Rephonic
Artwork for Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

Industrial Cybersecurity Insider
Cybersecurity
Operational Technology
Industrial Cybersecurity
Manufacturing
Industrial Control Systems
OT Cybersecurity
Ransomware
Velta Technology
IT and OT Convergence
Information Technology
Artificial Intelligence
Operational Technology Cybersecurity
It-Ot Convergence
Operational Technology (OT)
Claroty
CISO
Cyber Insurance
Asset Inventory
Risk Management
IT Security

Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know ... more

PublishesWeeklyEpisodes126Founded3 years ago
Number of ListenersCategories
ManagementNewsBusinessBusiness News

Listen to this Podcast

Artwork for Industrial Cybersecurity Insider

Latest Episodes

Is the Purdue Model outdated, or simply misunderstood? In this episode, Dino sits down with Ken Kully (Rockwell Automation) for a candid, practitioner-level conversation about what the Purdue Model still gets right.

They discuss where it falls short... more

YouTube

Dino and Jim break down a major shift in the cyber threat landscape: federal agencies obtaining legal authority to enter private networks to hunt down state-sponsored malware, and what that signals for industrial organizations.

They discuss why cri... more

YouTube

A real-world case study shows how a single phishing email led to credential and MFA compromise, creating an urgent question for any industrial organization: Did the attacker reach the OT environment?

Dino and Jim walk through how OT visibility, sec... more

YouTube

In this episode, Dino and LuRae address why system integrators, OEMs, and ecosystem partners are often a manufacturer’s most underused cybersecurity resource.

Dino explains why many IT leaders lack real visibility into the plant floor, what it take... more

YouTube

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

@BEERISAC: OT/ICS Security Podcast Playlist
@BEERISAC: OT/ICS Security Podcast PlaylistAnton Shipulin / Listen Notes
CISO Series Podcast
CISO Series PodcastDavid Spark, Mike Johnson, and Andy Ellis
PrOTect It All
PrOTect It AllAaron Crow

Recent Guests

Ken Kally
Rockwell Automation executive guest, OT cybersecurity expert
Rockwell Automation
Episode: OT Cybersecurity: Is the Purdue Model Still Useful?
Jim Cope
Industry professional discussed as a guest for the episode
Episode: The Phishing Attack That Could Have Shut Down a Plant Floor
Dino Busalachi
Industry expert discussing ecosystem partners as cybersecurity assets
Episode: Your Most Valuable & Underutilized Cybersecurity Asset
Shellie D'Angelo
CIO and Chief Enterprise Architect with 15+ years in manufacturing and distribution
Manufacturing and distribution companies (aerospace/defense, life sciences, automotive)
Episode: You Think Your Plant Is Secure. Your Data Says Otherwise.
Simon Chassar
OT cybersecurity executive with a track record at Claroty and other OT/IoT cybersecurity ventures
Claroty (former CRO); investor/advisor in OT cybersecurity
Episode: Two Major Cybersecurity Shifts the Industry Isn't Prepared For with Simon Chassar
Dick Wilkinson
CTO and co-founder of Proof Labs
Proof Labs
Episode: Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to Manufacturing
Guest 1
Expert in Operational Technology and cybersecurity
Episode: Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security
Guest 2
Senior advisor on cybersecurity strategies for manufacturing
Episode: Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security
Guest 3
Operations manager with experience in IT and OT convergence
Episode: Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security

Hosts

Craig Duckworth
Co-host of Industrial Cybersecurity Insider; frequent guest hosting and subject-matter expert on IT/OT security, OT/IT integration, and manufacturing cybersecurity.
Dino Pusulaki
Co-host and frequent guest; specializes in OT/IT cybersecurity convergence within manufacturing and industrial environments.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Talking Points

Recent interactions between the hosts and their guests.

Your Most Valuable & Underutilized Cybersecurity Asset
Q: How should organizations prove ROI for OT cybersecurity investments beyond insurance?
Quantify the cost of downtime and production loss from potential incidents, compare against the budget for OT cybersecurity, and highlight the value of leveraging trusted partners who already understand the plant and its risks.
Your Most Valuable & Underutilized Cybersecurity Asset
Q: What is the best practice to inventory existing partners and start security conversations with them?
Start by engaging plant leadership to identify the right contacts, then inventory all assets across OT and IT, map relationships with system integrators and OEMs, and establish a plan to include those partners in cybersecurity conversations and roadmaps.
You Think Your Plant Is Secure. Your Data Says Otherwise.
Q: What final advice would you offer listeners who are early in their journey toward OT/IT convergence?
Turn chaos into cash by aligning governance with business goals, ensuring data quality, and communicating risk honestly up to the CEO and board to enable fast, secure decision-making.
You Think Your Plant Is Secure. Your Data Says Otherwise.
Q: How should an organization approach starting from foundational visibility to a mature governance structure?
Start by understanding what you truly have underneath the hood, then use a combination of scan tools to map the environment, while avoiding shadow IT and ensuring owned, vetted data flows into governance processes.
You Think Your Plant Is Secure. Your Data Says Otherwise.
Q: So let's just kick it off and jump right in. What would you say organizations need to consider as they move data from the plant into the enterprise to decide governance and risk?
Begin with a deep understanding of the business and the data landscape, then establish data governance that aligns with security. Centralize the relevant data, ensure data quality, and build a foundation of governance before selecting tools.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Industrial Cybersecurity Insider

What is Industrial Cybersecurity Insider about and what kind of topics does it cover?

Industrial Cybersecurity Insider provides in-depth conversations at the intersection of information technology and operational technology within manufacturing and critical infrastructure. Episodes frequently explore how OT and IT security differ in practice, the challenges of securing industrial control systems, and strategies to bridge gaps between engineering, production, and cybersecurity teams. Notable recurring angles include the role of leadership and budgeting in OT security, the impact of aging industrial IT on risk, and practical defense approaches such as tabletop exercises, asset visibility, and collaboration with suppliers and OEMs. The show often features practitioners and thought leaders discussing real-world incidents, govern... more

Where can I find podcast stats for Industrial Cybersecurity Insider?

Rephonic provides a wide range of podcast stats for Industrial Cybersecurity Insider. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Industrial Cybersecurity Insider and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Industrial Cybersecurity Insider get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Industrial Cybersecurity Insider, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Industrial Cybersecurity Insider?

Rephonic provides comprehensive predictive audience data for Industrial Cybersecurity Insider, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Industrial Cybersecurity Insider have?

To see how many followers or subscribers Industrial Cybersecurity Insider has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Industrial Cybersecurity Insider?

These podcasts share a similar audience with Industrial Cybersecurity Insider:

1. @BEERISAC: OT/ICS Security Podcast Playlist
2. CISO Series Podcast
3. PrOTect It All
4. Commodity Culture
5. SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

How many episodes of Industrial Cybersecurity Insider are there?

Industrial Cybersecurity Insider launched 3 years ago and published 126 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Industrial Cybersecurity Insider?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Industrial Cybersecurity Insider?

Rephonic pulls ratings and reviews for Industrial Cybersecurity Insider from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Industrial Cybersecurity Insider?

Rephonic provides full transcripts for episodes of Industrial Cybersecurity Insider. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Industrial Cybersecurity Insider?

Recent guests on Industrial Cybersecurity Insider include:

1. Ken Kally
2. Jim Cope
3. Dino Busalachi
4. Shellie D'Angelo
5. Simon Chassar
6. Dick Wilkinson
7. Guest 1
8. Guest 2

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days