172 episodes

SC Media, and our sponsor Arctic Wolf, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.

CISO Stories Podcast (Audio‪)‬ SC Media

    • Technology
    • 4.6 • 11 Ratings

SC Media, and our sponsor Arctic Wolf, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.

    The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171

    The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171

    For manufacturing companies, technology has taken over a good deal of the day-to-day operations occurring on the manufacturing floor. Things like robotics, CNC machines and automated inventory management. There are even systems that track what tools are used, by whom and for how long. This technology often works outside of or flies under the radar of traditional IT processes. For critical infrastructure, we are hooking up legacy systems to larger networks. Industrial control systems, that were never designed to be attached to the Internet, are now exposed to a wide array of new threats and attacks. Aside from those risks, digital sensors can be attached to almost anything these days, making everything "smart". And with the ability for sensors to also be controllers the risks levels are rising quickly.
    This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-171

    • 28 min
    The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170

    The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170

    Manufacturing environments rely heavily on Operational Technology (OT) systems – such as industrial control systems, supervisory control, PLCs etc. to manage production processes. Compromises of these networks and systems can have devastating consequences, including: • Production disruptions and downtime • Safety hazards: • Data breaches and intellectual property theft: • Financial losses: Ransomware attacks can cripple operations and demand hefty payments. Manufacturing is a lucrative target for Ransomware. • There is little tolerance for downtime. • Difficulty in managing OT environments (different skillsets) • Increasing connectivity between IT and OT due to digital transformation Incidents such as the well documented Colonial Pipeline attack along with other manufacturing companies like Dole, and Brunswick continue to highlight the growing threat landscape for OT security in manufacturing.
    This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-170

    • 30 min
    Tips for a Successful Cyber Resilience Program - Olusegun Opeyemi-Ajayi - CSP #169

    Tips for a Successful Cyber Resilience Program - Olusegun Opeyemi-Ajayi - CSP #169

    The cybersecurity threat landscape is constantly evolving, and experience has shown that everyone and every organization is prone to being breached. How do you prepare for what seems inevitable? You assume breach and plan accordingly. Cyber resilience has become a top priority as organizations figure out how to build a network that can either continue functioning or can recover quickly when faced with cybersecurity attack.
    This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-169

    • 31 min
    Operational Technology (OT) and the Art of War - Glenn Kapetansky - CSP #168

    Operational Technology (OT) and the Art of War - Glenn Kapetansky - CSP #168

    Operational Technology (OT) security is concerned with protecting embedded, purpose-built technologies enabling our industrial processes. You also may have heard “adjacent” buzzwords like Internet of Things (IOT) and Fog (like “cloud” but close to the ground). OT security has significant challenges in terms of cost/size/weight, capability, ability to be updated, and robustness (often, OT failures can endanger lives). More recently, as cyber warfare evolves, OT is one of two main attack vectors. This session will explore the threats, and ability to manage them, using war stories.
    This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-168

    • 32 min
    Third-Party Risk Management - BEC Compromises and the Cloud - Michael Swinarski - CSP #167

    Third-Party Risk Management - BEC Compromises and the Cloud - Michael Swinarski - CSP #167

    Third-Party Risk Management is essential for safeguarding an organization's assets, reputation, and operations. By identifying, assessing, and managing risks associated with external partners, organizations can enhance their resilience, protect sensitive information, and maintain the trust of stakeholders in an increasingly interconnected business ecosystem. We have seen the threat landscape change in the last few years. It has always been important to properly identify, categorize, and address risks created by our vendors and strategic partners, to now having to understand the entire supply chain, and how interruptions can affect your business. Even more recently, with the rise of Business Email Compromise (BEC), risks may also come from organizations you have no previous relationship or agreements with.
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-167

    • 23 min
    52,000 Suppliers:Third-Party Supply Chain CyberRisk Approach - Cassie Crossley - CSP #166

    52,000 Suppliers:Third-Party Supply Chain CyberRisk Approach - Cassie Crossley - CSP #166

    Schneider Electric has over 52,000 suppliers and sells hundreds of thousands of products of which 15,000 would be classified as intelligent products. To address risks stemming from third-party suppliers, and in recognition of the risks posed to customers, we have a holistic approach to value chain security, by implementing security controls at every level (R&D, Design, Manufacturing, Distribution, Staging, Commissioning and Operating). This approach is guided by policies and regulations, continuously evolving to improve our maturity. On the Third-party Cyber posture level, Schneider Electric partners across the industry to raise cybersecurity maturity, with the World Economic Forum (WEF), ISA Global Cybersecurity Alliance (ISAGCA), and Cyber Tech Accord. We specifically have a tiered third-party risk management program which evaluates suppliers through evidenced-based reviews of their secure development processes and cybersecurity posture.
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-166

    • 30 min

Customer Reviews

4.6 out of 5
11 Ratings

11 Ratings

naith1988 ,

So many great guests. Thank you Todd!

Love this series

Cyber_Decker ,

Excellence

Todd Fitzgerald is one of the best cyber leaders, author and now podcaster. When I heard he was doing a podcast, I signed up immediately. Great stuff here!

emarchewka ,

Great Take-Aways

Great take-always from people living this everyday.

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod
The Neuron: AI Explained
The Neuron
TED Radio Hour
NPR

You Might Also Like

CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis
Defense in Depth
David Spark
Cyber Security Headlines
CISO Series
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Risky Business
Patrick Gray
CyberWire Daily
N2K Networks