logo
header-image

Control Loop: The OT Cybersecurity Podcast

by N2K Networks
54 EPISODES
Jun 2022
All Episodes
Digging into regulatory compliance issues.
N2K Networks
Hacktivism targeting OT devices.
N2K Networks
Critical infrastructure: Pending legislation and risks and rewards from AI.
N2K Networks
Examining CIRCIA and VOLTZITE.
N2K Networks
Hunting adversaries.
N2K Networks
Navigating China's infrastructure risks in the energy sector.
N2K Networks
Addressing maritime cyber threats.
N2K Networks
Volt Typhoon and the Year in Review.
N2K Networks
Operational Technology disruptions: An eye on the water sector.
N2K Networks
Building community in OT.
N2K Networks
A free community initiative to protect small utilities.
N2K Networks
Encore: Active visibility into OT systems.
N2K Networks
Utility attacks and electrical sector supply chain vulnerabilities.
N2K Networks
Building automation systems and maritime cyber regulations.
N2K Networks
Port disruption and a discussion of maritime and OT.
N2K Networks
Active visibility into OT systems.
N2K Networks
A look at a Whole-of-State cybersecurity strategy.
N2K Networks
When IT infrastructure translates into OT.
N2K Networks
Don't take energy for granted.
N2K Networks
Intelligence services within the convergence of OT and IT.
N2K Networks
Real world stories of incident response and threat intelligence.
N2K Networks
Mentorship, internships, and apprenticeships in OT security.
N2K Networks
Compliance with an eye on OT security.
N2K Networks
The IT/OT cultural divide in the federal space.
N2K Networks
OT cybersecurity concerns in the federal space.
N2K Networks
Unpacking cyber awareness syndrome.
N2K Networks
Taking a look at cyber insurance in the industrial space.
N2K Networks
Internal Network Security Monitoring (INSM) for the electrical sector.
N2K Networks
Asset inventory: Part of ICS network visibility and monitoring.
N2K Networks
Unique OT characteristics and points of IT convergence.
N2K Networks
The challenges of carrying out vulnerability management.
N2K Networks
The CISO evolution to incorporate OT.
N2K Networks
National Cybersecurity Strategy released.
N2K Networks
Adding some color to incident response.
N2K Networks
Insight from the ISACs.
N2K Networks
ICS/OT incident response plans: Don't get caught unprepared.
N2K Networks
Shifting into the OT space.
N2K Networks
Interview Select: Maria Varmazis interviews Brandon Bailey about Space Attack Research and Tactic Analysis, or SPARTA matrix.
N2K Networks
Cyber threat intelligence in the OT space.
N2K Networks
Preparing for the electrical grid of the future.
N2K Networks
Looking to the future of the OT space.
N2K Networks
Critical infrastructure in the crosshairs.
N2K Networks
An IT security professional walks into an OT bar.
N2K Networks
Disrupt, disable, deny, deceive, and/or destroy.
N2K Networks
Providing a safe and secure OT infrastructure.
N2K Networks
The fundamentals of the control loop.
N2K Networks
Executive discussions and how to communicate your cyber risks to the Board.
N2K Networks
Pipeline cybersecurity mitigation actions, contingency planning, and testing.
N2K Networks
Demystifying the alphabet soup of OT, IT, IOT.
N2K Networks
CMMC and your industrial environment, plus the five most critical security controls.
N2K Networks