Episódios

  • AI, Governance & Cybersecurity Culture: Why People and Process Still Matter Most
    Dec 18 2025
    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: AI, Governance & Cybersecurity Culture: Why People and Process Still Matter MostPub date: 2025-12-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCybersecurity has evolved from an afterthought to a business-critical responsibility - and AI is accelerating that shift faster than most organizations are ready for. In this episode of Protect It All, host Aaron Crow sits down with Sue McTaggart, a cybersecurity leader with a software development background and more than 15 years of experience driving security transformation. Together, they explore how cybersecurity success today depends less on shiny new tools and more on culture, governance, and fundamentals done right. Sue shares her journey from developer to cybersecurity leader, offering real-world insights into embedding security thinking into everyday work - not bolting it on after something breaks. The conversation tackles the realities of AI adoption, the risks of over-automation, and why human oversight and curiosity remain essential in an increasingly automated world. You’ll learn: Why technology alone can’t fix cybersecurity problemsHow to embed a security-first mindset across teams and leadershipWhat AI changes - and what it doesn’t - in cybersecurity governanceThe role of Zero Trust and foundational cyber hygieneWhy people, process, and accountability prevent more breaches than toolsHow generational shifts and curiosity shape the future of cyber careers Whether you’re a security leader, technologist, or business decision-maker navigating AI adoption, this episode delivers grounded, practical wisdom for building resilience that lasts. Tune in to learn why strong cybersecurity still starts with people, not platform,s only on Protect It All. Key Moments: 01:12 Cybersecurity Evolution and Insights 03:51 "Cybersecurity Requires Culture Shift" 07:09 "Tech Failures and Curfew Challenges" 10:30 "Prioritizing Security in AI Development" 15:05 Cybersecurity's Role in Everything 19:37 "Everything is Sales" 23:54 Adapting Communication for Audiences 26:26 "Think Ahead, Stay Curious." 28:30 Tinkering and Curiosity Unleashed 31:32 "Gen Z: Redefining Work and Life." 36:17 Governing AI: Benefits and Risks 37:59 AI Needs Human Oversight 42:35 "AI's Role in Cybersecurity." 47:25 "Hackers Exploit Basic Vulnerabilities." About the guest: Sue McTaggart is a passionate educator and cybersecurity professional with a strong background in software development. Her curiosity and desire to raise awareness led her to transition from developing applications primarily in languages like Java in the early 2000s to the field of cybersecurity. Sue is dedicated to empowering others through education and strives to share her knowledge to help others better understand cybersecurity risks and solutions. She is honored and humbled by opportunities to speak about her work and continues to inspire those around her with her commitment to ongoing learning and public awareness. How to connect Sue: https://www.linkedin.com/in/sue-mctaggart-24604158/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Exibir mais Exibir menos
    52 minutos
  • IT/OT convergence with ISA President Scott Reynolds | 61
    Dec 17 2025
    Podcast: ICS Arabia Podcast
    Episode: IT/OT convergence with ISA President Scott Reynolds | 61
    Pub date: 2025-12-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    In this episode of the ICS Arabia Podcast, Scott Reynolds, President of the International Society of Automation (ISA), shares his deep insights on bridging IT and OT cybersecurity, emphasizing how collaboration and mutual understanding are key to building secure, resilient, and efficient industrial systems.Scott discusses: 🔄 The critical role of IT-OT translators in preventing communication and security gaps. 🔐 The importance of ISA/IEC 62443 standards as a unifying cybersecurity framework. 🌐 How IT-OT convergence can succeed through clear governance and shared accountability. 🎓 The need to balance practical experience with formal certification in cybersecurity. 🤖 The growing role of AI and robotics in industrial systems and ISA’s AI assistant, MIMO. 🌍 ISA’s global engagement and the value of volunteering to advance the automation community.🎧 Listen to the full episode to hear Scott’s vision



    The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Exibir mais Exibir menos
    54 minutos
  • Rapid Recovery - When Security Fails [The Industrial Security Podcast]
    Dec 16 2025
    Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)
    Episode: Rapid Recovery - When Security Fails [The Industrial Security Podcast]
    Pub date: 2025-12-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    We've been hacked. Everything is down. Or more mundane - there was a power surge and 5% of our cyber gear is fried. How do we get back into operation fastest? Stephen Nichols of Acronis joins us to look at rapid recovery of OT systems - from the mundane to the arcane.

    The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Exibir mais Exibir menos
    44 minutos
  • Interview with Mohammed AlDabbous (Arabic) | 46
    Dec 16 2025
    Podcast: ICS Arabia Podcast
    Episode: Interview with Mohammed AlDabbous (Arabic) | 46
    Pub date: 2025-12-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Join us for a special live session 🎙️ with Mohammed AlDabbous, a leading expert with over 15 years in OT and OT cybersecurity!Currently the Director of Solutions Engineering at Industrial Defender, Mohammed brings a wealth of experience from his roles at Invictux, Nozomi Networks, and Honeywell.We’ll be discussing OT security trends, real-world challenges, and advice for the next generation of cybersecurity professionals.



    The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Exibir mais Exibir menos
    2 horas e 2 minutos
  • When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems
    Dec 15 2025
    Podcast: Exploited: The Cyber Truth
    Episode: When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems
    Pub date: 2025-12-11

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Open source accelerates development in embedded systems, but hidden license obligations can quickly create legal and operational risk. In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M. Saunders and Salim Blume, Director of Security Applications, for a look at how copyleft risk emerges and why compliance in embedded products is more challenging than many teams expect.

    Salim breaks down how restrictive licenses, such as GPL and AGPL, can force the disclosure of proprietary code, interrupt product shipments, or create exposure long after devices are deployed in the field. Joe shares why accurate SBOMs, automated license checks, and enforcing policy at build time are critical to preventing surprises in downstream products. The discussion also touches on the ongoing Vizio case, where the TV manufacturer faces litigation that could compel public release of source code under the GPL, highlighting how open source obligations can surface years after products hit the market.

    Together, Paul, Joe, and Salim explore:

    • How copyleft obligations can require source-code disclosure
    • Why embedded environments complicate license compliance
    • Real-world cases where unnoticed GPL dependencies caused major issues, such as Vizio’s GPL lawsuit and Cisco’s WRT54G router family
    • The growing implications of AGPL for SaaS and connected services
    • How build-time SBOMs and automated controls reduce long-term risk

    Whether you're building connected devices, managing software supply chain compliance, or protecting proprietary IP, this episode offers practical guidance to reduce copyleft risk before it becomes a costly problem.



    The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Exibir mais Exibir menos
    30 minutos
  • Building an OT Security Company from Scratch (Arabic) | 52
    Dec 15 2025
    Podcast: ICS Arabia Podcast
    Episode: Building an OT Security Company from Scratch (Arabic) | 52
    Pub date: 2025-12-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    In this episode, I’m joined by Engineer Ali Laribi, the founder of Fortress Plus, to dive deep into what it takes to build and lead in the OT security space — especially when you’re going against the crowd.



    The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Exibir mais Exibir menos
    1 hora e 12 minutos
  • EP 77: Building a Cyber Physical System Device Library
    Dec 14 2025
    Podcast: Error Code (LS 27 · TOP 10% what is this?)
    Episode: EP 77: Building a Cyber Physical System Device Library
    Pub date: 2025-12-09

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    Do you really know what’s on your network? A lot of OT devices are white labeled, meaning they have a brand name but under the hood they’re made by someone else. Sean Tufts, Field CTO for Claroty, explains how his team is using AI to sift through all the available data and build a cyber physical library that starts to add specificity to remediation operations, and improve cyber physical security overall



    The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Exibir mais Exibir menos
    27 minutos
  • OT Risk Management | 55 with Steve Mustard
    Dec 14 2025
    Podcast: ICS Arabia Podcast
    Episode: OT Risk Management | 55 with Steve Mustard
    Pub date: 2025-12-13

    Get Podcast Transcript →
    powered by Listen411 - fast audio-to-text and summarization



    🚨 Featuring: Steve Mustard — engineer, author, ex-ISA President & CEO of National Automation Inc.In this thought-provoking ICS Arabia Podcast episode, Steve dives deep into the critical—but often misunderstood—domain of OT cyber risk management. Drawing on decades of experience, he challenges the traditional focus on tech vulnerabilities and advocates for consequence-driven risk assessments that prioritize safety, operations, and business continuity.🔍 Key Takeaways:Why traditional IT risk models fall short in OT environmentsThe value of ISA/IEC 62443 as a flexible, risk-based frameworkHow multidisciplinary teams (engineering, safety, finance, cyber) create better risk decisionsThe role of incident response, backups, and mechanical fail-safesUS vs UK approaches to cybersecurity regulations



    The podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
    Exibir mais Exibir menos
    58 minutos