Rephonic
Artwork for @BEERISAC: OT/ICS Security Podcast Playlist

@BEERISAC: OT/ICS Security Podcast Playlist

Anton Shipulin / Listen Notes
Cybersecurity
Operational Technology
Artificial Intelligence
Industrial Control Systems
Critical Infrastructure
Risk Management
Cyber Security
Operational Technology Security
OT Cybersecurity
Manufacturing
OT Security
IT Security
Industrial Cybersecurity
Digital Transformation
Cloud Computing
Ransomware
Autonomous Vehicles
Ciberseguridad Industrial
Patient Safety
Medical Devices

A curated playlist of Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity podcast episodes in any language, compiled by ICS security enthusiasts. Missing something? Contact Anton Shipulin on LinkedIn. Subscribe for updates!

PublishesDailyEpisodes300Founded7 years ago
Number of ListenersCategories
BusinessTechnology

Listen to this Podcast

Artwork for @BEERISAC: OT/ICS Security Podcast Playlist

Latest Episodes

Podcast: Exploited: The Cyber Truth

Episode: The Next Cyber Crisis Won’t Be One Hospital—It Could Be the Entire Health System

Pub date: 2026-05-14

Get Podcast Transcript →

powered by Listen411 - fast audio-to-text and summarization

In this episode... more

Podcast: Industrial Cybersecurity Insider

Episode: OT Cybersecurity: Is the Purdue Model Still Useful?

Pub date: 2026-05-12

Get Podcast Transcript →

powered by Listen411 - fast audio-to-text and summarization

Is the Purdue Model outdated, or simply... more

Podcast: Error Code (LS 27 · TOP 10% what is this?)

Episode: EP 86: The Trusted Channel: AT Command Exploits and Cellular IoT Security

Pub date: 2026-05-12

Get Podcast Transcript →

powered by Listen411 - fast audio-to-text and summarization

Cellula... more

Podcast: OT Security Made Simple

Episode: Das digitale Nervensystem: Warum Gebäudeautomation echte OT ist | OT Security Made Simple

Pub date: 2026-05-12

Get Podcast Transcript →

powered by Listen411 - fast audio-to-text and summarization

Klaus Moch... more

Key Facts

Accepts Guests
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Industrial Cybersecurity Insider
Industrial Cybersecurity InsiderIndustrial Cybersecurity Insider
PrOTect It All
PrOTect It AllAaron Crow
Hacker And The Fed
Hacker And The FedChris Tarbell & Hector Monsegur

Recent Guests

Rod Locke
Fortinet security executive
Fortinet
Episode: Decoding the IEC 62443-4-1 Standard for OT
Heather Jordan
Microbiologist and site director for Mississippi State University at the NSF Center for Insect Biomanufacturing and Innovations
Mississippi State University / Center for Insect Biomanufacturing and Innovation
Episode: Your Food Waste Has a Second Life. Meet Insect Agriculture with Dr. Heather Jordan & Cheryl Preyer
Cheryl Prior
Industry liaison officer for the Center for Insect Biomanufacturing and Innovation
CB, NSF IUCRC Center for Insect Biomanufacturing and Innovation
Episode: Your Food Waste Has a Second Life. Meet Insect Agriculture with Dr. Heather Jordan & Cheryl Preyer
Lola Fernández
Responsable de seguridad y riesgo de producto
ConBrense
Episode: 1/4 Contexto de la Resiliencia Colectiva en el Sector Ferroviario
Omar Benjumea
Experto en ciberseguridad del sector ferroviario
Norbremse (contexto laboral en transiciones ferroviarias)
Episode: 1/4 Contexto de la Resiliencia Colectiva en el Sector Ferroviario
Costin Raiu
Cybersecurity researcher and leader within the podcast discussion
Kaspersky/CRYPU (as referenced in discussion)
Episode: Cracking the Fast16 sabotage malware mystery
Vitaliy Kamluk
Cybersecurity researcher contributing to the Fast16 discussion
SentinelLabs
Episode: Cracking the Fast16 sabotage malware mystery
Andy Greenberg
Security journalist and author
Wired
Episode: Cracking the Fast16 sabotage malware mystery
Juan Andres
Journalist/analyst involved in coverage of the Fast16 project
Wired/SentinelOne collaboration referenced
Episode: Cracking the Fast16 sabotage malware mystery

Reviews

4.8 out of 5 stars from 25 ratings
  • Podcast doesn’t play while on VPN.

    Podcast doesn’t play while on VPN.

    Apple Podcasts
    1
    [REDACTED] USER
    United States3 years ago
  • Great list

    I am a co-host of the Industrial Security podcast - one of the podcasts routinely featured in the BeerISAC list. I really appreciate having this list around - other podcasters have good and relevant content and this list means I don’t have to go finding that other content myself! Thanks guys!

    Andrew Ginter

    Apple Podcasts
    5
    andrew ginter
    Canada6 years ago
  • Thank you!!!

    Anton — thank you for curating and making it available on iTunes.

    Apple Podcasts
    5
    Brad from NoVA
    United States7 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners appreciate the curated content, highlighting its relevance and quality.
Feedback suggests a strong community interest in addressing cybersecurity challenges in operational technology.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#115
Saudi Arabia/Technology

Talking Points

Recent interactions between the hosts and their guests.

Decoding the IEC 62443-4-1 Standard for OT
Q: How does 62443 interact with regulatory compliance in different sectors?
62443 provides a flexible, open-ended framework that can map to sector-specific regulations (e.g., NERC-CIP, maritime standards), helping organizations target a recognized baseline even in less regulated environments.
Decoding the IEC 62443-4-1 Standard for OT
Q: What is the practical difference between 4-1 and 4-2 for a typical OT vendor?
4-1 is about the secure development practices and lifecycle, while 4-2 is the product-specific certification that validates those practices on particular products or product families before customers accept them as secure deployments.
Decoding the IEC 62443-4-1 Standard for OT
Q: How do maturity levels relate to real-world product certification and vendor readiness?
Maturity levels start with defined practices (level 1) and progress toward more systematic, auditable procedures; achieving higher levels signals that a vendor has established stable security discipline, which then supports 4-2 product certifications when combined with the certification process.
Decoding the IEC 62443-4-1 Standard for OT
Q: What is IEC 62443-4-1 and why should OT security teams care about it?
4-1 focuses on secure product design lifecycle elements, including how a product is designed, how its security features are verified, and how the vendor maintains security updates in the field, which helps teams trust that products meet auditable security practices.
From NFL to OT Cybersecurity Why Trust and Teamwork Matter More Than Tools | Aaron Crow
Q: Please introduce yourself and share your background.
Sean Tufts introduces himself as a field CTO at Claroty, describes his unconventional career path from NFL linebacker to cyber security in the OT space, and explains how his background informs his approach to OT/ICS security and team-building.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About This Podcast

What is This Podcast about and what kind of topics does it cover?

Focused on the intersection of cybersecurity and operational technology (OT), this series features episodes that explore essential topics such as critical infrastructure security, medical device vulnerabilities, and cybersecurity strategies for the industrial sector. Each episode includes insights from experts, discussing the complexities of hybrid warfare, regulatory compliance, and the latest technological advancements aimed at enhancing security measures in challenging environments. The series is particularly notable for its emphasis on practical advice and real-world applications within various industries, making it a valuable resource for cybersecurity professionals and organizations looking to strengthen their defense mechanisms again... more

Where can I find podcast stats for this podcast?

Rephonic provides a wide range of podcast stats for this podcast. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to this podcast and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does this podcast get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for this podcast, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for this podcast?

Rephonic provides comprehensive predictive audience data for this podcast, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does this podcast have?

To see how many followers or subscribers this podcast has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to this podcast?

These podcasts share a similar audience with this podcast:

1. Industrial Cybersecurity Insider
2. PrOTect It All
3. Cybersecurity Today
4. SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
5. Hacker And The Fed

How many episodes of this podcast are there?

this podcast launched 7 years ago and published 300 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact this podcast?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for this podcast?

Rephonic pulls ratings and reviews for this podcast from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for this podcast?

Rephonic provides full transcripts for episodes of this podcast. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on this podcast?

Recent guests on this podcast include:

1. Rod Locke
2. Heather Jordan
3. Cheryl Prior
4. Lola Fernández
5. Omar Benjumea
6. Costin Raiu
7. Vitaliy Kamluk
8. Andy Greenberg

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days