Powered by RND
PodcastsBusinessPrOTect It All

PrOTect It All

Aaron Crow
PrOTect It All
Latest episode

Available Episodes

5 of 78
  • Open Source Intelligence Exposed: How Hackers Use Public Data to Target People, Passwords, and Critical Systems
    Think your company’s private data is safe? Think again. In this episode of Protect It All, host Aaron Crow pulls back the curtain on one of cybersecurity’s most underestimated frontiers - Open Source Intelligence. He reveals how attackers leverage publicly available data from LinkedIn profiles to leak passwords, mapping out targets, infiltrating systems, and exploiting the human attack surface. Drawing from real-world incidents and years of experience across IT and OT security, Aaron explains: How Open Source Intelligence fuels social engineering and insider threat campaigns. Why protecting systems isn’t enough - you must protect people. How to use Open Source Intelligence proactively for threat modeling and risk mitigation. Steps to monitor your digital footprint and reduce exposure before it’s too late. Whether you’re a cybersecurity professional, executive, or simply digital-curious, this episode will change how you think about “public information.” Tune in to learn how Open Source Intelligence can both expose and empower your cybersecurity strategy - only on Protect It All. Key Moments:  06:17 Securing Domain Admin Accounts 09:09 Proactive Employee Security Monitoring 12:19 "Protecting Human Attack Surfaces" 16:48 "Enhancing Cybersecurity with Open Source Intelligence” 18:49 Exposed Data Response Process Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: [email protected]  Website: https://protectitall.co/  X: https://twitter.com/protectitall 
    --------  
    24:25
  • Old Windows, New Risks: How End-of-Life Systems Threaten OT Security and What You Can Do
    In this episode of Protect It All, host Aaron Crow takes a hard look at one of the biggest blind spots in OT cybersecurity: legacy Windows environments still running inside plants, refineries, and utilities. From Windows XP to Windows 10’s upcoming end of support, Aaron breaks down why these systems persist, the true cost of “doing nothing,” and the high-stakes trade-offs between replacement, isolation, and risk mitigation. You’ll discover: Why outdated Windows systems remain critical yet dangerously exposed. The myths of “true air gaps” and why they don’t protect you anymore. Practical isolation tactics, segmentation, strict access control, and monitoring. How to manage asset visibility, vendor dependencies, and downtime risks. Whether you’re a cybersecurity leader, plant manager, or operations engineer, this episode is your roadmap to making smarter, safer decisions about legacy systems before they cause costly disruptions. Tune in to learn how to balance operations, cost, and security and protect your OT world from old-system vulnerabilities. Key Moments:  01:22 "End-of-Life Systems in OT" 04:15 Upgrading Systems in Regulated Industries 07:35 Reducing Risk with Network Segmentation 12:02 "Firewall Rules and System Security" 15:52 Understanding Risks in End-of-Life Systems 18:54 Securing Legacy Systems Effectively Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: [email protected]  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:
    --------  
    20:18
  • OT Cybersecurity Wake-Up Call: How Airports and Power Grids Expose the Gaps We Can’t Ignore
    In this solo episode of Protect It All, host Aaron Crow delivers a straight-talk reality check on the widening IT–OT cybersecurity gap and what it really takes to protect the systems that keep the world running. With decades of experience defending critical infrastructure, Aaron exposes why many OT environments are still years behind in resilience and visibility - and how we can finally fix that. You’ll learn: The real incidents prove why OT cybersecurity can’t afford to lag. Why visibility and segmentation are non-negotiable for industrial systems. How to build an incident-response plan that works when the stakes are highest. Practical steps to strengthen resilience and recovery across critical operations. This episode isn’t about fear - it’s about preparation. If your work touches energy, transportation, manufacturing, or utilities, this one’s your wake-up call to act before disaster hits. Listen now and learn how to protect what truly keeps our world moving - only on Protect It All. Key Moments: 05:06 "Real Risks of Critical Disruptions" 06:16 Redefining OT System Boundaries 11:42 Troubleshooting Unknown System Issues 14:09 "Secure Remote Access Best Practices" 18:28 "Planning for Worst-Case Scenarios" 19:36 Critical Infrastructure Under Cyber Threat   Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: [email protected]  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube:
    --------  
    22:46
  • Why “One Size Fits All” Fails in OT Cybersecurity: Real-World Fixes for IT–OT Gaps
    OT cybersecurity isn’t about installing more firewalls - it’s about adapting your entire mindset. In this episode of Protect It All, host Aaron Crow breaks down why IT security tools often fall short in industrial environments and what it really takes to protect operational systems. Drawing from 25+ years of hands-on experience, Aaron explores the differences between IT and OT priorities, why “silver bullet” solutions don’t exist, and how to build defense-in-depth strategies that actually work on the plant floor. You’ll discover: Why IT tools struggle in OT environments - and where they can help. How to balance availability, safety, and security in critical systems. Practical ways to manage legacy hardware, vendor dependencies, and remote access. The key to uniting IT and OT teams for stronger resilience. If you’re navigating the evolving world of industrial cybersecurity, this episode will change how you think about tools, processes, and protection. Tune in to learn how to bridge the IT–OT divide and build a smarter, safer security culture. Key Moments: 03:31 "Adapting IT Products for OT Use" 08:53 IT and OT Crossover Tools 11:05 Balancing OT Risk in Cybersecurity 13:37 Cybersecurity and Remote Secure Access 18:25 Designing Resilient, Independent Systems 21:40 Unified Cybersecurity Through Training & Collaboration 24:24 "IT and OT Integration Challenges" Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: [email protected]  Website: https://protectitall.co/  X:
    --------  
    28:01
  • How to Protect Kids in a Digital World: Online Safety, AI Dangers, and Parental Guidance
    In this episode, host Aaron Crow welcomes cybersecurity expert John Schimanski Jr., Chief Information Security Officer at Trivigil, for an eye-opening conversation that every parent, educator, and technologist needs to hear. Together, they delve into the escalating dangers children face online - from the alarming rise of cyber predators and social media manipulation, to the misuse of AI and increasingly sophisticated scams targeting families. John shares powerful stories from his work with educational institutions and law enforcement, highlighting how digital threats are evolving far faster than most parents can keep up with. Aaron reflects on personal challenges as a parent navigating device safety and digital boundaries, and the two discuss practical strategies for protecting kids in today’s hyper-connected world. This episode doesn’t just explore the risks - it offers hope and tangible action, including details about cybersecurity education initiatives like the MASK Next Gen Shield game, designed to give kids and parents the knowledge they need to stay safe online. Whether you’re a concerned parent, a teacher, or someone working in the cybersecurity field, this discussion is packed with real-world advice and resources you can use right now. Tune in for a timely conversation on the front lines of digital safety—and learn why, when it comes to protecting our kids, awareness and action are more important than ever. Key Moments:  05:00 Digital Image Blacklist Management 08:08 Parental Cybersecurity and Tech Awareness 10:06 Fake Arrest Warrant Scam Alert 13:27 AI Development Concerns and Future 21:13 Online Predator Alert & Teen Safety 25:33 Limits of Facebook Moderation 27:29 Managing Digital Challenges for Parents 30:46 Teen Sextortion Crisis Emerges 33:44 "Saving Kids Amidst Social Media" 42:23 Broken Graphics Card Issue Resolved 45:33 Internet Safety Tips for Parents 49:43 Pause Before Reacting 51:17 Future Concerns and Optimism 56:46 "Essential Curriculum for Schools" About the guest :    John Schimanski Jr. brings more than three decades of experience in physical and cybersecurity, spanning private and public sectors. Beginning his career in 1994, he worked as a physical security specialist protecting super-regional shopping centers in high-crime areas, focusing on stolen vehicles and safety operations. During this time, he earned two master’s degrees—one in Criminal Justice and Security Administration and another in Managing Information Systems—along with a bachelor’s in Business Administration.   He transitioned into cybersecurity in 2007, when ransomware was still a $5,000 payment on a green dot credit card. While working in a small data center, he developed customized web services and interfaces for organizations such as the Las Vegas Motor Speedway and Electric Daisy Carnival (EDC).  
    --------  
    58:51

More Business podcasts

About PrOTect It All

Welcome to "PrOTect It All," the podcast where we peel back the layers of cybersecurity to reveal the core strategies, challenges, and triumphs of protecting our digital and operational landscapes. We're thrilled to have you on board for an upcoming episode! Your insights and experiences are invaluable to our listeners who are eager to learn and engage with the leading minds in IT and OT security. As we gear up to dive into conversation, please feel free to share any specific topics or stories you'd like to discuss. Our audience appreciates both the technical deep-dives and the high-level overviews, so bring your unique perspective, and let's make cybersecurity accessible and engaging together. Thank you for joining us on this journey to foster a more secure future. We can't wait to hear your voice on the "PrOTect It All" podcast!
Podcast website

Listen to PrOTect It All, The Other Hand and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

PrOTect It All: Podcasts in Family

Social
v7.23.11 | © 2007-2025 radio.de GmbH
Generated: 11/7/2025 - 5:53:48 PM