Rephonic
Artwork for Security Breach

Security Breach

Eric Sorensen
Ransomware
Cybersecurity
Industrial Cybersecurity
Manufacturing
Operational Technology
Cybersecurity Threats
Artificial Intelligence
Manufacturing Sector
Legacy Systems
Phishing Schemes
Automation
Budget Constraints In Cybersecurity
Colonial Pipeline
Denial Of Service Attacks
Supply Chain Attacks
Zero Trust
Phishing
AI In Cybersecurity
SOC (security Operations Center)
Vulnerability Assessments

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

PublishesTwice monthlyEpisodes151Founded4 years ago
Number of ListenersCategories
NewsTechnologyTech News

Listen to this Podcast

Artwork for Security Breach

Latest Episodes

Send a text

Last December the Cybersecurity and Infrastructure Security Agency, or CISA, issued an advisory warning manufacturers, operators of critical infrastructure, and really anybody associated with industrial control systems about the threats ... more

Send us a text

When we talk about the challenges presented to those trying to secure the operational landscape of manufacturing, it’s tough to avoid what I’d call the usual suspects - endpoints, connection points, credentials, vulnerabilities, silos... more

Send us a text

Back in 2020, the Department of Defense, as it was called at the time, introduced the Cybersecurity Maturity Model Certification (CMMC). It carried the goal of ensuring companies would be able to protect sensitive information when wor... more

Send us a text

"You don't have to get hacked to understand how you can get hacked."

While I utilize that editorial director title to introduce myself before every episode of Security Breach, it’s not the title that I’ve used the longest, think abou... more

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Recent Guests

Nick Oram
Senior Manager of Domain and Dark Web Monitoring Solutions
Fortra
Episode: IABs, Dark Web Fueling Ransomware Surge
Rob Larson
Cybersecurity Specialist
Episode: The Evolution of OT Vulnerabilities
Paul Shaver
Cybersecurity Specialist with experience in the energy sector
Mandiant
Episode: The Evolution of OT Vulnerabilities
Will Capaccio
Expert in bug bounty programs
HackerOne
Episode: The Evolution of OT Vulnerabilities
Jesse Varsalone
Co-author of The Hack is Back and cybersecurity expert
Episode: The Evolution of OT Vulnerabilities
Will Capsio
Hacker and cybersecurity expert at HackerOne, specializing in AI-driven security solutions.
HackerOne
Episode: The Legacy of AI in Cybersecurity
Noam Moshe
Cybersecurity expert and member of Claroty's Team82
Claroty
Episode: A Happy Ending to the Latest ICS Hack
Jon Taylor
Cybersecurity expert at Versa
Versa
Episode: Looking Back to Move Forward
Jeff Krall
Analyzes ransomware tactics for Baker Tilley
Baker Tilley
Episode: Looking Back to Move Forward

Host

Jeff Franke
Editorial Director of Manufacturing.net and Manufacturing Business Technology

Reviews

5.0 out of 5 stars from 2 ratings
  • Yay

    Yay

    Apple Podcasts
    5
    🐻🐤🐰🦊FNAF
    United States9 months ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Many find the content both educational and engaging, aiding in their understanding of complex topics.
Listeners appreciate the timely discussions and expert insights on relevant cybersecurity challenges.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#139
Ireland/News/Tech News

Talking Points

Recent interactions between the hosts and their guests.

'Nobody Should Get Ransomwared'
Q: What are some of the biggest changes you've seen over the years regarding cybersecurity threats?
Vendors are starting to take action by implementing built-in firewalling in newer systems, although retrofitting older systems remains a challenge.
The Dollars and Sense of Cybersecurity
Q: What are you seeing in working with manufacturers to break down IT and OT silos?
Lovejoy notes there are organizations making progress, but many critical sectors still lag due to funding and cultural challenges.
The Dollars and Sense of Cybersecurity
Q: Where do you typically start when working with a manufacturer?
Starting with examining what the organization has and identifying connections to the internet, especially for those with lower maturity in cybersecurity.
The Dollars and Sense of Cybersecurity
Q: What drew you to getting involved in manufacturing?
Chris Lovejoy shares about an incident involving a manufacturing company that faced cyber threats during the early pandemic, prompting his deep dive into manufacturing's unique cybersecurity challenges.
The Protection and Productivity of Zero Trust
Q: Roman, do you think there's a culture in manufacturing when it comes to security that just hasn't become the priority that it should be yet?
Yes, there is a mentality that cybersecurity won't happen to them, and production focuses remain primary, often pushing cyber concerns to the back.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Security Breach

What is Security Breach about and what kind of topics does it cover?

A hub for timely and engaging discussions, focused on the latest developments in cybersecurity, particularly as they relate to the industrial sector in the U.S. Recent episodes cover topics such as ransomware, malware, phishing schemes, and DDoS attacks, showcasing the evolving landscape of cyber threats. With expert guests and hosts providing insights, listeners gain a deep understanding of the challenges and strategies associated with securing operational technologies and manufacturing environments. Discussions often highlight real-world case studies and proactive measures, making the content relevant for professionals looking to stay ahead in cybersecurity.

Where can I find podcast stats for Security Breach?

Rephonic provides a wide range of podcast stats for Security Breach. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Security Breach and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Security Breach get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Security Breach, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Security Breach?

Rephonic provides comprehensive predictive audience data for Security Breach, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Security Breach have?

To see how many followers or subscribers Security Breach has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Security Breach?

These podcasts share a similar audience with Security Breach:

1. Darknet Diaries
2. Cybersecurity Headlines

How many episodes of Security Breach are there?

Security Breach launched 4 years ago and published 151 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Security Breach?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Security Breach?

Rephonic pulls ratings and reviews for Security Breach from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Security Breach?

Rephonic provides full transcripts for episodes of Security Breach. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Security Breach?

Recent guests on Security Breach include:

1. Nick Oram
2. Rob Larson
3. Paul Shaver
4. Will Capaccio
5. Jesse Varsalone
6. Will Capsio
7. Noam Moshe
8. Jon Taylor

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days