbite startTime="522.576" duration="15.0" />
    <itunes:duration>2172</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Checks and Balances for Cybersecurity Readiness</itunes:title>
    <title>The Checks and Balances for Cybersecurity Readiness</title>
    <itunes:summary><![CDATA[Cyber Senate had the privilege of catching up with Willi Nelson, CISO, Operational Technologies, Fortinet to discuss their forthcoming presentation on Cyber Preparedness September 29-30th in Celebration Florida, for the 9th annual Control System Cybersecurity USA conference.    Large or small, cyberattacks are making headlines and elevating executive attention toward cyber resiliency. Preparing for, responding to and recovering from cyberattacks should be a strategic part of any business...]]></itunes:summary>
    <description><![CDATA[<p>Cyber Senate had the privilege of catching up with Willi Nelson, CISO, Operational Technologies, Fortinet to discuss their forthcoming presentation on Cyber Preparedness September 29-30th in Celebration Florida, for the <a href='https://www.cybersenate.com/control-systems-cybersecurity-usa/'>9th annual Control System Cybersecurity USA conference.  </a><br/><br/>Large or small, cyberattacks are making headlines and elevating executive attention toward cyber resiliency. Preparing for, responding to and recovering from cyberattacks should be a strategic part of any business continuity plan. As recent cyberattacks have demonstrated increased risk to both IT and operational technology (OT) environments, readiness equates to enforcement of rules and policies that provide the visibility, control and situational awareness to respond at the speed of business.  Cybercriminals are maximizing their opportunity by exploiting older vulnerabilities and an expanding attack surface. Strategic readiness should be underpinned with the notion that eventually an attack will happen, and when it occurs, you are proactively ready to respond. During this session, we will explore security considerations for developing cyber resilience covering security fundamentals and readiness planning to protect your IT and OT environments.<br/><br/><br/>Willi joined Fortinet as the CISO for Operational Technology in August 2022. He brings more than 25 years of experience in Information Security working across industry verticals such as Healthcare, Telecom, Financials, Manufacturing, and Life Sciences. Most recently with GlaxoSmithKline (GSK), he established and directed the Global OT Infrastructure Security team charged with monitoring and protecting the OT assets for GSK. Globally, the team deployed 43 additional controls across the OT landscape assessed against NIST CSF and aligned business units to embrace a unified model for security, incident response, and risk reporting. During Willi’s tenure, he also oversaw the creation of the Security Organization and the Global Cyber Defense team for GSK’s Consumer Health startup (now called Haleon). Beyond building and leading the OT and Consumer Health security teams, he led the security team responsible for Cloud transformation for both IT and OT. Willi relies on a pragmatic and systematic approach to achieve company goals while also maturing the organizations and teams he leads.</p><p> </p><p>Willi is a graduate of Rockhurst University in Kansas City, MO, USA and holds a CISSP (Certified Information Security Professional) certification in good standing. Willi lives in NW Arkansas with his family. He’s an avid outdoorsman, cyclist, woodworker, and veteran.</p>]]></description>
    <content:encoded><![CDATA[<p>Cyber Senate had the privilege of catching up with Willi Nelson, CISO, Operational Technologies, Fortinet to discuss their forthcoming presentation on Cyber Preparedness September 29-30th in Celebration Florida, for the <a href='https://www.cybersenate.com/control-systems-cybersecurity-usa/'>9th annual Control System Cybersecurity USA conference.  </a><br/><br/>Large or small, cyberattacks are making headlines and elevating executive attention toward cyber resiliency. Preparing for, responding to and recovering from cyberattacks should be a strategic part of any business continuity plan. As recent cyberattacks have demonstrated increased risk to both IT and operational technology (OT) environments, readiness equates to enforcement of rules and policies that provide the visibility, control and situational awareness to respond at the speed of business.  Cybercriminals are maximizing their opportunity by exploiting older vulnerabilities and an expanding attack surface. Strategic readiness should be underpinned with the notion that eventually an attack will happen, and when it occurs, you are proactively ready to respond. During this session, we will explore security considerations for developing cyber resilience covering security fundamentals and readiness planning to protect your IT and OT environments.<br/><br/><br/>Willi joined Fortinet as the CISO for Operational Technology in August 2022. He brings more than 25 years of experience in Information Security working across industry verticals such as Healthcare, Telecom, Financials, Manufacturing, and Life Sciences. Most recently with GlaxoSmithKline (GSK), he established and directed the Global OT Infrastructure Security team charged with monitoring and protecting the OT assets for GSK. Globally, the team deployed 43 additional controls across the OT landscape assessed against NIST CSF and aligned business units to embrace a unified model for security, incident response, and risk reporting. During Willi’s tenure, he also oversaw the creation of the Security Organization and the Global Cyber Defense team for GSK’s Consumer Health startup (now called Haleon). Beyond building and leading the OT and Consumer Health security teams, he led the security team responsible for Cloud transformation for both IT and OT. Willi relies on a pragmatic and systematic approach to achieve company goals while also maturing the organizations and teams he leads.</p><p> </p><p>Willi is a graduate of Rockhurst University in Kansas City, MO, USA and holds a CISSP (Certified Information Security Professional) certification in good standing. Willi lives in NW Arkansas with his family. He’s an avid outdoorsman, cyclist, woodworker, and veteran.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/11201025-the-checks-and-balances-for-cybersecurity-readiness.mp3" length="27228357" type="audio/mpeg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11201025</guid>
    <pubDate>Thu, 25 Aug 2022 08:00:00 +0100</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/286347/11201025/transcript" type="text/html" />
    <podcast:soundbite startTime="900.0" duration="30.0" />
    <itunes:duration>2266</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sustainable Cybersecurity over the Complete Life-Cycle for Rail</itunes:title>
    <title>Sustainable Cybersecurity over the Complete Life-Cycle for Rail</title>
    <itunes:summary><![CDATA[Cyber Senate discuss 'Sustainable Cybersecurity over the Complete Life-Cycle for Rail' with Christian Paulsen, Product and Solution Security Officer at Siemens, sponsors of the Rail Cybersecurity USA conference February 9/10th online.  www.railcybersecurityusa.com   Christian drives protecting Mobility portfolio elements against cyber threats. With more than 20 years of experience in rail and utility business he understands the needs of transport customers managing cybersecurity ris...]]></itunes:summary>
    <description><![CDATA[<p>Cyber Senate discuss &apos;Sustainable Cybersecurity over the Complete Life-Cycle for Rail&apos; with Christian Paulsen, Product and Solution Security Officer at Siemens, sponsors of the Rail Cybersecurity USA conference February 9/10th online. <br/>www.railcybersecurityusa.com <br/><br/>Christian drives protecting Mobility portfolio elements against cyber threats. With more than 20 years of experience in rail and utility business he understands the needs of transport customers managing cybersecurity risks along the complete lifecycle of their assets. His background in telecommunication, SCADA and security systems as well as process and project management helped him defining the governance and guidance standards applicable throughout Siemens Mobility.<br/><br/>Christian is Chair of the Cybersecurity group of the European Rail Industry and active with the European Rail ISAC.<br/><br/><br/>Christian&apos;s presentation on February 9th:<br/><br/>The advance and benefits of digitalization in the transport sector and the related need for cybersecurity is undisputed. Operators face new threats and new laws and define new requirements for cybersecurity. These requirements not only take technical implementations into consideration, but also processes and the inclusion of all internal and external stakeholders along the lifecycle of a transportation system. In the presentation our expert gives you an overview over communalities and differences in approaching cyber risk management worldwide. He will share best practices and actionable approaches to secure the rail operation and assets.</p>]]></description>
    <content:encoded><![CDATA[<p>Cyber Senate discuss &apos;Sustainable Cybersecurity over the Complete Life-Cycle for Rail&apos; with Christian Paulsen, Product and Solution Security Officer at Siemens, sponsors of the Rail Cybersecurity USA conference February 9/10th online. <br/>www.railcybersecurityusa.com <br/><br/>Christian drives protecting Mobility portfolio elements against cyber threats. With more than 20 years of experience in rail and utility business he understands the needs of transport customers managing cybersecurity risks along the complete lifecycle of their assets. His background in telecommunication, SCADA and security systems as well as process and project management helped him defining the governance and guidance standards applicable throughout Siemens Mobility.<br/><br/>Christian is Chair of the Cybersecurity group of the European Rail Industry and active with the European Rail ISAC.<br/><br/><br/>Christian&apos;s presentation on February 9th:<br/><br/>The advance and benefits of digitalization in the transport sector and the related need for cybersecurity is undisputed. Operators face new threats and new laws and define new requirements for cybersecurity. These requirements not only take technical implementations into consideration, but also processes and the inclusion of all internal and external stakeholders along the lifecycle of a transportation system. In the presentation our expert gives you an overview over communalities and differences in approaching cyber risk management worldwide. He will share best practices and actionable approaches to secure the rail operation and assets.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/7389742-sustainable-cybersecurity-over-the-complete-life-cycle-for-rail.mp3" length="26699464" type="audio/mpeg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7389742</guid>
    <pubDate>Wed, 20 Jan 2021 10:00:00 +0000</pubDate>
    <podcast:soundbite startTime="300.0" duration="15.0" />
    <itunes:duration>2222</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Supply Chain Cybersecurity Cyber Senate Control Systems Podcast with Industrial Defender</itunes:title>
    <title>Supply Chain Cybersecurity Cyber Senate Control Systems Podcast with Industrial Defender</title>
    <itunes:summary><![CDATA[Supply Chain Cybersecurity Cyber Senate Control Systems Podcast with Industrial Defender.  Cyber Senate were pleased to catch up with Jeremy Morgan, Principal Risk and Solutions Consultant at Industrial Defender to discuss the panel theme "Supply Chain Cybersecurity" that will take place March 29-31st online for the Cyber Senate Control Systems Cybersecurity Conference 2021 EST. www.industrialcontrolcybersecusa.com  In his role at Industrial Defender, Jeremy helps ICS asset owners build ...]]></itunes:summary>
    <description><![CDATA[<p>Supply Chain Cybersecurity Cyber Senate Control Systems Podcast with Industrial Defender.<br/><br/>Cyber Senate were pleased to catch up with Jeremy Morgan, Principal Risk and Solutions Consultant at Industrial Defender to discuss the panel theme &quot;Supply Chain Cybersecurity&quot; that will take place March 29-31st online for the Cyber Senate Control Systems Cybersecurity Conference 2021 EST. www.industrialcontrolcybersecusa.com <br/>In his role at Industrial Defender, Jeremy helps ICS asset owners build a strong foundation to apply security controls in OT environments. With a diverse career spanning compliance management at a utility to cybersecurity product management for a major OEM, Jeremy has over 20 years’ experience in IT and OT cybersecurity.<br/><br/>You can learn more about Industrial Defender at https://industrialcontrolcybersecusa.com/virtualeventsponsors<br/><br/><br/>Panel: Supply Chain Risk and Maturity</p><p>30-03-2021, 15:30 - 16:10</p><p>Supply Chain Cyber Security is taking center stage and is our biggest risk.<br/>-Are we identifying risk in the supply chain?<br/>-How are we doing this and if not how can we improve?<br/>-Information Sharing on supply chain threats, common practices, challenges and ways we can improve<br/>-How can we more effectively build trust with our suppliers and industry peers?<br/>-How can we better communicate supply chain risk?<br/>-Sourcing and Procurement - how can we better communicate cyber risk contractually and move away from the &apos;break and fix&apos; model with our suppliers<br/>-Lets look closer at how vendors, infosec leaders and engineering are working -together in ensuring security of OT products<br/><br/><br/></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Supply Chain Cybersecurity Cyber Senate Control Systems Podcast with Industrial Defender.<br/><br/>Cyber Senate were pleased to catch up with Jeremy Morgan, Principal Risk and Solutions Consultant at Industrial Defender to discuss the panel theme &quot;Supply Chain Cybersecurity&quot; that will take place March 29-31st online for the Cyber Senate Control Systems Cybersecurity Conference 2021 EST. www.industrialcontrolcybersecusa.com <br/>In his role at Industrial Defender, Jeremy helps ICS asset owners build a strong foundation to apply security controls in OT environments. With a diverse career spanning compliance management at a utility to cybersecurity product management for a major OEM, Jeremy has over 20 years’ experience in IT and OT cybersecurity.<br/><br/>You can learn more about Industrial Defender at https://industrialcontrolcybersecusa.com/virtualeventsponsors<br/><br/><br/>Panel: Supply Chain Risk and Maturity</p><p>30-03-2021, 15:30 - 16:10</p><p>Supply Chain Cyber Security is taking center stage and is our biggest risk.<br/>-Are we identifying risk in the supply chain?<br/>-How are we doing this and if not how can we improve?<br/>-Information Sharing on supply chain threats, common practices, challenges and ways we can improve<br/>-How can we more effectively build trust with our suppliers and industry peers?<br/>-How can we better communicate supply chain risk?<br/>-Sourcing and Procurement - how can we better communicate cyber risk contractually and move away from the &apos;break and fix&apos; model with our suppliers<br/>-Lets look closer at how vendors, infosec leaders and engineering are working -together in ensuring security of OT products<br/><br/><br/></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/7368145-supply-chain-cybersecurity-cyber-senate-control-systems-podcast-with-industrial-defender.mp3" length="32681400" type="audio/mpeg" />
    <link>https://industrialcontrolcybersecusa.com</link>
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7368145</guid>
    <pubDate>Tue, 19 Jan 2021 08:00:00 +0000</pubDate>
    <podcast:soundbite startTime="600.0" duration="30.0" />
    <itunes:duration>2720</itunes:duration>
    <itunes:keywords>supply chain cybersecurity, industrial control, control systems cybersecurity</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Threat Intelligence Panel Cyber Senate Industrial Control Cybersecurity Europe </itunes:title>
    <title>Threat Intelligence Panel Cyber Senate Industrial Control Cybersecurity Europe </title>
    <itunes:summary><![CDATA[ •Building a Framework and the 4 why's and How    •Identifying critical assets   •What are we seeing, day to day    •Understanding your tools and user awareness     •Identifying risk prior to stopping threats    •APT Education Panellists include    Noureen NjorogeCISCO Cybersecurity Threat Intel Engineer (now Director of Global Cyber Threat Intelligence at Nike)   Jacob Benjamin, PhDDragos Principal Industrial Consultant      ]]></itunes:summary>
    <description><![CDATA[<p><br/>•Building a Framework and the 4 why&apos;s and How <br/><br/></p><p>•Identifying critical assets<br/><br/></p><p>•What are we seeing, day to day <br/><br/></p><p>•Understanding your tools and user awareness  <br/><br/></p><p>•Identifying risk prior to stopping threats <br/><br/></p><p>•APT Education</p><p>Panellists include <br/><br/></p><h1>Noureen Njoroge</h1><p>CISCO<br/>Cybersecurity Threat Intel Engineer<br/>(now Director of Global Cyber Threat Intelligence at Nike)<br/><br/></p><h1>Jacob Benjamin, PhD</h1><p>Dragos<br/>Principal Industrial Consultant</p><p><br/></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><br/>•Building a Framework and the 4 why&apos;s and How <br/><br/></p><p>•Identifying critical assets<br/><br/></p><p>•What are we seeing, day to day <br/><br/></p><p>•Understanding your tools and user awareness  <br/><br/></p><p>•Identifying risk prior to stopping threats <br/><br/></p><p>•APT Education</p><p>Panellists include <br/><br/></p><h1>Noureen Njoroge</h1><p>CISCO<br/>Cybersecurity Threat Intel Engineer<br/>(now Director of Global Cyber Threat Intelligence at Nike)<br/><br/></p><h1>Jacob Benjamin, PhD</h1><p>Dragos<br/>Principal Industrial Consultant</p><p><br/></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/6250111-threat-intelligence-panel-cyber-senate-industrial-control-cybersecurity-europe.mp3" length="27567528" type="audio/mpeg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6250111</guid>
    <pubDate>Fri, 06 Nov 2020 13:00:00 +0000</pubDate>
    <itunes:duration>2294</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Panel Session ICS Europe 2020 CIA vs. Reliability and Safety</itunes:title>
    <title>Panel Session ICS Europe 2020 CIA vs. Reliability and Safety</title>
    <itunes:summary><![CDATA[Panel: “CIA” – confidentiality, integrity, and availability versus Safety and Reliability" James Nesbitt Cyber Senate DirectorGuido Villacis EDF Technical Client Organisation I&amp;C Cyber Security Lead, PWR TechnologyGeorge Bearfield Rock Rail Health &amp; Safety DirectorMichael H Firstenberg Waterfall Security Solutions Director of Industrial SecurityAndreas Klien OMICRON electronics GmbH Head of Business Development Power Utility Communication    ]]></itunes:summary>
    <description><![CDATA[<p><b>Panel: “CIA” – confidentiality, integrity, and availability versus Safety and Reliability&quot;</b></p><ul><li><b>James Nesbitt </b>Cyber Senate Director</li><li><b>Guido Villacis </b>EDF Technical Client Organisation I&amp;C Cyber Security Lead, PWR Technology</li><li><b>George Bearfield </b>Rock Rail Health &amp; Safety Director</li><li><b>Michael H Firstenberg </b>Waterfall Security Solutions Director of Industrial Security</li><li><b>Andreas Klien </b>OMICRON electronics GmbH Head of Business Development Power Utility Communication</li></ul><p><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Panel: “CIA” – confidentiality, integrity, and availability versus Safety and Reliability&quot;</b></p><ul><li><b>James Nesbitt </b>Cyber Senate Director</li><li><b>Guido Villacis </b>EDF Technical Client Organisation I&amp;C Cyber Security Lead, PWR Technology</li><li><b>George Bearfield </b>Rock Rail Health &amp; Safety Director</li><li><b>Michael H Firstenberg </b>Waterfall Security Solutions Director of Industrial Security</li><li><b>Andreas Klien </b>OMICRON electronics GmbH Head of Business Development Power Utility Communication</li></ul><p><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/6249400-panel-session-ics-europe-2020-cia-vs-reliability-and-safety.mp3" length="27385177" type="audio/mpeg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6249400</guid>
    <pubDate>Fri, 06 Nov 2020 12:00:00 +0000</pubDate>
    <podcast:soundbite startTime="25.0" duration="30.0" />
    <itunes:duration>2279</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Maersk Cyber Senate Fire Side Chat 7th annual ICS CyberSec Europe 2020</itunes:title>
    <title>Maersk Cyber Senate Fire Side Chat 7th annual ICS CyberSec Europe 2020</title>
    <itunes:summary><![CDATA[Digital Transformation, Automating OT: Our Biggest Challenges Andy Powell Maersk Chief Information Security Officer  Discussion includes: Instrument OT Automation of Process Controlling Device Identities ]]></itunes:summary>
    <description><![CDATA[<p><b>Digital Transformation, Automating OT: Our Biggest Challenges<br/>Andy Powell </b>Maersk Chief Information Security Officer<br/><br/>Discussion includes:<br/>Instrument OT<br/>Automation of Process<br/>Controlling Device Identities</p>]]></description>
    <content:encoded><![CDATA[<p><b>Digital Transformation, Automating OT: Our Biggest Challenges<br/>Andy Powell </b>Maersk Chief Information Security Officer<br/><br/>Discussion includes:<br/>Instrument OT<br/>Automation of Process<br/>Controlling Device Identities</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/6249367-maersk-cyber-senate-fire-side-chat-7th-annual-ics-cybersec-europe-2020.mp3" length="23937485" type="audio/mpeg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6249367</guid>
    <pubDate>Fri, 06 Nov 2020 12:00:00 +0000</pubDate>
    <podcast:soundbite startTime="87.245" duration="30.0" />
    <itunes:duration>1991</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Industrial Control Cybersecurity: A discussion &quot;Confidentiality, integrity, and availability versus Safety and Reliability&quot;</itunes:title>
    <title>Industrial Control Cybersecurity: A discussion &quot;Confidentiality, integrity, and availability versus Safety and Reliability&quot;</title>
    <itunes:summary><![CDATA[Cyber Senate discusses confidentiality, integrity, and availability versus Safety and Reliability with Michael Firstenberg, Waterfall Security Solution's Director of Industrial Security. Mr Firstenberg will be moderating and contribution to a Panel Discussion on November 4th with the Cyber Senate for the 7th annual Industrial Control Cybersecurity Europe online conference 2020.   Mike Firstenberg is the Director of Industrial Security for Waterfall Security. Mike brings almost ...]]></itunes:summary>
    <description><![CDATA[<p>Cyber Senate discusses <b>confidentiality, integrity, and availability versus Safety and Reliability with Michael Firstenberg, </b>Waterfall Security Solution&apos;s Director of Industrial Security. Mr Firstenberg will be moderating and contribution to a Panel Discussion on November 4th with the Cyber Senate for the 7th annual Industrial Control Cybersecurity Europe online conference 2020. <br/><br/>Mike Firstenberg is the Director of Industrial Security for Waterfall Security. Mike brings almost two decades of experience in Control System Security, specializing in Control System Cyber Security. With a proven track record as a hands-on engineer - researching, designing, and implementing strategic security solutions, Mike has an established background working with governmental institutions, regulatory authorities, and industrial utilities. The former chair of the American Water SCADA Council, Mike studied Computer Science, Chemical Engineering, and Mathematics at the University of Pennsylvania, and has served as a speaker and panelist at numerous conferences and events.<br/><br/><br/>Waterfall Security Solutions is the global leader in industrial cybersecurity, protecting critical industrial networks since 2007. Our mission is to revolutionize how entire industries protect physical assets and industrial processes from cyber attacks. Waterfall’s patented, unidirectional products enable safe IT/OT integration, remote monitoring and diagnostics, cloud connectivity and tamper-proof forensics, without the vulnerabilities that always accompany firewalled connectivity. </p><p>The company’s growing list of customers includes national critical infrastructures and utilities, power plants, nuclear plants, water and wastewater systems, offshore platforms, refineries, pipelines, pharmaceutical, chemical and manufacturing plants, and many more. Deployed world-wide, Waterfall products support the widest range of industrial and remote monitoring platforms, applications, databases and protocols in the market. </p><p>As a global leader in industrial control system security, Waterfall contributes routinely to national and international standards, best practice guidance and control system security educational programs. As a result, our products are widely recognized as simplifying compliance with security regulations, standards and best practices. <a href='https://www.waterfall-security.com/'>https://www.waterfall-security.com</a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Cyber Senate discusses <b>confidentiality, integrity, and availability versus Safety and Reliability with Michael Firstenberg, </b>Waterfall Security Solution&apos;s Director of Industrial Security. Mr Firstenberg will be moderating and contribution to a Panel Discussion on November 4th with the Cyber Senate for the 7th annual Industrial Control Cybersecurity Europe online conference 2020. <br/><br/>Mike Firstenberg is the Director of Industrial Security for Waterfall Security. Mike brings almost two decades of experience in Control System Security, specializing in Control System Cyber Security. With a proven track record as a hands-on engineer - researching, designing, and implementing strategic security solutions, Mike has an established background working with governmental institutions, regulatory authorities, and industrial utilities. The former chair of the American Water SCADA Council, Mike studied Computer Science, Chemical Engineering, and Mathematics at the University of Pennsylvania, and has served as a speaker and panelist at numerous conferences and events.<br/><br/><br/>Waterfall Security Solutions is the global leader in industrial cybersecurity, protecting critical industrial networks since 2007. Our mission is to revolutionize how entire industries protect physical assets and industrial processes from cyber attacks. Waterfall’s patented, unidirectional products enable safe IT/OT integration, remote monitoring and diagnostics, cloud connectivity and tamper-proof forensics, without the vulnerabilities that always accompany firewalled connectivity. </p><p>The company’s growing list of customers includes national critical infrastructures and utilities, power plants, nuclear plants, water and wastewater systems, offshore platforms, refineries, pipelines, pharmaceutical, chemical and manufacturing plants, and many more. Deployed world-wide, Waterfall products support the widest range of industrial and remote monitoring platforms, applications, databases and protocols in the market. </p><p>As a global leader in industrial control system security, Waterfall contributes routinely to national and international standards, best practice guidance and control system security educational programs. As a result, our products are widely recognized as simplifying compliance with security regulations, standards and best practices. <a href='https://www.waterfall-security.com/'>https://www.waterfall-security.com</a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/5856355-industrial-control-cybersecurity-a-discussion-confidentiality-integrity-and-availability-versus-safety-and-reliability.mp3" length="26450244" type="audio/mpeg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5856355</guid>
    <pubDate>Mon, 12 Oct 2020 16:00:00 +0100</pubDate>
    <podcast:soundbite startTime="1200.0" duration="30.0" />
    <itunes:duration>2201</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security Monitoring Cloud Infrastructure for the Rail Sector</itunes:title>
    <title>Security Monitoring Cloud Infrastructure for the Rail Sector</title>
    <itunes:summary><![CDATA[The digitisation of the rail sector continues to evolve at an unprecedented rate, as innovation and the implementation of new technologies to enhance services and customer experiences hail in a new era of connected rail travel. Whilst digitisation improves efficiencies, it also extends the attack surface for cyber security incidents across the enterprise. Cloud computing technology is a key business driver, enabling the sharing of railway information resources, improving the capacity of infor...]]></itunes:summary>
    <description><![CDATA[<p>The digitisation of the rail sector continues to evolve at an unprecedented rate, as innovation and the implementation of new technologies to enhance services and customer experiences hail in a new era of connected rail travel. Whilst digitisation improves efficiencies, it also extends the attack surface for cyber security incidents across the enterprise.</p><p>Cloud computing technology is a key business driver, enabling the sharing of railway information resources, improving the capacity of information processing. However, cloud security monitoring remains a barrier to the full realisation of Cloud’s capability. Deploying security monitoring tools, virtualisation and configuration of event management tools in dynamic environments are just a few of the challenges rail security professionals are grappling with on a daily basis, as well as how security information is shared and how we effectively collaborate within a shared infrastructure.</p><p> Join the Cyber Senate as we dive deeper into the key discussion on Security Monitoring for Cloud Services, as we address best practices in ensuring the confidentiality, integrity and availability of cloud computing for the rail network.</p><p>You can join our <a href='https://www.cybersenate.network/plans/47421?bundle_token=6633261c2fafddc18f147bb6573886ee&amp;utm_source=manual'>Rail Cyber Security SME Group here</a></p><p><b>Areas of discussion include:</b></p><ul><li>How can we gain full visibility to monitor for potential security flaws and vulnerabilities in a multi-tenant architecture?</li><li>How can we gain strict controls over data at all endpoints?</li><li>How can we better identify patterns and pinpoint potential security vulnerabilities?</li><li>Reliability and performance: How can we ensure it is not impacted by security?</li><li>A look at Cloud-wide intrusion and anomaly detection systems</li><li>Security monitoring collaboration</li><li>How can we provide more timely information on attacks, vulnerabilities and incident</li></ul>]]></description>
    <content:encoded><![CDATA[<p>The digitisation of the rail sector continues to evolve at an unprecedented rate, as innovation and the implementation of new technologies to enhance services and customer experiences hail in a new era of connected rail travel. Whilst digitisation improves efficiencies, it also extends the attack surface for cyber security incidents across the enterprise.</p><p>Cloud computing technology is a key business driver, enabling the sharing of railway information resources, improving the capacity of information processing. However, cloud security monitoring remains a barrier to the full realisation of Cloud’s capability. Deploying security monitoring tools, virtualisation and configuration of event management tools in dynamic environments are just a few of the challenges rail security professionals are grappling with on a daily basis, as well as how security information is shared and how we effectively collaborate within a shared infrastructure.</p><p> Join the Cyber Senate as we dive deeper into the key discussion on Security Monitoring for Cloud Services, as we address best practices in ensuring the confidentiality, integrity and availability of cloud computing for the rail network.</p><p>You can join our <a href='https://www.cybersenate.network/plans/47421?bundle_token=6633261c2fafddc18f147bb6573886ee&amp;utm_source=manual'>Rail Cyber Security SME Group here</a></p><p><b>Areas of discussion include:</b></p><ul><li>How can we gain full visibility to monitor for potential security flaws and vulnerabilities in a multi-tenant architecture?</li><li>How can we gain strict controls over data at all endpoints?</li><li>How can we better identify patterns and pinpoint potential security vulnerabilities?</li><li>Reliability and performance: How can we ensure it is not impacted by security?</li><li>A look at Cloud-wide intrusion and anomaly detection systems</li><li>Security monitoring collaboration</li><li>How can we provide more timely information on attacks, vulnerabilities and incident</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/4314011-security-monitoring-cloud-infrastructure-for-the-rail-sector.mp3" length="73649002" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o5702tr1gylgk9ioum87wtq6elez?.jpg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4314011</guid>
    <pubDate>Thu, 25 Jun 2020 12:00:00 +0100</pubDate>
    <podcast:soundbite startTime="540.317" duration="25.0" />
    <itunes:duration>6135</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Achieving IEC 62443-3-3 Security Level 3 for Rail Automation Systems</itunes:title>
    <title>Achieving IEC 62443-3-3 Security Level 3 for Rail Automation Systems</title>
    <itunes:summary><![CDATA[The Cyber Senate interviews Markus Alexander Wischy Hernandez, Head of R&amp;D IT Security at Siemens Mobility, about their forthcoming presentation for the 5th annual Rail Cyber Security Summit in London February 18/19th 2020. The presentation is entitled "Achieving IEC 62443-3-3 Security Level 3 for Rail Automation Systems."  The talk will focus on the strategy achieving IEC 62443-3-3 Security Level 3 compliance for a country-wide, fully digitalized rail automation system. Topics are t...]]></itunes:summary>
    <description><![CDATA[<p>The Cyber Senate interviews Markus Alexander Wischy Hernandez, Head of R&amp;D IT Security at Siemens Mobility, about their forthcoming presentation for the 5th annual Rail Cyber Security Summit in London February 18/19th 2020. The presentation is entitled &quot;Achieving IEC 62443-3-3 Security Level 3 for Rail Automation Systems.&quot; </p><p>The talk will focus on the strategy achieving IEC 62443-3-3 Security Level 3 compliance for a country-wide, fully digitalized rail automation system. Topics are the current status of standardization, the required central security services and outlook for the protocols required to achieve interoperability. Additionally, the application of this strategy in a large rail-automation infrastructure project is presented at the conference.</p><p>This topic would bring together various points:</p><p>·         Technical security systems and communication protocols</p><p>·         Standardization, also aiming at the work that is currently done within Shift2Rail IT-Sec Working Group and an overall move of the sector to IEC 62443 compliance.</p><p><br/></p><p><figure data-trix-attachment='{&quot;contentType&quot;:&quot;image&quot;,&quot;height&quot;:200,&quot;url&quot;:&quot;https://events.cybersenate.com/backstage/public/portals/700741155/profileImage/16830000000071622?_ft=profilephoto_cropped&amp;_=1575392777713&quot;,&quot;width&quot;:200}' data-trix-content-type='image' data-trix-attributes='{&quot;caption&quot;:&quot;Markus Alexander Wischy Hernandez Siemens Mobility&quot;}' class='attachment attachment--preview'><img src='https://events.cybersenate.com/backstage/public/portals/700741155/profileImage/16830000000071622?_ft=profilephoto_cropped&amp;_=1575392777713' width='200' height='200'/><figcaption class='attachment__caption attachment__caption--edited'>Markus Alexander Wischy Hernandez Siemens Mobility</figcaption></figure></p><p>For more information visit <a href='https://www.railcybersecurity.com '>www.railcybersecurity.com </a></p>]]></description>
    <content:encoded><![CDATA[<p>The Cyber Senate interviews Markus Alexander Wischy Hernandez, Head of R&amp;D IT Security at Siemens Mobility, about their forthcoming presentation for the 5th annual Rail Cyber Security Summit in London February 18/19th 2020. The presentation is entitled &quot;Achieving IEC 62443-3-3 Security Level 3 for Rail Automation Systems.&quot; </p><p>The talk will focus on the strategy achieving IEC 62443-3-3 Security Level 3 compliance for a country-wide, fully digitalized rail automation system. Topics are the current status of standardization, the required central security services and outlook for the protocols required to achieve interoperability. Additionally, the application of this strategy in a large rail-automation infrastructure project is presented at the conference.</p><p>This topic would bring together various points:</p><p>·         Technical security systems and communication protocols</p><p>·         Standardization, also aiming at the work that is currently done within Shift2Rail IT-Sec Working Group and an overall move of the sector to IEC 62443 compliance.</p><p><br/></p><p><figure data-trix-attachment='{&quot;contentType&quot;:&quot;image&quot;,&quot;height&quot;:200,&quot;url&quot;:&quot;https://events.cybersenate.com/backstage/public/portals/700741155/profileImage/16830000000071622?_ft=profilephoto_cropped&amp;_=1575392777713&quot;,&quot;width&quot;:200}' data-trix-content-type='image' data-trix-attributes='{&quot;caption&quot;:&quot;Markus Alexander Wischy Hernandez Siemens Mobility&quot;}' class='attachment attachment--preview'><img src='https://events.cybersenate.com/backstage/public/portals/700741155/profileImage/16830000000071622?_ft=profilephoto_cropped&amp;_=1575392777713' width='200' height='200'/><figcaption class='attachment__caption attachment__caption--edited'>Markus Alexander Wischy Hernandez Siemens Mobility</figcaption></figure></p><p>For more information visit <a href='https://www.railcybersecurity.com '>www.railcybersecurity.com </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/2276654-achieving-iec-62443-3-3-security-level-3-for-rail-automation-systems.mp3" length="12357717" type="audio/mpeg" />
    <itunes:author>James Nesbitt / Cyber Senate</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2276654</guid>
    <pubDate>Fri, 13 Dec 2019 13:00:00 +0000</pubDate>
    <podcast:soundbite startTime="28.68" duration="30.0" />
    <itunes:duration>1026</itunes:duration>
    <itunes:keywords>rail cyber security, railway cyber security, IEC 62443, Rail Automation Systems</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Industry 4.0: Cyber Securing Legacy Systems across the Business</itunes:title>
    <title>Industry 4.0: Cyber Securing Legacy Systems across the Business</title>
    <itunes:summary><![CDATA[Podcast: Cyber Senate Podcast Episode: Industry 4.0: Cyber Securing Legacy Systems across the Business Episode pub date: 2019-08-01   Cyber Senate discusses Industry 4.0: Cyber Securing Legacy Systems across the Business with Andrew Kling, Director Cybersecurity and Software Practices, Schneider Electric. Andrew has been one of our guest speakers on our Industrial Control Cybersecurity USA conference for several years and brings a wealth of information to our community of subject matter exper...]]></itunes:summary>
    <description><![CDATA[<p><b>Podcast</b>: <a href='https://www.listennotes.com/podcasts/cyber-senate-podcast-james-nesbitt-QwHLYr9WJ5E/'>Cyber Senate Podcast</a><br/><b>Episode</b>: <a href='https://www.listennotes.com/e/b7bb82be3b074844af93f3c798c4b103/'>Industry 4.0: Cyber Securing Legacy Systems across the Business</a><br/><b>Episode pub date</b>: 2019-08-01<br/><br/><figure data-trix-attachment='{&quot;contentType&quot;:&quot;image&quot;,&quot;height&quot;:300,&quot;url&quot;:&quot;https://cdn-images-1.listennotes.com/podcasts/cyber-senate-podcast-dkEOzCAVj8P-QwHLYr9WJ5E.300x300.jpg&quot;,&quot;width&quot;:300}' data-trix-content-type='image' class='attachment attachment--preview'><img src='https://cdn-images-1.listennotes.com/podcasts/cyber-senate-podcast-dkEOzCAVj8P-QwHLYr9WJ5E.300x300.jpg' width='300' height='300'/><figcaption class='attachment__caption'></figcaption></figure></p><p>Cyber Senate discusses Industry 4.0: Cyber Securing Legacy Systems across the Business with Andrew Kling, Director Cybersecurity and Software Practices, Schneider Electric. Andrew has been one of our guest speakers on our Industrial Control Cybersecurity USA conference for several years and brings a wealth of information to our community of subject matter experts. <br/>In this podcast, Cyber Senate and Andrew Kling dive deeper into the new ISA Global Strategic Alliance and what the means for the industry, supply chain and IoT cybersecurity, the transfer of risk across global businesses and how our perception and culture are changing to mitigate evolving cyber threats. <br/><br/><br/></p><p><br/></p><p><br/><br/>The podcast and artwork embedded on this page are from James Nesbitt, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.<br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Podcast</b>: <a href='https://www.listennotes.com/podcasts/cyber-senate-podcast-james-nesbitt-QwHLYr9WJ5E/'>Cyber Senate Podcast</a><br/><b>Episode</b>: <a href='https://www.listennotes.com/e/b7bb82be3b074844af93f3c798c4b103/'>Industry 4.0: Cyber Securing Legacy Systems across the Business</a><br/><b>Episode pub date</b>: 2019-08-01<br/><br/><figure data-trix-attachment='{&quot;contentType&quot;:&quot;image&quot;,&quot;height&quot;:300,&quot;url&quot;:&quot;https://cdn-images-1.listennotes.com/podcasts/cyber-senate-podcast-dkEOzCAVj8P-QwHLYr9WJ5E.300x300.jpg&quot;,&quot;width&quot;:300}' data-trix-content-type='image' class='attachment attachment--preview'><img src='https://cdn-images-1.listennotes.com/podcasts/cyber-senate-podcast-dkEOzCAVj8P-QwHLYr9WJ5E.300x300.jpg' width='300' height='300'/><figcaption class='attachment__caption'></figcaption></figure></p><p>Cyber Senate discusses Industry 4.0: Cyber Securing Legacy Systems across the Business with Andrew Kling, Director Cybersecurity and Software Practices, Schneider Electric. Andrew has been one of our guest speakers on our Industrial Control Cybersecurity USA conference for several years and brings a wealth of information to our community of subject matter experts. <br/>In this podcast, Cyber Senate and Andrew Kling dive deeper into the new ISA Global Strategic Alliance and what the means for the industry, supply chain and IoT cybersecurity, the transfer of risk across global businesses and how our perception and culture are changing to mitigate evolving cyber threats. <br/><br/><br/></p><p><br/></p><p><br/><br/>The podcast and artwork embedded on this page are from James Nesbitt, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.<br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/1500346-industry-4-0-cyber-securing-legacy-systems-across-the-business.mp3" length="26211978" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/r2mz350ph9w1o2524xeyvwa15o4g?.jpg" />
    <itunes:author>James Nesbitt</itunes:author>
    <guid isPermaLink="false">https://www.listennotes.com/e/p/b7bb82be3b074844af93f3c798c4b103/</guid>
    <pubDate>Sun, 04 Aug 2019 09:48:14 +0100</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>2181</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>More Than Turbulence - Aviation Software Vulnerabilities &amp; Exploitation Podcast with Cyber Senate and Chris Kubecka CEO of Hypasec</itunes:title>
    <title>More Than Turbulence - Aviation Software Vulnerabilities &amp; Exploitation Podcast with Cyber Senate and Chris Kubecka CEO of Hypasec</title>
    <itunes:summary><![CDATA[The Cyber Senate welcome special guest, Chris Kubeck, CEO of Hypasec, who will be speaking on our 3rd annual Aviation Cybersecurity Summit in London on November 5/th and 6th. www.aviationcybersec.com Her presentation: More Than Turbulence- Aviation Software Vulnerabilities &amp; Exploitation Introductions to the challenges of modern aviation and technologyMaintenance and asset managementFAA requirements and recalls     -Weaknesses in exposure of various parts databases &nb...]]></itunes:summary>
    <description><![CDATA[<p>The Cyber Senate welcome special guest, Chris Kubeck, CEO of Hypasec, who will be speaking on our 3rd annual Aviation Cybersecurity Summit in London on November 5/th and 6th. www.aviationcybersec.com<br/>Her presentation: <a href='https://aviationcybersecurity2019.sched.com/event/NTOa/more-than-turbulence-aviation-software-vulnerabilities-exploitation?iframe=yes&amp;w=100%&amp;sidebar=yes&amp;bg=no#'>More Than Turbulence- Aviation Software Vulnerabilities &amp; Exploitation</a></p><ul><li>Introductions to the challenges of modern aviation and technology</li><li>Maintenance and asset management</li><li>FAA requirements and recalls</li></ul><p>     -Weaknesses in exposure of various parts databases  <br/>     - Lack of required security testing by FAA on maintenance software </p><ul><li>Software utilized in a modern airframe</li></ul><p>     -Explanation of what types of software is in use on both planes and weight balancing <br/><br/></p><ul><li>Buffer overflows, the FAA requires memory checks to ensure they stay within hardware operating parameters. But, no full boundary checks. </li><li>Explanation of current challenges: F35a has buffer overflow issues requiring a manual reboot of the flight computer, in-flight</li><li>Gate logic doesn&apos;t equal good code or secure code: explanation of how the software is written whilst pointing out memory leaks, incompatibility with ease of patching unless substantial downtime (except the 787) and the lack of any security testing for any aviation software on a plane.</li><li><br/></li><li>Exposure of various airframe manufacturer systems.</li><li><br/></li><li>Exposure of various airport ticketing and maintenance systems</li></ul><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>The Cyber Senate welcome special guest, Chris Kubeck, CEO of Hypasec, who will be speaking on our 3rd annual Aviation Cybersecurity Summit in London on November 5/th and 6th. www.aviationcybersec.com<br/>Her presentation: <a href='https://aviationcybersecurity2019.sched.com/event/NTOa/more-than-turbulence-aviation-software-vulnerabilities-exploitation?iframe=yes&amp;w=100%&amp;sidebar=yes&amp;bg=no#'>More Than Turbulence- Aviation Software Vulnerabilities &amp; Exploitation</a></p><ul><li>Introductions to the challenges of modern aviation and technology</li><li>Maintenance and asset management</li><li>FAA requirements and recalls</li></ul><p>     -Weaknesses in exposure of various parts databases  <br/>     - Lack of required security testing by FAA on maintenance software </p><ul><li>Software utilized in a modern airframe</li></ul><p>     -Explanation of what types of software is in use on both planes and weight balancing <br/><br/></p><ul><li>Buffer overflows, the FAA requires memory checks to ensure they stay within hardware operating parameters. But, no full boundary checks. </li><li>Explanation of current challenges: F35a has buffer overflow issues requiring a manual reboot of the flight computer, in-flight</li><li>Gate logic doesn&apos;t equal good code or secure code: explanation of how the software is written whilst pointing out memory leaks, incompatibility with ease of patching unless substantial downtime (except the 787) and the lack of any security testing for any aviation software on a plane.</li><li><br/></li><li>Exposure of various airframe manufacturer systems.</li><li><br/></li><li>Exposure of various airport ticketing and maintenance systems</li></ul><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/286347/episodes/1397620-more-than-turbulence-aviation-software-vulnerabilities-exploitation-podcast-with-cyber-senate-and-chris-kubecka-ceo-of-hypasec.mp3" length="17829064" type="audio/mpeg" />
    <itunes:author>James Nesbitt and Chris Kubecka</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1397620</guid>
    <pubDate>Thu, 11 Jul 2019 15:00:00 +0100</pubDate>
    <podcast:soundbite startTime="613.112" duration="30.0" />
    <itunes:duration>1483</itunes:duration>
    <itunes:keywords>aviationcybersecurity, aviation safety, airline cyber security, airport cybersecurity, airport security, information security, airline manufacturers cyber security</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
