PodcastsBusinessIndustrial Cybersecurity Insider

Industrial Cybersecurity Insider

Industrial Cybersecurity Insider
Industrial Cybersecurity Insider
Latest episode

125 episodes

  • Industrial Cybersecurity Insider

    Federal Agencies Can Enter Private Networks to Hunt Malware. Is Your Plant Prepared?

    06/05/2026 | 31 mins.
    Dino and Jim break down a major shift in the cyber threat landscape: federal agencies obtaining legal authority to enter private networks to hunt down state-sponsored malware, and what that signals for industrial organizations.
    They discuss why critical infrastructure and supply chains are prime targets, how “soft targets” in OT and building automation get exploited, and why many companies still lack visibility into what’s happening on the plant floor.
    The conversation zooms in on real-world exposure points, especially unmanaged vendor remote access and end-of-life equipment, and closes with practical themes for leadership.
    Stop assuming “IT has it covered”
    Define measurable OT security outcomes
    Start taking steps that make disruption harder and detection faster.

    Chapters:
    (00:00:00) Why identity, trust, and vendor access are breaking down in modern plants
    (00:01:00) The episode’s trigger: government-led operations to remove malware from private networks
    (00:03:00) “Machete scanning” and why IT-style tactics can disrupt OT operations
    (00:05:00) The real target set: critical infrastructure, supply chains, and smaller utilities with limited resources
    (00:08:00) Collateral damage and how cyber “weapons” trickle down to criminal ransomware
    (00:13:00) Why OT is still a soft target: visibility gaps, unpatched systems, and weak segmentation
    (00:14:00) Remote access everywhere: OEM/SI pathways, unknown identities, and lack of governance
    (00:20:00) The logging gap: what IT sees vs. what OT can’t see (and why that matters for incident response)
    (00:24:00) Building automation and facilities systems as weak links attackers love
    (00:26:00) Executive accountability: what boards should be measuring after breaches (and why progress stalls)

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!
  • Industrial Cybersecurity Insider

    The Phishing Attack That Could Have Shut Down a Plant Floor

    29/04/2026 | 26 mins.
    A real-world case study shows how a single phishing email led to credential and MFA compromise, creating an urgent question for any industrial organization: Did the attacker reach the OT environment?
    Dino and Jim walk through how OT visibility, secure remote access controls, and continuous monitoring enabled rapid validation of what happened. They were able to prove the breach did not impact control systems and avoid an expensive, safety-driven shutdown of a continuous manufacturing process.
    The episode connects technical controls to executive outcomes, including resilience, duty of care, and the financial reality that “not knowing” can be as costly as an actual compromise.
    Chapters:
    (00:00:00) Why continuous manufacturing makes “abundance of caution” shutdowns so costly
    (00:01:00) What “OT continuous monitoring” means and why it matters in real incidents
    (00:03:00) Safety and connected environments: why “it can go boom” changes the stakes
    (00:05:00) Baselines: defining “normal” so abnormal behavior is actionable
    (00:07:00) Incident story: phishing email leads to credential and MFA compromise
    (00:09:00) What the team validated: tracing access and confirming OT was not impacted
    (00:10:00) Lessons from Colonial Pipeline: inability to validate can force shutdowns
    (00:11:00) OT reality check: Windows assets, HMIs, historians, and engineering workstations
    (00:13:00) Secure OT remote access: why VPN-only access is not sufficient
    (00:16:00) The payoff: avoided downtime, avoided product loss, and avoided disruption
    (00:19:00) Executive view: duty of care, liability, compliance, and protecting enterprise value
    (00:23:00) The “air gap” myth and why defense-in-depth is the only practical path

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!
  • Industrial Cybersecurity Insider

    Your Most Valuable & Underutilized Cybersecurity Asset

    21/04/2026 | 25 mins.
    In this episode, Dino and LuRae address why system integrators, OEMs, and ecosystem partners are often a manufacturer’s most underused cybersecurity resource.
    Dino explains why many IT leaders lack real visibility into the plant floor, what it takes to operationalize OT security beyond “checking the box,” and why asset inventory is the first practical step toward protecting control systems.
    The conversation also covers the realities of remote access after COVID, the need for governance measures such as change control and auditing, and why manufacturers should build real partner relationships rather than purely transactional vendor engagements.
    Chapters:
    (00:00:00) OT security requires time inside the plant, not an “ivory tower” view
    (00:01:00) Introducing Dino and the topic: partners as a cybersecurity asset
    (00:02:00) Why OT assets get excluded from cybersecurity strategy
    (00:03:00) The real opportunity: system integrators and OEMs already in the plant
    (00:05:00) Getting started: identify who’s working in each facility
    (00:08:00) Step one: accurate OT asset inventory and visibility
    (00:10:00) Remote access: detect, audit, and control what partners are doing
    (00:12:00) “Compliance” vs. operational reality on the plant floor
    (00:16:00) Resourcing reality: why most teams cannot self-perform OT security
    (00:20:00) Final advice: budget, ROI of downtime, and act before the incident

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!
  • Industrial Cybersecurity Insider

    OT Patching vs IT Patching: What's Commonly Misunderstood

    14/04/2026 | 27 mins.
    Most cybersecurity teams treat patching like a universal fix. In manufacturing, that assumption can take down a production line, trigger a safety event, or void the warranty on a $2 million piece of equipment.
    In this episode, Dino Busalachi and Craig Duckworth break down why patching in operational technology environments is a fundamentally different problem than patching enterprise IT — and why closing that gap requires more than just pushing an update.
    The bottom line: A firewall is not a patching strategy. Neither is hoping your systems are isolated. Organizations that get this right use risk-based prioritization, lab testing, virtual patching, and real collaboration between IT and OT teams.
    If you are responsible for a plant floor — or for the people who are — this conversation is for you.
    🎙️ Industrial Cybersecurity Insider is where C-suite leaders, plant managers, engineers, and security teams come to close the gap between IT and OT.
    🔔 Subscribe so you never miss an episode.
    Chapters:
    (00:00:00) Why assessing OT cybersecurity posture and asset visibility is hard
    (00:01:00) IT patches constantly, OT rarely does, and why that gap matters
    (00:03:00) Downtime costs: a broken patch in OT can stop the entire plant
    (00:05:00) OEM “don’t touch it” policies and warranty pressure
    (00:08:00) M&A due diligence: buying plants without knowing the cyber condition
    (00:09:00) CrowdStrike outage example and why agent-based tools are risky in OT
    (00:10:00) Virtual patching: protecting PLCs and legacy assets you cannot patch
    (00:14:00) Vendor guidance, upgrade rewrites, and “acceptable risk” decisions
    (00:17:00) Hidden exposure: guest Wi‑Fi, tablets, remote access, and “air gaps”
    (00:20:00) Best practices: inventory, continuous monitoring, vulnerability metrics, and cross-team alignment

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!
  • Industrial Cybersecurity Insider

    Who Actually Owns OT Cybersecurity? Not Who You Think

    06/04/2026 | 30 mins.
    Dino and Craig break down what they are seeing in real industrial environments as companies begin the OT cybersecurity journey. They outline why most organizations are still in an “unaware to awareness” phase, what creates the “oh wow” moment after the first pilot, and why ownership and execution often falls to plant-floor teams and their OEM and integrator partners.
    The conversation covers the limits of surface-level visibility, why accurate asset inventory and remote access control are foundational, and how practical constraints like flat networks, legacy switches, warranty concerns, and limited human capital can stall progress.
    They also share cautionary examples of IT-first security tooling causing operational impact, and they close with a clear message: think globally, act locally, and build a defensible OT program that matches how plants actually run.
    Chapters:
    (00:00:00) Why OT vulnerabilities and remote access are the real “kicker”
    (00:01:00) The market reality: 60% unaware, 30% starting, 10% operationalized
    (00:03:00) Who owns remediation: IT vs OT and the plant-floor accountability gap
    (00:05:00) Why “visibility” often stops at Purdue Level 3 and misses Level 2 assets
    (00:07:00) OEMs, integrators, and why support models matter in OT cybersecurity
    (00:09:00) Flat networks, north-south traffic, and why you still miss panel-level devices
    (00:11:00) The human capital problem and why outsourcing is often unavoidable
    (00:18:00) A real-world warning: EDR in ICS can create massive operational cost
    (00:20:00) Safety, quality, and cybersecurity: the three things leaders will fund
    (00:24:00) Change management failures and why monitoring PLC edits matters

    Links And Resources:
    Want to Sponsor an episode or be a Guest? Reach out here.
    Industrial Cybersecurity Insider on LinkedIn
    Cybersecurity & Digital Safety on LinkedIn
    BW Design Group Cybersecurity
    Dino Busalachi on LinkedIn
    Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

More Business podcasts

About Industrial Cybersecurity Insider

Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
Podcast website

Listen to Industrial Cybersecurity Insider, Inside Business with Ciaran Hancock and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features