<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:podcast="https://podcastindex.org/namespace/1.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"
    xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:spotify="http://www.spotify.com/ns/rss">
    <channel>
        <title>PrOTect It All</title>
        <generator>Castos</generator>
        <atom:link href="https://feeds.castos.com/qomzq" rel="self" type="application/rss+xml" />
        <link>https://protectitallpod.com/</link>
        <description>PrOTect IT All is a weekly cybersecurity podcast covering the full spectrum. IT, OT, cloud, AI, IoT, and everything in between. Host Aaron Crow sits down with practitioners, leaders, and builders for real conversations about people, process, and technology. From securing power plants and manufacturing floors to navigating enterprise risk and emerging threats, this show is about how we actually protect the things that matter. No product pitches. No hype. Just the people doing the work, sharing what they&#039;ve learned.</description>
        <lastBuildDate>Mon, 13 Apr 2026 12:40:54 +0000</lastBuildDate>
        <language>en</language>
        <copyright>© 2024</copyright>
        
        <spotify:limit recentCount="999" />
        
        <spotify:countryOfOrigin>
              
        </spotify:countryOfOrigin>
                    <image>
                <url>https://episodes.castos.com/65a3de233ee354-30886570/images/podcast/covers/c1a-w52rp-gdqdq96pum57-e3j1pr.png</url>
                <title>PrOTect It All</title>
                <link>https://protectitallpod.com/</link>
            </image>
                <itunes:subtitle>PrOTect IT All is a weekly cybersecurity podcast covering the full spectrum. IT, OT, cloud, AI, IoT, and everything in between. Host Aaron Crow sits down with practitioners, leaders, and builders for real conversations about people, process, and technology. From securing power plants and manufacturing floors to navigating enterprise risk and emerging threats, this show is about how we actually protect the things that matter. No product pitches. No hype. Just the people doing the work, sharing what they&#039;ve learned.</itunes:subtitle>
        <itunes:author>Aaron Crow</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:summary>PrOTect IT All is a weekly cybersecurity podcast covering the full spectrum. IT, OT, cloud, AI, IoT, and everything in between. Host Aaron Crow sits down with practitioners, leaders, and builders for real conversations about people, process, and technology. From securing power plants and manufacturing floors to navigating enterprise risk and emerging threats, this show is about how we actually protect the things that matter. No product pitches. No hype. Just the people doing the work, sharing what they&#039;ve learned.</itunes:summary>
        <itunes:owner>
            <itunes:name>Aaron Crow</itunes:name>
            <itunes:email>info@protectitall.co</itunes:email>
        </itunes:owner>
        <itunes:explicit>false</itunes:explicit>
                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/podcast/covers/c1a-w52rp-gdqdq96pum57-e3j1pr.png"></itunes:image>
        
                                    <itunes:category text="Technology" />
                                                <itunes:category text="Business" />
                                                <itunes:category text="Education" />
                    
                    <itunes:new-feed-url>https://feeds.castos.com/qomzq</itunes:new-feed-url>
                
        
        <podcast:locked>yes</podcast:locked>
                                    <item>
                <title>
                    <![CDATA[OT Risk Management That Works: Asset Visibility, Risk Quantification & CISO-Level Strategy]]>
                </title>
                <pubDate>Mon, 13 Apr 2026 12:40:54 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2420291</guid>
                                    <link>https://protectitallpod.com/ep101/</link>
                                <description>
                                            <![CDATA[<p><b>You can’t manage risk you can’t measure - or even see.</b></p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with <b>Nicholas Friedman</b> to explore how organizations can move beyond compliance and build <b>real, measurable cybersecurity programs</b> across IT and OT environments.</p>
<p>With experience spanning banking, aerospace, and critical infrastructure, Nicholas shares how <b>risk management principles translate across industries</b> - and why understanding business context is critical to protecting operational systems.</p>
<p><b>This conversation dives into one of the biggest challenges in OT today: asset visibility and risk quantification</b>. From outdated spreadsheets to modern automation, Aaron and Nicholas break down what it actually takes to understand exposure, justify investment, and communicate risk at the board level.</p>
<p><b>You’ll learn:</b></p>
<ul>
<li style="font-weight:400;">Why <b>asset inventory is the foundation of OT security</b></li>
<li style="font-weight:400;">How to move from <b>compliance checklists to real risk reduction</b></li>
<li style="font-weight:400;">The importance of <b>risk quantification for CISOs and executives</b></li>
<li style="font-weight:400;">How to communicate cybersecurity in <b>business and financial terms</b></li>
<li style="font-weight:400;">The role of automation and knowledge transfer in scaling security programs</li>
<li style="font-weight:400;">Lessons from banking and aerospace applied to <b>utilities and critical infrastructure</b></li>
</ul>
<p>Whether you’re leading a cybersecurity program, managing OT environments, or presenting to the board, this episode delivers <b>practical strategies to align security with business value and measurable outcomes</b>.</p>
<p> <b>Tune in to learn how to turn cybersecurity into a risk-driven, business-aligned strategy - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>05:14 Understanding business risk basics</p>
<p>08:40 Building effective OT cybersecurity teams</p>
<p>13:26 Challenges with aging IT and OT systems</p>
<p>14:19 Organizing IT and OT assets</p>
<p>18:31 Understanding OT and IT risks</p>
<p>21:53 Evaluating security risks and priorities</p>
<p>25:31 Improving asset deployment and management</p>
<p>29:14 Evaluating and prioritizing risks</p>
<p>31:12 Shifting focus to success plans</p>
<p>35:59 Selling tech that delivers results</p>
<p>37:22 Hands-on approach to cybersecurity</p>
<p>42:39 Challenges with NERC audit processes</p>
<p>44:47 Balancing compliance and security</p>
<p>49:45 Challenges in power utility operations</p>
<p>51:55 AI, OT, and risk management</p>
<p>56:31 Importance of early compliance planning</p>
<p><b>About the guest : </b></p>
<p>Nicholas Friedman is an enterprise risk and governance leader with 25+ years of experience across Fortune 500 companies and government sectors. He specializes in integrated risk management, compliance, and AI governance - helping organizations build scalable frameworks that align security, risk, and business resilience.</p>
<p><b>How to connect </b><b>Nicholas Friedman : </b></p>
<p>Linkedin :  <a href="https://www.linkedin.com/in/nicholasfriedman/">https://www.linkedin.com/in/nicholasfriedman/</a></p>
<p>Website : <a href="https://www.templarshield.com/">https://www.templarshield.com/</a></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[You can’t manage risk you can’t measure - or even see.
In this episode of Protect It All, host Aaron Crow sits down with Nicholas Friedman to explore how organizations can move beyond compliance and build real, measurable cybersecurity programs across IT and OT environments.
With experience spanning banking, aerospace, and critical infrastructure, Nicholas shares how risk management principles translate across industries - and why understanding business context is critical to protecting operational systems.
This conversation dives into one of the biggest challenges in OT today: asset visibility and risk quantification. From outdated spreadsheets to modern automation, Aaron and Nicholas break down what it actually takes to understand exposure, justify investment, and communicate risk at the board level.
You’ll learn:

Why asset inventory is the foundation of OT security
How to move from compliance checklists to real risk reduction
The importance of risk quantification for CISOs and executives
How to communicate cybersecurity in business and financial terms
The role of automation and knowledge transfer in scaling security programs
Lessons from banking and aerospace applied to utilities and critical infrastructure

Whether you’re leading a cybersecurity program, managing OT environments, or presenting to the board, this episode delivers practical strategies to align security with business value and measurable outcomes.
 Tune in to learn how to turn cybersecurity into a risk-driven, business-aligned strategy - only on Protect It All.
Key Moments: 
05:14 Understanding business risk basics
08:40 Building effective OT cybersecurity teams
13:26 Challenges with aging IT and OT systems
14:19 Organizing IT and OT assets
18:31 Understanding OT and IT risks
21:53 Evaluating security risks and priorities
25:31 Improving asset deployment and management
29:14 Evaluating and prioritizing risks
31:12 Shifting focus to success plans
35:59 Selling tech that delivers results
37:22 Hands-on approach to cybersecurity
42:39 Challenges with NERC audit processes
44:47 Balancing compliance and security
49:45 Challenges in power utility operations
51:55 AI, OT, and risk management
56:31 Importance of early compliance planning
About the guest : 
Nicholas Friedman is an enterprise risk and governance leader with 25+ years of experience across Fortune 500 companies and government sectors. He specializes in integrated risk management, compliance, and AI governance - helping organizations build scalable frameworks that align security, risk, and business resilience.
How to connect Nicholas Friedman : 
Linkedin :  https://www.linkedin.com/in/nicholasfriedman/
Website : https://www.templarshield.com/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[OT Risk Management That Works: Asset Visibility, Risk Quantification & CISO-Level Strategy]]>
                </itunes:title>
                                    <itunes:episode>101</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><b>You can’t manage risk you can’t measure - or even see.</b></p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with <b>Nicholas Friedman</b> to explore how organizations can move beyond compliance and build <b>real, measurable cybersecurity programs</b> across IT and OT environments.</p>
<p>With experience spanning banking, aerospace, and critical infrastructure, Nicholas shares how <b>risk management principles translate across industries</b> - and why understanding business context is critical to protecting operational systems.</p>
<p><b>This conversation dives into one of the biggest challenges in OT today: asset visibility and risk quantification</b>. From outdated spreadsheets to modern automation, Aaron and Nicholas break down what it actually takes to understand exposure, justify investment, and communicate risk at the board level.</p>
<p><b>You’ll learn:</b></p>
<ul>
<li style="font-weight:400;">Why <b>asset inventory is the foundation of OT security</b></li>
<li style="font-weight:400;">How to move from <b>compliance checklists to real risk reduction</b></li>
<li style="font-weight:400;">The importance of <b>risk quantification for CISOs and executives</b></li>
<li style="font-weight:400;">How to communicate cybersecurity in <b>business and financial terms</b></li>
<li style="font-weight:400;">The role of automation and knowledge transfer in scaling security programs</li>
<li style="font-weight:400;">Lessons from banking and aerospace applied to <b>utilities and critical infrastructure</b></li>
</ul>
<p>Whether you’re leading a cybersecurity program, managing OT environments, or presenting to the board, this episode delivers <b>practical strategies to align security with business value and measurable outcomes</b>.</p>
<p> <b>Tune in to learn how to turn cybersecurity into a risk-driven, business-aligned strategy - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>05:14 Understanding business risk basics</p>
<p>08:40 Building effective OT cybersecurity teams</p>
<p>13:26 Challenges with aging IT and OT systems</p>
<p>14:19 Organizing IT and OT assets</p>
<p>18:31 Understanding OT and IT risks</p>
<p>21:53 Evaluating security risks and priorities</p>
<p>25:31 Improving asset deployment and management</p>
<p>29:14 Evaluating and prioritizing risks</p>
<p>31:12 Shifting focus to success plans</p>
<p>35:59 Selling tech that delivers results</p>
<p>37:22 Hands-on approach to cybersecurity</p>
<p>42:39 Challenges with NERC audit processes</p>
<p>44:47 Balancing compliance and security</p>
<p>49:45 Challenges in power utility operations</p>
<p>51:55 AI, OT, and risk management</p>
<p>56:31 Importance of early compliance planning</p>
<p><b>About the guest : </b></p>
<p>Nicholas Friedman is an enterprise risk and governance leader with 25+ years of experience across Fortune 500 companies and government sectors. He specializes in integrated risk management, compliance, and AI governance - helping organizations build scalable frameworks that align security, risk, and business resilience.</p>
<p><b>How to connect </b><b>Nicholas Friedman : </b></p>
<p>Linkedin :  <a href="https://www.linkedin.com/in/nicholasfriedman/">https://www.linkedin.com/in/nicholasfriedman/</a></p>
<p>Website : <a href="https://www.templarshield.com/">https://www.templarshield.com/</a></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p><b>To be a guest or suggest a guest/episode, please email us at</b> <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2420291/c1e-jg87nu44mdjtpkx5v-v6vzw06xtj8r-kozhyg.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2420291&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=32cae8b85600c6731330b534e1309e37b85e39dd4d3fa75995143b07f2cee63b" length="58280298"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[You can’t manage risk you can’t measure - or even see.
In this episode of Protect It All, host Aaron Crow sits down with Nicholas Friedman to explore how organizations can move beyond compliance and build real, measurable cybersecurity programs across IT and OT environments.
With experience spanning banking, aerospace, and critical infrastructure, Nicholas shares how risk management principles translate across industries - and why understanding business context is critical to protecting operational systems.
This conversation dives into one of the biggest challenges in OT today: asset visibility and risk quantification. From outdated spreadsheets to modern automation, Aaron and Nicholas break down what it actually takes to understand exposure, justify investment, and communicate risk at the board level.
You’ll learn:

Why asset inventory is the foundation of OT security
How to move from compliance checklists to real risk reduction
The importance of risk quantification for CISOs and executives
How to communicate cybersecurity in business and financial terms
The role of automation and knowledge transfer in scaling security programs
Lessons from banking and aerospace applied to utilities and critical infrastructure

Whether you’re leading a cybersecurity program, managing OT environments, or presenting to the board, this episode delivers practical strategies to align security with business value and measurable outcomes.
 Tune in to learn how to turn cybersecurity into a risk-driven, business-aligned strategy - only on Protect It All.
Key Moments: 
05:14 Understanding business risk basics
08:40 Building effective OT cybersecurity teams
13:26 Challenges with aging IT and OT systems
14:19 Organizing IT and OT assets
18:31 Understanding OT and IT risks
21:53 Evaluating security risks and priorities
25:31 Improving asset deployment and management
29:14 Evaluating and prioritizing risks
31:12 Shifting focus to success plans
35:59 Selling tech that delivers results
37:22 Hands-on approach to cybersecurity
42:39 Challenges with NERC audit processes
44:47 Balancing compliance and security
49:45 Challenges in power utility operations
51:55 AI, OT, and risk management
56:31 Importance of early compliance planning
About the guest : 
Nicholas Friedman is an enterprise risk and governance leader with 25+ years of experience across Fortune 500 companies and government sectors. He specializes in integrated risk management, compliance, and AI governance - helping organizations build scalable frameworks that align security, risk, and business resilience.
How to connect Nicholas Friedman : 
Linkedin :  https://www.linkedin.com/in/nicholasfriedman/
Website : https://www.templarshield.com/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2420291/c1a-w52rp-jpxjqkp9s24-wjvctl.jpg"></itunes:image>
                                                                            <itunes:duration>01:01:16</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[100 Episodes of Protect It All: Aaron Crow’s Journey Through IT, OT & Cybersecurity]]>
                </title>
                <pubDate>Mon, 06 Apr 2026 17:43:39 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2414922</guid>
                                    <link>https://protectitallpod.com/ep100/</link>
                                <description>
                                            <![CDATA[<p>In this special milestone episode of <b>Protect It All</b>, host <b>Aaron Crow</b> steps away from the usual format to share his personal journey - from early days working with PLCs at a kitchen table to building a platform that connects and educates cybersecurity professionals around the world.</p>
<p>This episode is more than a reflection - it’s a story of persistence, curiosity, and community.</p>
<p>Aaron walks through the evolution of <b>IT and OT cybersecurity</b>, the lessons learned from decades in the field, and how conversations with experts across 100 episodes have shaped his perspective on what it truly means to “Protect It All.”</p>
<p>You’ll hear:</p>
<ul>
<li style="font-weight:400;">How Aaron’s career in IT and OT began - and what kept him going</li>
<li style="font-weight:400;">The biggest lessons learned across <b>30+ years in cybersecurity</b></li>
<li style="font-weight:400;">What building a podcast taught him about <b>community and leadership</b></li>
<li style="font-weight:400;">How the industry has evolved - and what still hasn’t changed</li>
<li style="font-weight:400;">Why relationships and shared knowledge matter more than ever</li>
<li style="font-weight:400;">What’s next for the future of cybersecurity and the podcast</li>
</ul>
<p>Whether you’ve been listening since episode one or you’re just discovering the show, this episode offers <b>inspiration, perspective, and a deeper look behind the mic.</b></p>
<p> <b>Tune in to celebrate 100 episodes and the journey of protecting what matters most - only on Protect It All.</b></p>
<p>Key Moments: </p>
<p>04:12 Early tech projects and hobbies</p>
<p>09:31 First tech job setting up classrooms</p>
<p>11:20 Getting certified in IT</p>
<p>16:49 Early career in power and cybersecurity</p>
<p>18:08 Building a versatile IT team</p>
<p>24:23 Starting the cybersecurity podcast journey</p>
<p>26:28 Feeling recognized in the podcast world</p>
<p>29:22 Getting started in cybersecurity</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p><b>To be a guest or suggest a guest/episode, please email us at</b> <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this special milestone episode of Protect It All, host Aaron Crow steps away from the usual format to share his personal journey - from early days working with PLCs at a kitchen table to building a platform that connects and educates cybersecurity professionals around the world.
This episode is more than a reflection - it’s a story of persistence, curiosity, and community.
Aaron walks through the evolution of IT and OT cybersecurity, the lessons learned from decades in the field, and how conversations with experts across 100 episodes have shaped his perspective on what it truly means to “Protect It All.”
You’ll hear:

How Aaron’s career in IT and OT began - and what kept him going
The biggest lessons learned across 30+ years in cybersecurity
What building a podcast taught him about community and leadership
How the industry has evolved - and what still hasn’t changed
Why relationships and shared knowledge matter more than ever
What’s next for the future of cybersecurity and the podcast

Whether you’ve been listening since episode one or you’re just discovering the show, this episode offers inspiration, perspective, and a deeper look behind the mic.
 Tune in to celebrate 100 episodes and the journey of protecting what matters most - only on Protect It All.
Key Moments: 
04:12 Early tech projects and hobbies
09:31 First tech job setting up classrooms
11:20 Getting certified in IT
16:49 Early career in power and cybersecurity
18:08 Building a versatile IT team
24:23 Starting the cybersecurity podcast journey
26:28 Feeling recognized in the podcast world
29:22 Getting started in cybersecurity
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

To be a guest or suggest a guest/episode, please email us at info@protectitall.co
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[100 Episodes of Protect It All: Aaron Crow’s Journey Through IT, OT & Cybersecurity]]>
                </itunes:title>
                                    <itunes:episode>100</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this special milestone episode of <b>Protect It All</b>, host <b>Aaron Crow</b> steps away from the usual format to share his personal journey - from early days working with PLCs at a kitchen table to building a platform that connects and educates cybersecurity professionals around the world.</p>
<p>This episode is more than a reflection - it’s a story of persistence, curiosity, and community.</p>
<p>Aaron walks through the evolution of <b>IT and OT cybersecurity</b>, the lessons learned from decades in the field, and how conversations with experts across 100 episodes have shaped his perspective on what it truly means to “Protect It All.”</p>
<p>You’ll hear:</p>
<ul>
<li style="font-weight:400;">How Aaron’s career in IT and OT began - and what kept him going</li>
<li style="font-weight:400;">The biggest lessons learned across <b>30+ years in cybersecurity</b></li>
<li style="font-weight:400;">What building a podcast taught him about <b>community and leadership</b></li>
<li style="font-weight:400;">How the industry has evolved - and what still hasn’t changed</li>
<li style="font-weight:400;">Why relationships and shared knowledge matter more than ever</li>
<li style="font-weight:400;">What’s next for the future of cybersecurity and the podcast</li>
</ul>
<p>Whether you’ve been listening since episode one or you’re just discovering the show, this episode offers <b>inspiration, perspective, and a deeper look behind the mic.</b></p>
<p> <b>Tune in to celebrate 100 episodes and the journey of protecting what matters most - only on Protect It All.</b></p>
<p>Key Moments: </p>
<p>04:12 Early tech projects and hobbies</p>
<p>09:31 First tech job setting up classrooms</p>
<p>11:20 Getting certified in IT</p>
<p>16:49 Early career in power and cybersecurity</p>
<p>18:08 Building a versatile IT team</p>
<p>24:23 Starting the cybersecurity podcast journey</p>
<p>26:28 Feeling recognized in the podcast world</p>
<p>29:22 Getting started in cybersecurity</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p><b>To be a guest or suggest a guest/episode, please email us at</b> <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2414922/c1e-jg87nu45o6zupko3d-jpq0o98zc49z-y366ke.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2414922&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=f29e62c01fe8e36d78e39184db736d10bbfcfb1c95faad24b449740ec8f31ad9" length="33009934"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this special milestone episode of Protect It All, host Aaron Crow steps away from the usual format to share his personal journey - from early days working with PLCs at a kitchen table to building a platform that connects and educates cybersecurity professionals around the world.
This episode is more than a reflection - it’s a story of persistence, curiosity, and community.
Aaron walks through the evolution of IT and OT cybersecurity, the lessons learned from decades in the field, and how conversations with experts across 100 episodes have shaped his perspective on what it truly means to “Protect It All.”
You’ll hear:

How Aaron’s career in IT and OT began - and what kept him going
The biggest lessons learned across 30+ years in cybersecurity
What building a podcast taught him about community and leadership
How the industry has evolved - and what still hasn’t changed
Why relationships and shared knowledge matter more than ever
What’s next for the future of cybersecurity and the podcast

Whether you’ve been listening since episode one or you’re just discovering the show, this episode offers inspiration, perspective, and a deeper look behind the mic.
 Tune in to celebrate 100 episodes and the journey of protecting what matters most - only on Protect It All.
Key Moments: 
04:12 Early tech projects and hobbies
09:31 First tech job setting up classrooms
11:20 Getting certified in IT
16:49 Early career in power and cybersecurity
18:08 Building a versatile IT team
24:23 Starting the cybersecurity podcast journey
26:28 Feeling recognized in the podcast world
29:22 Getting started in cybersecurity
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

To be a guest or suggest a guest/episode, please email us at info@protectitall.co
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2414922/c1a-w52rp-6z9k75mjuj1p-djgfdi.jpeg"></itunes:image>
                                                                            <itunes:duration>00:32:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[OT Cybersecurity That Works: Budgets, Soft Skills & AI Reality for Stronger Defense]]>
                </title>
                <pubDate>Mon, 30 Mar 2026 16:07:53 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2409332</guid>
                                    <link>https://protectitallpod.com/ep099/</link>
                                <description>
                                            <![CDATA[<p>Strong OT cybersecurity programs aren’t built on tools alone, they're built on strategy, communication, and smart investment.</p>
<p>In this episode of Protect It All, host Aaron Crow is joined by cybersecurity expert Don C. Weber for a candid, real-world discussion on what it actually takes to build and sustain effective security programs across IT and OT environments.</p>
<p>From CapEx vs OpEx decisions to the growing role of AI in both attack and defense, this conversation cuts through the noise and focuses on what drives real outcomes: understanding business workflows, aligning with leadership, and developing the soft skills needed to turn strategy into action.</p>
<p></p>
<p><b>You’ll learn:</b></p>
<ul>
<li style="font-weight:400;">Why budgeting (CapEx vs OpEx) directly impacts security success</li>
<li style="font-weight:400;">The underrated power of soft skills in driving security programs</li>
<li style="font-weight:400;">How to connect cybersecurity efforts to business value and operations</li>
<li style="font-weight:400;">The role of pen testing and assessments in improving maturity</li>
<li style="font-weight:400;">Where AI adds value and where it introduces new risk</li>
<li style="font-weight:400;">How training and process understanding strengthen long-term resilience</li>
</ul>
<p>Whether you’re building a new security program or scaling an existing one, this episode delivers practical, experience-driven insights to help you make smarter decisions and drive real impact.</p>
<p><i> Tune in to learn how to align strategy, people, and investment for stronger OT cybersecurity only on Protect It All.</i></p>
<p><b>Key Moments: </b></p>
<p>05:49 Technical skills and security requirements</p>
<p>09:10 Understanding data workflows</p>
<p>12:29 Building a vulnerability management program</p>
<p>13:26 Understanding organizational decision history</p>
<p>17:44 Budgeting challenges with CAPEX and OPEX</p>
<p>21:36 Steps in a security assessment</p>
<p>24:17 Starting a cybersecurity program</p>
<p>28:02 Prioritizing remote access security</p>
<p>31:21 Discussing AI's impact on cybersecurity</p>
<p>32:55 Using AI in cybersecurity</p>
<p>38:07 AI simplifying complex knowledge</p>
<p>40:35 AI tools making data queries easier</p>
<p>45:02 Detecting and responding faster</p>
<p>46:05 Networking and shared experiences</p>
<p></p>
<p><b>About the guest: </b></p>
<p>Don C. Weber is a visionary cybersecurity leader who helps defenders safely prove security where it matters most in industrial operations. He is a SANS Principal Instructor, Founder of Cutaway Security, co-author of SANS ICS613: ICS/OT Penetration Testing &amp; Assessments, and he also teaches SANS ICS410: ICS/SCADA Security Essentials to SANS student around the world. He brings years of field work into creating step-by-step labs and planning methods teams can use right away.</p>
<p></p>
<p><b>How to connect Don: </b></p>
<p>LinkedIn: <a href="https://www.linkedin.com/in/cutaway/">https://www.linkedin.com/in/cutaway/</a> </p>
<p>Cutaway Security: <a href="https://www.linkedin.com/company/cutaway-security-llc">https://www.linkedin.com/company/cutaway-security-llc</a> </p>
<p>CutSec Github: <a href="https://github.com/cutaway-security">https://github.com/cutaway-security</a> </p>
<p>CutSec GasPot HMI Lab: <a href="https://github.com/cutaway-security/gaspot-hmi-lab">https://github.com/cutaway-security/gaspot-hmi-lab</a> </p>
<p>SANS ICS ICS613 ICS/OT Penetration Testing and Assessments: <a href="https://www.sans.org/cyber-security-courses/ics-ot-penetration-testing-assessments">https://www.sans.org/cyber-security-courses/ics-ot-penetration-testing-assessments</a></p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>L...</b></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Strong OT cybersecurity programs aren’t built on tools alone, they're built on strategy, communication, and smart investment.
In this episode of Protect It All, host Aaron Crow is joined by cybersecurity expert Don C. Weber for a candid, real-world discussion on what it actually takes to build and sustain effective security programs across IT and OT environments.
From CapEx vs OpEx decisions to the growing role of AI in both attack and defense, this conversation cuts through the noise and focuses on what drives real outcomes: understanding business workflows, aligning with leadership, and developing the soft skills needed to turn strategy into action.

You’ll learn:

Why budgeting (CapEx vs OpEx) directly impacts security success
The underrated power of soft skills in driving security programs
How to connect cybersecurity efforts to business value and operations
The role of pen testing and assessments in improving maturity
Where AI adds value and where it introduces new risk
How training and process understanding strengthen long-term resilience

Whether you’re building a new security program or scaling an existing one, this episode delivers practical, experience-driven insights to help you make smarter decisions and drive real impact.
 Tune in to learn how to align strategy, people, and investment for stronger OT cybersecurity only on Protect It All.
Key Moments: 
05:49 Technical skills and security requirements
09:10 Understanding data workflows
12:29 Building a vulnerability management program
13:26 Understanding organizational decision history
17:44 Budgeting challenges with CAPEX and OPEX
21:36 Steps in a security assessment
24:17 Starting a cybersecurity program
28:02 Prioritizing remote access security
31:21 Discussing AI's impact on cybersecurity
32:55 Using AI in cybersecurity
38:07 AI simplifying complex knowledge
40:35 AI tools making data queries easier
45:02 Detecting and responding faster
46:05 Networking and shared experiences

About the guest: 
Don C. Weber is a visionary cybersecurity leader who helps defenders safely prove security where it matters most in industrial operations. He is a SANS Principal Instructor, Founder of Cutaway Security, co-author of SANS ICS613: ICS/OT Penetration Testing & Assessments, and he also teaches SANS ICS410: ICS/SCADA Security Essentials to SANS student around the world. He brings years of field work into creating step-by-step labs and planning methods teams can use right away.

How to connect Don: 
LinkedIn: https://www.linkedin.com/in/cutaway/ 
Cutaway Security: https://www.linkedin.com/company/cutaway-security-llc 
CutSec Github: https://github.com/cutaway-security 
CutSec GasPot HMI Lab: https://github.com/cutaway-security/gaspot-hmi-lab 
SANS ICS ICS613 ICS/OT Penetration Testing and Assessments: https://www.sans.org/cyber-security-courses/ics-ot-penetration-testing-assessments

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


L...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[OT Cybersecurity That Works: Budgets, Soft Skills & AI Reality for Stronger Defense]]>
                </itunes:title>
                                    <itunes:episode>99</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Strong OT cybersecurity programs aren’t built on tools alone, they're built on strategy, communication, and smart investment.</p>
<p>In this episode of Protect It All, host Aaron Crow is joined by cybersecurity expert Don C. Weber for a candid, real-world discussion on what it actually takes to build and sustain effective security programs across IT and OT environments.</p>
<p>From CapEx vs OpEx decisions to the growing role of AI in both attack and defense, this conversation cuts through the noise and focuses on what drives real outcomes: understanding business workflows, aligning with leadership, and developing the soft skills needed to turn strategy into action.</p>
<p></p>
<p><b>You’ll learn:</b></p>
<ul>
<li style="font-weight:400;">Why budgeting (CapEx vs OpEx) directly impacts security success</li>
<li style="font-weight:400;">The underrated power of soft skills in driving security programs</li>
<li style="font-weight:400;">How to connect cybersecurity efforts to business value and operations</li>
<li style="font-weight:400;">The role of pen testing and assessments in improving maturity</li>
<li style="font-weight:400;">Where AI adds value and where it introduces new risk</li>
<li style="font-weight:400;">How training and process understanding strengthen long-term resilience</li>
</ul>
<p>Whether you’re building a new security program or scaling an existing one, this episode delivers practical, experience-driven insights to help you make smarter decisions and drive real impact.</p>
<p><i> Tune in to learn how to align strategy, people, and investment for stronger OT cybersecurity only on Protect It All.</i></p>
<p><b>Key Moments: </b></p>
<p>05:49 Technical skills and security requirements</p>
<p>09:10 Understanding data workflows</p>
<p>12:29 Building a vulnerability management program</p>
<p>13:26 Understanding organizational decision history</p>
<p>17:44 Budgeting challenges with CAPEX and OPEX</p>
<p>21:36 Steps in a security assessment</p>
<p>24:17 Starting a cybersecurity program</p>
<p>28:02 Prioritizing remote access security</p>
<p>31:21 Discussing AI's impact on cybersecurity</p>
<p>32:55 Using AI in cybersecurity</p>
<p>38:07 AI simplifying complex knowledge</p>
<p>40:35 AI tools making data queries easier</p>
<p>45:02 Detecting and responding faster</p>
<p>46:05 Networking and shared experiences</p>
<p></p>
<p><b>About the guest: </b></p>
<p>Don C. Weber is a visionary cybersecurity leader who helps defenders safely prove security where it matters most in industrial operations. He is a SANS Principal Instructor, Founder of Cutaway Security, co-author of SANS ICS613: ICS/OT Penetration Testing &amp; Assessments, and he also teaches SANS ICS410: ICS/SCADA Security Essentials to SANS student around the world. He brings years of field work into creating step-by-step labs and planning methods teams can use right away.</p>
<p></p>
<p><b>How to connect Don: </b></p>
<p>LinkedIn: <a href="https://www.linkedin.com/in/cutaway/">https://www.linkedin.com/in/cutaway/</a> </p>
<p>Cutaway Security: <a href="https://www.linkedin.com/company/cutaway-security-llc">https://www.linkedin.com/company/cutaway-security-llc</a> </p>
<p>CutSec Github: <a href="https://github.com/cutaway-security">https://github.com/cutaway-security</a> </p>
<p>CutSec GasPot HMI Lab: <a href="https://github.com/cutaway-security/gaspot-hmi-lab">https://github.com/cutaway-security/gaspot-hmi-lab</a> </p>
<p>SANS ICS ICS613 ICS/OT Penetration Testing and Assessments: <a href="https://www.sans.org/cyber-security-courses/ics-ot-penetration-testing-assessments">https://www.sans.org/cyber-security-courses/ics-ot-penetration-testing-assessments</a></p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p><b>To be a guest or suggest a guest/episode, please email us at</b> <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2409332/c1e-v5m9pb577mmc41wkm-jpq96w6ka492-thhcrj.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2409332&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=74b3afe63592d2ccefc941f44822d0959c3ecb98b359e700982c77d2c9ebfa9c" length="50718993"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Strong OT cybersecurity programs aren’t built on tools alone, they're built on strategy, communication, and smart investment.
In this episode of Protect It All, host Aaron Crow is joined by cybersecurity expert Don C. Weber for a candid, real-world discussion on what it actually takes to build and sustain effective security programs across IT and OT environments.
From CapEx vs OpEx decisions to the growing role of AI in both attack and defense, this conversation cuts through the noise and focuses on what drives real outcomes: understanding business workflows, aligning with leadership, and developing the soft skills needed to turn strategy into action.

You’ll learn:

Why budgeting (CapEx vs OpEx) directly impacts security success
The underrated power of soft skills in driving security programs
How to connect cybersecurity efforts to business value and operations
The role of pen testing and assessments in improving maturity
Where AI adds value and where it introduces new risk
How training and process understanding strengthen long-term resilience

Whether you’re building a new security program or scaling an existing one, this episode delivers practical, experience-driven insights to help you make smarter decisions and drive real impact.
 Tune in to learn how to align strategy, people, and investment for stronger OT cybersecurity only on Protect It All.
Key Moments: 
05:49 Technical skills and security requirements
09:10 Understanding data workflows
12:29 Building a vulnerability management program
13:26 Understanding organizational decision history
17:44 Budgeting challenges with CAPEX and OPEX
21:36 Steps in a security assessment
24:17 Starting a cybersecurity program
28:02 Prioritizing remote access security
31:21 Discussing AI's impact on cybersecurity
32:55 Using AI in cybersecurity
38:07 AI simplifying complex knowledge
40:35 AI tools making data queries easier
45:02 Detecting and responding faster
46:05 Networking and shared experiences

About the guest: 
Don C. Weber is a visionary cybersecurity leader who helps defenders safely prove security where it matters most in industrial operations. He is a SANS Principal Instructor, Founder of Cutaway Security, co-author of SANS ICS613: ICS/OT Penetration Testing & Assessments, and he also teaches SANS ICS410: ICS/SCADA Security Essentials to SANS student around the world. He brings years of field work into creating step-by-step labs and planning methods teams can use right away.

How to connect Don: 
LinkedIn: https://www.linkedin.com/in/cutaway/ 
Cutaway Security: https://www.linkedin.com/company/cutaway-security-llc 
CutSec Github: https://github.com/cutaway-security 
CutSec GasPot HMI Lab: https://github.com/cutaway-security/gaspot-hmi-lab 
SANS ICS ICS613 ICS/OT Penetration Testing and Assessments: https://www.sans.org/cyber-security-courses/ics-ot-penetration-testing-assessments

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


L...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2409332/c1a-w52rp-6z95jpjzs5g4-hmmcss.jpg"></itunes:image>
                                                                            <itunes:duration>00:51:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter]]>
                </title>
                <pubDate>Mon, 23 Mar 2026 13:58:15 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2403736</guid>
                                    <link>https://protectitallpod.com/ep098/</link>
                                <description>
                                            <![CDATA[<p>Cyberattacks don’t just test your systems - they test your preparedness.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down key lessons from the <b>Striker attack</b> and what it reveals about today’s evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like <b>“living off the land”</b> - blending into normal operations instead of deploying obvious malware.</p>
<p>Aaron takes this beyond theory, focusing on what organizations must do <i>before</i> an attack happens.</p>
<p>A major theme? <b>Tabletop exercises.</b> Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can’t catch.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">What the <b>Striker attack</b> teaches about modern cyber warfare</li>
<li style="font-weight:400;">How <b>living-off-the-land tactics</b> bypass traditional defenses</li>
<li style="font-weight:400;">Why tabletop exercises are essential for real-world readiness</li>
<li style="font-weight:400;">The role of <b>threat hunting and collaboration</b> across teams</li>
<li style="font-weight:400;">How attackers exploit weaknesses in both IT and OT environments</li>
<li style="font-weight:400;">Why small, consistent actions can dramatically improve resilience</li>
</ul>
<p>Whether you’re defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers <b>practical insights you can apply immediately.</b></p>
<p> <b>Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>04:59 "Modern Warfare: Cyber and Beyond"</p>
<p>08:47 "Security Risks of Remote Wipe"</p>
<p>10:31 "Living Off the Land Tactics"</p>
<p>13:11 "Balancing Power and Security"</p>
<p>19:12 "Vulnerabilities Demand Swift Action"</p>
<p>20:21 Prioritize Risk, Justify Investment</p>
<p>25:04 Practice Preparedness Before Crisis</p>
<p>26:48 Weak Links Threaten Cybersecurity</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Cyberattacks don’t just test your systems - they test your preparedness.
In this episode of Protect It All, host Aaron Crow breaks down key lessons from the Striker attack and what it reveals about today’s evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like “living off the land” - blending into normal operations instead of deploying obvious malware.
Aaron takes this beyond theory, focusing on what organizations must do before an attack happens.
A major theme? Tabletop exercises. Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can’t catch.
You’ll learn:

What the Striker attack teaches about modern cyber warfare
How living-off-the-land tactics bypass traditional defenses
Why tabletop exercises are essential for real-world readiness
The role of threat hunting and collaboration across teams
How attackers exploit weaknesses in both IT and OT environments
Why small, consistent actions can dramatically improve resilience

Whether you’re defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers practical insights you can apply immediately.
 Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All.
Key Moments: 
04:59 "Modern Warfare: Cyber and Beyond"
08:47 "Security Risks of Remote Wipe"
10:31 "Living Off the Land Tactics"
13:11 "Balancing Power and Security"
19:12 "Vulnerabilities Demand Swift Action"
20:21 Prioritize Risk, Justify Investment
25:04 Practice Preparedness Before Crisis
26:48 Weak Links Threaten Cybersecurity
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

To be a guest or suggest a guest/episode, please email us at info@protectitall.co
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter]]>
                </itunes:title>
                                    <itunes:episode>98</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Cyberattacks don’t just test your systems - they test your preparedness.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down key lessons from the <b>Striker attack</b> and what it reveals about today’s evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like <b>“living off the land”</b> - blending into normal operations instead of deploying obvious malware.</p>
<p>Aaron takes this beyond theory, focusing on what organizations must do <i>before</i> an attack happens.</p>
<p>A major theme? <b>Tabletop exercises.</b> Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can’t catch.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">What the <b>Striker attack</b> teaches about modern cyber warfare</li>
<li style="font-weight:400;">How <b>living-off-the-land tactics</b> bypass traditional defenses</li>
<li style="font-weight:400;">Why tabletop exercises are essential for real-world readiness</li>
<li style="font-weight:400;">The role of <b>threat hunting and collaboration</b> across teams</li>
<li style="font-weight:400;">How attackers exploit weaknesses in both IT and OT environments</li>
<li style="font-weight:400;">Why small, consistent actions can dramatically improve resilience</li>
</ul>
<p>Whether you’re defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers <b>practical insights you can apply immediately.</b></p>
<p> <b>Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>04:59 "Modern Warfare: Cyber and Beyond"</p>
<p>08:47 "Security Risks of Remote Wipe"</p>
<p>10:31 "Living Off the Land Tactics"</p>
<p>13:11 "Balancing Power and Security"</p>
<p>19:12 "Vulnerabilities Demand Swift Action"</p>
<p>20:21 Prioritize Risk, Justify Investment</p>
<p>25:04 Practice Preparedness Before Crisis</p>
<p>26:48 Weak Links Threaten Cybersecurity</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2403736/c1e-0qo87i7j4o2u2x9d9-xx733xq7hxx7-grg23a.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2403736&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=e63047b2104c833565d803416722b572de917fe9d0f429449c0fcb6885458af5" length="32409955"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Cyberattacks don’t just test your systems - they test your preparedness.
In this episode of Protect It All, host Aaron Crow breaks down key lessons from the Striker attack and what it reveals about today’s evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like “living off the land” - blending into normal operations instead of deploying obvious malware.
Aaron takes this beyond theory, focusing on what organizations must do before an attack happens.
A major theme? Tabletop exercises. Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can’t catch.
You’ll learn:

What the Striker attack teaches about modern cyber warfare
How living-off-the-land tactics bypass traditional defenses
Why tabletop exercises are essential for real-world readiness
The role of threat hunting and collaboration across teams
How attackers exploit weaknesses in both IT and OT environments
Why small, consistent actions can dramatically improve resilience

Whether you’re defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers practical insights you can apply immediately.
 Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All.
Key Moments: 
04:59 "Modern Warfare: Cyber and Beyond"
08:47 "Security Risks of Remote Wipe"
10:31 "Living Off the Land Tactics"
13:11 "Balancing Power and Security"
19:12 "Vulnerabilities Demand Swift Action"
20:21 Prioritize Risk, Justify Investment
25:04 Practice Preparedness Before Crisis
26:48 Weak Links Threaten Cybersecurity
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

To be a guest or suggest a guest/episode, please email us at info@protectitall.co
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2403736/c1a-w52rp-jpqmmprksx-b9zt8q.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[OT Under Siege: How to Defend Critical Infrastructure From Nation-State Cyber Threats]]>
                </title>
                <pubDate>Mon, 16 Mar 2026 12:39:08 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2397326</guid>
                                    <link>https://protectitallpod.com/ep097/</link>
                                <description>
                                            <![CDATA[<p>Global conflicts are no longer confined to physical battlefields - they’re spilling into cyberspace.</p>
<p>In this urgent episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down the rising wave of cyber threats targeting <b>critical infrastructure</b>, from energy and water utilities to manufacturing and transportation systems.</p>
<p>Drawing on recent global events and real-world incidents, Aaron explores how <b>nation-state actors, hacktivists, and advanced adversaries</b> are increasingly targeting operational technology environments. These attacks often rely on “living off the land” techniques - leveraging existing tools and access inside networks rather than deploying obvious malware.</p>
<p>But this episode isn’t about panic. It’s about <b>practical defense.</b></p>
<p>Aaron outlines the immediate steps OT security teams can take to strengthen resilience - even with limited resources and tight budgets.</p>
<p>In this episode, you’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>global instability increases cyber risk for critical infrastructure</b></li>
<li style="font-weight:400;">How attackers exploit existing tools using <b>living-off-the-land tactics</b></li>
<li style="font-weight:400;">The importance of <b>vigilance, monitoring, and patching</b> in OT environments</li>
<li style="font-weight:400;">Why <b>access control and identity management</b> are critical defenses</li>
<li style="font-weight:400;">How organizations can improve security posture <b>without massive investments</b></li>
<li style="font-weight:400;">The role of collaboration and awareness in defending essential systems<br /><br /></li>
</ul>
<p>Whether you operate power systems, water facilities, industrial plants, or transportation infrastructure, this episode provides <b>real-world guidance to help you stay ahead of evolving threats.</b></p>
<p> <b>Tune in to learn how OT teams can strengthen defenses and protect the systems society depends on - only on Protect It All.</b></p>
<p></p>
<p><b>Key Moments:</b></p>
<p>03:41 "Rising Cyber Threats Amid Tensions"</p>
<p>08:24 Nation-State Cyber Threats Unveiled</p>
<p>11:23 "Advanced Cybersecurity and Monitoring"</p>
<p>14:24 Prioritizing and Addressing Security Risks</p>
<p>17:24 Practical Steps for Cybersecurity Improvements</p>
<p>19:34 "Focus on Resources and Action"</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p> </p>
<p></p>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Global conflicts are no longer confined to physical battlefields - they’re spilling into cyberspace.
In this urgent episode of Protect It All, host Aaron Crow breaks down the rising wave of cyber threats targeting critical infrastructure, from energy and water utilities to manufacturing and transportation systems.
Drawing on recent global events and real-world incidents, Aaron explores how nation-state actors, hacktivists, and advanced adversaries are increasingly targeting operational technology environments. These attacks often rely on “living off the land” techniques - leveraging existing tools and access inside networks rather than deploying obvious malware.
But this episode isn’t about panic. It’s about practical defense.
Aaron outlines the immediate steps OT security teams can take to strengthen resilience - even with limited resources and tight budgets.
In this episode, you’ll learn:

Why global instability increases cyber risk for critical infrastructure
How attackers exploit existing tools using living-off-the-land tactics
The importance of vigilance, monitoring, and patching in OT environments
Why access control and identity management are critical defenses
How organizations can improve security posture without massive investments
The role of collaboration and awareness in defending essential systems

Whether you operate power systems, water facilities, industrial plants, or transportation infrastructure, this episode provides real-world guidance to help you stay ahead of evolving threats.
 Tune in to learn how OT teams can strengthen defenses and protect the systems society depends on - only on Protect It All.

Key Moments:
03:41 "Rising Cyber Threats Amid Tensions"
08:24 Nation-State Cyber Threats Unveiled
11:23 "Advanced Cybersecurity and Monitoring"
14:24 Prioritizing and Addressing Security Risks
17:24 Practical Steps for Cybersecurity Improvements
19:34 "Focus on Resources and Action"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

 

To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[OT Under Siege: How to Defend Critical Infrastructure From Nation-State Cyber Threats]]>
                </itunes:title>
                                    <itunes:episode>97</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Global conflicts are no longer confined to physical battlefields - they’re spilling into cyberspace.</p>
<p>In this urgent episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down the rising wave of cyber threats targeting <b>critical infrastructure</b>, from energy and water utilities to manufacturing and transportation systems.</p>
<p>Drawing on recent global events and real-world incidents, Aaron explores how <b>nation-state actors, hacktivists, and advanced adversaries</b> are increasingly targeting operational technology environments. These attacks often rely on “living off the land” techniques - leveraging existing tools and access inside networks rather than deploying obvious malware.</p>
<p>But this episode isn’t about panic. It’s about <b>practical defense.</b></p>
<p>Aaron outlines the immediate steps OT security teams can take to strengthen resilience - even with limited resources and tight budgets.</p>
<p>In this episode, you’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>global instability increases cyber risk for critical infrastructure</b></li>
<li style="font-weight:400;">How attackers exploit existing tools using <b>living-off-the-land tactics</b></li>
<li style="font-weight:400;">The importance of <b>vigilance, monitoring, and patching</b> in OT environments</li>
<li style="font-weight:400;">Why <b>access control and identity management</b> are critical defenses</li>
<li style="font-weight:400;">How organizations can improve security posture <b>without massive investments</b></li>
<li style="font-weight:400;">The role of collaboration and awareness in defending essential systems<br /><br /></li>
</ul>
<p>Whether you operate power systems, water facilities, industrial plants, or transportation infrastructure, this episode provides <b>real-world guidance to help you stay ahead of evolving threats.</b></p>
<p> <b>Tune in to learn how OT teams can strengthen defenses and protect the systems society depends on - only on Protect It All.</b></p>
<p></p>
<p><b>Key Moments:</b></p>
<p>03:41 "Rising Cyber Threats Amid Tensions"</p>
<p>08:24 Nation-State Cyber Threats Unveiled</p>
<p>11:23 "Advanced Cybersecurity and Monitoring"</p>
<p>14:24 Prioritizing and Addressing Security Risks</p>
<p>17:24 Practical Steps for Cybersecurity Improvements</p>
<p>19:34 "Focus on Resources and Action"</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p> </p>
<p></p>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2397326/c1e-4p03ms84x92smgwjk-9jw84270tqqq-ohds1i.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2397326&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=00365fc046cc85c10ef8fefb3a72d7b4224c430f182c33d3dd2879e8ae1a44a3" length="23560272"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Global conflicts are no longer confined to physical battlefields - they’re spilling into cyberspace.
In this urgent episode of Protect It All, host Aaron Crow breaks down the rising wave of cyber threats targeting critical infrastructure, from energy and water utilities to manufacturing and transportation systems.
Drawing on recent global events and real-world incidents, Aaron explores how nation-state actors, hacktivists, and advanced adversaries are increasingly targeting operational technology environments. These attacks often rely on “living off the land” techniques - leveraging existing tools and access inside networks rather than deploying obvious malware.
But this episode isn’t about panic. It’s about practical defense.
Aaron outlines the immediate steps OT security teams can take to strengthen resilience - even with limited resources and tight budgets.
In this episode, you’ll learn:

Why global instability increases cyber risk for critical infrastructure
How attackers exploit existing tools using living-off-the-land tactics
The importance of vigilance, monitoring, and patching in OT environments
Why access control and identity management are critical defenses
How organizations can improve security posture without massive investments
The role of collaboration and awareness in defending essential systems

Whether you operate power systems, water facilities, industrial plants, or transportation infrastructure, this episode provides real-world guidance to help you stay ahead of evolving threats.
 Tune in to learn how OT teams can strengthen defenses and protect the systems society depends on - only on Protect It All.

Key Moments:
03:41 "Rising Cyber Threats Amid Tensions"
08:24 Nation-State Cyber Threats Unveiled
11:23 "Advanced Cybersecurity and Monitoring"
14:24 Prioritizing and Addressing Security Risks
17:24 Practical Steps for Cybersecurity Improvements
19:34 "Focus on Resources and Action"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

 

To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2397326/c1a-w52rp-nd12pjg4a9z3-v6ncoq.jpg"></itunes:image>
                                                                            <itunes:duration>00:23:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Poland’s Power Grid Cyberattack  What It Teaches Us About OT Security and Renewable  Energy Risks]]>
                </title>
                <pubDate>Mon, 09 Mar 2026 12:44:32 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2388193</guid>
                                    <link>https://protectitallpod.com/ep096/</link>
                                <description>
                                            <![CDATA[<p>What happens when attackers target the systems that keep the lights on?</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down the December 2025 cyberattack on <b>Poland’s energy infrastructure</b>, where coordinated attackers disrupted wind farms, solar installations, and heat and power plants - impacting nearly half a million people.</p>
<p>This real-world incident highlights the growing risks facing <b>distributed energy resources (DER)</b> and modern power grids. As energy systems become more connected and decentralized, the attack surface expands - often faster than security programs can adapt.</p>
<p>Aaron walks through what actually went wrong: <b>default passwords, unpatched devices, and weak network segmentation</b> that allowed attackers to brick OT equipment and blind operators to what was happening in their own systems.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">How attackers targeted <b>renewable energy infrastructure</b> at scale</li>
<li style="font-weight:400;">Why <b>edge devices and distributed assets</b> create new vulnerabilities</li>
<li style="font-weight:400;">The importance of eliminating <b>default credentials and poor configurations</b></li>
<li style="font-weight:400;">Why <b>network segmentation and secure remote access</b> are essential</li>
<li style="font-weight:400;">What grid operators and OT teams must prioritize immediately</li>
<li style="font-weight:400;">How lessons from Poland apply to <b>power grids worldwide</b><b><br /><br /></b></li>
</ul>
<p>For engineers, operators, and cybersecurity leaders responsible for critical infrastructure, this episode delivers <b>practical insights on defending modern energy systems before attackers strike again.</b></p>
<p> <b>Tune in to understand what Poland’s grid attack reveals about the future of OT security - only on Protect It All.</b></p>
<p>Key Moments: </p>
<p>04:57 "Corrupted Firmware Disables System Control"</p>
<p>10:01 DER Risks and Scaling Threats</p>
<p>10:55 Risks of Expanding Energy Grids</p>
<p>16:30 OT Security Vulnerabilities and Risks</p>
<p>18:34 Prioritize OT Security Systems</p>
<p>23:06 Change Default Passwords Immediately</p>
<p>24:49 "Critical ICS Security Measures"</p>
<p>30:15 "OT Cyber-Physical Response Plan"</p>
<p>32:56 "Critical Security Steps for Resilience"</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p> </p>
<p></p>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>
<p></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[What happens when attackers target the systems that keep the lights on?
In this episode of Protect It All, host Aaron Crow breaks down the December 2025 cyberattack on Poland’s energy infrastructure, where coordinated attackers disrupted wind farms, solar installations, and heat and power plants - impacting nearly half a million people.
This real-world incident highlights the growing risks facing distributed energy resources (DER) and modern power grids. As energy systems become more connected and decentralized, the attack surface expands - often faster than security programs can adapt.
Aaron walks through what actually went wrong: default passwords, unpatched devices, and weak network segmentation that allowed attackers to brick OT equipment and blind operators to what was happening in their own systems.
You’ll learn:

How attackers targeted renewable energy infrastructure at scale
Why edge devices and distributed assets create new vulnerabilities
The importance of eliminating default credentials and poor configurations
Why network segmentation and secure remote access are essential
What grid operators and OT teams must prioritize immediately
How lessons from Poland apply to power grids worldwide

For engineers, operators, and cybersecurity leaders responsible for critical infrastructure, this episode delivers practical insights on defending modern energy systems before attackers strike again.
 Tune in to understand what Poland’s grid attack reveals about the future of OT security - only on Protect It All.
Key Moments: 
04:57 "Corrupted Firmware Disables System Control"
10:01 DER Risks and Scaling Threats
10:55 Risks of Expanding Energy Grids
16:30 OT Security Vulnerabilities and Risks
18:34 Prioritize OT Security Systems
23:06 Change Default Passwords Immediately
24:49 "Critical ICS Security Measures"
30:15 "OT Cyber-Physical Response Plan"
32:56 "Critical Security Steps for Resilience"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

 

To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Poland’s Power Grid Cyberattack  What It Teaches Us About OT Security and Renewable  Energy Risks]]>
                </itunes:title>
                                    <itunes:episode>96</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>What happens when attackers target the systems that keep the lights on?</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down the December 2025 cyberattack on <b>Poland’s energy infrastructure</b>, where coordinated attackers disrupted wind farms, solar installations, and heat and power plants - impacting nearly half a million people.</p>
<p>This real-world incident highlights the growing risks facing <b>distributed energy resources (DER)</b> and modern power grids. As energy systems become more connected and decentralized, the attack surface expands - often faster than security programs can adapt.</p>
<p>Aaron walks through what actually went wrong: <b>default passwords, unpatched devices, and weak network segmentation</b> that allowed attackers to brick OT equipment and blind operators to what was happening in their own systems.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">How attackers targeted <b>renewable energy infrastructure</b> at scale</li>
<li style="font-weight:400;">Why <b>edge devices and distributed assets</b> create new vulnerabilities</li>
<li style="font-weight:400;">The importance of eliminating <b>default credentials and poor configurations</b></li>
<li style="font-weight:400;">Why <b>network segmentation and secure remote access</b> are essential</li>
<li style="font-weight:400;">What grid operators and OT teams must prioritize immediately</li>
<li style="font-weight:400;">How lessons from Poland apply to <b>power grids worldwide</b><b><br /><br /></b></li>
</ul>
<p>For engineers, operators, and cybersecurity leaders responsible for critical infrastructure, this episode delivers <b>practical insights on defending modern energy systems before attackers strike again.</b></p>
<p> <b>Tune in to understand what Poland’s grid attack reveals about the future of OT security - only on Protect It All.</b></p>
<p>Key Moments: </p>
<p>04:57 "Corrupted Firmware Disables System Control"</p>
<p>10:01 DER Risks and Scaling Threats</p>
<p>10:55 Risks of Expanding Energy Grids</p>
<p>16:30 OT Security Vulnerabilities and Risks</p>
<p>18:34 Prioritize OT Security Systems</p>
<p>23:06 Change Default Passwords Immediately</p>
<p>24:49 "Critical ICS Security Measures"</p>
<p>30:15 "OT Cyber-Physical Response Plan"</p>
<p>32:56 "Critical Security Steps for Resilience"</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p> </p>
<p></p>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>
<p></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2388193/c1e-0qo87i78x8rb2zknk-xx71o6wqcdw8-2cgsm9.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2388193&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=1b6bb7133e2ea5fe9ab21967a3ebf4d72b4f4e8e3aaf510bf6f49abc60c1d70e" length="33516428"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[What happens when attackers target the systems that keep the lights on?
In this episode of Protect It All, host Aaron Crow breaks down the December 2025 cyberattack on Poland’s energy infrastructure, where coordinated attackers disrupted wind farms, solar installations, and heat and power plants - impacting nearly half a million people.
This real-world incident highlights the growing risks facing distributed energy resources (DER) and modern power grids. As energy systems become more connected and decentralized, the attack surface expands - often faster than security programs can adapt.
Aaron walks through what actually went wrong: default passwords, unpatched devices, and weak network segmentation that allowed attackers to brick OT equipment and blind operators to what was happening in their own systems.
You’ll learn:

How attackers targeted renewable energy infrastructure at scale
Why edge devices and distributed assets create new vulnerabilities
The importance of eliminating default credentials and poor configurations
Why network segmentation and secure remote access are essential
What grid operators and OT teams must prioritize immediately
How lessons from Poland apply to power grids worldwide

For engineers, operators, and cybersecurity leaders responsible for critical infrastructure, this episode delivers practical insights on defending modern energy systems before attackers strike again.
 Tune in to understand what Poland’s grid attack reveals about the future of OT security - only on Protect It All.
Key Moments: 
04:57 "Corrupted Firmware Disables System Control"
10:01 DER Risks and Scaling Threats
10:55 Risks of Expanding Energy Grids
16:30 OT Security Vulnerabilities and Risks
18:34 Prioritize OT Security Systems
23:06 Change Default Passwords Immediately
24:49 "Critical ICS Security Measures"
30:15 "OT Cyber-Physical Response Plan"
32:56 "Critical Security Steps for Resilience"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

 

To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2388193/c1a-w52rp-ww72xq6ku74-z0vv7c.jpg"></itunes:image>
                                                                            <itunes:duration>00:34:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Safe AI Automation for Cybersecurity: Practical Workflows Without the Risk]]>
                </title>
                <pubDate>Mon, 02 Mar 2026 11:49:51 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2380497</guid>
                                    <link>https://protectitallpod.com/ep095/</link>
                                <description>
                                            <![CDATA[<p>AI can accelerate cybersecurity - or accidentally expose it.</p>
<p>In this solo episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down how cybersecurity professionals can safely integrate AI into their IT and OT workflows. As tools like ChatGPT, Copilot, and enterprise AI platforms become part of daily operations, the question isn’t whether to use AI - it’s how to use it responsibly.</p>
<p>Aaron moves beyond buzzwords to focus on practical, everyday applications: automating reports, summarizing threat intelligence, drafting policies, enhancing documentation, and streamlining repetitive tasks. At the same time, he tackles the real concerns leaders face - data privacy, compliance, policy alignment, and shadow AI risks.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Where AI delivers immediate value in cybersecurity workflows</li>
<li style="font-weight:400;">How to automate without exposing proprietary or regulated data</li>
<li style="font-weight:400;">The difference between enterprise AI tools and public platforms</li>
<li style="font-weight:400;">How to align AI usage with corporate security policies</li>
<li style="font-weight:400;">Practical ways CISOs and analysts can boost productivity safely</li>
<li style="font-weight:400;">Why governance and awareness matter as much as innovation<br /><br /></li>
</ul>
<p>Whether you’re leading a security program or working hands-on in IT or OT environments, this episode delivers <b>actionable strategies to use AI smarter—not riskier.</b></p>
<p> <b>Tune in to learn how to automate with confidence and stay ahead of the curve—only on Protect It All.</b></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p> </p>
<p></p>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[AI can accelerate cybersecurity - or accidentally expose it.
In this solo episode of Protect It All, host Aaron Crow breaks down how cybersecurity professionals can safely integrate AI into their IT and OT workflows. As tools like ChatGPT, Copilot, and enterprise AI platforms become part of daily operations, the question isn’t whether to use AI - it’s how to use it responsibly.
Aaron moves beyond buzzwords to focus on practical, everyday applications: automating reports, summarizing threat intelligence, drafting policies, enhancing documentation, and streamlining repetitive tasks. At the same time, he tackles the real concerns leaders face - data privacy, compliance, policy alignment, and shadow AI risks.
You’ll learn:

Where AI delivers immediate value in cybersecurity workflows
How to automate without exposing proprietary or regulated data
The difference between enterprise AI tools and public platforms
How to align AI usage with corporate security policies
Practical ways CISOs and analysts can boost productivity safely
Why governance and awareness matter as much as innovation

Whether you’re leading a security program or working hands-on in IT or OT environments, this episode delivers actionable strategies to use AI smarter—not riskier.
 Tune in to learn how to automate with confidence and stay ahead of the curve—only on Protect It All.
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

 

To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Safe AI Automation for Cybersecurity: Practical Workflows Without the Risk]]>
                </itunes:title>
                                    <itunes:episode>95</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>AI can accelerate cybersecurity - or accidentally expose it.</p>
<p>In this solo episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down how cybersecurity professionals can safely integrate AI into their IT and OT workflows. As tools like ChatGPT, Copilot, and enterprise AI platforms become part of daily operations, the question isn’t whether to use AI - it’s how to use it responsibly.</p>
<p>Aaron moves beyond buzzwords to focus on practical, everyday applications: automating reports, summarizing threat intelligence, drafting policies, enhancing documentation, and streamlining repetitive tasks. At the same time, he tackles the real concerns leaders face - data privacy, compliance, policy alignment, and shadow AI risks.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Where AI delivers immediate value in cybersecurity workflows</li>
<li style="font-weight:400;">How to automate without exposing proprietary or regulated data</li>
<li style="font-weight:400;">The difference between enterprise AI tools and public platforms</li>
<li style="font-weight:400;">How to align AI usage with corporate security policies</li>
<li style="font-weight:400;">Practical ways CISOs and analysts can boost productivity safely</li>
<li style="font-weight:400;">Why governance and awareness matter as much as innovation<br /><br /></li>
</ul>
<p>Whether you’re leading a security program or working hands-on in IT or OT environments, this episode delivers <b>actionable strategies to use AI smarter—not riskier.</b></p>
<p> <b>Tune in to learn how to automate with confidence and stay ahead of the curve—only on Protect It All.</b></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p> </p>
<p></p>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2380497/c1e-x510gb1ppwvsrqqwp-xx76k621fgx9-qtor1t.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2380497&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=f64f4711335c756defee3c45751568ac9f795e47f8a4c5e343776abe51bd9867" length="16535099"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[AI can accelerate cybersecurity - or accidentally expose it.
In this solo episode of Protect It All, host Aaron Crow breaks down how cybersecurity professionals can safely integrate AI into their IT and OT workflows. As tools like ChatGPT, Copilot, and enterprise AI platforms become part of daily operations, the question isn’t whether to use AI - it’s how to use it responsibly.
Aaron moves beyond buzzwords to focus on practical, everyday applications: automating reports, summarizing threat intelligence, drafting policies, enhancing documentation, and streamlining repetitive tasks. At the same time, he tackles the real concerns leaders face - data privacy, compliance, policy alignment, and shadow AI risks.
You’ll learn:

Where AI delivers immediate value in cybersecurity workflows
How to automate without exposing proprietary or regulated data
The difference between enterprise AI tools and public platforms
How to align AI usage with corporate security policies
Practical ways CISOs and analysts can boost productivity safely
Why governance and awareness matter as much as innovation

Whether you’re leading a security program or working hands-on in IT or OT environments, this episode delivers actionable strategies to use AI smarter—not riskier.
 Tune in to learn how to automate with confidence and stay ahead of the curve—only on Protect It All.
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

 

To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2380497/c1a-w52rp-qd1qpq9ktj01-gv3tct.jpg"></itunes:image>
                                                                            <itunes:duration>00:15:47</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Compliance Isn’t Security: NERC CIP 15 and the Real Gaps in OT Network Monitoring]]>
                </title>
                <pubDate>Mon, 23 Feb 2026 15:46:37 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2371607</guid>
                                    <link>https://protectitallpod.com/ep094/</link>
                                <description>
                                            <![CDATA[<p>Passing an audit doesn’t mean you’re secure.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> dives into one of the biggest misconceptions in operational technology: the belief that compliance equals protection. Using <b>NERC CIP 15</b> as a real-world case study, Aaron explores why meeting regulatory requirements is only the starting point - not the finish line.</p>
<p>A major focus of this conversation is OT network monitoring, especially the often-overlooked <b>east-west traffic inside your environment</b>. Many organizations monitor perimeter traffic while internal blind spots remain wide open.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why compliance frameworks don’t automatically create security</li>
<li style="font-weight:400;">The real challenges of implementing <b>NERC CIP 15 at scale</b></li>
<li style="font-weight:400;">Why internal network visibility (east-west monitoring) matters</li>
<li style="font-weight:400;">How to establish meaningful baselines in legacy OT environments</li>
<li style="font-weight:400;">The difference between audit success and operational resilience</li>
<li style="font-weight:400;">Why architecture, tooling, and skilled personnel must work together<br /><br /></li>
</ul>
<p>Whether you’re working in utilities, manufacturing, or critical infrastructure, this episode provides practical guidance on how to move beyond checklists and build security programs that truly reduce risk.</p>
<p> <b>Tune in to learn how to transform compliance requirements into real operational protection - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>00:00 OT Security Blind Spots</p>
<p>05:15 "OT Security and Monitoring Challenges"</p>
<p>10:41 Aging Switches and Monitoring Challenges</p>
<p>13:16 OT Protocols and Infrastructure Challenges</p>
<p>15:42 "IT vs OT: Complexity Challenges"</p>
<p>18:03 "Balancing Compliance and Security"</p>
<p>21:57 Securing Critical Infrastructure Spaces</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p> </p>
<p></p>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Passing an audit doesn’t mean you’re secure.
In this episode of Protect It All, host Aaron Crow dives into one of the biggest misconceptions in operational technology: the belief that compliance equals protection. Using NERC CIP 15 as a real-world case study, Aaron explores why meeting regulatory requirements is only the starting point - not the finish line.
A major focus of this conversation is OT network monitoring, especially the often-overlooked east-west traffic inside your environment. Many organizations monitor perimeter traffic while internal blind spots remain wide open.
You’ll learn:

Why compliance frameworks don’t automatically create security
The real challenges of implementing NERC CIP 15 at scale
Why internal network visibility (east-west monitoring) matters
How to establish meaningful baselines in legacy OT environments
The difference between audit success and operational resilience
Why architecture, tooling, and skilled personnel must work together

Whether you’re working in utilities, manufacturing, or critical infrastructure, this episode provides practical guidance on how to move beyond checklists and build security programs that truly reduce risk.
 Tune in to learn how to transform compliance requirements into real operational protection - only on Protect It All.
Key Moments: 
00:00 OT Security Blind Spots
05:15 "OT Security and Monitoring Challenges"
10:41 Aging Switches and Monitoring Challenges
13:16 OT Protocols and Infrastructure Challenges
15:42 "IT vs OT: Complexity Challenges"
18:03 "Balancing Compliance and Security"
21:57 Securing Critical Infrastructure Spaces
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

 

To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Compliance Isn’t Security: NERC CIP 15 and the Real Gaps in OT Network Monitoring]]>
                </itunes:title>
                                    <itunes:episode>94</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Passing an audit doesn’t mean you’re secure.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> dives into one of the biggest misconceptions in operational technology: the belief that compliance equals protection. Using <b>NERC CIP 15</b> as a real-world case study, Aaron explores why meeting regulatory requirements is only the starting point - not the finish line.</p>
<p>A major focus of this conversation is OT network monitoring, especially the often-overlooked <b>east-west traffic inside your environment</b>. Many organizations monitor perimeter traffic while internal blind spots remain wide open.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why compliance frameworks don’t automatically create security</li>
<li style="font-weight:400;">The real challenges of implementing <b>NERC CIP 15 at scale</b></li>
<li style="font-weight:400;">Why internal network visibility (east-west monitoring) matters</li>
<li style="font-weight:400;">How to establish meaningful baselines in legacy OT environments</li>
<li style="font-weight:400;">The difference between audit success and operational resilience</li>
<li style="font-weight:400;">Why architecture, tooling, and skilled personnel must work together<br /><br /></li>
</ul>
<p>Whether you’re working in utilities, manufacturing, or critical infrastructure, this episode provides practical guidance on how to move beyond checklists and build security programs that truly reduce risk.</p>
<p> <b>Tune in to learn how to transform compliance requirements into real operational protection - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>00:00 OT Security Blind Spots</p>
<p>05:15 "OT Security and Monitoring Challenges"</p>
<p>10:41 Aging Switches and Monitoring Challenges</p>
<p>13:16 OT Protocols and Infrastructure Challenges</p>
<p>15:42 "IT vs OT: Complexity Challenges"</p>
<p>18:03 "Balancing Compliance and Security"</p>
<p>21:57 Securing Critical Infrastructure Spaces</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p> </p>
<p></p>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2371607/c1e-m257wu436draw0jg4-rk255v8jb7p1-uykdht.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2371607&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=9860638981ce75532b5aad2301efd2b7351a297a425861e96d77ccbabc7368e1" length="23238428"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Passing an audit doesn’t mean you’re secure.
In this episode of Protect It All, host Aaron Crow dives into one of the biggest misconceptions in operational technology: the belief that compliance equals protection. Using NERC CIP 15 as a real-world case study, Aaron explores why meeting regulatory requirements is only the starting point - not the finish line.
A major focus of this conversation is OT network monitoring, especially the often-overlooked east-west traffic inside your environment. Many organizations monitor perimeter traffic while internal blind spots remain wide open.
You’ll learn:

Why compliance frameworks don’t automatically create security
The real challenges of implementing NERC CIP 15 at scale
Why internal network visibility (east-west monitoring) matters
How to establish meaningful baselines in legacy OT environments
The difference between audit success and operational resilience
Why architecture, tooling, and skilled personnel must work together

Whether you’re working in utilities, manufacturing, or critical infrastructure, this episode provides practical guidance on how to move beyond checklists and build security programs that truly reduce risk.
 Tune in to learn how to transform compliance requirements into real operational protection - only on Protect It All.
Key Moments: 
00:00 OT Security Blind Spots
05:15 "OT Security and Monitoring Challenges"
10:41 Aging Switches and Monitoring Challenges
13:16 OT Protocols and Infrastructure Challenges
15:42 "IT vs OT: Complexity Challenges"
18:03 "Balancing Compliance and Security"
21:57 Securing Critical Infrastructure Spaces
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast

 

To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2371607/c1a-w52rp-1prqqm1wsokv-ka5iqa.jpg"></itunes:image>
                                                                            <itunes:duration>00:23:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[OT Cybersecurity That Works: Tabletop Exercises, Critical Controls & Building Trust]]>
                </title>
                <pubDate>Mon, 16 Feb 2026 12:19:27 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2364198</guid>
                                    <link>https://protectitallpod.com/ep093/</link>
                                <description>
                                            <![CDATA[<p>You can’t secure OT environments with checklists alone - you secure them with trust, clarity, and focused action.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with OT security expert <b>Dean Parsons</b> to unpack what actually improves cybersecurity maturity in manufacturing, water, and wastewater environments. From remote access blind spots to outdated network architecture, they explore the practical gaps many organizations face - and how to fix them without massive budgets.</p>
<p>A central theme? <b>Tabletop exercises.</b> Not as a compliance checkbox - but as a powerful tool to build collaboration between IT and OT teams, clarify roles, and stress-test real incident response plans before a crisis hits.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>tabletop exercises accelerate OT maturity</b></li>
<li style="font-weight:400;">The importance of trust between engineers and IT teams</li>
<li style="font-weight:400;">How focusing on the <b>SANS 5 Critical Controls</b> drives meaningful progress</li>
<li style="font-weight:400;">Why visibility and architecture matter more than shiny tools</li>
<li style="font-weight:400;">How to improve OT security without overwhelming teams or budgets</li>
<li style="font-weight:400;">The human and process factors that determine response success<br /><br /></li>
</ul>
<p>Whether you’re leading OT security, managing critical infrastructure, or trying to bridge IT and engineering teams, this episode delivers <b>practical, experience-backed strategies</b> you can implement immediately.</p>
<p> <b>Tune in to learn how to strengthen OT security through people, process, and purposeful action - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>03:57 "Improved IT-OT Collaboration Tabletops"</p>
<p>08:57 "ICS Security Priorities"</p>
<p>12:16 "Accelerating ICS Cybersecurity Programs"</p>
<p>15:07 Trusted Expertise Builds Credibility</p>
<p>17:28 "Engineering Role in Incident Response"</p>
<p>20:53 "Cybersecurity: Tabletops Gain Traction"</p>
<p>26:34 "Control Systems, Protocol Abuse Insights"</p>
<p>27:51 Secure Architecture Enables Network Visibility</p>
<p>33:07 "Targeted Network Monitoring Essentials"</p>
<p>35:23 Prioritize Critical Assets Strategically</p>
<p>37:50 "Bridging IT and OT Expertise"</p>
<p>41:56 Critical Infrastructure Security Risks</p>
<p>44:30 ICS Leadership and Threat Strategy</p>
<p>48:14 "Power Plant Walkthrough Insights"</p>
<p>52:02 Critical Cyber Asset Management</p>
<p>57:29 "SANS Courses: Essential and Valuable"</p>
<p></p>
<p>About the guest : </p>
<p>Dean Parsons is a SANS Principal Instructor and the CEO and Principal Consultant of ICS Defense Force. Over the past two decades, Dean has built and led industrial cyber defense programs, conducted incident response and digital forensics in live plants and partnered with operators and engineers to maintain both safety and uptime across major industrial sectors.</p>
<p>He helps organizations align investment and policy decisions with operational priorities, developing risk metrics and tabletop exercises that unify operations, engineering, and cybersecurity so organizations in any industrial sector can prioritize and measure what matters.</p>
<p>How to connect Dean : <a href="https://www.linkedin.com/in/dean-parsons-cybersecurity">https://www.linkedin.com/in/dean-parsons-cybersecurity</a></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a></a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[You can’t secure OT environments with checklists alone - you secure them with trust, clarity, and focused action.
In this episode of Protect It All, host Aaron Crow sits down with OT security expert Dean Parsons to unpack what actually improves cybersecurity maturity in manufacturing, water, and wastewater environments. From remote access blind spots to outdated network architecture, they explore the practical gaps many organizations face - and how to fix them without massive budgets.
A central theme? Tabletop exercises. Not as a compliance checkbox - but as a powerful tool to build collaboration between IT and OT teams, clarify roles, and stress-test real incident response plans before a crisis hits.
You’ll learn:

Why tabletop exercises accelerate OT maturity
The importance of trust between engineers and IT teams
How focusing on the SANS 5 Critical Controls drives meaningful progress
Why visibility and architecture matter more than shiny tools
How to improve OT security without overwhelming teams or budgets
The human and process factors that determine response success

Whether you’re leading OT security, managing critical infrastructure, or trying to bridge IT and engineering teams, this episode delivers practical, experience-backed strategies you can implement immediately.
 Tune in to learn how to strengthen OT security through people, process, and purposeful action - only on Protect It All.
Key Moments: 
03:57 "Improved IT-OT Collaboration Tabletops"
08:57 "ICS Security Priorities"
12:16 "Accelerating ICS Cybersecurity Programs"
15:07 Trusted Expertise Builds Credibility
17:28 "Engineering Role in Incident Response"
20:53 "Cybersecurity: Tabletops Gain Traction"
26:34 "Control Systems, Protocol Abuse Insights"
27:51 Secure Architecture Enables Network Visibility
33:07 "Targeted Network Monitoring Essentials"
35:23 Prioritize Critical Assets Strategically
37:50 "Bridging IT and OT Expertise"
41:56 Critical Infrastructure Security Risks
44:30 ICS Leadership and Threat Strategy
48:14 "Power Plant Walkthrough Insights"
52:02 Critical Cyber Asset Management
57:29 "SANS Courses: Essential and Valuable"

About the guest : 
Dean Parsons is a SANS Principal Instructor and the CEO and Principal Consultant of ICS Defense Force. Over the past two decades, Dean has built and led industrial cyber defense programs, conducted incident response and digital forensics in live plants and partnered with operators and engineers to maintain both safety and uptime across major industrial sectors.
He helps organizations align investment and policy decisions with operational priorities, developing risk metrics and tabletop exercises that unify operations, engineering, and cybersecurity so organizations in any industrial sector can prioritize and measure what matters.
How to connect Dean : https://www.linkedin.com/in/dean-parsons-cybersecurity
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X:]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[OT Cybersecurity That Works: Tabletop Exercises, Critical Controls & Building Trust]]>
                </itunes:title>
                                    <itunes:episode>93</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>You can’t secure OT environments with checklists alone - you secure them with trust, clarity, and focused action.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with OT security expert <b>Dean Parsons</b> to unpack what actually improves cybersecurity maturity in manufacturing, water, and wastewater environments. From remote access blind spots to outdated network architecture, they explore the practical gaps many organizations face - and how to fix them without massive budgets.</p>
<p>A central theme? <b>Tabletop exercises.</b> Not as a compliance checkbox - but as a powerful tool to build collaboration between IT and OT teams, clarify roles, and stress-test real incident response plans before a crisis hits.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>tabletop exercises accelerate OT maturity</b></li>
<li style="font-weight:400;">The importance of trust between engineers and IT teams</li>
<li style="font-weight:400;">How focusing on the <b>SANS 5 Critical Controls</b> drives meaningful progress</li>
<li style="font-weight:400;">Why visibility and architecture matter more than shiny tools</li>
<li style="font-weight:400;">How to improve OT security without overwhelming teams or budgets</li>
<li style="font-weight:400;">The human and process factors that determine response success<br /><br /></li>
</ul>
<p>Whether you’re leading OT security, managing critical infrastructure, or trying to bridge IT and engineering teams, this episode delivers <b>practical, experience-backed strategies</b> you can implement immediately.</p>
<p> <b>Tune in to learn how to strengthen OT security through people, process, and purposeful action - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>03:57 "Improved IT-OT Collaboration Tabletops"</p>
<p>08:57 "ICS Security Priorities"</p>
<p>12:16 "Accelerating ICS Cybersecurity Programs"</p>
<p>15:07 Trusted Expertise Builds Credibility</p>
<p>17:28 "Engineering Role in Incident Response"</p>
<p>20:53 "Cybersecurity: Tabletops Gain Traction"</p>
<p>26:34 "Control Systems, Protocol Abuse Insights"</p>
<p>27:51 Secure Architecture Enables Network Visibility</p>
<p>33:07 "Targeted Network Monitoring Essentials"</p>
<p>35:23 Prioritize Critical Assets Strategically</p>
<p>37:50 "Bridging IT and OT Expertise"</p>
<p>41:56 Critical Infrastructure Security Risks</p>
<p>44:30 ICS Leadership and Threat Strategy</p>
<p>48:14 "Power Plant Walkthrough Insights"</p>
<p>52:02 Critical Cyber Asset Management</p>
<p>57:29 "SANS Courses: Essential and Valuable"</p>
<p></p>
<p>About the guest : </p>
<p>Dean Parsons is a SANS Principal Instructor and the CEO and Principal Consultant of ICS Defense Force. Over the past two decades, Dean has built and led industrial cyber defense programs, conducted incident response and digital forensics in live plants and partnered with operators and engineers to maintain both safety and uptime across major industrial sectors.</p>
<p>He helps organizations align investment and policy decisions with operational priorities, developing risk metrics and tabletop exercises that unify operations, engineering, and cybersecurity so organizations in any industrial sector can prioritize and measure what matters.</p>
<p>How to connect Dean : <a href="https://www.linkedin.com/in/dean-parsons-cybersecurity">https://www.linkedin.com/in/dean-parsons-cybersecurity</a></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p> </p>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2364198/c1e-v5m9pb5r6q7h4mjp9-gp5vg916cr4v-mluq74.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2364198&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=888c262d318a8a5c40fd41fbed193bdeb84daf6b0e5e0b7a2d953f36ee66489c" length="56686736"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[You can’t secure OT environments with checklists alone - you secure them with trust, clarity, and focused action.
In this episode of Protect It All, host Aaron Crow sits down with OT security expert Dean Parsons to unpack what actually improves cybersecurity maturity in manufacturing, water, and wastewater environments. From remote access blind spots to outdated network architecture, they explore the practical gaps many organizations face - and how to fix them without massive budgets.
A central theme? Tabletop exercises. Not as a compliance checkbox - but as a powerful tool to build collaboration between IT and OT teams, clarify roles, and stress-test real incident response plans before a crisis hits.
You’ll learn:

Why tabletop exercises accelerate OT maturity
The importance of trust between engineers and IT teams
How focusing on the SANS 5 Critical Controls drives meaningful progress
Why visibility and architecture matter more than shiny tools
How to improve OT security without overwhelming teams or budgets
The human and process factors that determine response success

Whether you’re leading OT security, managing critical infrastructure, or trying to bridge IT and engineering teams, this episode delivers practical, experience-backed strategies you can implement immediately.
 Tune in to learn how to strengthen OT security through people, process, and purposeful action - only on Protect It All.
Key Moments: 
03:57 "Improved IT-OT Collaboration Tabletops"
08:57 "ICS Security Priorities"
12:16 "Accelerating ICS Cybersecurity Programs"
15:07 Trusted Expertise Builds Credibility
17:28 "Engineering Role in Incident Response"
20:53 "Cybersecurity: Tabletops Gain Traction"
26:34 "Control Systems, Protocol Abuse Insights"
27:51 Secure Architecture Enables Network Visibility
33:07 "Targeted Network Monitoring Essentials"
35:23 Prioritize Critical Assets Strategically
37:50 "Bridging IT and OT Expertise"
41:56 Critical Infrastructure Security Risks
44:30 ICS Leadership and Threat Strategy
48:14 "Power Plant Walkthrough Insights"
52:02 Critical Cyber Asset Management
57:29 "SANS Courses: Essential and Valuable"

About the guest : 
Dean Parsons is a SANS Principal Instructor and the CEO and Principal Consultant of ICS Defense Force. Over the past two decades, Dean has built and led industrial cyber defense programs, conducted incident response and digital forensics in live plants and partnered with operators and engineers to maintain both safety and uptime across major industrial sectors.
He helps organizations align investment and policy decisions with operational priorities, developing risk metrics and tabletop exercises that unify operations, engineering, and cybersecurity so organizations in any industrial sector can prioritize and measure what matters.
How to connect Dean : https://www.linkedin.com/in/dean-parsons-cybersecurity
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X:]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2364198/c1a-w52rp-gp5vg91gh9q0-w4hw8q.jpg"></itunes:image>
                                                                            <itunes:duration>00:59:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Pen Testing Reality Check: Why Cybersecurity Fundamentals Still Matter More Than AI]]>
                </title>
                <pubDate>Mon, 09 Feb 2026 12:51:41 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2353176</guid>
                                    <link>https://protectitallpod.com/ep092/</link>
                                <description>
                                            <![CDATA[<p>Shiny tools don’t break attackers in basic mistakes.</p>
<p>In Episode 92 of Protect It All, host Aaron Crow sits down with Corey LeBleu, founder of Relix Security and seasoned penetration tester, for a candid look at what actually causes organizations to get compromised and why fundamentals still matter more than the latest security trends.</p>
<p>Drawing from years of red-team and penetration-testing experience, Corey shares real stories from the field: forgotten printers, unmanaged IoT devices, legacy systems no one owns anymore, and misconfigurations hiding in plain sight. Together, Aaron and Corey unpack why asset visibility, patching, and change management continue to be the weakest links - even as AI and automation enter the security conversation.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why old printers, IoT devices, and “temporary” systems are prime attack paths</li>
<li style="font-weight:400;">What most organizations misunderstand about pen testing and red teaming</li>
<li style="font-weight:400;">How poor asset inventory and change management undermine security programs</li>
<li style="font-weight:400;">The real risks behind shadow IT and unmanaged tools</li>
<li style="font-weight:400;">Where AI helps in pen testing and where experience still wins</li>
<li style="font-weight:400;">Why mastering the basics beats chasing new security gadgets every time<br /><br /></li>
</ul>
<p>Whether you’re a security professional, IT leader, or someone looking to break into cybersecurity, this episode delivers practical, no-nonsense lessons from the front lines - focused on what actually reduces risk.</p>
<p> Tune in to hear why cybersecurity success still starts with the fundamentals - only on Protect It All.</p>
<p><b>Key Moments: </b></p>
<p>03:57 Critical Infrastructure: Finding Vulnerabilities</p>
<p>06:44 "Cyber Risks from Hidden Devices"</p>
<p>11:25 Cybersecurity: Focus on Basics</p>
<p>16:09 Complex Systems Demand Continuous Testing</p>
<p>18:17 Understanding Complex System Security</p>
<p>22:54 "Testing: External vs. Internal"</p>
<p>24:12 Enterprise Challenges with AI Integration</p>
<p>27:40 AI Lowers Barriers for Hacking</p>
<p><b>About the guest : </b></p>
<p>Corey LeBleu has built a career around application security testing, becoming deeply involved in integrating vulnerability assessments throughout the software testing lifecycle. Noticing shifts in industry practices, Corey observed major international financial institutions moving to routinely pentest every application- even legacy IBM systems - leading the way in robust cybersecurity practices. In contrast, Corey also highlights the challenges faced by manufacturing, where operational technology often suffers from outdated, vulnerable systems. Corey’s experience showcases the evolving landscape of application security, emphasizing the need for continuous testing and vigilance across diverse industries.</p>
<p></p>
<p><b>How to connect Corey : </b><br /><a href="https://www.linkedin.com/in/coreylebleu/">https://www.linkedin.com/in/coreylebleu/</a></p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Shiny tools don’t break attackers in basic mistakes.
In Episode 92 of Protect It All, host Aaron Crow sits down with Corey LeBleu, founder of Relix Security and seasoned penetration tester, for a candid look at what actually causes organizations to get compromised and why fundamentals still matter more than the latest security trends.
Drawing from years of red-team and penetration-testing experience, Corey shares real stories from the field: forgotten printers, unmanaged IoT devices, legacy systems no one owns anymore, and misconfigurations hiding in plain sight. Together, Aaron and Corey unpack why asset visibility, patching, and change management continue to be the weakest links - even as AI and automation enter the security conversation.
You’ll learn:

Why old printers, IoT devices, and “temporary” systems are prime attack paths
What most organizations misunderstand about pen testing and red teaming
How poor asset inventory and change management undermine security programs
The real risks behind shadow IT and unmanaged tools
Where AI helps in pen testing and where experience still wins
Why mastering the basics beats chasing new security gadgets every time

Whether you’re a security professional, IT leader, or someone looking to break into cybersecurity, this episode delivers practical, no-nonsense lessons from the front lines - focused on what actually reduces risk.
 Tune in to hear why cybersecurity success still starts with the fundamentals - only on Protect It All.
Key Moments: 
03:57 Critical Infrastructure: Finding Vulnerabilities
06:44 "Cyber Risks from Hidden Devices"
11:25 Cybersecurity: Focus on Basics
16:09 Complex Systems Demand Continuous Testing
18:17 Understanding Complex System Security
22:54 "Testing: External vs. Internal"
24:12 Enterprise Challenges with AI Integration
27:40 AI Lowers Barriers for Hacking
About the guest : 
Corey LeBleu has built a career around application security testing, becoming deeply involved in integrating vulnerability assessments throughout the software testing lifecycle. Noticing shifts in industry practices, Corey observed major international financial institutions moving to routinely pentest every application- even legacy IBM systems - leading the way in robust cybersecurity practices. In contrast, Corey also highlights the challenges faced by manufacturing, where operational technology often suffers from outdated, vulnerable systems. Corey’s experience showcases the evolving landscape of application security, emphasizing the need for continuous testing and vigilance across diverse industries.

How to connect Corey : https://www.linkedin.com/in/coreylebleu/

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Pen Testing Reality Check: Why Cybersecurity Fundamentals Still Matter More Than AI]]>
                </itunes:title>
                                    <itunes:episode>92</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Shiny tools don’t break attackers in basic mistakes.</p>
<p>In Episode 92 of Protect It All, host Aaron Crow sits down with Corey LeBleu, founder of Relix Security and seasoned penetration tester, for a candid look at what actually causes organizations to get compromised and why fundamentals still matter more than the latest security trends.</p>
<p>Drawing from years of red-team and penetration-testing experience, Corey shares real stories from the field: forgotten printers, unmanaged IoT devices, legacy systems no one owns anymore, and misconfigurations hiding in plain sight. Together, Aaron and Corey unpack why asset visibility, patching, and change management continue to be the weakest links - even as AI and automation enter the security conversation.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why old printers, IoT devices, and “temporary” systems are prime attack paths</li>
<li style="font-weight:400;">What most organizations misunderstand about pen testing and red teaming</li>
<li style="font-weight:400;">How poor asset inventory and change management undermine security programs</li>
<li style="font-weight:400;">The real risks behind shadow IT and unmanaged tools</li>
<li style="font-weight:400;">Where AI helps in pen testing and where experience still wins</li>
<li style="font-weight:400;">Why mastering the basics beats chasing new security gadgets every time<br /><br /></li>
</ul>
<p>Whether you’re a security professional, IT leader, or someone looking to break into cybersecurity, this episode delivers practical, no-nonsense lessons from the front lines - focused on what actually reduces risk.</p>
<p> Tune in to hear why cybersecurity success still starts with the fundamentals - only on Protect It All.</p>
<p><b>Key Moments: </b></p>
<p>03:57 Critical Infrastructure: Finding Vulnerabilities</p>
<p>06:44 "Cyber Risks from Hidden Devices"</p>
<p>11:25 Cybersecurity: Focus on Basics</p>
<p>16:09 Complex Systems Demand Continuous Testing</p>
<p>18:17 Understanding Complex System Security</p>
<p>22:54 "Testing: External vs. Internal"</p>
<p>24:12 Enterprise Challenges with AI Integration</p>
<p>27:40 AI Lowers Barriers for Hacking</p>
<p><b>About the guest : </b></p>
<p>Corey LeBleu has built a career around application security testing, becoming deeply involved in integrating vulnerability assessments throughout the software testing lifecycle. Noticing shifts in industry practices, Corey observed major international financial institutions moving to routinely pentest every application- even legacy IBM systems - leading the way in robust cybersecurity practices. In contrast, Corey also highlights the challenges faced by manufacturing, where operational technology often suffers from outdated, vulnerable systems. Corey’s experience showcases the evolving landscape of application security, emphasizing the need for continuous testing and vigilance across diverse industries.</p>
<p></p>
<p><b>How to connect Corey : </b><br /><a href="https://www.linkedin.com/in/coreylebleu/">https://www.linkedin.com/in/coreylebleu/</a></p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a></li>
</ul>
<p> </p>
<p><b>To be a guest or suggest a guest/episode, </b>please email us at <a href="mailto:info@protectitall.co">info@protectitall.co</a></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2353176/c1e-z68mps3gmdwsq5403-rk2ovqmmav81-nfqmgb.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2353176&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=8b9951e74874b2b4dfb1efa7105d42017b4aeee20f2c56697966470bbff74e02" length="31321309"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Shiny tools don’t break attackers in basic mistakes.
In Episode 92 of Protect It All, host Aaron Crow sits down with Corey LeBleu, founder of Relix Security and seasoned penetration tester, for a candid look at what actually causes organizations to get compromised and why fundamentals still matter more than the latest security trends.
Drawing from years of red-team and penetration-testing experience, Corey shares real stories from the field: forgotten printers, unmanaged IoT devices, legacy systems no one owns anymore, and misconfigurations hiding in plain sight. Together, Aaron and Corey unpack why asset visibility, patching, and change management continue to be the weakest links - even as AI and automation enter the security conversation.
You’ll learn:

Why old printers, IoT devices, and “temporary” systems are prime attack paths
What most organizations misunderstand about pen testing and red teaming
How poor asset inventory and change management undermine security programs
The real risks behind shadow IT and unmanaged tools
Where AI helps in pen testing and where experience still wins
Why mastering the basics beats chasing new security gadgets every time

Whether you’re a security professional, IT leader, or someone looking to break into cybersecurity, this episode delivers practical, no-nonsense lessons from the front lines - focused on what actually reduces risk.
 Tune in to hear why cybersecurity success still starts with the fundamentals - only on Protect It All.
Key Moments: 
03:57 Critical Infrastructure: Finding Vulnerabilities
06:44 "Cyber Risks from Hidden Devices"
11:25 Cybersecurity: Focus on Basics
16:09 Complex Systems Demand Continuous Testing
18:17 Understanding Complex System Security
22:54 "Testing: External vs. Internal"
24:12 Enterprise Challenges with AI Integration
27:40 AI Lowers Barriers for Hacking
About the guest : 
Corey LeBleu has built a career around application security testing, becoming deeply involved in integrating vulnerability assessments throughout the software testing lifecycle. Noticing shifts in industry practices, Corey observed major international financial institutions moving to routinely pentest every application- even legacy IBM systems - leading the way in robust cybersecurity practices. In contrast, Corey also highlights the challenges faced by manufacturing, where operational technology often suffers from outdated, vulnerable systems. Corey’s experience showcases the evolving landscape of application security, emphasizing the need for continuous testing and vigilance across diverse industries.

How to connect Corey : https://www.linkedin.com/in/coreylebleu/

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2353176/c1a-w52rp-rk2ovqmwbvj6-wafz1i.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:37</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[OT Remote Access After COVID: Why IT Tools Fail and What Critical Infrastructure Needs Now]]>
                </title>
                <pubDate>Mon, 02 Feb 2026 18:23:07 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2346247</guid>
                                    <link>https://protectitallpod.com/ep091/</link>
                                <description>
                                            <![CDATA[<p>Remote access transformed overnight - and OT environments are still feeling the impact.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> is joined by <b>Steve Rutherford</b>, VP of Sales at Hyperport and former military officer, for a candid conversation on how secure remote access in <b>operational technology (OT)</b> has evolved - and where it’s heading next.</p>
<p>They unpack how COVID accelerated remote connectivity across critical infrastructure, why many traditional IT security tools fall short in OT environments, and what protection really looks like when safety, reliability, and uptime are non-negotiable. Drawing from military discipline and frontline OT experience, Steve shares a grounded perspective on managing risk in environments where failure has physical-world consequences.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">How COVID permanently changed OT remote access expectations</li>
<li style="font-weight:400;">Why <b>IT-first security approaches don’t translate well to OT</b></li>
<li style="font-weight:400;">The role of <b>layered access controls</b> and policy-driven permissions</li>
<li style="font-weight:400;">How <b>dynamic access and trust scoring</b> are reshaping OT security</li>
<li style="font-weight:400;">Where IT/OT convergence helps - and where it creates new risk</li>
<li style="font-weight:400;">What leaders must prioritize to balance access, safety, and resilience<br /><br /></li>
</ul>
<p>If you’re responsible for enabling remote access while protecting critical operations, this episode delivers <b>real-world insight, practical guidance, and a forward-looking view</b> of OT cybersecurity.</p>
<p> <b>Tune in to understand what secure OT access really requires in today’s threat landscape- only on Protect It All.</b></p>
<p>Key Moments: </p>
<p>00:00 Securing Critical Infrastructure Access</p>
<p>03:59 "OT Mindset: Defense and Offense"</p>
<p>07:26 "Remote Access Challenges in Operations"</p>
<p>11:45 "Challenges in OT-IT Integration"</p>
<p>16:07 Authority Must Match Responsibility</p>
<p>18:23 Simplifying OT Authentication Challenges</p>
<p>21:53 "Dynamic Trust Scoring with AI"</p>
<p>24:05 "Access Control and Segmentation"</p>
<p>28:57 "Secure Access Without Overreach"</p>
<p>33:12 "Left of Boom Awareness"</p>
<p>35:56 OT Security and Local Control</p>
<p>39:35 "Driving Early Adoption Awareness"</p>
<p>41:54 "Proactive Support for Critical Infrastructure"</p>
<p>45:52 "Remote Work Enhances Team Efficiency"</p>
<p>47:17 "Exciting Tech for Cybersecurity"</p>
<p><b>About the guest : </b><br />Steve Rutherford is a former U.S. Army officer and aviator who transitioned his mission-driven mindset from military service to protecting critical infrastructure through operational technology (OT) security. After exploring multiple industries, Steve found a natural alignment between military operations and OT environments - where safety, reliability, and uptime are non-negotiable. Today, he works in secure user access for OT, helping organizations protect the systems that power modern life.</p>
<p><b>How to connect steve : </b></p>
<p>Website : <a href="https://hyperport.io/">https://hyperport.io/</a></p>
<p>Linkedin: <a href="https://www.linkedin.com/in/steverutherford1/">https://www.linkedin.com/in/steverutherford1/</a></p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Remote access transformed overnight - and OT environments are still feeling the impact.
In this episode of Protect It All, host Aaron Crow is joined by Steve Rutherford, VP of Sales at Hyperport and former military officer, for a candid conversation on how secure remote access in operational technology (OT) has evolved - and where it’s heading next.
They unpack how COVID accelerated remote connectivity across critical infrastructure, why many traditional IT security tools fall short in OT environments, and what protection really looks like when safety, reliability, and uptime are non-negotiable. Drawing from military discipline and frontline OT experience, Steve shares a grounded perspective on managing risk in environments where failure has physical-world consequences.
You’ll learn:

How COVID permanently changed OT remote access expectations
Why IT-first security approaches don’t translate well to OT
The role of layered access controls and policy-driven permissions
How dynamic access and trust scoring are reshaping OT security
Where IT/OT convergence helps - and where it creates new risk
What leaders must prioritize to balance access, safety, and resilience

If you’re responsible for enabling remote access while protecting critical operations, this episode delivers real-world insight, practical guidance, and a forward-looking view of OT cybersecurity.
 Tune in to understand what secure OT access really requires in today’s threat landscape- only on Protect It All.
Key Moments: 
00:00 Securing Critical Infrastructure Access
03:59 "OT Mindset: Defense and Offense"
07:26 "Remote Access Challenges in Operations"
11:45 "Challenges in OT-IT Integration"
16:07 Authority Must Match Responsibility
18:23 Simplifying OT Authentication Challenges
21:53 "Dynamic Trust Scoring with AI"
24:05 "Access Control and Segmentation"
28:57 "Secure Access Without Overreach"
33:12 "Left of Boom Awareness"
35:56 OT Security and Local Control
39:35 "Driving Early Adoption Awareness"
41:54 "Proactive Support for Critical Infrastructure"
45:52 "Remote Work Enhances Team Efficiency"
47:17 "Exciting Tech for Cybersecurity"
About the guest : Steve Rutherford is a former U.S. Army officer and aviator who transitioned his mission-driven mindset from military service to protecting critical infrastructure through operational technology (OT) security. After exploring multiple industries, Steve found a natural alignment between military operations and OT environments - where safety, reliability, and uptime are non-negotiable. Today, he works in secure user access for OT, helping organizations protect the systems that power modern life.
How to connect steve : 
Website : https://hyperport.io/
Linkedin: https://www.linkedin.com/in/steverutherford1/

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[OT Remote Access After COVID: Why IT Tools Fail and What Critical Infrastructure Needs Now]]>
                </itunes:title>
                                    <itunes:episode>91</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Remote access transformed overnight - and OT environments are still feeling the impact.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> is joined by <b>Steve Rutherford</b>, VP of Sales at Hyperport and former military officer, for a candid conversation on how secure remote access in <b>operational technology (OT)</b> has evolved - and where it’s heading next.</p>
<p>They unpack how COVID accelerated remote connectivity across critical infrastructure, why many traditional IT security tools fall short in OT environments, and what protection really looks like when safety, reliability, and uptime are non-negotiable. Drawing from military discipline and frontline OT experience, Steve shares a grounded perspective on managing risk in environments where failure has physical-world consequences.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">How COVID permanently changed OT remote access expectations</li>
<li style="font-weight:400;">Why <b>IT-first security approaches don’t translate well to OT</b></li>
<li style="font-weight:400;">The role of <b>layered access controls</b> and policy-driven permissions</li>
<li style="font-weight:400;">How <b>dynamic access and trust scoring</b> are reshaping OT security</li>
<li style="font-weight:400;">Where IT/OT convergence helps - and where it creates new risk</li>
<li style="font-weight:400;">What leaders must prioritize to balance access, safety, and resilience<br /><br /></li>
</ul>
<p>If you’re responsible for enabling remote access while protecting critical operations, this episode delivers <b>real-world insight, practical guidance, and a forward-looking view</b> of OT cybersecurity.</p>
<p> <b>Tune in to understand what secure OT access really requires in today’s threat landscape- only on Protect It All.</b></p>
<p>Key Moments: </p>
<p>00:00 Securing Critical Infrastructure Access</p>
<p>03:59 "OT Mindset: Defense and Offense"</p>
<p>07:26 "Remote Access Challenges in Operations"</p>
<p>11:45 "Challenges in OT-IT Integration"</p>
<p>16:07 Authority Must Match Responsibility</p>
<p>18:23 Simplifying OT Authentication Challenges</p>
<p>21:53 "Dynamic Trust Scoring with AI"</p>
<p>24:05 "Access Control and Segmentation"</p>
<p>28:57 "Secure Access Without Overreach"</p>
<p>33:12 "Left of Boom Awareness"</p>
<p>35:56 OT Security and Local Control</p>
<p>39:35 "Driving Early Adoption Awareness"</p>
<p>41:54 "Proactive Support for Critical Infrastructure"</p>
<p>45:52 "Remote Work Enhances Team Efficiency"</p>
<p>47:17 "Exciting Tech for Cybersecurity"</p>
<p><b>About the guest : </b><br />Steve Rutherford is a former U.S. Army officer and aviator who transitioned his mission-driven mindset from military service to protecting critical infrastructure through operational technology (OT) security. After exploring multiple industries, Steve found a natural alignment between military operations and OT environments - where safety, reliability, and uptime are non-negotiable. Today, he works in secure user access for OT, helping organizations protect the systems that power modern life.</p>
<p><b>How to connect steve : </b></p>
<p>Website : <a href="https://hyperport.io/">https://hyperport.io/</a></p>
<p>Linkedin: <a href="https://www.linkedin.com/in/steverutherford1/">https://www.linkedin.com/in/steverutherford1/</a></p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2346247/c1e-0qo87i7r5m7h2072z-xx7kwkg9h9j5-tggtyd.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2346247&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=724689b5df24c41ccbe26b5949165bd3156a51e89b2551b946ba8262f295416b" length="46933017"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Remote access transformed overnight - and OT environments are still feeling the impact.
In this episode of Protect It All, host Aaron Crow is joined by Steve Rutherford, VP of Sales at Hyperport and former military officer, for a candid conversation on how secure remote access in operational technology (OT) has evolved - and where it’s heading next.
They unpack how COVID accelerated remote connectivity across critical infrastructure, why many traditional IT security tools fall short in OT environments, and what protection really looks like when safety, reliability, and uptime are non-negotiable. Drawing from military discipline and frontline OT experience, Steve shares a grounded perspective on managing risk in environments where failure has physical-world consequences.
You’ll learn:

How COVID permanently changed OT remote access expectations
Why IT-first security approaches don’t translate well to OT
The role of layered access controls and policy-driven permissions
How dynamic access and trust scoring are reshaping OT security
Where IT/OT convergence helps - and where it creates new risk
What leaders must prioritize to balance access, safety, and resilience

If you’re responsible for enabling remote access while protecting critical operations, this episode delivers real-world insight, practical guidance, and a forward-looking view of OT cybersecurity.
 Tune in to understand what secure OT access really requires in today’s threat landscape- only on Protect It All.
Key Moments: 
00:00 Securing Critical Infrastructure Access
03:59 "OT Mindset: Defense and Offense"
07:26 "Remote Access Challenges in Operations"
11:45 "Challenges in OT-IT Integration"
16:07 Authority Must Match Responsibility
18:23 Simplifying OT Authentication Challenges
21:53 "Dynamic Trust Scoring with AI"
24:05 "Access Control and Segmentation"
28:57 "Secure Access Without Overreach"
33:12 "Left of Boom Awareness"
35:56 OT Security and Local Control
39:35 "Driving Early Adoption Awareness"
41:54 "Proactive Support for Critical Infrastructure"
45:52 "Remote Work Enhances Team Efficiency"
47:17 "Exciting Tech for Cybersecurity"
About the guest : Steve Rutherford is a former U.S. Army officer and aviator who transitioned his mission-driven mindset from military service to protecting critical infrastructure through operational technology (OT) security. After exploring multiple industries, Steve found a natural alignment between military operations and OT environments - where safety, reliability, and uptime are non-negotiable. Today, he works in secure user access for OT, helping organizations protect the systems that power modern life.
How to connect steve : 
Website : https://hyperport.io/
Linkedin: https://www.linkedin.com/in/steverutherford1/

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2346247/c1a-w52rp-mkg9x9w5s6v5-w0obzm.jpg"></itunes:image>
                                                                            <itunes:duration>00:49:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Securing Remote Access in OT: Visibility, Segmentation, and What Compliance Misses]]>
                </title>
                <pubDate>Mon, 19 Jan 2026 10:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2328847</guid>
                                    <link>https://protectitallpod.com/ep090/</link>
                                <description>
                                            <![CDATA[<p>Remote access is no longer optional in OT - but unmanaged connectivity is one of the fastest ways to lose control of critical systems.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down the real challenges of securing connectivity across IT and OT environments. As vendors, technicians, and support teams increasingly rely on remote access, many organizations struggle with poor visibility, legacy systems, and unclear network boundaries - creating unnecessary risk.</p>
<p>Aaron walks through newly released <b>secure connectivity guidance from CISA and the UK National Cyber Security Centre</b>, translating an eight-point framework into practical, real-world steps that security and operations teams can actually implement.</p>
<p><b>You’ll learn:</b></p>
<ul>
<li style="font-weight:400;">Why <b>remote access is one of the biggest OT risk multipliers</b></li>
<li style="font-weight:400;">How poor visibility creates blind spots attackers love</li>
<li style="font-weight:400;">Why <b>asset inventory and documentation</b> are foundational - not optional</li>
<li style="font-weight:400;">How segmentation and least-privilege design shrink the attack surface</li>
<li style="font-weight:400;">What compliance frameworks get right - and what they <i>don’t</i></li>
<li style="font-weight:400;">Best practices for <b>vendor access, MFA, session recording, and monitoring</b></li>
<li style="font-weight:400;">How to design secure connectivity without breaking operations<br /><br /></li>
</ul>
<p>Whether you’re responsible for OT security, managing vendors, or bridging IT and OT teams, this episode delivers <b>actionable guidance</b> to help you regain control of connectivity and protect critical infrastructure.</p>
<p> <b>Tune in to learn how to secure access without sacrificing operations - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>01:11 "Secure Connectivity in OT"</p>
<p>05:10 "Reducing Attack Surface Through Access Limits"</p>
<p>10:02 "Control System Upgrade Failure Impact"</p>
<p>12:00 Beyond Passwords: Strengthening Security</p>
<p>17:16 "Strengthening Cybersecurity Basics"</p>
<p>18:26 "Balancing Compliance and Security"</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Remote access is no longer optional in OT - but unmanaged connectivity is one of the fastest ways to lose control of critical systems.
In this episode of Protect It All, host Aaron Crow breaks down the real challenges of securing connectivity across IT and OT environments. As vendors, technicians, and support teams increasingly rely on remote access, many organizations struggle with poor visibility, legacy systems, and unclear network boundaries - creating unnecessary risk.
Aaron walks through newly released secure connectivity guidance from CISA and the UK National Cyber Security Centre, translating an eight-point framework into practical, real-world steps that security and operations teams can actually implement.
You’ll learn:

Why remote access is one of the biggest OT risk multipliers
How poor visibility creates blind spots attackers love
Why asset inventory and documentation are foundational - not optional
How segmentation and least-privilege design shrink the attack surface
What compliance frameworks get right - and what they don’t
Best practices for vendor access, MFA, session recording, and monitoring
How to design secure connectivity without breaking operations

Whether you’re responsible for OT security, managing vendors, or bridging IT and OT teams, this episode delivers actionable guidance to help you regain control of connectivity and protect critical infrastructure.
 Tune in to learn how to secure access without sacrificing operations - only on Protect It All.
Key Moments: 
01:11 "Secure Connectivity in OT"
05:10 "Reducing Attack Surface Through Access Limits"
10:02 "Control System Upgrade Failure Impact"
12:00 Beyond Passwords: Strengthening Security
17:16 "Strengthening Cybersecurity Basics"
18:26 "Balancing Compliance and Security"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 


To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Securing Remote Access in OT: Visibility, Segmentation, and What Compliance Misses]]>
                </itunes:title>
                                    <itunes:episode>90</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Remote access is no longer optional in OT - but unmanaged connectivity is one of the fastest ways to lose control of critical systems.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down the real challenges of securing connectivity across IT and OT environments. As vendors, technicians, and support teams increasingly rely on remote access, many organizations struggle with poor visibility, legacy systems, and unclear network boundaries - creating unnecessary risk.</p>
<p>Aaron walks through newly released <b>secure connectivity guidance from CISA and the UK National Cyber Security Centre</b>, translating an eight-point framework into practical, real-world steps that security and operations teams can actually implement.</p>
<p><b>You’ll learn:</b></p>
<ul>
<li style="font-weight:400;">Why <b>remote access is one of the biggest OT risk multipliers</b></li>
<li style="font-weight:400;">How poor visibility creates blind spots attackers love</li>
<li style="font-weight:400;">Why <b>asset inventory and documentation</b> are foundational - not optional</li>
<li style="font-weight:400;">How segmentation and least-privilege design shrink the attack surface</li>
<li style="font-weight:400;">What compliance frameworks get right - and what they <i>don’t</i></li>
<li style="font-weight:400;">Best practices for <b>vendor access, MFA, session recording, and monitoring</b></li>
<li style="font-weight:400;">How to design secure connectivity without breaking operations<br /><br /></li>
</ul>
<p>Whether you’re responsible for OT security, managing vendors, or bridging IT and OT teams, this episode delivers <b>actionable guidance</b> to help you regain control of connectivity and protect critical infrastructure.</p>
<p> <b>Tune in to learn how to secure access without sacrificing operations - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>01:11 "Secure Connectivity in OT"</p>
<p>05:10 "Reducing Attack Surface Through Access Limits"</p>
<p>10:02 "Control System Upgrade Failure Impact"</p>
<p>12:00 Beyond Passwords: Strengthening Security</p>
<p>17:16 "Strengthening Cybersecurity Basics"</p>
<p>18:26 "Balancing Compliance and Security"</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2328847/c1e-w52rpbvjxzvbj2441-34xdmgrra3w2-7eznkw.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2328847&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=77748a677a9e5ca0cdcbf527283a2b0749b545f563053f8fb20703c456f7d35e" length="20947284"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Remote access is no longer optional in OT - but unmanaged connectivity is one of the fastest ways to lose control of critical systems.
In this episode of Protect It All, host Aaron Crow breaks down the real challenges of securing connectivity across IT and OT environments. As vendors, technicians, and support teams increasingly rely on remote access, many organizations struggle with poor visibility, legacy systems, and unclear network boundaries - creating unnecessary risk.
Aaron walks through newly released secure connectivity guidance from CISA and the UK National Cyber Security Centre, translating an eight-point framework into practical, real-world steps that security and operations teams can actually implement.
You’ll learn:

Why remote access is one of the biggest OT risk multipliers
How poor visibility creates blind spots attackers love
Why asset inventory and documentation are foundational - not optional
How segmentation and least-privilege design shrink the attack surface
What compliance frameworks get right - and what they don’t
Best practices for vendor access, MFA, session recording, and monitoring
How to design secure connectivity without breaking operations

Whether you’re responsible for OT security, managing vendors, or bridging IT and OT teams, this episode delivers actionable guidance to help you regain control of connectivity and protect critical infrastructure.
 Tune in to learn how to secure access without sacrificing operations - only on Protect It All.
Key Moments: 
01:11 "Secure Connectivity in OT"
05:10 "Reducing Attack Surface Through Access Limits"
10:02 "Control System Upgrade Failure Impact"
12:00 Beyond Passwords: Strengthening Security
17:16 "Strengthening Cybersecurity Basics"
18:26 "Balancing Compliance and Security"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 


To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2328847/c1a-w52rp-ww7xpm20sv9j-dkfqyv.jpg"></itunes:image>
                                                                            <itunes:duration>00:20:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Small Business Cybersecurity: Practical Steps to Survive Big Threats on a Small Budget]]>
                </title>
                <pubDate>Mon, 12 Jan 2026 11:29:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2319955</guid>
                                    <link>https://protectitallpod.com/ep089/</link>
                                <description>
                                            <![CDATA[<p>Small businesses aren’t too small to be targeted; they're often the <i>first</i> targets.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down what cybersecurity really looks like for <b>small and medium-sized businesses with limited resources</b>. With nearly half of all cyberattacks aimed at SMBs and many companies never recovering, this episode focuses on <b>what actually matters</b> when budgets, time, and teams are tight.</p>
<p>Aaron cuts through fear-based messaging and tool overload to share <b>simple, affordable steps</b> that can dramatically reduce risk without requiring a full security team or enterprise spend.</p>
<p><b>You’ll learn:</b></p>
<ul>
<li style="font-weight:400;">Why small businesses are prime cyber targets</li>
<li style="font-weight:400;">The most common mistakes that lead to catastrophic loss</li>
<li style="font-weight:400;">How <b>basic policies and employee awareness</b> stop most attacks</li>
<li style="font-weight:400;">Why <b>multi-factor authentication, backups, and segmentation</b> are non-negotiable</li>
<li style="font-weight:400;">How to prioritize cybersecurity when resources are limited</li>
<li style="font-weight:400;">Why resilience not perfection is the real goal<br /><br /></li>
</ul>
<p>Whether you’re a founder, business owner, or IT lead at a growing company, this episode gives you <b>practical guidance you can act on immediately</b> before a cyber incident forces your hand.</p>
<p> <b>Tune in to learn how to protect your business, your data, and your future only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>03:37 Cybersecurity Risks for Small Businesses</p>
<p>08:06 System Security and Backup Essentials</p>
<p>12:21 Cybersecurity: Prepare, Monitor, Survive</p>
<p>14:21 Efficient Device Monitoring Simplified</p>
<p>19:31 "Three-Two-One Backup Strategy"</p>
<p>20:20 "Planning Left of Bang"</p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Small businesses aren’t too small to be targeted; they're often the first targets.
In this episode of Protect It All, host Aaron Crow breaks down what cybersecurity really looks like for small and medium-sized businesses with limited resources. With nearly half of all cyberattacks aimed at SMBs and many companies never recovering, this episode focuses on what actually matters when budgets, time, and teams are tight.
Aaron cuts through fear-based messaging and tool overload to share simple, affordable steps that can dramatically reduce risk without requiring a full security team or enterprise spend.
You’ll learn:

Why small businesses are prime cyber targets
The most common mistakes that lead to catastrophic loss
How basic policies and employee awareness stop most attacks
Why multi-factor authentication, backups, and segmentation are non-negotiable
How to prioritize cybersecurity when resources are limited
Why resilience not perfection is the real goal

Whether you’re a founder, business owner, or IT lead at a growing company, this episode gives you practical guidance you can act on immediately before a cyber incident forces your hand.
 Tune in to learn how to protect your business, your data, and your future only on Protect It All.
Key Moments: 
03:37 Cybersecurity Risks for Small Businesses
08:06 System Security and Backup Essentials
12:21 Cybersecurity: Prepare, Monitor, Survive
14:21 Efficient Device Monitoring Simplified
19:31 "Three-Two-One Backup Strategy"
20:20 "Planning Left of Bang"

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 


To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Small Business Cybersecurity: Practical Steps to Survive Big Threats on a Small Budget]]>
                </itunes:title>
                                    <itunes:episode>89</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Small businesses aren’t too small to be targeted; they're often the <i>first</i> targets.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> breaks down what cybersecurity really looks like for <b>small and medium-sized businesses with limited resources</b>. With nearly half of all cyberattacks aimed at SMBs and many companies never recovering, this episode focuses on <b>what actually matters</b> when budgets, time, and teams are tight.</p>
<p>Aaron cuts through fear-based messaging and tool overload to share <b>simple, affordable steps</b> that can dramatically reduce risk without requiring a full security team or enterprise spend.</p>
<p><b>You’ll learn:</b></p>
<ul>
<li style="font-weight:400;">Why small businesses are prime cyber targets</li>
<li style="font-weight:400;">The most common mistakes that lead to catastrophic loss</li>
<li style="font-weight:400;">How <b>basic policies and employee awareness</b> stop most attacks</li>
<li style="font-weight:400;">Why <b>multi-factor authentication, backups, and segmentation</b> are non-negotiable</li>
<li style="font-weight:400;">How to prioritize cybersecurity when resources are limited</li>
<li style="font-weight:400;">Why resilience not perfection is the real goal<br /><br /></li>
</ul>
<p>Whether you’re a founder, business owner, or IT lead at a growing company, this episode gives you <b>practical guidance you can act on immediately</b> before a cyber incident forces your hand.</p>
<p> <b>Tune in to learn how to protect your business, your data, and your future only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>03:37 Cybersecurity Risks for Small Businesses</p>
<p>08:06 System Security and Backup Essentials</p>
<p>12:21 Cybersecurity: Prepare, Monitor, Survive</p>
<p>14:21 Efficient Device Monitoring Simplified</p>
<p>19:31 "Three-Two-One Backup Strategy"</p>
<p>20:20 "Planning Left of Bang"</p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2319955/c1e-p5o2vb172j2cv12rm-dm1581j7hmqm-nk7cda.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2319955&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=ba390b7e1210b3fd0f7fbc8a27a626b3c6992f9d05f053ee5cdca76121643e94" length="25331666"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Small businesses aren’t too small to be targeted; they're often the first targets.
In this episode of Protect It All, host Aaron Crow breaks down what cybersecurity really looks like for small and medium-sized businesses with limited resources. With nearly half of all cyberattacks aimed at SMBs and many companies never recovering, this episode focuses on what actually matters when budgets, time, and teams are tight.
Aaron cuts through fear-based messaging and tool overload to share simple, affordable steps that can dramatically reduce risk without requiring a full security team or enterprise spend.
You’ll learn:

Why small businesses are prime cyber targets
The most common mistakes that lead to catastrophic loss
How basic policies and employee awareness stop most attacks
Why multi-factor authentication, backups, and segmentation are non-negotiable
How to prioritize cybersecurity when resources are limited
Why resilience not perfection is the real goal

Whether you’re a founder, business owner, or IT lead at a growing company, this episode gives you practical guidance you can act on immediately before a cyber incident forces your hand.
 Tune in to learn how to protect your business, your data, and your future only on Protect It All.
Key Moments: 
03:37 Cybersecurity Risks for Small Businesses
08:06 System Security and Backup Essentials
12:21 Cybersecurity: Prepare, Monitor, Survive
14:21 Efficient Device Monitoring Simplified
19:31 "Three-Two-One Backup Strategy"
20:20 "Planning Left of Bang"

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 


To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2319955/c1a-w52rp-ww7mr74gh46z-xd71wo.jpg"></itunes:image>
                                                                            <itunes:duration>00:25:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cybersecurity Success in 2026: Why Planning Early and Investing in People Wins]]>
                </title>
                <pubDate>Mon, 05 Jan 2026 12:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2313368</guid>
                                    <link>https://protectitallpod.com/ep088/</link>
                                <description>
                                            <![CDATA[<p> Great cybersecurity programs aren’t built in a panic - they’re built through <b>early planning, trusted relationships, and consistent execution</b>.</p>
<p>In this kickoff episode for 2026 of <b>Protect It All</b>, host <b>Aaron Crow</b> shares practical, real-world guidance on how cybersecurity leaders can avoid last-minute scrambles and instead build momentum that lasts all year. Drawing from years of experience across IT and OT environments, Aaron explains why <b>people, trust, and planning</b> matter more than any single tool or technology.</p>
<p>This episode dives into how successful teams think ahead, budgeting wisely, engaging stakeholders early, and creating space for learning, networking, and collaboration beyond spreadsheets and ROI metrics.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>starting early</b> is the most underrated cybersecurity advantage</li>
<li style="font-weight:400;">How trust and relationships accelerate security programs</li>
<li style="font-weight:400;">Why investing in <b>people over tools</b> delivers better outcomes</li>
<li style="font-weight:400;">How to avoid procrastination and year-end panic</li>
<li style="font-weight:400;">The role of networking, conferences, and peer learning in long-term success</li>
<li style="font-weight:400;">How diversity, challenge, and momentum strengthen security teams</li>
<li style="font-weight:400;">What leaders should prioritize to make 2026 a year of progress - not firefighting<br /><br /></li>
</ul>
<p>Whether you’re planning budgets, building teams, or refining IT/OT security strategy, this episode delivers <b>actionable guidance to help you move from intention to execution</b>.</p>
<p> <b>Tune in and learn how to build a cybersecurity program that works all year long - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>03:51 "Planning for Unforeseen Challenges"</p>
<p>09:02 "AI Automation: Challenges and Expectations"</p>
<p>10:21 "Budgeting: The Importance of Buffers"</p>
<p>16:16 "Diversity in Problem-Solving Approaches"</p>
<p>17:53 "Understanding Perspectives and Future Goals"</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[ Great cybersecurity programs aren’t built in a panic - they’re built through early planning, trusted relationships, and consistent execution.
In this kickoff episode for 2026 of Protect It All, host Aaron Crow shares practical, real-world guidance on how cybersecurity leaders can avoid last-minute scrambles and instead build momentum that lasts all year. Drawing from years of experience across IT and OT environments, Aaron explains why people, trust, and planning matter more than any single tool or technology.
This episode dives into how successful teams think ahead, budgeting wisely, engaging stakeholders early, and creating space for learning, networking, and collaboration beyond spreadsheets and ROI metrics.
You’ll learn:

Why starting early is the most underrated cybersecurity advantage
How trust and relationships accelerate security programs
Why investing in people over tools delivers better outcomes
How to avoid procrastination and year-end panic
The role of networking, conferences, and peer learning in long-term success
How diversity, challenge, and momentum strengthen security teams
What leaders should prioritize to make 2026 a year of progress - not firefighting

Whether you’re planning budgets, building teams, or refining IT/OT security strategy, this episode delivers actionable guidance to help you move from intention to execution.
 Tune in and learn how to build a cybersecurity program that works all year long - only on Protect It All.
Key Moments: 
03:51 "Planning for Unforeseen Challenges"
09:02 "AI Automation: Challenges and Expectations"
10:21 "Budgeting: The Importance of Buffers"
16:16 "Diversity in Problem-Solving Approaches"
17:53 "Understanding Perspectives and Future Goals"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 


To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Cybersecurity Success in 2026: Why Planning Early and Investing in People Wins]]>
                </itunes:title>
                                    <itunes:episode>88</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p> Great cybersecurity programs aren’t built in a panic - they’re built through <b>early planning, trusted relationships, and consistent execution</b>.</p>
<p>In this kickoff episode for 2026 of <b>Protect It All</b>, host <b>Aaron Crow</b> shares practical, real-world guidance on how cybersecurity leaders can avoid last-minute scrambles and instead build momentum that lasts all year. Drawing from years of experience across IT and OT environments, Aaron explains why <b>people, trust, and planning</b> matter more than any single tool or technology.</p>
<p>This episode dives into how successful teams think ahead, budgeting wisely, engaging stakeholders early, and creating space for learning, networking, and collaboration beyond spreadsheets and ROI metrics.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>starting early</b> is the most underrated cybersecurity advantage</li>
<li style="font-weight:400;">How trust and relationships accelerate security programs</li>
<li style="font-weight:400;">Why investing in <b>people over tools</b> delivers better outcomes</li>
<li style="font-weight:400;">How to avoid procrastination and year-end panic</li>
<li style="font-weight:400;">The role of networking, conferences, and peer learning in long-term success</li>
<li style="font-weight:400;">How diversity, challenge, and momentum strengthen security teams</li>
<li style="font-weight:400;">What leaders should prioritize to make 2026 a year of progress - not firefighting<br /><br /></li>
</ul>
<p>Whether you’re planning budgets, building teams, or refining IT/OT security strategy, this episode delivers <b>actionable guidance to help you move from intention to execution</b>.</p>
<p> <b>Tune in and learn how to build a cybersecurity program that works all year long - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>03:51 "Planning for Unforeseen Challenges"</p>
<p>09:02 "AI Automation: Challenges and Expectations"</p>
<p>10:21 "Budgeting: The Importance of Buffers"</p>
<p>16:16 "Diversity in Problem-Solving Approaches"</p>
<p>17:53 "Understanding Perspectives and Future Goals"</p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2313368/c1e-2p9xmsmokmkcm37q5-9j34zk6zuzx-emwn4p.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2313368&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=d5e11d1df79e215f5f1c934e22a28c9e299e1b11021bc7f418c71890b369baa1" length="22978852"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[ Great cybersecurity programs aren’t built in a panic - they’re built through early planning, trusted relationships, and consistent execution.
In this kickoff episode for 2026 of Protect It All, host Aaron Crow shares practical, real-world guidance on how cybersecurity leaders can avoid last-minute scrambles and instead build momentum that lasts all year. Drawing from years of experience across IT and OT environments, Aaron explains why people, trust, and planning matter more than any single tool or technology.
This episode dives into how successful teams think ahead, budgeting wisely, engaging stakeholders early, and creating space for learning, networking, and collaboration beyond spreadsheets and ROI metrics.
You’ll learn:

Why starting early is the most underrated cybersecurity advantage
How trust and relationships accelerate security programs
Why investing in people over tools delivers better outcomes
How to avoid procrastination and year-end panic
The role of networking, conferences, and peer learning in long-term success
How diversity, challenge, and momentum strengthen security teams
What leaders should prioritize to make 2026 a year of progress - not firefighting

Whether you’re planning budgets, building teams, or refining IT/OT security strategy, this episode delivers actionable guidance to help you move from intention to execution.
 Tune in and learn how to build a cybersecurity program that works all year long - only on Protect It All.
Key Moments: 
03:51 "Planning for Unforeseen Challenges"
09:02 "AI Automation: Challenges and Expectations"
10:21 "Budgeting: The Importance of Buffers"
16:16 "Diversity in Problem-Solving Approaches"
17:53 "Understanding Perspectives and Future Goals"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 


To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2313368/c1a-w52rp-0v7rom63i1g4-r7jby4.jpg"></itunes:image>
                                                                            <itunes:duration>00:21:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[AI Isn’t the Answer: Why Cybersecurity Fundamentals Still Decide OT and IT Success]]>
                </title>
                <pubDate>Mon, 29 Dec 2025 11:12:28 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2307492</guid>
                                    <link>https://protectitallpod.com/ep087/</link>
                                <description>
                                            <![CDATA[<p>AI is everywhere - but it won’t fix broken cybersecurity foundations.</p>
<p>In this end-of-year wrap-up episode of <b>Protect It All</b>, host <b>Aaron Crow</b> takes a hard look at the growing hype around AI in cybersecurity and explains why <b>fundamentals still matter more than any shiny new tool</b>, especially in OT environments.</p>
<p>Drawing from real-world experience and industry observations, Aaron challenges the belief that AI can compensate for missing basics like <b>asset inventory, network segmentation, and clear ownership</b>. He reframes AI as a powerful assistant not a savior and warns against the risks of rushing into automation without understanding what you’re protecting in the first place.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>basic cybersecurity hygiene</b> still determines success or failure</li>
<li style="font-weight:400;">How AI fits best when foundations are already in place</li>
<li style="font-weight:400;">The dangers of <b>shadow AI</b> in OT and industrial environments</li>
<li style="font-weight:400;">Why asset visibility and segmentation remain non-negotiable</li>
<li style="font-weight:400;">How leaders should think about AI as a support tool - not a shortcut</li>
</ul>
<p><b>What OT and IT teams should prioritize heading into 2026</b><br />Whether you’re closing out the year or planning ahead, this episode delivers a grounded, experience-driven perspective on building resilient cybersecurity programs—without chasing hype.</p>
<p> <b>Tune in to hear why mastering the basics is still the smartest cyber strategy - only on Protect It All.</b></p>
<p><strong>Key Moments: </strong></p>
<p>03:32 "Technology Complexity vs. Practicality"</p>
<p>09:33 "AI as an Entry-Level Intern"</p>
<p>12:29 "AI: A Powerful Team Tool"</p>
<p>16:24 "AI Alone Won't Fix Cyber"</p>
<p>19:34 "Mastering Basics Before AI Integration"</p>
<p>21:46 "Shadow AI and Resilience"</p>
<p>25:26 "Addressing Gaps and Ownership"</p>
<p>30:27 "Foundations Matter for Success"</p>
<p><b></b></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[AI is everywhere - but it won’t fix broken cybersecurity foundations.
In this end-of-year wrap-up episode of Protect It All, host Aaron Crow takes a hard look at the growing hype around AI in cybersecurity and explains why fundamentals still matter more than any shiny new tool, especially in OT environments.
Drawing from real-world experience and industry observations, Aaron challenges the belief that AI can compensate for missing basics like asset inventory, network segmentation, and clear ownership. He reframes AI as a powerful assistant not a savior and warns against the risks of rushing into automation without understanding what you’re protecting in the first place.
You’ll learn:

Why basic cybersecurity hygiene still determines success or failure
How AI fits best when foundations are already in place
The dangers of shadow AI in OT and industrial environments
Why asset visibility and segmentation remain non-negotiable
How leaders should think about AI as a support tool - not a shortcut

What OT and IT teams should prioritize heading into 2026Whether you’re closing out the year or planning ahead, this episode delivers a grounded, experience-driven perspective on building resilient cybersecurity programs—without chasing hype.
 Tune in to hear why mastering the basics is still the smartest cyber strategy - only on Protect It All.
Key Moments: 
03:32 "Technology Complexity vs. Practicality"
09:33 "AI as an Entry-Level Intern"
12:29 "AI: A Powerful Team Tool"
16:24 "AI Alone Won't Fix Cyber"
19:34 "Mastering Basics Before AI Integration"
21:46 "Shadow AI and Resilience"
25:26 "Addressing Gaps and Ownership"
30:27 "Foundations Matter for Success"

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 


To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[AI Isn’t the Answer: Why Cybersecurity Fundamentals Still Decide OT and IT Success]]>
                </itunes:title>
                                    <itunes:episode>87</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>AI is everywhere - but it won’t fix broken cybersecurity foundations.</p>
<p>In this end-of-year wrap-up episode of <b>Protect It All</b>, host <b>Aaron Crow</b> takes a hard look at the growing hype around AI in cybersecurity and explains why <b>fundamentals still matter more than any shiny new tool</b>, especially in OT environments.</p>
<p>Drawing from real-world experience and industry observations, Aaron challenges the belief that AI can compensate for missing basics like <b>asset inventory, network segmentation, and clear ownership</b>. He reframes AI as a powerful assistant not a savior and warns against the risks of rushing into automation without understanding what you’re protecting in the first place.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>basic cybersecurity hygiene</b> still determines success or failure</li>
<li style="font-weight:400;">How AI fits best when foundations are already in place</li>
<li style="font-weight:400;">The dangers of <b>shadow AI</b> in OT and industrial environments</li>
<li style="font-weight:400;">Why asset visibility and segmentation remain non-negotiable</li>
<li style="font-weight:400;">How leaders should think about AI as a support tool - not a shortcut</li>
</ul>
<p><b>What OT and IT teams should prioritize heading into 2026</b><br />Whether you’re closing out the year or planning ahead, this episode delivers a grounded, experience-driven perspective on building resilient cybersecurity programs—without chasing hype.</p>
<p> <b>Tune in to hear why mastering the basics is still the smartest cyber strategy - only on Protect It All.</b></p>
<p><strong>Key Moments: </strong></p>
<p>03:32 "Technology Complexity vs. Practicality"</p>
<p>09:33 "AI as an Entry-Level Intern"</p>
<p>12:29 "AI: A Powerful Team Tool"</p>
<p>16:24 "AI Alone Won't Fix Cyber"</p>
<p>19:34 "Mastering Basics Before AI Integration"</p>
<p>21:46 "Shadow AI and Resilience"</p>
<p>25:26 "Addressing Gaps and Ownership"</p>
<p>30:27 "Foundations Matter for Success"</p>
<p><b></b></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2307492/c1e-k1vqntg22zpb219w4-1p711917i58p-u5k8cu.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2307492&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=14eebf4dff6f21a8055b9d3f2179f6d442753ee6a0587cafb07ccf2e48be8e49" length="32610693"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[AI is everywhere - but it won’t fix broken cybersecurity foundations.
In this end-of-year wrap-up episode of Protect It All, host Aaron Crow takes a hard look at the growing hype around AI in cybersecurity and explains why fundamentals still matter more than any shiny new tool, especially in OT environments.
Drawing from real-world experience and industry observations, Aaron challenges the belief that AI can compensate for missing basics like asset inventory, network segmentation, and clear ownership. He reframes AI as a powerful assistant not a savior and warns against the risks of rushing into automation without understanding what you’re protecting in the first place.
You’ll learn:

Why basic cybersecurity hygiene still determines success or failure
How AI fits best when foundations are already in place
The dangers of shadow AI in OT and industrial environments
Why asset visibility and segmentation remain non-negotiable
How leaders should think about AI as a support tool - not a shortcut

What OT and IT teams should prioritize heading into 2026Whether you’re closing out the year or planning ahead, this episode delivers a grounded, experience-driven perspective on building resilient cybersecurity programs—without chasing hype.
 Tune in to hear why mastering the basics is still the smartest cyber strategy - only on Protect It All.
Key Moments: 
03:32 "Technology Complexity vs. Practicality"
09:33 "AI as an Entry-Level Intern"
12:29 "AI: A Powerful Team Tool"
16:24 "AI Alone Won't Fix Cyber"
19:34 "Mastering Basics Before AI Integration"
21:46 "Shadow AI and Resilience"
25:26 "Addressing Gaps and Ownership"
30:27 "Foundations Matter for Success"

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 


To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2307492/c1a-w52rp-7zx7717ru96q-4rrk1g.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get Right]]>
                </title>
                <pubDate>Mon, 22 Dec 2025 11:52:55 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2301797</guid>
                                    <link>https://protectitallpod.com/ep086/</link>
                                <description>
                                            <![CDATA[<p>AI promises transformation - but legacy technology, process gaps, and cyber risk often stand in the way.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with veteran IT and cybersecurity leader <b>Neil D. Morris</b>, who brings over 30 years of experience across aerospace, defense, and energy sectors. Together, they cut through the hype to explore what really matters when modernizing technology and managing cyber risk in complex, real-world environments.</p>
<p>Neil shares candid insights on why legacy systems still power critical operations, why replacing them isn’t as simple as it sounds, and how organizations can unlock real value from AI <i>without increasing risk</i>. The conversation dives into tech debt, regulation, ROI, and the often-overlooked role of process in successful transformation.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>legacy systems aren’t going away anytime soon</b></li>
<li style="font-weight:400;">The hidden risks of chasing AI without strong foundations</li>
<li style="font-weight:400;">How to balance <b>security, usability, and business value</b></li>
<li style="font-weight:400;">Why process and governance matter more than tools</li>
<li style="font-weight:400;">How IT leaders can communicate cyber and AI value in <b>business terms</b></li>
<li style="font-weight:400;">Where AI creates opportunity - and where it creates new attack paths<br /><br /></li>
</ul>
<p>Whether you’re leading digital transformation, managing cyber risk, or advising the business on AI adoption, this episode delivers <b>real talk and practical wisdom</b> from the front lines of IT and OT leadership.</p>
<p> <b>Tune in to learn how to modernize responsibly, manage risk intelligently, and separate AI reality from hype only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>00:00 "Legacy Tech in Modern Firms"</p>
<p>06:22 "Technology, Change, and Customer Focus"</p>
<p>09:51 "Challenges in Articulating Cybersecurity Value"</p>
<p>12:27 "Tech Solutions Must Drive Value"</p>
<p>15:43 Sell Ideas Beyond the Code</p>
<p>19:03 "Ransomware Risks in Acquisitions"</p>
<p>24:02 Government, Services, and Compliance Debate</p>
<p>25:35 Balancing AI, Cybersecurity, and Regulation</p>
<p>30:33 BlackBerry's Downfall: Ignored Innovation</p>
<p>32:06 "Evolution and Misuse of AI"</p>
<p>34:45 "Opportunity to Lead Change"</p>
<p>37:52 "AI Without Guidance Backfires"</p>
<p>41:07 "AI: Smart but Context-Lacking"</p>
<p>46:45 "AI Empowering Business Transformation"</p>
<p>50:30 "Effortless Tech-Fueled Imitation"</p>
<p>About the guest : </p>
<p>Neil D. Morris is a senior enterprise technology leader with 25+ years of experience in digital transformation, cybersecurity, and AI at scale. He currently serves as Head of IT at Redaptive and previously held CIO roles at Ball Aerospace and Maxar Technologies. Neil is known for guiding organizations through complex modernization efforts while balancing security, risk, and business value.</p>
<p>How to connect Neil: <a href="https://www.linkedin.com/in/neildmorris/">https://www.linkedin.com/in/neildmorris/</a></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protecti..."></a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[AI promises transformation - but legacy technology, process gaps, and cyber risk often stand in the way.
In this episode of Protect It All, host Aaron Crow sits down with veteran IT and cybersecurity leader Neil D. Morris, who brings over 30 years of experience across aerospace, defense, and energy sectors. Together, they cut through the hype to explore what really matters when modernizing technology and managing cyber risk in complex, real-world environments.
Neil shares candid insights on why legacy systems still power critical operations, why replacing them isn’t as simple as it sounds, and how organizations can unlock real value from AI without increasing risk. The conversation dives into tech debt, regulation, ROI, and the often-overlooked role of process in successful transformation.
You’ll learn:

Why legacy systems aren’t going away anytime soon
The hidden risks of chasing AI without strong foundations
How to balance security, usability, and business value
Why process and governance matter more than tools
How IT leaders can communicate cyber and AI value in business terms
Where AI creates opportunity - and where it creates new attack paths

Whether you’re leading digital transformation, managing cyber risk, or advising the business on AI adoption, this episode delivers real talk and practical wisdom from the front lines of IT and OT leadership.
 Tune in to learn how to modernize responsibly, manage risk intelligently, and separate AI reality from hype only on Protect It All.
Key Moments: 
00:00 "Legacy Tech in Modern Firms"
06:22 "Technology, Change, and Customer Focus"
09:51 "Challenges in Articulating Cybersecurity Value"
12:27 "Tech Solutions Must Drive Value"
15:43 Sell Ideas Beyond the Code
19:03 "Ransomware Risks in Acquisitions"
24:02 Government, Services, and Compliance Debate
25:35 Balancing AI, Cybersecurity, and Regulation
30:33 BlackBerry's Downfall: Ignored Innovation
32:06 "Evolution and Misuse of AI"
34:45 "Opportunity to Lead Change"
37:52 "AI Without Guidance Backfires"
41:07 "AI: Smart but Context-Lacking"
46:45 "AI Empowering Business Transformation"
50:30 "Effortless Tech-Fueled Imitation"
About the guest : 
Neil D. Morris is a senior enterprise technology leader with 25+ years of experience in digital transformation, cybersecurity, and AI at scale. He currently serves as Head of IT at Redaptive and previously held CIO roles at Ball Aerospace and Maxar Technologies. Neil is known for guiding organizations through complex modernization efforts while balancing security, risk, and business value.
How to connect Neil: https://www.linkedin.com/in/neildmorris/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook: ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get Right]]>
                </itunes:title>
                                    <itunes:episode>86</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>AI promises transformation - but legacy technology, process gaps, and cyber risk often stand in the way.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with veteran IT and cybersecurity leader <b>Neil D. Morris</b>, who brings over 30 years of experience across aerospace, defense, and energy sectors. Together, they cut through the hype to explore what really matters when modernizing technology and managing cyber risk in complex, real-world environments.</p>
<p>Neil shares candid insights on why legacy systems still power critical operations, why replacing them isn’t as simple as it sounds, and how organizations can unlock real value from AI <i>without increasing risk</i>. The conversation dives into tech debt, regulation, ROI, and the often-overlooked role of process in successful transformation.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>legacy systems aren’t going away anytime soon</b></li>
<li style="font-weight:400;">The hidden risks of chasing AI without strong foundations</li>
<li style="font-weight:400;">How to balance <b>security, usability, and business value</b></li>
<li style="font-weight:400;">Why process and governance matter more than tools</li>
<li style="font-weight:400;">How IT leaders can communicate cyber and AI value in <b>business terms</b></li>
<li style="font-weight:400;">Where AI creates opportunity - and where it creates new attack paths<br /><br /></li>
</ul>
<p>Whether you’re leading digital transformation, managing cyber risk, or advising the business on AI adoption, this episode delivers <b>real talk and practical wisdom</b> from the front lines of IT and OT leadership.</p>
<p> <b>Tune in to learn how to modernize responsibly, manage risk intelligently, and separate AI reality from hype only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>00:00 "Legacy Tech in Modern Firms"</p>
<p>06:22 "Technology, Change, and Customer Focus"</p>
<p>09:51 "Challenges in Articulating Cybersecurity Value"</p>
<p>12:27 "Tech Solutions Must Drive Value"</p>
<p>15:43 Sell Ideas Beyond the Code</p>
<p>19:03 "Ransomware Risks in Acquisitions"</p>
<p>24:02 Government, Services, and Compliance Debate</p>
<p>25:35 Balancing AI, Cybersecurity, and Regulation</p>
<p>30:33 BlackBerry's Downfall: Ignored Innovation</p>
<p>32:06 "Evolution and Misuse of AI"</p>
<p>34:45 "Opportunity to Lead Change"</p>
<p>37:52 "AI Without Guidance Backfires"</p>
<p>41:07 "AI: Smart but Context-Lacking"</p>
<p>46:45 "AI Empowering Business Transformation"</p>
<p>50:30 "Effortless Tech-Fueled Imitation"</p>
<p>About the guest : </p>
<p>Neil D. Morris is a senior enterprise technology leader with 25+ years of experience in digital transformation, cybersecurity, and AI at scale. He currently serves as Head of IT at Redaptive and previously held CIO roles at Ball Aerospace and Maxar Technologies. Neil is known for guiding organizations through complex modernization efforts while balancing security, risk, and business value.</p>
<p>How to connect Neil: <a href="https://www.linkedin.com/in/neildmorris/">https://www.linkedin.com/in/neildmorris/</a></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2301797/c1e-z68mps70x8msqd23j-z3pxdd0gbpv0-c8efcr.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2301797&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=0148c9b3be344fec3f5030e8a208a73098084dcb7e2187d0200bec1b3455cc2e" length="51906192"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[AI promises transformation - but legacy technology, process gaps, and cyber risk often stand in the way.
In this episode of Protect It All, host Aaron Crow sits down with veteran IT and cybersecurity leader Neil D. Morris, who brings over 30 years of experience across aerospace, defense, and energy sectors. Together, they cut through the hype to explore what really matters when modernizing technology and managing cyber risk in complex, real-world environments.
Neil shares candid insights on why legacy systems still power critical operations, why replacing them isn’t as simple as it sounds, and how organizations can unlock real value from AI without increasing risk. The conversation dives into tech debt, regulation, ROI, and the often-overlooked role of process in successful transformation.
You’ll learn:

Why legacy systems aren’t going away anytime soon
The hidden risks of chasing AI without strong foundations
How to balance security, usability, and business value
Why process and governance matter more than tools
How IT leaders can communicate cyber and AI value in business terms
Where AI creates opportunity - and where it creates new attack paths

Whether you’re leading digital transformation, managing cyber risk, or advising the business on AI adoption, this episode delivers real talk and practical wisdom from the front lines of IT and OT leadership.
 Tune in to learn how to modernize responsibly, manage risk intelligently, and separate AI reality from hype only on Protect It All.
Key Moments: 
00:00 "Legacy Tech in Modern Firms"
06:22 "Technology, Change, and Customer Focus"
09:51 "Challenges in Articulating Cybersecurity Value"
12:27 "Tech Solutions Must Drive Value"
15:43 Sell Ideas Beyond the Code
19:03 "Ransomware Risks in Acquisitions"
24:02 Government, Services, and Compliance Debate
25:35 Balancing AI, Cybersecurity, and Regulation
30:33 BlackBerry's Downfall: Ignored Innovation
32:06 "Evolution and Misuse of AI"
34:45 "Opportunity to Lead Change"
37:52 "AI Without Guidance Backfires"
41:07 "AI: Smart but Context-Lacking"
46:45 "AI Empowering Business Transformation"
50:30 "Effortless Tech-Fueled Imitation"
About the guest : 
Neil D. Morris is a senior enterprise technology leader with 25+ years of experience in digital transformation, cybersecurity, and AI at scale. He currently serves as Head of IT at Redaptive and previously held CIO roles at Ball Aerospace and Maxar Technologies. Neil is known for guiding organizations through complex modernization efforts while balancing security, risk, and business value.
How to connect Neil: https://www.linkedin.com/in/neildmorris/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook: ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2301797/c1a-w52rp-mkwmxx6zado7-s60rmg.jpg"></itunes:image>
                                                                            <itunes:duration>00:53:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[AI, Governance & Cybersecurity Culture: Why People and Process Still Matter Most]]>
                </title>
                <pubDate>Mon, 15 Dec 2025 10:52:15 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2289120</guid>
                                <description>
                                            <![CDATA[<p>Cybersecurity has evolved from an afterthought to a business-critical responsibility - and AI is accelerating that shift faster than most organizations are ready for.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with <b>Sue McTaggart</b>, a cybersecurity leader with a software development background and more than 15 years of experience driving security transformation. Together, they explore how cybersecurity success today depends less on shiny new tools and more on <b>culture, governance, and fundamentals done right</b>.</p>
<p>Sue shares her journey from developer to cybersecurity leader, offering real-world insights into embedding security thinking into everyday work - not bolting it on after something breaks. The conversation tackles the realities of AI adoption, the risks of over-automation, and why <b>human oversight and curiosity</b> remain essential in an increasingly automated world.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>technology alone can’t fix cybersecurity problems</b></li>
<li style="font-weight:400;">How to embed a <b>security-first mindset</b> across teams and leadership</li>
<li style="font-weight:400;">What AI changes - and what it <i>doesn’t</i> - in cybersecurity governance</li>
<li style="font-weight:400;">The role of <b>Zero Trust</b> and foundational cyber hygiene</li>
<li style="font-weight:400;">Why people, process, and accountability prevent more breaches than tools</li>
<li style="font-weight:400;">How generational shifts and curiosity shape the future of cyber careers</li>
</ul>
<p>Whether you’re a security leader, technologist, or business decision-maker navigating AI adoption, this episode delivers grounded, practical wisdom for building resilience that lasts.</p>
<p> <b>Tune in to learn why strong cybersecurity still starts with people, not platform,s only on Protect It All.</b></p>
<p>Key Moments:</p>
<p>01:12 Cybersecurity Evolution and Insights</p>
<p>03:51 "Cybersecurity Requires Culture Shift"</p>
<p>07:09 "Tech Failures and Curfew Challenges"</p>
<p>10:30 "Prioritizing Security in AI Development"</p>
<p>15:05 Cybersecurity's Role in Everything</p>
<p>19:37 "Everything is Sales"</p>
<p>23:54 Adapting Communication for Audiences</p>
<p>26:26 "Think Ahead, Stay Curious."</p>
<p>28:30 Tinkering and Curiosity Unleashed</p>
<p>31:32 "Gen Z: Redefining Work and Life."</p>
<p>36:17 Governing AI: Benefits and Risks</p>
<p>37:59 AI Needs Human Oversight</p>
<p>42:35 "AI's Role in Cybersecurity."</p>
<p>47:25 "Hackers Exploit Basic Vulnerabilities."</p>
<p><b>About the guest:</b></p>
<p>Sue McTaggart is a passionate educator and cybersecurity professional with a strong background in software development. Her curiosity and desire to raise awareness led her to transition from developing applications primarily in languages like Java in the early 2000s to the field of cybersecurity. Sue is dedicated to empowering others through education and strives to share her knowledge to help others better understand cybersecurity risks and solutions. She is honored and humbled by opportunities to speak about her work and continues to inspire those around her with her commitment to ongoing learning and public awareness.</p>
<p>How to connect Sue: <a href="https://www.linkedin.com/in/sue-mctaggart-24604158/">https://www.linkedin.com/in/sue-mctaggart-24604158/</a></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> http...</a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Cybersecurity has evolved from an afterthought to a business-critical responsibility - and AI is accelerating that shift faster than most organizations are ready for.
In this episode of Protect It All, host Aaron Crow sits down with Sue McTaggart, a cybersecurity leader with a software development background and more than 15 years of experience driving security transformation. Together, they explore how cybersecurity success today depends less on shiny new tools and more on culture, governance, and fundamentals done right.
Sue shares her journey from developer to cybersecurity leader, offering real-world insights into embedding security thinking into everyday work - not bolting it on after something breaks. The conversation tackles the realities of AI adoption, the risks of over-automation, and why human oversight and curiosity remain essential in an increasingly automated world.
You’ll learn:

Why technology alone can’t fix cybersecurity problems
How to embed a security-first mindset across teams and leadership
What AI changes - and what it doesn’t - in cybersecurity governance
The role of Zero Trust and foundational cyber hygiene
Why people, process, and accountability prevent more breaches than tools
How generational shifts and curiosity shape the future of cyber careers

Whether you’re a security leader, technologist, or business decision-maker navigating AI adoption, this episode delivers grounded, practical wisdom for building resilience that lasts.
 Tune in to learn why strong cybersecurity still starts with people, not platform,s only on Protect It All.
Key Moments:
01:12 Cybersecurity Evolution and Insights
03:51 "Cybersecurity Requires Culture Shift"
07:09 "Tech Failures and Curfew Challenges"
10:30 "Prioritizing Security in AI Development"
15:05 Cybersecurity's Role in Everything
19:37 "Everything is Sales"
23:54 Adapting Communication for Audiences
26:26 "Think Ahead, Stay Curious."
28:30 Tinkering and Curiosity Unleashed
31:32 "Gen Z: Redefining Work and Life."
36:17 Governing AI: Benefits and Risks
37:59 AI Needs Human Oversight
42:35 "AI's Role in Cybersecurity."
47:25 "Hackers Exploit Basic Vulnerabilities."
About the guest:
Sue McTaggart is a passionate educator and cybersecurity professional with a strong background in software development. Her curiosity and desire to raise awareness led her to transition from developing applications primarily in languages like Java in the early 2000s to the field of cybersecurity. Sue is dedicated to empowering others through education and strives to share her knowledge to help others better understand cybersecurity risks and solutions. She is honored and humbled by opportunities to speak about her work and continues to inspire those around her with her commitment to ongoing learning and public awareness.
How to connect Sue: https://www.linkedin.com/in/sue-mctaggart-24604158/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: http...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[AI, Governance & Cybersecurity Culture: Why People and Process Still Matter Most]]>
                </itunes:title>
                                    <itunes:episode>85</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Cybersecurity has evolved from an afterthought to a business-critical responsibility - and AI is accelerating that shift faster than most organizations are ready for.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with <b>Sue McTaggart</b>, a cybersecurity leader with a software development background and more than 15 years of experience driving security transformation. Together, they explore how cybersecurity success today depends less on shiny new tools and more on <b>culture, governance, and fundamentals done right</b>.</p>
<p>Sue shares her journey from developer to cybersecurity leader, offering real-world insights into embedding security thinking into everyday work - not bolting it on after something breaks. The conversation tackles the realities of AI adoption, the risks of over-automation, and why <b>human oversight and curiosity</b> remain essential in an increasingly automated world.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>technology alone can’t fix cybersecurity problems</b></li>
<li style="font-weight:400;">How to embed a <b>security-first mindset</b> across teams and leadership</li>
<li style="font-weight:400;">What AI changes - and what it <i>doesn’t</i> - in cybersecurity governance</li>
<li style="font-weight:400;">The role of <b>Zero Trust</b> and foundational cyber hygiene</li>
<li style="font-weight:400;">Why people, process, and accountability prevent more breaches than tools</li>
<li style="font-weight:400;">How generational shifts and curiosity shape the future of cyber careers</li>
</ul>
<p>Whether you’re a security leader, technologist, or business decision-maker navigating AI adoption, this episode delivers grounded, practical wisdom for building resilience that lasts.</p>
<p> <b>Tune in to learn why strong cybersecurity still starts with people, not platform,s only on Protect It All.</b></p>
<p>Key Moments:</p>
<p>01:12 Cybersecurity Evolution and Insights</p>
<p>03:51 "Cybersecurity Requires Culture Shift"</p>
<p>07:09 "Tech Failures and Curfew Challenges"</p>
<p>10:30 "Prioritizing Security in AI Development"</p>
<p>15:05 Cybersecurity's Role in Everything</p>
<p>19:37 "Everything is Sales"</p>
<p>23:54 Adapting Communication for Audiences</p>
<p>26:26 "Think Ahead, Stay Curious."</p>
<p>28:30 Tinkering and Curiosity Unleashed</p>
<p>31:32 "Gen Z: Redefining Work and Life."</p>
<p>36:17 Governing AI: Benefits and Risks</p>
<p>37:59 AI Needs Human Oversight</p>
<p>42:35 "AI's Role in Cybersecurity."</p>
<p>47:25 "Hackers Exploit Basic Vulnerabilities."</p>
<p><b>About the guest:</b></p>
<p>Sue McTaggart is a passionate educator and cybersecurity professional with a strong background in software development. Her curiosity and desire to raise awareness led her to transition from developing applications primarily in languages like Java in the early 2000s to the field of cybersecurity. Sue is dedicated to empowering others through education and strives to share her knowledge to help others better understand cybersecurity risks and solutions. She is honored and humbled by opportunities to speak about her work and continues to inspire those around her with her commitment to ongoing learning and public awareness.</p>
<p>How to connect Sue: <a href="https://www.linkedin.com/in/sue-mctaggart-24604158/">https://www.linkedin.com/in/sue-mctaggart-24604158/</a></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2289120/c1e-jg87nu5dv2whp6012-qdv91wvpczzz-kmkj2r.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2289120&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=e82db0e32c0f95f7def692c6db50df0c1076249d2ce1b5b6858f94308e177bf4" length="48291164"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Cybersecurity has evolved from an afterthought to a business-critical responsibility - and AI is accelerating that shift faster than most organizations are ready for.
In this episode of Protect It All, host Aaron Crow sits down with Sue McTaggart, a cybersecurity leader with a software development background and more than 15 years of experience driving security transformation. Together, they explore how cybersecurity success today depends less on shiny new tools and more on culture, governance, and fundamentals done right.
Sue shares her journey from developer to cybersecurity leader, offering real-world insights into embedding security thinking into everyday work - not bolting it on after something breaks. The conversation tackles the realities of AI adoption, the risks of over-automation, and why human oversight and curiosity remain essential in an increasingly automated world.
You’ll learn:

Why technology alone can’t fix cybersecurity problems
How to embed a security-first mindset across teams and leadership
What AI changes - and what it doesn’t - in cybersecurity governance
The role of Zero Trust and foundational cyber hygiene
Why people, process, and accountability prevent more breaches than tools
How generational shifts and curiosity shape the future of cyber careers

Whether you’re a security leader, technologist, or business decision-maker navigating AI adoption, this episode delivers grounded, practical wisdom for building resilience that lasts.
 Tune in to learn why strong cybersecurity still starts with people, not platform,s only on Protect It All.
Key Moments:
01:12 Cybersecurity Evolution and Insights
03:51 "Cybersecurity Requires Culture Shift"
07:09 "Tech Failures and Curfew Challenges"
10:30 "Prioritizing Security in AI Development"
15:05 Cybersecurity's Role in Everything
19:37 "Everything is Sales"
23:54 Adapting Communication for Audiences
26:26 "Think Ahead, Stay Curious."
28:30 Tinkering and Curiosity Unleashed
31:32 "Gen Z: Redefining Work and Life."
36:17 Governing AI: Benefits and Risks
37:59 AI Needs Human Oversight
42:35 "AI's Role in Cybersecurity."
47:25 "Hackers Exploit Basic Vulnerabilities."
About the guest:
Sue McTaggart is a passionate educator and cybersecurity professional with a strong background in software development. Her curiosity and desire to raise awareness led her to transition from developing applications primarily in languages like Java in the early 2000s to the field of cybersecurity. Sue is dedicated to empowering others through education and strives to share her knowledge to help others better understand cybersecurity risks and solutions. She is honored and humbled by opportunities to speak about her work and continues to inspire those around her with her commitment to ongoing learning and public awareness.
How to connect Sue: https://www.linkedin.com/in/sue-mctaggart-24604158/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: http...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2289120/c1a-w52rp-0v7z9574tm8n-oip7e7.jpg"></itunes:image>
                                                                            <itunes:duration>00:51:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[AI, Human Behavior & Cybersecurity’s Future: Cutting Complexity and Strengthening Defense]]>
                </title>
                <pubDate>Mon, 08 Dec 2025 12:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2274952</guid>
                                <description>
                                            <![CDATA[<p>The future of cybersecurity won’t be won by tools alone - it will be won by <b>people, process, and smarter use of AI.</b></p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with cybersecurity veteran <b>Sharad Rai</b> to explore how IT and OT security teams can reduce complexity, fight alert fatigue, and build stronger defenses through foundational practices and intelligent automation.</p>
<p>Sharad brings decades of real-world experience - from early firewall management to leading large-scale security programs at major financial institutions. Together, Aaron and Sharad break down what <i>actually works</i> in cybersecurity today: simplifying policies, understanding user behavior, strengthening basics like patching, and leveraging AI for contextual decision-making.</p>
<p><b>You’ll learn:</b></p>
<ul>
<li style="font-weight:400;">Why <b>human behavior</b> is the root of both risk and resilience</li>
<li style="font-weight:400;">How <b>AI can reduce complexity</b>, noise, and alert fatigue</li>
<li style="font-weight:400;">What “good vs bad” looks like through an AI-driven, context-aware lens</li>
<li style="font-weight:400;">How policy overload cripples organizations - and how to fix it</li>
<li style="font-weight:400;">Why OT and IT security still depend on foundational hygiene</li>
<li style="font-weight:400;">The rise of <b>browser-based security</b> and Chrome as an endpoint</li>
<li style="font-weight:400;">What’s coming next: AI-driven phishing, contextual controls, and automated response</li>
</ul>
<p>Whether you're a security leader, practitioner, or just navigating modern cyber challenges, this episode will reshape how you think about defending systems and the people using them.</p>
<p> <b>Tune in to discover how AI, clarity, and human-centered design are shaping cybersecurity’s next chapter only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>06:21 "Cybersecurity Basics: Know the Layers"</p>
<p>09:49 "Defining Good to Block Bad"</p>
<p>13:03 Alarm Fatigue and Information Overload</p>
<p>14:01 Alarm Tuning and Data Utilization</p>
<p>19:02 RFID Tags and Process Frustration</p>
<p>23:03 Simplifying Cybersecurity for Success</p>
<p>25:18 "AI Optimizing Policy Adjustments"</p>
<p>27:33 "Tech Frustrations Then and Now"</p>
<p>31:46 Cloud Computing Transformed Everyday Work</p>
<p>36:05 Focus on Foundational Basics</p>
<p></p>
<p><b>About the guest : </b></p>
<p>Sharad Rai is a cybersecurity leader and architect with over 20 years of experience securing some of the world’s most complex financial institutions. As Vice President of Security and Architecture at State Street, he leads regulatory-driven initiatives and delivers enterprise-wide cybersecurity programs across cloud, infrastructure, and endpoint platforms. Sharad has held key security roles at Morgan Stanley, BNP Paribas, Jefferies, and Foundation Medicine, with deep expertise in EDR, PAM, SASE, ZTNA, and cloud-native security. He is known for simplifying complexity, reducing risk, and bridging product, engineering, and executive teams.</p>
<p></p>
<p><b>How to connect Sharad:</b> <a href="https://www.linkedin.com/in/sharad-rai-cissp-a951a28">https://www.linkedin.com/in/sharad-rai-cissp-a951a28</a></p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> htt...</a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[The future of cybersecurity won’t be won by tools alone - it will be won by people, process, and smarter use of AI.
In this episode of Protect It All, host Aaron Crow sits down with cybersecurity veteran Sharad Rai to explore how IT and OT security teams can reduce complexity, fight alert fatigue, and build stronger defenses through foundational practices and intelligent automation.
Sharad brings decades of real-world experience - from early firewall management to leading large-scale security programs at major financial institutions. Together, Aaron and Sharad break down what actually works in cybersecurity today: simplifying policies, understanding user behavior, strengthening basics like patching, and leveraging AI for contextual decision-making.
You’ll learn:

Why human behavior is the root of both risk and resilience
How AI can reduce complexity, noise, and alert fatigue
What “good vs bad” looks like through an AI-driven, context-aware lens
How policy overload cripples organizations - and how to fix it
Why OT and IT security still depend on foundational hygiene
The rise of browser-based security and Chrome as an endpoint
What’s coming next: AI-driven phishing, contextual controls, and automated response

Whether you're a security leader, practitioner, or just navigating modern cyber challenges, this episode will reshape how you think about defending systems and the people using them.
 Tune in to discover how AI, clarity, and human-centered design are shaping cybersecurity’s next chapter only on Protect It All.
Key Moments: 
06:21 "Cybersecurity Basics: Know the Layers"
09:49 "Defining Good to Block Bad"
13:03 Alarm Fatigue and Information Overload
14:01 Alarm Tuning and Data Utilization
19:02 RFID Tags and Process Frustration
23:03 Simplifying Cybersecurity for Success
25:18 "AI Optimizing Policy Adjustments"
27:33 "Tech Frustrations Then and Now"
31:46 Cloud Computing Transformed Everyday Work
36:05 Focus on Foundational Basics

About the guest : 
Sharad Rai is a cybersecurity leader and architect with over 20 years of experience securing some of the world’s most complex financial institutions. As Vice President of Security and Architecture at State Street, he leads regulatory-driven initiatives and delivers enterprise-wide cybersecurity programs across cloud, infrastructure, and endpoint platforms. Sharad has held key security roles at Morgan Stanley, BNP Paribas, Jefferies, and Foundation Medicine, with deep expertise in EDR, PAM, SASE, ZTNA, and cloud-native security. He is known for simplifying complexity, reducing risk, and bridging product, engineering, and executive teams.

How to connect Sharad: https://www.linkedin.com/in/sharad-rai-cissp-a951a28

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: htt...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[AI, Human Behavior & Cybersecurity’s Future: Cutting Complexity and Strengthening Defense]]>
                </itunes:title>
                                    <itunes:episode>84</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>The future of cybersecurity won’t be won by tools alone - it will be won by <b>people, process, and smarter use of AI.</b></p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with cybersecurity veteran <b>Sharad Rai</b> to explore how IT and OT security teams can reduce complexity, fight alert fatigue, and build stronger defenses through foundational practices and intelligent automation.</p>
<p>Sharad brings decades of real-world experience - from early firewall management to leading large-scale security programs at major financial institutions. Together, Aaron and Sharad break down what <i>actually works</i> in cybersecurity today: simplifying policies, understanding user behavior, strengthening basics like patching, and leveraging AI for contextual decision-making.</p>
<p><b>You’ll learn:</b></p>
<ul>
<li style="font-weight:400;">Why <b>human behavior</b> is the root of both risk and resilience</li>
<li style="font-weight:400;">How <b>AI can reduce complexity</b>, noise, and alert fatigue</li>
<li style="font-weight:400;">What “good vs bad” looks like through an AI-driven, context-aware lens</li>
<li style="font-weight:400;">How policy overload cripples organizations - and how to fix it</li>
<li style="font-weight:400;">Why OT and IT security still depend on foundational hygiene</li>
<li style="font-weight:400;">The rise of <b>browser-based security</b> and Chrome as an endpoint</li>
<li style="font-weight:400;">What’s coming next: AI-driven phishing, contextual controls, and automated response</li>
</ul>
<p>Whether you're a security leader, practitioner, or just navigating modern cyber challenges, this episode will reshape how you think about defending systems and the people using them.</p>
<p> <b>Tune in to discover how AI, clarity, and human-centered design are shaping cybersecurity’s next chapter only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>06:21 "Cybersecurity Basics: Know the Layers"</p>
<p>09:49 "Defining Good to Block Bad"</p>
<p>13:03 Alarm Fatigue and Information Overload</p>
<p>14:01 Alarm Tuning and Data Utilization</p>
<p>19:02 RFID Tags and Process Frustration</p>
<p>23:03 Simplifying Cybersecurity for Success</p>
<p>25:18 "AI Optimizing Policy Adjustments"</p>
<p>27:33 "Tech Frustrations Then and Now"</p>
<p>31:46 Cloud Computing Transformed Everyday Work</p>
<p>36:05 Focus on Foundational Basics</p>
<p></p>
<p><b>About the guest : </b></p>
<p>Sharad Rai is a cybersecurity leader and architect with over 20 years of experience securing some of the world’s most complex financial institutions. As Vice President of Security and Architecture at State Street, he leads regulatory-driven initiatives and delivers enterprise-wide cybersecurity programs across cloud, infrastructure, and endpoint platforms. Sharad has held key security roles at Morgan Stanley, BNP Paribas, Jefferies, and Foundation Medicine, with deep expertise in EDR, PAM, SASE, ZTNA, and cloud-native security. He is known for simplifying complexity, reducing risk, and bridging product, engineering, and executive teams.</p>
<p></p>
<p><b>How to connect Sharad:</b> <a href="https://www.linkedin.com/in/sharad-rai-cissp-a951a28">https://www.linkedin.com/in/sharad-rai-cissp-a951a28</a></p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2274952/c1e-52n9du14xx3srdn6g-ndv7d8j0s10-nv3e7s.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2274952&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=41b2cd4662ec9cc9104aed8d866efff3d8b3d74d6a7cc417da3597f0c44cc286" length="37338133"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[The future of cybersecurity won’t be won by tools alone - it will be won by people, process, and smarter use of AI.
In this episode of Protect It All, host Aaron Crow sits down with cybersecurity veteran Sharad Rai to explore how IT and OT security teams can reduce complexity, fight alert fatigue, and build stronger defenses through foundational practices and intelligent automation.
Sharad brings decades of real-world experience - from early firewall management to leading large-scale security programs at major financial institutions. Together, Aaron and Sharad break down what actually works in cybersecurity today: simplifying policies, understanding user behavior, strengthening basics like patching, and leveraging AI for contextual decision-making.
You’ll learn:

Why human behavior is the root of both risk and resilience
How AI can reduce complexity, noise, and alert fatigue
What “good vs bad” looks like through an AI-driven, context-aware lens
How policy overload cripples organizations - and how to fix it
Why OT and IT security still depend on foundational hygiene
The rise of browser-based security and Chrome as an endpoint
What’s coming next: AI-driven phishing, contextual controls, and automated response

Whether you're a security leader, practitioner, or just navigating modern cyber challenges, this episode will reshape how you think about defending systems and the people using them.
 Tune in to discover how AI, clarity, and human-centered design are shaping cybersecurity’s next chapter only on Protect It All.
Key Moments: 
06:21 "Cybersecurity Basics: Know the Layers"
09:49 "Defining Good to Block Bad"
13:03 Alarm Fatigue and Information Overload
14:01 Alarm Tuning and Data Utilization
19:02 RFID Tags and Process Frustration
23:03 Simplifying Cybersecurity for Success
25:18 "AI Optimizing Policy Adjustments"
27:33 "Tech Frustrations Then and Now"
31:46 Cloud Computing Transformed Everyday Work
36:05 Focus on Foundational Basics

About the guest : 
Sharad Rai is a cybersecurity leader and architect with over 20 years of experience securing some of the world’s most complex financial institutions. As Vice President of Security and Architecture at State Street, he leads regulatory-driven initiatives and delivers enterprise-wide cybersecurity programs across cloud, infrastructure, and endpoint platforms. Sharad has held key security roles at Morgan Stanley, BNP Paribas, Jefferies, and Foundation Medicine, with deep expertise in EDR, PAM, SASE, ZTNA, and cloud-native security. He is known for simplifying complexity, reducing risk, and bridging product, engineering, and executive teams.

How to connect Sharad: https://www.linkedin.com/in/sharad-rai-cissp-a951a28

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: htt...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2274952/c1a-w52rp-gp9gprd7i68m-ykomev.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Inside Cyber Incident Response: Military Lessons, OT Challenges & the Power of Blameless Culture]]>
                </title>
                <pubDate>Mon, 01 Dec 2025 11:40:12 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2261274</guid>
                                <description>
                                            <![CDATA[<p>Cyber incidents don’t just test your technology - they test your people, your processes, and your culture.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with <b>Daniel Swann</b>, Cyber Incident Commander at <b>Rockwell Automation</b>, to pull back the curtain on what really happens during IT and OT incidents. With decades of experience across the U.S. Air Force, enterprise environments, and industrial operations, Daniel shares lessons learned the hard way - from managing chaos in real time to building a culture where teams can learn without blame.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>documentation and scribe roles</b> can make or break an incident response</li>
<li style="font-weight:400;">How <b>blameless postmortems</b> actually strengthen team performance</li>
<li style="font-weight:400;">What military-style discipline can teach us about <b>OT and IT incident handling</b></li>
<li style="font-weight:400;">How to run effective <b>tabletop exercises</b> that expose real gaps</li>
<li style="font-weight:400;">The human factors - communication, clarity, ownership - that reduce downtime and panic</li>
<li style="font-weight:400;">Practical strategies to evolve your incident response plan before the next breach<br /><br /></li>
</ul>
<p>Whether you’re developing your first IR playbook or leading seasoned response teams, this episode delivers <b>actionable, real-world insights</b> that help you prepare, respond, and recover with confidence.</p>
<p> <b>Tune in for battle-tested wisdom from military operations to industrial control rooms - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>00:00 "Protect IT/OT Cybersecurity Podcast"</p>
<p>03:30 Cybersecurity: Versatility Is Key</p>
<p>07:52 "Balancing Bureaucracy and Flexibility"</p>
<p>10:20 "Practice Makes Plans Effective"</p>
<p>14:17 "Learning While Doing"</p>
<p>18:44 "Document Key Info in Incidents"</p>
<p>19:46 "Versatile Team Role Importance"</p>
<p>22:45 "Tracking Lessons with Visibility"</p>
<p>28:34 Proactive Reporting Encouraged</p>
<p>29:33 Safe Reporting Prevents Phishing Incidents</p>
<p>32:52 "Bridging IT and OT Safely"</p>
<p>37:15 Team Collaboration Enhances Outcomes</p>
<p>41:00 Military Preparedness and Logistics Planning</p>
<p>42:59 Preparing for Unlikely Scenarios</p>
<p>47:20 AI Threats to OT Systems</p>
<p>48:32 "AI's Impact on Learning and Jobs"</p>
<p>About the guest: </p>
<p>Daniel Swann is a seasoned Cyber Incident Commander at Rockwell Automation, bringing 17+ years of IT leadership and nearly a decade of cybersecurity experience. A U.S. Air Force veteran, he has led global cyber operations, responded to major vulnerabilities like Log4J, and driven large-scale improvements in incident response and vulnerability management. Daniel is highly certified, mission-driven, and recognized for building strong, resilient security teams.</p>
<p>Links : </p>
<p>Video of Daniel Swann with Kate Vajda, Director of Vulnerability Research and Malware Threat Research, Dragos : <a href="https://www.youtube.com/watch?v=4zotgrPk8vI">https://www.youtube.com/watch?v=4zotgrPk8vI</a></p>
<p>Connect with Daniel on LinkedIn : <a href="https://www.linkedin.com/in/j-daniel-swann/">https://www.linkedin.com/in/j-daniel-swann/</a></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="ht..."></a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Cyber incidents don’t just test your technology - they test your people, your processes, and your culture.
In this episode of Protect It All, host Aaron Crow sits down with Daniel Swann, Cyber Incident Commander at Rockwell Automation, to pull back the curtain on what really happens during IT and OT incidents. With decades of experience across the U.S. Air Force, enterprise environments, and industrial operations, Daniel shares lessons learned the hard way - from managing chaos in real time to building a culture where teams can learn without blame.
You’ll learn:

Why documentation and scribe roles can make or break an incident response
How blameless postmortems actually strengthen team performance
What military-style discipline can teach us about OT and IT incident handling
How to run effective tabletop exercises that expose real gaps
The human factors - communication, clarity, ownership - that reduce downtime and panic
Practical strategies to evolve your incident response plan before the next breach

Whether you’re developing your first IR playbook or leading seasoned response teams, this episode delivers actionable, real-world insights that help you prepare, respond, and recover with confidence.
 Tune in for battle-tested wisdom from military operations to industrial control rooms - only on Protect It All.
Key Moments: 
00:00 "Protect IT/OT Cybersecurity Podcast"
03:30 Cybersecurity: Versatility Is Key
07:52 "Balancing Bureaucracy and Flexibility"
10:20 "Practice Makes Plans Effective"
14:17 "Learning While Doing"
18:44 "Document Key Info in Incidents"
19:46 "Versatile Team Role Importance"
22:45 "Tracking Lessons with Visibility"
28:34 Proactive Reporting Encouraged
29:33 Safe Reporting Prevents Phishing Incidents
32:52 "Bridging IT and OT Safely"
37:15 Team Collaboration Enhances Outcomes
41:00 Military Preparedness and Logistics Planning
42:59 Preparing for Unlikely Scenarios
47:20 AI Threats to OT Systems
48:32 "AI's Impact on Learning and Jobs"
About the guest: 
Daniel Swann is a seasoned Cyber Incident Commander at Rockwell Automation, bringing 17+ years of IT leadership and nearly a decade of cybersecurity experience. A U.S. Air Force veteran, he has led global cyber operations, responded to major vulnerabilities like Log4J, and driven large-scale improvements in incident response and vulnerability management. Daniel is highly certified, mission-driven, and recognized for building strong, resilient security teams.
Links : 
Video of Daniel Swann with Kate Vajda, Director of Vulnerability Research and Malware Threat Research, Dragos : https://www.youtube.com/watch?v=4zotgrPk8vI
Connect with Daniel on LinkedIn : https://www.linkedin.com/in/j-daniel-swann/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube:]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Inside Cyber Incident Response: Military Lessons, OT Challenges & the Power of Blameless Culture]]>
                </itunes:title>
                                    <itunes:episode>83</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Cyber incidents don’t just test your technology - they test your people, your processes, and your culture.</p>
<p>In this episode of <b>Protect It All</b>, host <b>Aaron Crow</b> sits down with <b>Daniel Swann</b>, Cyber Incident Commander at <b>Rockwell Automation</b>, to pull back the curtain on what really happens during IT and OT incidents. With decades of experience across the U.S. Air Force, enterprise environments, and industrial operations, Daniel shares lessons learned the hard way - from managing chaos in real time to building a culture where teams can learn without blame.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why <b>documentation and scribe roles</b> can make or break an incident response</li>
<li style="font-weight:400;">How <b>blameless postmortems</b> actually strengthen team performance</li>
<li style="font-weight:400;">What military-style discipline can teach us about <b>OT and IT incident handling</b></li>
<li style="font-weight:400;">How to run effective <b>tabletop exercises</b> that expose real gaps</li>
<li style="font-weight:400;">The human factors - communication, clarity, ownership - that reduce downtime and panic</li>
<li style="font-weight:400;">Practical strategies to evolve your incident response plan before the next breach<br /><br /></li>
</ul>
<p>Whether you’re developing your first IR playbook or leading seasoned response teams, this episode delivers <b>actionable, real-world insights</b> that help you prepare, respond, and recover with confidence.</p>
<p> <b>Tune in for battle-tested wisdom from military operations to industrial control rooms - only on Protect It All.</b></p>
<p><b>Key Moments: </b></p>
<p>00:00 "Protect IT/OT Cybersecurity Podcast"</p>
<p>03:30 Cybersecurity: Versatility Is Key</p>
<p>07:52 "Balancing Bureaucracy and Flexibility"</p>
<p>10:20 "Practice Makes Plans Effective"</p>
<p>14:17 "Learning While Doing"</p>
<p>18:44 "Document Key Info in Incidents"</p>
<p>19:46 "Versatile Team Role Importance"</p>
<p>22:45 "Tracking Lessons with Visibility"</p>
<p>28:34 Proactive Reporting Encouraged</p>
<p>29:33 Safe Reporting Prevents Phishing Incidents</p>
<p>32:52 "Bridging IT and OT Safely"</p>
<p>37:15 Team Collaboration Enhances Outcomes</p>
<p>41:00 Military Preparedness and Logistics Planning</p>
<p>42:59 Preparing for Unlikely Scenarios</p>
<p>47:20 AI Threats to OT Systems</p>
<p>48:32 "AI's Impact on Learning and Jobs"</p>
<p>About the guest: </p>
<p>Daniel Swann is a seasoned Cyber Incident Commander at Rockwell Automation, bringing 17+ years of IT leadership and nearly a decade of cybersecurity experience. A U.S. Air Force veteran, he has led global cyber operations, responded to major vulnerabilities like Log4J, and driven large-scale improvements in incident response and vulnerability management. Daniel is highly certified, mission-driven, and recognized for building strong, resilient security teams.</p>
<p>Links : </p>
<p>Video of Daniel Swann with Kate Vajda, Director of Vulnerability Research and Malware Threat Research, Dragos : <a href="https://www.youtube.com/watch?v=4zotgrPk8vI">https://www.youtube.com/watch?v=4zotgrPk8vI</a></p>
<p>Connect with Daniel on LinkedIn : <a href="https://www.linkedin.com/in/j-daniel-swann/">https://www.linkedin.com/in/j-daniel-swann/</a></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2261274/c1e-7wg0xh9pxp1tq920v-wwpqqk36cop-okritj.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2261274&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=466a45b689901a33310fe169dc94de47a5c1d5f2876b6dfa3f67d85994070572" length="53607562"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Cyber incidents don’t just test your technology - they test your people, your processes, and your culture.
In this episode of Protect It All, host Aaron Crow sits down with Daniel Swann, Cyber Incident Commander at Rockwell Automation, to pull back the curtain on what really happens during IT and OT incidents. With decades of experience across the U.S. Air Force, enterprise environments, and industrial operations, Daniel shares lessons learned the hard way - from managing chaos in real time to building a culture where teams can learn without blame.
You’ll learn:

Why documentation and scribe roles can make or break an incident response
How blameless postmortems actually strengthen team performance
What military-style discipline can teach us about OT and IT incident handling
How to run effective tabletop exercises that expose real gaps
The human factors - communication, clarity, ownership - that reduce downtime and panic
Practical strategies to evolve your incident response plan before the next breach

Whether you’re developing your first IR playbook or leading seasoned response teams, this episode delivers actionable, real-world insights that help you prepare, respond, and recover with confidence.
 Tune in for battle-tested wisdom from military operations to industrial control rooms - only on Protect It All.
Key Moments: 
00:00 "Protect IT/OT Cybersecurity Podcast"
03:30 Cybersecurity: Versatility Is Key
07:52 "Balancing Bureaucracy and Flexibility"
10:20 "Practice Makes Plans Effective"
14:17 "Learning While Doing"
18:44 "Document Key Info in Incidents"
19:46 "Versatile Team Role Importance"
22:45 "Tracking Lessons with Visibility"
28:34 Proactive Reporting Encouraged
29:33 Safe Reporting Prevents Phishing Incidents
32:52 "Bridging IT and OT Safely"
37:15 Team Collaboration Enhances Outcomes
41:00 Military Preparedness and Logistics Planning
42:59 Preparing for Unlikely Scenarios
47:20 AI Threats to OT Systems
48:32 "AI's Impact on Learning and Jobs"
About the guest: 
Daniel Swann is a seasoned Cyber Incident Commander at Rockwell Automation, bringing 17+ years of IT leadership and nearly a decade of cybersecurity experience. A U.S. Air Force veteran, he has led global cyber operations, responded to major vulnerabilities like Log4J, and driven large-scale improvements in incident response and vulnerability management. Daniel is highly certified, mission-driven, and recognized for building strong, resilient security teams.
Links : 
Video of Daniel Swann with Kate Vajda, Director of Vulnerability Research and Malware Threat Research, Dragos : https://www.youtube.com/watch?v=4zotgrPk8vI
Connect with Daniel on LinkedIn : https://www.linkedin.com/in/j-daniel-swann/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube:]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2261274/c1a-w52rp-jpnzz96du41k-un6t7p.jpg"></itunes:image>
                                                                            <itunes:duration>00:55:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[The Future of Cybersecurity Careers: Human Skills, AI Disruption & How to Stand Out Now]]>
                </title>
                <pubDate>Mon, 24 Nov 2025 12:26:33 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2240891</guid>
                                <description>
                                            <![CDATA[<p>The cybersecurity job market is changing faster than ever - and the skills that mattered five years ago won’t carry you into the future.</p>
<p>In this episode of Protect It All, host Aaron Crow sits down with Mark Sasson, Managing Partner at Pinpoint Search Group, to break down what the <i>future</i> of cybersecurity careers really looks like. From the rise of AI and automation to the growing importance of human skills, they uncover the new realities facing candidates, hiring managers, and leaders across IT and OT security.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why soft skills, communication, and adaptability are now just as critical as technical expertise</li>
<li style="font-weight:400;">How AI is reshaping job searches, resumes, and candidate evaluation</li>
<li style="font-weight:400;">The shift between employer-driven and candidate-driven markets</li>
<li style="font-weight:400;">What separates standout candidates in today’s competitive landscape</li>
<li style="font-weight:400;">How startups think about hiring -  and what they <i>won’t</i> compromise on</li>
<li style="font-weight:400;">Practical steps to future-proof your cybersecurity career starting now<br /><br /></li>
</ul>
<p>Whether you’re entering cybersecurity, leveling up your role, or hiring your next team member, this episode delivers real-world, actionable insights to help you stay relevant  - and competitive in an evolving industry.</p>
<p> Tune in to learn how to stay ahead in the cybersecurity job market of today and tomorrow  only on Protect It All.</p>
<p><br /><br /></p>
<p>Key Moments: </p>
<p></p>
<p>04:14 Recruitment Growth and Funding Trends</p>
<p>06:42 Tangible Value in AI Age</p>
<p>12:18 "Stepping Outside the Comfort Zone"</p>
<p>15:16 "Growth Through Embracing Discomfort"</p>
<p>19:23 "Embracing Growth and New Challenges"</p>
<p>21:01 Balancing Growth and Bold Moves</p>
<p>25:14 "Breaking Into Tech: Sacrifice &amp; Strategy"</p>
<p>27:40 Experience Beats Book Knowledge</p>
<p>32:13 Human Insight Beats AI in Hiring</p>
<p>34:45 AI Recruitment: Potential, Limits, Distinctions</p>
<p>39:37 "Reluctant Growth through Opportunity"</p>
<p>42:47 "AI Tools: Benefits and Downsides"</p>
<p>44:29 "Human-Centered Hiring Over AI"</p>
<p>50:12 "Human Connection Over Technology"</p>
<p>53:23 "Planning Your Next Step"</p>
<p>About the guest: </p>
<p>Mark Sasson is the Managing Partner of Pinpoint Search Group, a recruitment firm specializing in helping innovators in emerging markets attract the talent needed to drive maturation, scale, and successful outcomes. In 2014, Mark launched Pinpoint’s Cybersecurity practice, where he and his team have successfully completed hundreds of executive and senior-level individual contributor searches for leading Cybersecurity vendors. Building on that success, Mark is now guiding Pinpoint’s expansion into the rapidly evolving Space sector.</p>
<p></p>
<p><b>Connect Mark: </b></p>
<p>Website: <a href="https://pinpointsearchgroup.com/">https://pinpointsearchgroup.com/</a></p>
<p>LinkedIn: <a href="http://linkedin.com/in/markjsasson/">linkedin.com/in/markjsasson/<br /></a>Learn more about Cybersecurity Vendor M&amp;A + Funding Roundups here : <a href="https://pinpointsearchgroup.com/cybersecurity-industry-reports/">https://pinpointsearchgroup.com/cybersecurity-industry-reports/</a></p>
<p></p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/p...</a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[The cybersecurity job market is changing faster than ever - and the skills that mattered five years ago won’t carry you into the future.
In this episode of Protect It All, host Aaron Crow sits down with Mark Sasson, Managing Partner at Pinpoint Search Group, to break down what the future of cybersecurity careers really looks like. From the rise of AI and automation to the growing importance of human skills, they uncover the new realities facing candidates, hiring managers, and leaders across IT and OT security.
You’ll learn:

Why soft skills, communication, and adaptability are now just as critical as technical expertise
How AI is reshaping job searches, resumes, and candidate evaluation
The shift between employer-driven and candidate-driven markets
What separates standout candidates in today’s competitive landscape
How startups think about hiring -  and what they won’t compromise on
Practical steps to future-proof your cybersecurity career starting now

Whether you’re entering cybersecurity, leveling up your role, or hiring your next team member, this episode delivers real-world, actionable insights to help you stay relevant  - and competitive in an evolving industry.
 Tune in to learn how to stay ahead in the cybersecurity job market of today and tomorrow  only on Protect It All.

Key Moments: 

04:14 Recruitment Growth and Funding Trends
06:42 Tangible Value in AI Age
12:18 "Stepping Outside the Comfort Zone"
15:16 "Growth Through Embracing Discomfort"
19:23 "Embracing Growth and New Challenges"
21:01 Balancing Growth and Bold Moves
25:14 "Breaking Into Tech: Sacrifice & Strategy"
27:40 Experience Beats Book Knowledge
32:13 Human Insight Beats AI in Hiring
34:45 AI Recruitment: Potential, Limits, Distinctions
39:37 "Reluctant Growth through Opportunity"
42:47 "AI Tools: Benefits and Downsides"
44:29 "Human-Centered Hiring Over AI"
50:12 "Human Connection Over Technology"
53:23 "Planning Your Next Step"
About the guest: 
Mark Sasson is the Managing Partner of Pinpoint Search Group, a recruitment firm specializing in helping innovators in emerging markets attract the talent needed to drive maturation, scale, and successful outcomes. In 2014, Mark launched Pinpoint’s Cybersecurity practice, where he and his team have successfully completed hundreds of executive and senior-level individual contributor searches for leading Cybersecurity vendors. Building on that success, Mark is now guiding Pinpoint’s expansion into the rapidly evolving Space sector.

Connect Mark: 
Website: https://pinpointsearchgroup.com/
LinkedIn: linkedin.com/in/markjsasson/Learn more about Cybersecurity Vendor M&A + Funding Roundups here : https://pinpointsearchgroup.com/cybersecurity-industry-reports/


Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/p...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[The Future of Cybersecurity Careers: Human Skills, AI Disruption & How to Stand Out Now]]>
                </itunes:title>
                                    <itunes:episode>82</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>The cybersecurity job market is changing faster than ever - and the skills that mattered five years ago won’t carry you into the future.</p>
<p>In this episode of Protect It All, host Aaron Crow sits down with Mark Sasson, Managing Partner at Pinpoint Search Group, to break down what the <i>future</i> of cybersecurity careers really looks like. From the rise of AI and automation to the growing importance of human skills, they uncover the new realities facing candidates, hiring managers, and leaders across IT and OT security.</p>
<p>You’ll learn:</p>
<ul>
<li style="font-weight:400;">Why soft skills, communication, and adaptability are now just as critical as technical expertise</li>
<li style="font-weight:400;">How AI is reshaping job searches, resumes, and candidate evaluation</li>
<li style="font-weight:400;">The shift between employer-driven and candidate-driven markets</li>
<li style="font-weight:400;">What separates standout candidates in today’s competitive landscape</li>
<li style="font-weight:400;">How startups think about hiring -  and what they <i>won’t</i> compromise on</li>
<li style="font-weight:400;">Practical steps to future-proof your cybersecurity career starting now<br /><br /></li>
</ul>
<p>Whether you’re entering cybersecurity, leveling up your role, or hiring your next team member, this episode delivers real-world, actionable insights to help you stay relevant  - and competitive in an evolving industry.</p>
<p> Tune in to learn how to stay ahead in the cybersecurity job market of today and tomorrow  only on Protect It All.</p>
<p><br /><br /></p>
<p>Key Moments: </p>
<p></p>
<p>04:14 Recruitment Growth and Funding Trends</p>
<p>06:42 Tangible Value in AI Age</p>
<p>12:18 "Stepping Outside the Comfort Zone"</p>
<p>15:16 "Growth Through Embracing Discomfort"</p>
<p>19:23 "Embracing Growth and New Challenges"</p>
<p>21:01 Balancing Growth and Bold Moves</p>
<p>25:14 "Breaking Into Tech: Sacrifice &amp; Strategy"</p>
<p>27:40 Experience Beats Book Knowledge</p>
<p>32:13 Human Insight Beats AI in Hiring</p>
<p>34:45 AI Recruitment: Potential, Limits, Distinctions</p>
<p>39:37 "Reluctant Growth through Opportunity"</p>
<p>42:47 "AI Tools: Benefits and Downsides"</p>
<p>44:29 "Human-Centered Hiring Over AI"</p>
<p>50:12 "Human Connection Over Technology"</p>
<p>53:23 "Planning Your Next Step"</p>
<p>About the guest: </p>
<p>Mark Sasson is the Managing Partner of Pinpoint Search Group, a recruitment firm specializing in helping innovators in emerging markets attract the talent needed to drive maturation, scale, and successful outcomes. In 2014, Mark launched Pinpoint’s Cybersecurity practice, where he and his team have successfully completed hundreds of executive and senior-level individual contributor searches for leading Cybersecurity vendors. Building on that success, Mark is now guiding Pinpoint’s expansion into the rapidly evolving Space sector.</p>
<p></p>
<p><b>Connect Mark: </b></p>
<p>Website: <a href="https://pinpointsearchgroup.com/">https://pinpointsearchgroup.com/</a></p>
<p>LinkedIn: <a href="http://linkedin.com/in/markjsasson/">linkedin.com/in/markjsasson/<br /></a>Learn more about Cybersecurity Vendor M&amp;A + Funding Roundups here : <a href="https://pinpointsearchgroup.com/cybersecurity-industry-reports/">https://pinpointsearchgroup.com/cybersecurity-industry-reports/</a></p>
<p></p>
<p></p>
<p><b>Connect With Aaron Crow:</b></p>
<ul>
<li style="font-weight:400;">Website:<a href="http://www.corvosec.com"> www.corvosec.com</a> </li>
<li style="font-weight:400;">LinkedIn:<a href="https://www.linkedin.com/in/aaronccrow"> https://www.linkedin.com/in/aaronccrow</a></li>
</ul>
<p></p>
<p><b>Learn more about PrOTect IT All:</b></p>
<ul>
<li style="font-weight:400;">Email: info@protectitall.co </li>
<li style="font-weight:400;">Website:<a href="https://protectitall.co/"> https://protectitall.co/</a> </li>
<li style="font-weight:400;">X:<a href="https://twitter.com/protectitall"> https://twitter.com/protectitall</a> </li>
<li style="font-weight:400;">YouTube:<a href="https://www.youtube.com/@PrOTectITAll"> https://www.youtube.com/@PrOTectITAll</a> </li>
<li style="font-weight:400;">FaceBook: <a href="https://facebook.com/protectitallpodcast"> https://facebook.com/protectitallpodcast</a> </li>
</ul>
<p></p>
<p><b><i>To be a guest or suggest a guest/episode, please email us at </i></b><a href="mailto:info@protectitall.co"><b><i>info@protectitall.co</i></b></a></p>
<p></p>
<p><b>Please leave us a review on Apple/Spotify Podcasts:</b></p>
<p>Apple   - <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</a></p>
<p>Spotify - <a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2240891/c1e-9pzm3sd0wjpfo7jrd-0v7q692nbqqk-u6ce05.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2240891&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=6fd5f479eb85cfd8482b8083ab3ae40f5f959d3b8f613f0345b5850a973ab54d" length="55384586"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[The cybersecurity job market is changing faster than ever - and the skills that mattered five years ago won’t carry you into the future.
In this episode of Protect It All, host Aaron Crow sits down with Mark Sasson, Managing Partner at Pinpoint Search Group, to break down what the future of cybersecurity careers really looks like. From the rise of AI and automation to the growing importance of human skills, they uncover the new realities facing candidates, hiring managers, and leaders across IT and OT security.
You’ll learn:

Why soft skills, communication, and adaptability are now just as critical as technical expertise
How AI is reshaping job searches, resumes, and candidate evaluation
The shift between employer-driven and candidate-driven markets
What separates standout candidates in today’s competitive landscape
How startups think about hiring -  and what they won’t compromise on
Practical steps to future-proof your cybersecurity career starting now

Whether you’re entering cybersecurity, leveling up your role, or hiring your next team member, this episode delivers real-world, actionable insights to help you stay relevant  - and competitive in an evolving industry.
 Tune in to learn how to stay ahead in the cybersecurity job market of today and tomorrow  only on Protect It All.

Key Moments: 

04:14 Recruitment Growth and Funding Trends
06:42 Tangible Value in AI Age
12:18 "Stepping Outside the Comfort Zone"
15:16 "Growth Through Embracing Discomfort"
19:23 "Embracing Growth and New Challenges"
21:01 Balancing Growth and Bold Moves
25:14 "Breaking Into Tech: Sacrifice & Strategy"
27:40 Experience Beats Book Knowledge
32:13 Human Insight Beats AI in Hiring
34:45 AI Recruitment: Potential, Limits, Distinctions
39:37 "Reluctant Growth through Opportunity"
42:47 "AI Tools: Benefits and Downsides"
44:29 "Human-Centered Hiring Over AI"
50:12 "Human Connection Over Technology"
53:23 "Planning Your Next Step"
About the guest: 
Mark Sasson is the Managing Partner of Pinpoint Search Group, a recruitment firm specializing in helping innovators in emerging markets attract the talent needed to drive maturation, scale, and successful outcomes. In 2014, Mark launched Pinpoint’s Cybersecurity practice, where he and his team have successfully completed hundreds of executive and senior-level individual contributor searches for leading Cybersecurity vendors. Building on that success, Mark is now guiding Pinpoint’s expansion into the rapidly evolving Space sector.

Connect Mark: 
Website: https://pinpointsearchgroup.com/
LinkedIn: linkedin.com/in/markjsasson/Learn more about Cybersecurity Vendor M&A + Funding Roundups here : https://pinpointsearchgroup.com/cybersecurity-industry-reports/


Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/p...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2240891/c1a-w52rp-wwp5o7mki7ro-eru4jh.jpg"></itunes:image>
                                                                            <itunes:duration>00:56:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Data Diodes & Remote Access: How Industrial Systems Stay Secure in a Connected World]]>
                </title>
                <pubDate>Mon, 17 Nov 2025 12:33:54 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2221962</guid>
                                <description>
                                            <![CDATA[<p><em><span style="font-weight:400;">Can your plant stay connected </span><span style="font-weight:400;">and</span><span style="font-weight:400;"> completely secure?</span></em></p>
<p><span style="font-weight:400;">In this episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> teams up with </span><strong>Lior Frenkel</strong><span style="font-weight:400;">, CEO and co-founder of </span><strong>Waterfall Security</strong><span style="font-weight:400;">, to explore how industries are rethinking OT cybersecurity in the age of ransomware and AI-powered attacks. Together, they break down why traditional firewalls can’t fully protect industrial control systems and how </span><strong>unidirectional gateways (data diodes)</strong><span style="font-weight:400;"> are redefining safety for everything from </span><strong>nuclear plants to casinos</strong><span style="font-weight:400;">.</span></p>
<p><span style="font-weight:400;">You’ll learn:</span></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">What data diodes really are and how they </span><em><span style="font-weight:400;">physically</span></em><span style="font-weight:400;"> block inbound attacks.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Why “air gaps” are no longer enough for modern connected environments.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How remote-access tools like </span><strong>HERA</strong><span style="font-weight:400;"> are enabling secure operations.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Real-world stories of industries upgrading defenses without losing efficiency.</span><span style="font-weight:400;"><br /><br /></span></li>
</ul>
<p><span style="font-weight:400;">Whether you manage critical infrastructure, handle OT security, or just want to understand how cyber-physical systems stay safe, this episode will give you a new appreciation for </span><strong>data flow, digital risk, and resilience</strong><span style="font-weight:400;">.</span></p>
<p><span style="font-weight:400;"> </span><strong>Tune in to discover the future of secure connectivity - only on Protect It All.</strong></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">07:46 Balancing Security and Operational Data</span></p>
<p><span style="font-weight:400;">16:25 "One-Way Data Flow Explained"</span></p>
<p><span style="font-weight:400;">22:19 "Air Gap for Data Transfer"</span></p>
<p><span style="font-weight:400;">27:44 Increasing Awareness of Security Threats</span></p>
<p><span style="font-weight:400;">32:05 Challenges of Power Plant Management</span></p>
<p><span style="font-weight:400;">35:29 Global Risks Require Local Understanding</span></p>
<p><span style="font-weight:400;">44:44 "OT Security and Zero Trust"</span></p>
<p><span style="font-weight:400;">48:24 "Remote Access vs On-Site Work"</span></p>
<p><span style="font-weight:400;">55:48 "HERA: TPM-Powered Remote Access"</span></p>
<p><span style="font-weight:400;">58:43 Encrypted Remote Access Streaming</span></p>
<p><span style="font-weight:400;">01:05:32 Secure Remote Control for Infrastructure</span></p>
<p><span style="font-weight:400;">01:13:00 "Solving Critical Incident Response Gaps"</span></p>
<p> </p>
<p><strong>About the Guest : </strong><span style="font-weight:400;"><br /></span><span style="font-weight:400;">Lior Frenkel is a globally recognized OT cybersecurity leader and the CEO/co-founder of </span><strong>Waterfall Security Solutions</strong><span style="font-weight:400;">, the company behind the industry-standard </span><strong>Unidirectional Security Gateways</strong><span style="font-weight:400;"> protecting critical infrastructure worldwide. With 25+ years of cybersecurity expertise, multiple patents, and leadership roles across Israel’s top technology, industrial, and export organ...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Can your plant stay connected and completely secure?
In this episode of Protect It All, host Aaron Crow teams up with Lior Frenkel, CEO and co-founder of Waterfall Security, to explore how industries are rethinking OT cybersecurity in the age of ransomware and AI-powered attacks. Together, they break down why traditional firewalls can’t fully protect industrial control systems and how unidirectional gateways (data diodes) are redefining safety for everything from nuclear plants to casinos.
You’ll learn:

What data diodes really are and how they physically block inbound attacks.
Why “air gaps” are no longer enough for modern connected environments.
How remote-access tools like HERA are enabling secure operations.
Real-world stories of industries upgrading defenses without losing efficiency.

Whether you manage critical infrastructure, handle OT security, or just want to understand how cyber-physical systems stay safe, this episode will give you a new appreciation for data flow, digital risk, and resilience.
 Tune in to discover the future of secure connectivity - only on Protect It All.
Key Moments: 
07:46 Balancing Security and Operational Data
16:25 "One-Way Data Flow Explained"
22:19 "Air Gap for Data Transfer"
27:44 Increasing Awareness of Security Threats
32:05 Challenges of Power Plant Management
35:29 Global Risks Require Local Understanding
44:44 "OT Security and Zero Trust"
48:24 "Remote Access vs On-Site Work"
55:48 "HERA: TPM-Powered Remote Access"
58:43 Encrypted Remote Access Streaming
01:05:32 Secure Remote Control for Infrastructure
01:13:00 "Solving Critical Incident Response Gaps"
 
About the Guest : Lior Frenkel is a globally recognized OT cybersecurity leader and the CEO/co-founder of Waterfall Security Solutions, the company behind the industry-standard Unidirectional Security Gateways protecting critical infrastructure worldwide. With 25+ years of cybersecurity expertise, multiple patents, and leadership roles across Israel’s top technology, industrial, and export organ...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Data Diodes & Remote Access: How Industrial Systems Stay Secure in a Connected World]]>
                </itunes:title>
                                    <itunes:episode>81</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><em><span style="font-weight:400;">Can your plant stay connected </span><span style="font-weight:400;">and</span><span style="font-weight:400;"> completely secure?</span></em></p>
<p><span style="font-weight:400;">In this episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> teams up with </span><strong>Lior Frenkel</strong><span style="font-weight:400;">, CEO and co-founder of </span><strong>Waterfall Security</strong><span style="font-weight:400;">, to explore how industries are rethinking OT cybersecurity in the age of ransomware and AI-powered attacks. Together, they break down why traditional firewalls can’t fully protect industrial control systems and how </span><strong>unidirectional gateways (data diodes)</strong><span style="font-weight:400;"> are redefining safety for everything from </span><strong>nuclear plants to casinos</strong><span style="font-weight:400;">.</span></p>
<p><span style="font-weight:400;">You’ll learn:</span></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">What data diodes really are and how they </span><em><span style="font-weight:400;">physically</span></em><span style="font-weight:400;"> block inbound attacks.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Why “air gaps” are no longer enough for modern connected environments.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How remote-access tools like </span><strong>HERA</strong><span style="font-weight:400;"> are enabling secure operations.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Real-world stories of industries upgrading defenses without losing efficiency.</span><span style="font-weight:400;"><br /><br /></span></li>
</ul>
<p><span style="font-weight:400;">Whether you manage critical infrastructure, handle OT security, or just want to understand how cyber-physical systems stay safe, this episode will give you a new appreciation for </span><strong>data flow, digital risk, and resilience</strong><span style="font-weight:400;">.</span></p>
<p><span style="font-weight:400;"> </span><strong>Tune in to discover the future of secure connectivity - only on Protect It All.</strong></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">07:46 Balancing Security and Operational Data</span></p>
<p><span style="font-weight:400;">16:25 "One-Way Data Flow Explained"</span></p>
<p><span style="font-weight:400;">22:19 "Air Gap for Data Transfer"</span></p>
<p><span style="font-weight:400;">27:44 Increasing Awareness of Security Threats</span></p>
<p><span style="font-weight:400;">32:05 Challenges of Power Plant Management</span></p>
<p><span style="font-weight:400;">35:29 Global Risks Require Local Understanding</span></p>
<p><span style="font-weight:400;">44:44 "OT Security and Zero Trust"</span></p>
<p><span style="font-weight:400;">48:24 "Remote Access vs On-Site Work"</span></p>
<p><span style="font-weight:400;">55:48 "HERA: TPM-Powered Remote Access"</span></p>
<p><span style="font-weight:400;">58:43 Encrypted Remote Access Streaming</span></p>
<p><span style="font-weight:400;">01:05:32 Secure Remote Control for Infrastructure</span></p>
<p><span style="font-weight:400;">01:13:00 "Solving Critical Incident Response Gaps"</span></p>
<p> </p>
<p><strong>About the Guest : </strong><span style="font-weight:400;"><br /></span><span style="font-weight:400;">Lior Frenkel is a globally recognized OT cybersecurity leader and the CEO/co-founder of </span><strong>Waterfall Security Solutions</strong><span style="font-weight:400;">, the company behind the industry-standard </span><strong>Unidirectional Security Gateways</strong><span style="font-weight:400;"> protecting critical infrastructure worldwide. With 25+ years of cybersecurity expertise, multiple patents, and leadership roles across Israel’s top technology, industrial, and export organizations, Lior is a key voice shaping the future of industrial cyber defense and national cyber strategy.</span><span style="font-weight:400;"><br /></span><span style="font-weight:400;"><br /></span><strong>How to connect Lior:<br /> </strong><span style="font-weight:400;"><br /></span><span style="font-weight:400;">Website: </span><span style="font-weight:400;"><a href="https://waterfall-security.com/">https://waterfall-security.com/</a><a href="https://waterfall-security.com/"><br /></a></span><span style="font-weight:400;">LinkdIn: </span><a href="https://www.linkedin.com/in/lior-frenkel-91534/"><span style="font-weight:400;">https://www.linkedin.com/in/lior-frenkel-91534/</span></a></p>
<p><span style="font-weight:400;"><br /></span><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2221962/c1e-k1vqntg1k76s21z21-gp9v404qs70r-pwlmk0.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2221962&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=ce08ad3bb604b65b783137497d96a0807a182165e0c09e4474232f2964c66381" length="68239186"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Can your plant stay connected and completely secure?
In this episode of Protect It All, host Aaron Crow teams up with Lior Frenkel, CEO and co-founder of Waterfall Security, to explore how industries are rethinking OT cybersecurity in the age of ransomware and AI-powered attacks. Together, they break down why traditional firewalls can’t fully protect industrial control systems and how unidirectional gateways (data diodes) are redefining safety for everything from nuclear plants to casinos.
You’ll learn:

What data diodes really are and how they physically block inbound attacks.
Why “air gaps” are no longer enough for modern connected environments.
How remote-access tools like HERA are enabling secure operations.
Real-world stories of industries upgrading defenses without losing efficiency.

Whether you manage critical infrastructure, handle OT security, or just want to understand how cyber-physical systems stay safe, this episode will give you a new appreciation for data flow, digital risk, and resilience.
 Tune in to discover the future of secure connectivity - only on Protect It All.
Key Moments: 
07:46 Balancing Security and Operational Data
16:25 "One-Way Data Flow Explained"
22:19 "Air Gap for Data Transfer"
27:44 Increasing Awareness of Security Threats
32:05 Challenges of Power Plant Management
35:29 Global Risks Require Local Understanding
44:44 "OT Security and Zero Trust"
48:24 "Remote Access vs On-Site Work"
55:48 "HERA: TPM-Powered Remote Access"
58:43 Encrypted Remote Access Streaming
01:05:32 Secure Remote Control for Infrastructure
01:13:00 "Solving Critical Incident Response Gaps"
 
About the Guest : Lior Frenkel is a globally recognized OT cybersecurity leader and the CEO/co-founder of Waterfall Security Solutions, the company behind the industry-standard Unidirectional Security Gateways protecting critical infrastructure worldwide. With 25+ years of cybersecurity expertise, multiple patents, and leadership roles across Israel’s top technology, industrial, and export organ...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2221962/c1a-w52rp-47mrvpvvbd3r-adfzt1.jpg"></itunes:image>
                                                                            <itunes:duration>01:16:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[AI, Music, and Cybersecurity Collide: How Innovation Is Redefining Creativity and Risk]]>
                </title>
                <pubDate>Mon, 10 Nov 2025 11:34:58 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2201501</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">What happens when </span><strong>AI meets cybersecurity - and the music industry?</strong></p>
<p><span style="font-weight:400;">In this eye-opening episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> sits down with </span><strong>Hadi Heidari</strong><span style="font-weight:400;">, a cybersecurity veteran turned tech entrepreneur, to explore the groundbreaking (and sometimes risky) ways </span><strong>artificial intelligence</strong><span style="font-weight:400;"> is reshaping both </span><strong>digital defense</strong><span style="font-weight:400;"> and </span><strong>creative innovation</strong><span style="font-weight:400;">.</span></p>
<p><span style="font-weight:400;">From AI-driven </span><strong>SOC operations</strong><span style="font-weight:400;"> and </span><strong>threat detection</strong><span style="font-weight:400;"> to </span><strong>music creation, data privacy, and identity protection</strong><span style="font-weight:400;">, Aaron and Hadi dive deep into how the same technologies fueling creativity are also rewriting the rules of cybersecurity.</span></p>
<p><span style="font-weight:400;">You’ll discover:</span></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">How AI is transforming both </span><strong>cyber defense</strong><span style="font-weight:400;"> and </span><strong>music production</strong><span style="font-weight:400;">.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The hidden </span><strong>risks of data training, privacy, and model misuse</strong><span style="font-weight:400;">.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How startups like </span><strong>Tune Pack</strong><span style="font-weight:400;"> are empowering artists through ethical AI.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Why balancing </span><strong>innovation with integrity</strong><span style="font-weight:400;"> matters more than ever.</span></li>
</ul>
<p><span style="font-weight:400;">Whether you’re protecting critical infrastructure or composing your next track, this episode will challenge how you think about creativity, ethics, and security in the AI era.</span></p>
<p><span style="font-weight:400;"> </span><strong>Tune in for an inspiring conversation that bridges tech and artistry, only on Protect It All.</strong></p>
<p><strong>Key Moments:</strong></p>
<p><span style="font-weight:400;">06:34 AI: Opportunities and Regulation Challenges</span></p>
<p><span style="font-weight:400;">09:57 AI Risks: Data Privacy Challenges</span></p>
<p><span style="font-weight:400;">11:03 AI Education for Security Awareness</span></p>
<p><span style="font-weight:400;">15:50 "AI Risks in Cybersecurity Actions"</span></p>
<p><span style="font-weight:400;">18:54 "AI Trust and IAM Policies"</span></p>
<p><span style="font-weight:400;">21:13 AI Decision-Making Ethical Dilemma</span></p>
<p><span style="font-weight:400;">27:19 AI Oversight and Quality Control</span></p>
<p><span style="font-weight:400;">30:34 AI Ethics in Data Training</span></p>
<p><span style="font-weight:400;">31:30 AI Ethics: Consent and Data Use</span></p>
<p><span style="font-weight:400;">35:43 Detecting AI-Generated Fakes</span></p>
<p><span style="font-weight:400;">37:59 AI, Security, and Challenges</span></p>
<p><span style="font-weight:400;">42:33 AI Revolutionizing Security Analysis</span></p>
<p><span style="font-weight:400;">47:14 "Learning Daily in Tech Space"</span></p>
<p><span style="font-weight:400;">50:58 "Embracing Change in Music Industry"</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Hadi Heidari is the founder of TunePact, an AI label service designed to support independent musicians. With over 20 years of experience in cybersecurity, Hadi’s journey into the music industry is an u...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[What happens when AI meets cybersecurity - and the music industry?
In this eye-opening episode of Protect It All, host Aaron Crow sits down with Hadi Heidari, a cybersecurity veteran turned tech entrepreneur, to explore the groundbreaking (and sometimes risky) ways artificial intelligence is reshaping both digital defense and creative innovation.
From AI-driven SOC operations and threat detection to music creation, data privacy, and identity protection, Aaron and Hadi dive deep into how the same technologies fueling creativity are also rewriting the rules of cybersecurity.
You’ll discover:

How AI is transforming both cyber defense and music production.
The hidden risks of data training, privacy, and model misuse.
How startups like Tune Pack are empowering artists through ethical AI.
Why balancing innovation with integrity matters more than ever.

Whether you’re protecting critical infrastructure or composing your next track, this episode will challenge how you think about creativity, ethics, and security in the AI era.
 Tune in for an inspiring conversation that bridges tech and artistry, only on Protect It All.
Key Moments:
06:34 AI: Opportunities and Regulation Challenges
09:57 AI Risks: Data Privacy Challenges
11:03 AI Education for Security Awareness
15:50 "AI Risks in Cybersecurity Actions"
18:54 "AI Trust and IAM Policies"
21:13 AI Decision-Making Ethical Dilemma
27:19 AI Oversight and Quality Control
30:34 AI Ethics in Data Training
31:30 AI Ethics: Consent and Data Use
35:43 Detecting AI-Generated Fakes
37:59 AI, Security, and Challenges
42:33 AI Revolutionizing Security Analysis
47:14 "Learning Daily in Tech Space"
50:58 "Embracing Change in Music Industry"
About the guest : 
Hadi Heidari is the founder of TunePact, an AI label service designed to support independent musicians. With over 20 years of experience in cybersecurity, Hadi’s journey into the music industry is an u...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[AI, Music, and Cybersecurity Collide: How Innovation Is Redefining Creativity and Risk]]>
                </itunes:title>
                                    <itunes:episode>80</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">What happens when </span><strong>AI meets cybersecurity - and the music industry?</strong></p>
<p><span style="font-weight:400;">In this eye-opening episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> sits down with </span><strong>Hadi Heidari</strong><span style="font-weight:400;">, a cybersecurity veteran turned tech entrepreneur, to explore the groundbreaking (and sometimes risky) ways </span><strong>artificial intelligence</strong><span style="font-weight:400;"> is reshaping both </span><strong>digital defense</strong><span style="font-weight:400;"> and </span><strong>creative innovation</strong><span style="font-weight:400;">.</span></p>
<p><span style="font-weight:400;">From AI-driven </span><strong>SOC operations</strong><span style="font-weight:400;"> and </span><strong>threat detection</strong><span style="font-weight:400;"> to </span><strong>music creation, data privacy, and identity protection</strong><span style="font-weight:400;">, Aaron and Hadi dive deep into how the same technologies fueling creativity are also rewriting the rules of cybersecurity.</span></p>
<p><span style="font-weight:400;">You’ll discover:</span></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">How AI is transforming both </span><strong>cyber defense</strong><span style="font-weight:400;"> and </span><strong>music production</strong><span style="font-weight:400;">.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The hidden </span><strong>risks of data training, privacy, and model misuse</strong><span style="font-weight:400;">.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How startups like </span><strong>Tune Pack</strong><span style="font-weight:400;"> are empowering artists through ethical AI.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Why balancing </span><strong>innovation with integrity</strong><span style="font-weight:400;"> matters more than ever.</span></li>
</ul>
<p><span style="font-weight:400;">Whether you’re protecting critical infrastructure or composing your next track, this episode will challenge how you think about creativity, ethics, and security in the AI era.</span></p>
<p><span style="font-weight:400;"> </span><strong>Tune in for an inspiring conversation that bridges tech and artistry, only on Protect It All.</strong></p>
<p><strong>Key Moments:</strong></p>
<p><span style="font-weight:400;">06:34 AI: Opportunities and Regulation Challenges</span></p>
<p><span style="font-weight:400;">09:57 AI Risks: Data Privacy Challenges</span></p>
<p><span style="font-weight:400;">11:03 AI Education for Security Awareness</span></p>
<p><span style="font-weight:400;">15:50 "AI Risks in Cybersecurity Actions"</span></p>
<p><span style="font-weight:400;">18:54 "AI Trust and IAM Policies"</span></p>
<p><span style="font-weight:400;">21:13 AI Decision-Making Ethical Dilemma</span></p>
<p><span style="font-weight:400;">27:19 AI Oversight and Quality Control</span></p>
<p><span style="font-weight:400;">30:34 AI Ethics in Data Training</span></p>
<p><span style="font-weight:400;">31:30 AI Ethics: Consent and Data Use</span></p>
<p><span style="font-weight:400;">35:43 Detecting AI-Generated Fakes</span></p>
<p><span style="font-weight:400;">37:59 AI, Security, and Challenges</span></p>
<p><span style="font-weight:400;">42:33 AI Revolutionizing Security Analysis</span></p>
<p><span style="font-weight:400;">47:14 "Learning Daily in Tech Space"</span></p>
<p><span style="font-weight:400;">50:58 "Embracing Change in Music Industry"</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Hadi Heidari is the founder of TunePact, an AI label service designed to support independent musicians. With over 20 years of experience in cybersecurity, Hadi’s journey into the music industry is an unusual one. While he continues to work as a governance and compliance advisor in cybersecurity, his move to Los Angeles inspired him to bridge his technical background with his passion for music. His unique blend of expertise in technology and creativity now helps empower indie artists in today’s digital landscape.</span></p>
<p><strong>How to connect Hadi :</strong><span style="font-weight:400;"> </span></p>
<p><a href="https://www.linkedin.com/in/hadihheidari/"><span style="font-weight:400;">https://www.linkedin.com/in/hadihheidari/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2201501/c1e-g0g79smomg3bxqv5d-okjkmdoja2n9-dslm3n.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2201501&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=dff7225f3eb6f35c7071f29fa38ba7ef9fc3f72d127187343409ca2348b19df5" length="43993873"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[What happens when AI meets cybersecurity - and the music industry?
In this eye-opening episode of Protect It All, host Aaron Crow sits down with Hadi Heidari, a cybersecurity veteran turned tech entrepreneur, to explore the groundbreaking (and sometimes risky) ways artificial intelligence is reshaping both digital defense and creative innovation.
From AI-driven SOC operations and threat detection to music creation, data privacy, and identity protection, Aaron and Hadi dive deep into how the same technologies fueling creativity are also rewriting the rules of cybersecurity.
You’ll discover:

How AI is transforming both cyber defense and music production.
The hidden risks of data training, privacy, and model misuse.
How startups like Tune Pack are empowering artists through ethical AI.
Why balancing innovation with integrity matters more than ever.

Whether you’re protecting critical infrastructure or composing your next track, this episode will challenge how you think about creativity, ethics, and security in the AI era.
 Tune in for an inspiring conversation that bridges tech and artistry, only on Protect It All.
Key Moments:
06:34 AI: Opportunities and Regulation Challenges
09:57 AI Risks: Data Privacy Challenges
11:03 AI Education for Security Awareness
15:50 "AI Risks in Cybersecurity Actions"
18:54 "AI Trust and IAM Policies"
21:13 AI Decision-Making Ethical Dilemma
27:19 AI Oversight and Quality Control
30:34 AI Ethics in Data Training
31:30 AI Ethics: Consent and Data Use
35:43 Detecting AI-Generated Fakes
37:59 AI, Security, and Challenges
42:33 AI Revolutionizing Security Analysis
47:14 "Learning Daily in Tech Space"
50:58 "Embracing Change in Music Industry"
About the guest : 
Hadi Heidari is the founder of TunePact, an AI label service designed to support independent musicians. With over 20 years of experience in cybersecurity, Hadi’s journey into the music industry is an u...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2201501/c1a-w52rp-pkvk453wixqz-yetvhc.jpg"></itunes:image>
                                                                            <itunes:duration>00:53:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Open Source Intelligence Exposed: How Hackers Use Public Data to Target People, Passwords, and Critical Systems]]>
                </title>
                <pubDate>Tue, 04 Nov 2025 12:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2184480</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Think your company’s private data is safe? Think again.</span></p>
<p><span style="font-weight:400;">In this episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> pulls back the curtain on one of cybersecurity’s most underestimated frontiers - </span><strong>Open Source Intelligence</strong><span style="font-weight:400;">. He reveals how attackers leverage publicly available data from </span><strong>LinkedIn profiles to leak passwords</strong><span style="font-weight:400;">, mapping out targets, infiltrating systems, and exploiting the </span><strong>human attack surface</strong><span style="font-weight:400;">.</span></p>
<p><em><span style="font-weight:400;">Drawing from real-world incidents and years of experience across IT and OT security, Aaron explains:</span></em></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">How </span><strong>Open Source Intelligence</strong><span style="font-weight:400;"> fuels </span><strong>social engineering and insider threat campaigns</strong><span style="font-weight:400;">.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Why protecting systems isn’t enough - you must protect </span><strong>people</strong><span style="font-weight:400;">.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How to use </span><strong>Open Source Intelligence</strong><span style="font-weight:400;"> proactively for </span><strong>threat modeling and risk mitigation</strong><span style="font-weight:400;">.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Steps to monitor your </span><strong>digital footprint</strong><span style="font-weight:400;"> and reduce exposure before it’s too late.</span><span style="font-weight:400;"><br /><br /></span></li>
</ul>
<p><span style="font-weight:400;">Whether you’re a cybersecurity professional, executive, or simply digital-curious, this episode will change how you think about “public information.”</span></p>
<p><span style="font-weight:400;"> </span><strong>Tune in to learn how Open Source Intelligence can both expose and empower your cybersecurity strategy - only on Protect It All.</strong></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">06:17 Securing Domain Admin Accounts</span></p>
<p><span style="font-weight:400;">09:09 Proactive Employee Security Monitoring</span></p>
<p><span style="font-weight:400;">12:19 "Protecting Human Attack Surfaces"</span></p>
<p><span style="font-weight:400;">16:48 "Enhancing Cybersecurity with </span><strong>Open Source Intelligence</strong><span style="font-weight:400;">”</span></p>
<p><span style="font-weight:400;">18:49 Exposed Data Response Process</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span></span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Think your company’s private data is safe? Think again.
In this episode of Protect It All, host Aaron Crow pulls back the curtain on one of cybersecurity’s most underestimated frontiers - Open Source Intelligence. He reveals how attackers leverage publicly available data from LinkedIn profiles to leak passwords, mapping out targets, infiltrating systems, and exploiting the human attack surface.
Drawing from real-world incidents and years of experience across IT and OT security, Aaron explains:

How Open Source Intelligence fuels social engineering and insider threat campaigns.
Why protecting systems isn’t enough - you must protect people.
How to use Open Source Intelligence proactively for threat modeling and risk mitigation.
Steps to monitor your digital footprint and reduce exposure before it’s too late.

Whether you’re a cybersecurity professional, executive, or simply digital-curious, this episode will change how you think about “public information.”
 Tune in to learn how Open Source Intelligence can both expose and empower your cybersecurity strategy - only on Protect It All.
Key Moments: 
06:17 Securing Domain Admin Accounts
09:09 Proactive Employee Security Monitoring
12:19 "Protecting Human Attack Surfaces"
16:48 "Enhancing Cybersecurity with Open Source Intelligence”
18:49 Exposed Data Response Process
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Open Source Intelligence Exposed: How Hackers Use Public Data to Target People, Passwords, and Critical Systems]]>
                </itunes:title>
                                    <itunes:episode>79</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Think your company’s private data is safe? Think again.</span></p>
<p><span style="font-weight:400;">In this episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> pulls back the curtain on one of cybersecurity’s most underestimated frontiers - </span><strong>Open Source Intelligence</strong><span style="font-weight:400;">. He reveals how attackers leverage publicly available data from </span><strong>LinkedIn profiles to leak passwords</strong><span style="font-weight:400;">, mapping out targets, infiltrating systems, and exploiting the </span><strong>human attack surface</strong><span style="font-weight:400;">.</span></p>
<p><em><span style="font-weight:400;">Drawing from real-world incidents and years of experience across IT and OT security, Aaron explains:</span></em></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">How </span><strong>Open Source Intelligence</strong><span style="font-weight:400;"> fuels </span><strong>social engineering and insider threat campaigns</strong><span style="font-weight:400;">.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Why protecting systems isn’t enough - you must protect </span><strong>people</strong><span style="font-weight:400;">.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How to use </span><strong>Open Source Intelligence</strong><span style="font-weight:400;"> proactively for </span><strong>threat modeling and risk mitigation</strong><span style="font-weight:400;">.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Steps to monitor your </span><strong>digital footprint</strong><span style="font-weight:400;"> and reduce exposure before it’s too late.</span><span style="font-weight:400;"><br /><br /></span></li>
</ul>
<p><span style="font-weight:400;">Whether you’re a cybersecurity professional, executive, or simply digital-curious, this episode will change how you think about “public information.”</span></p>
<p><span style="font-weight:400;"> </span><strong>Tune in to learn how Open Source Intelligence can both expose and empower your cybersecurity strategy - only on Protect It All.</strong></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">06:17 Securing Domain Admin Accounts</span></p>
<p><span style="font-weight:400;">09:09 Proactive Employee Security Monitoring</span></p>
<p><span style="font-weight:400;">12:19 "Protecting Human Attack Surfaces"</span></p>
<p><span style="font-weight:400;">16:48 "Enhancing Cybersecurity with </span><strong>Open Source Intelligence</strong><span style="font-weight:400;">”</span></p>
<p><span style="font-weight:400;">18:49 Exposed Data Response Process</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2184480/c1e-3qromik8rprimo0d3-rkpgn1m8sqvv-azrsf4.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2184480&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=45c25e71c47469f6ed83e413aba9676db7cb39421be9f22e6ac73671e911a42f" length="26254957"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Think your company’s private data is safe? Think again.
In this episode of Protect It All, host Aaron Crow pulls back the curtain on one of cybersecurity’s most underestimated frontiers - Open Source Intelligence. He reveals how attackers leverage publicly available data from LinkedIn profiles to leak passwords, mapping out targets, infiltrating systems, and exploiting the human attack surface.
Drawing from real-world incidents and years of experience across IT and OT security, Aaron explains:

How Open Source Intelligence fuels social engineering and insider threat campaigns.
Why protecting systems isn’t enough - you must protect people.
How to use Open Source Intelligence proactively for threat modeling and risk mitigation.
Steps to monitor your digital footprint and reduce exposure before it’s too late.

Whether you’re a cybersecurity professional, executive, or simply digital-curious, this episode will change how you think about “public information.”
 Tune in to learn how Open Source Intelligence can both expose and empower your cybersecurity strategy - only on Protect It All.
Key Moments: 
06:17 Securing Domain Admin Accounts
09:09 Proactive Employee Security Monitoring
12:19 "Protecting Human Attack Surfaces"
16:48 "Enhancing Cybersecurity with Open Source Intelligence”
18:49 Exposed Data Response Process
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2184480/c1a-w52rp-v6pvj388tv9n-ypkljr.jpg"></itunes:image>
                                                                            <itunes:duration>00:24:25</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Old Windows, New Risks: How End-of-Life Systems Threaten OT Security and What You Can Do]]>
                </title>
                <pubDate>Mon, 27 Oct 2025 10:55:08 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2172865</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> takes a hard look at one of the biggest blind spots in </span><strong>OT cybersecurity</strong><span style="font-weight:400;">: legacy Windows environments still running inside plants, refineries, and utilities. From </span><strong>Windows XP to Windows 10’s upcoming end of support</strong><span style="font-weight:400;">, Aaron breaks down why these systems persist, the true cost of “doing nothing,” and the high-stakes trade-offs between replacement, isolation, and risk mitigation.</span></p>
<p><strong>You’ll discover:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Why outdated Windows systems remain critical yet dangerously exposed.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The myths of “true air gaps” and why they don’t protect you anymore.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Practical isolation tactics, segmentation, strict access control, and monitoring.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How to manage </span><strong>asset visibility, vendor dependencies, and downtime risks.</strong><strong><br /><br /></strong></li>
</ul>
<p><span style="font-weight:400;">Whether you’re a cybersecurity leader, plant manager, or operations engineer, this episode is your roadmap to making smarter, safer decisions about legacy systems before they cause costly disruptions.</span></p>
<p><span style="font-weight:400;"> </span><strong>Tune in to learn how to balance operations, cost, and security and protect your OT world from old-system vulnerabilities.</strong></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">01:22 "End-of-Life Systems in OT"</span></p>
<p><span style="font-weight:400;">04:15 Upgrading Systems in Regulated Industries</span></p>
<p><span style="font-weight:400;">07:35 Reducing Risk with Network Segmentation</span></p>
<p><span style="font-weight:400;">12:02 "Firewall Rules and System Security"</span></p>
<p><span style="font-weight:400;">15:52 Understanding Risks in End-of-Life Systems</span></p>
<p><span style="font-weight:400;">18:54 Securing Legacy Systems Effectively</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectit..."></a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of Protect It All, host Aaron Crow takes a hard look at one of the biggest blind spots in OT cybersecurity: legacy Windows environments still running inside plants, refineries, and utilities. From Windows XP to Windows 10’s upcoming end of support, Aaron breaks down why these systems persist, the true cost of “doing nothing,” and the high-stakes trade-offs between replacement, isolation, and risk mitigation.
You’ll discover:

Why outdated Windows systems remain critical yet dangerously exposed.
The myths of “true air gaps” and why they don’t protect you anymore.
Practical isolation tactics, segmentation, strict access control, and monitoring.
How to manage asset visibility, vendor dependencies, and downtime risks.

Whether you’re a cybersecurity leader, plant manager, or operations engineer, this episode is your roadmap to making smarter, safer decisions about legacy systems before they cause costly disruptions.
 Tune in to learn how to balance operations, cost, and security and protect your OT world from old-system vulnerabilities.
Key Moments: 
01:22 "End-of-Life Systems in OT"
04:15 Upgrading Systems in Regulated Industries
07:35 Reducing Risk with Network Segmentation
12:02 "Firewall Rules and System Security"
15:52 Understanding Risks in End-of-Life Systems
18:54 Securing Legacy Systems Effectively
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook: ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Old Windows, New Risks: How End-of-Life Systems Threaten OT Security and What You Can Do]]>
                </itunes:title>
                                    <itunes:episode>78</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> takes a hard look at one of the biggest blind spots in </span><strong>OT cybersecurity</strong><span style="font-weight:400;">: legacy Windows environments still running inside plants, refineries, and utilities. From </span><strong>Windows XP to Windows 10’s upcoming end of support</strong><span style="font-weight:400;">, Aaron breaks down why these systems persist, the true cost of “doing nothing,” and the high-stakes trade-offs between replacement, isolation, and risk mitigation.</span></p>
<p><strong>You’ll discover:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Why outdated Windows systems remain critical yet dangerously exposed.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The myths of “true air gaps” and why they don’t protect you anymore.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Practical isolation tactics, segmentation, strict access control, and monitoring.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How to manage </span><strong>asset visibility, vendor dependencies, and downtime risks.</strong><strong><br /><br /></strong></li>
</ul>
<p><span style="font-weight:400;">Whether you’re a cybersecurity leader, plant manager, or operations engineer, this episode is your roadmap to making smarter, safer decisions about legacy systems before they cause costly disruptions.</span></p>
<p><span style="font-weight:400;"> </span><strong>Tune in to learn how to balance operations, cost, and security and protect your OT world from old-system vulnerabilities.</strong></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">01:22 "End-of-Life Systems in OT"</span></p>
<p><span style="font-weight:400;">04:15 Upgrading Systems in Regulated Industries</span></p>
<p><span style="font-weight:400;">07:35 Reducing Risk with Network Segmentation</span></p>
<p><span style="font-weight:400;">12:02 "Firewall Rules and System Security"</span></p>
<p><span style="font-weight:400;">15:52 Understanding Risks in End-of-Life Systems</span></p>
<p><span style="font-weight:400;">18:54 Securing Legacy Systems Effectively</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2172865/c1e-9pzm3sdgo43ao9wgq-47mmqzq0a095-mutv31.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2172865&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=3936514925ce77ce6a2cbc6c64d6b4632170f8a9e374395c7ccd900f42ef8b42" length="21686894"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of Protect It All, host Aaron Crow takes a hard look at one of the biggest blind spots in OT cybersecurity: legacy Windows environments still running inside plants, refineries, and utilities. From Windows XP to Windows 10’s upcoming end of support, Aaron breaks down why these systems persist, the true cost of “doing nothing,” and the high-stakes trade-offs between replacement, isolation, and risk mitigation.
You’ll discover:

Why outdated Windows systems remain critical yet dangerously exposed.
The myths of “true air gaps” and why they don’t protect you anymore.
Practical isolation tactics, segmentation, strict access control, and monitoring.
How to manage asset visibility, vendor dependencies, and downtime risks.

Whether you’re a cybersecurity leader, plant manager, or operations engineer, this episode is your roadmap to making smarter, safer decisions about legacy systems before they cause costly disruptions.
 Tune in to learn how to balance operations, cost, and security and protect your OT world from old-system vulnerabilities.
Key Moments: 
01:22 "End-of-Life Systems in OT"
04:15 Upgrading Systems in Regulated Industries
07:35 Reducing Risk with Network Segmentation
12:02 "Firewall Rules and System Security"
15:52 Understanding Risks in End-of-Life Systems
18:54 Securing Legacy Systems Effectively
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook: ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2172865/c1a-w52rp-mkwwrmrvb7g-3sfmxa.jpg"></itunes:image>
                                                                            <itunes:duration>00:20:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[OT Cybersecurity Wake-Up Call: How Airports and Power Grids Expose the Gaps We Can’t Ignore]]>
                </title>
                <pubDate>Mon, 20 Oct 2025 12:41:52 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2168486</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this solo episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> delivers a straight-talk reality check on the widening </span><strong>IT–OT cybersecurity gap</strong><span style="font-weight:400;"> and what it really takes to protect the systems that keep the world running. With decades of experience defending critical infrastructure, Aaron exposes why many OT environments are still years behind in resilience and visibility - and how we can finally fix that.</span></p>
<p><span style="font-weight:400;">You’ll learn:</span></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">The </span><em><span style="font-weight:400;">real incidents</span></em><span style="font-weight:400;"> prove why OT cybersecurity can’t afford to lag.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Why </span><strong>visibility and segmentation</strong><span style="font-weight:400;"> are non-negotiable for industrial systems.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How to build an </span><strong>incident-response plan</strong><span style="font-weight:400;"> that works when the stakes are highest.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Practical steps to strengthen </span><strong>resilience and recovery</strong><span style="font-weight:400;"> across critical operations.</span><span style="font-weight:400;"><br /><br /></span></li>
</ul>
<p><span style="font-weight:400;">This episode isn’t about fear - it’s about preparation. If your work touches energy, transportation, manufacturing, or utilities, this one’s your </span><strong>wake-up call to act before disaster hits.</strong></p>
<p><span style="font-weight:400;"> </span><strong>Listen now and learn how to protect what truly keeps our world moving - only on Protect It All.</strong></p>
<p><span style="font-weight:400;">Key Moments: </span><span style="font-weight:400;"><br /></span><span style="font-weight:400;"><br /></span><span style="font-weight:400;">05:06 "Real Risks of Critical Disruptions"</span></p>
<p><span style="font-weight:400;">06:16 Redefining OT System Boundaries</span></p>
<p><span style="font-weight:400;">11:42 Troubleshooting Unknown System Issues</span></p>
<p><span style="font-weight:400;">14:09 "Secure Remote Access Best Practices"</span></p>
<p><span style="font-weight:400;">18:28 "Planning for Worst-Case Scenarios"</span></p>
<p><span style="font-weight:400;">19:36 Critical Infrastructure Under Cyber Threat</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a></a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this solo episode of Protect It All, host Aaron Crow delivers a straight-talk reality check on the widening IT–OT cybersecurity gap and what it really takes to protect the systems that keep the world running. With decades of experience defending critical infrastructure, Aaron exposes why many OT environments are still years behind in resilience and visibility - and how we can finally fix that.
You’ll learn:

The real incidents prove why OT cybersecurity can’t afford to lag.
Why visibility and segmentation are non-negotiable for industrial systems.
How to build an incident-response plan that works when the stakes are highest.
Practical steps to strengthen resilience and recovery across critical operations.

This episode isn’t about fear - it’s about preparation. If your work touches energy, transportation, manufacturing, or utilities, this one’s your wake-up call to act before disaster hits.
 Listen now and learn how to protect what truly keeps our world moving - only on Protect It All.
Key Moments: 05:06 "Real Risks of Critical Disruptions"
06:16 Redefining OT System Boundaries
11:42 Troubleshooting Unknown System Issues
14:09 "Secure Remote Access Best Practices"
18:28 "Planning for Worst-Case Scenarios"
19:36 Critical Infrastructure Under Cyber Threat
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube:]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[OT Cybersecurity Wake-Up Call: How Airports and Power Grids Expose the Gaps We Can’t Ignore]]>
                </itunes:title>
                                    <itunes:episode>77</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this solo episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> delivers a straight-talk reality check on the widening </span><strong>IT–OT cybersecurity gap</strong><span style="font-weight:400;"> and what it really takes to protect the systems that keep the world running. With decades of experience defending critical infrastructure, Aaron exposes why many OT environments are still years behind in resilience and visibility - and how we can finally fix that.</span></p>
<p><span style="font-weight:400;">You’ll learn:</span></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">The </span><em><span style="font-weight:400;">real incidents</span></em><span style="font-weight:400;"> prove why OT cybersecurity can’t afford to lag.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Why </span><strong>visibility and segmentation</strong><span style="font-weight:400;"> are non-negotiable for industrial systems.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How to build an </span><strong>incident-response plan</strong><span style="font-weight:400;"> that works when the stakes are highest.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Practical steps to strengthen </span><strong>resilience and recovery</strong><span style="font-weight:400;"> across critical operations.</span><span style="font-weight:400;"><br /><br /></span></li>
</ul>
<p><span style="font-weight:400;">This episode isn’t about fear - it’s about preparation. If your work touches energy, transportation, manufacturing, or utilities, this one’s your </span><strong>wake-up call to act before disaster hits.</strong></p>
<p><span style="font-weight:400;"> </span><strong>Listen now and learn how to protect what truly keeps our world moving - only on Protect It All.</strong></p>
<p><span style="font-weight:400;">Key Moments: </span><span style="font-weight:400;"><br /></span><span style="font-weight:400;"><br /></span><span style="font-weight:400;">05:06 "Real Risks of Critical Disruptions"</span></p>
<p><span style="font-weight:400;">06:16 Redefining OT System Boundaries</span></p>
<p><span style="font-weight:400;">11:42 Troubleshooting Unknown System Issues</span></p>
<p><span style="font-weight:400;">14:09 "Secure Remote Access Best Practices"</span></p>
<p><span style="font-weight:400;">18:28 "Planning for Worst-Case Scenarios"</span></p>
<p><span style="font-weight:400;">19:36 Critical Infrastructure Under Cyber Threat</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2168486/c1e-2p9xmsmxg4zsmzn80-ndvn7k0xco47-lmxixr.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2168486&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=fab3c4b4e9e511963b4e2ccfc96ad6b6762c65f13845c95876b0ce20b3ab05e7" length="22283296"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this solo episode of Protect It All, host Aaron Crow delivers a straight-talk reality check on the widening IT–OT cybersecurity gap and what it really takes to protect the systems that keep the world running. With decades of experience defending critical infrastructure, Aaron exposes why many OT environments are still years behind in resilience and visibility - and how we can finally fix that.
You’ll learn:

The real incidents prove why OT cybersecurity can’t afford to lag.
Why visibility and segmentation are non-negotiable for industrial systems.
How to build an incident-response plan that works when the stakes are highest.
Practical steps to strengthen resilience and recovery across critical operations.

This episode isn’t about fear - it’s about preparation. If your work touches energy, transportation, manufacturing, or utilities, this one’s your wake-up call to act before disaster hits.
 Listen now and learn how to protect what truly keeps our world moving - only on Protect It All.
Key Moments: 05:06 "Real Risks of Critical Disruptions"
06:16 Redefining OT System Boundaries
11:42 Troubleshooting Unknown System Issues
14:09 "Secure Remote Access Best Practices"
18:28 "Planning for Worst-Case Scenarios"
19:36 Critical Infrastructure Under Cyber Threat
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube:]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2168486/c1a-w52rp-ndvn7k5ws276-i2wtbh.jpg"></itunes:image>
                                                                            <itunes:duration>00:22:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Why “One Size Fits All” Fails in OT Cybersecurity: Real-World Fixes for IT–OT Gaps]]>
                </title>
                <pubDate>Mon, 06 Oct 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2158859</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">OT cybersecurity isn’t about installing more firewalls - it’s about adapting your entire mindset.</span></p>
<p><span style="font-weight:400;">In this episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> breaks down why IT security tools often fall short in industrial environments and what it really takes to protect operational systems. Drawing from </span><strong>25+ years of hands-on experience</strong><span style="font-weight:400;">, Aaron explores the differences between IT and OT priorities, why “silver bullet” solutions don’t exist, and how to build defense-in-depth strategies that actually work on the plant floor.</span></p>
<p><em><span style="font-weight:400;">You’ll discover:</span></em></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Why IT tools struggle in OT environments - and where they </span><em><span style="font-weight:400;">can</span></em><span style="font-weight:400;"> help.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How to balance </span><strong>availability, safety, and security</strong><span style="font-weight:400;"> in critical systems.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Practical ways to manage </span><strong>legacy hardware, vendor dependencies, and remote access</strong><span style="font-weight:400;">.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The key to uniting </span><strong>IT and OT teams</strong><span style="font-weight:400;"> for stronger resilience.</span><span style="font-weight:400;"><br /><br /></span></li>
</ul>
<p><span style="font-weight:400;">If you’re navigating the evolving world of </span><strong>industrial cybersecurity</strong><span style="font-weight:400;">, this episode will change how you think about tools, processes, and protection.</span></p>
<p><span style="font-weight:400;"> </span><strong>Tune in to learn how to bridge the IT–OT divide and build a smarter, safer security culture.</strong></p>
<p><strong>Key Moments: </strong><span style="font-weight:400;"><br /><br /></span></p>
<p><span style="font-weight:400;">03:31 "Adapting IT Products for OT Use"</span></p>
<p><span style="font-weight:400;">08:53 IT and OT Crossover Tools</span></p>
<p><span style="font-weight:400;">11:05 Balancing OT Risk in Cybersecurity</span></p>
<p><span style="font-weight:400;">13:37 Cybersecurity and Remote Secure Access</span></p>
<p><span style="font-weight:400;">18:25 Designing Resilient, Independent Systems</span></p>
<p><span style="font-weight:400;">21:40 Unified Cybersecurity Through Training &amp; Collaboration</span></p>
<p><span style="font-weight:400;">24:24 "IT and OT Integration Challenges"</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span></span></a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[OT cybersecurity isn’t about installing more firewalls - it’s about adapting your entire mindset.
In this episode of Protect It All, host Aaron Crow breaks down why IT security tools often fall short in industrial environments and what it really takes to protect operational systems. Drawing from 25+ years of hands-on experience, Aaron explores the differences between IT and OT priorities, why “silver bullet” solutions don’t exist, and how to build defense-in-depth strategies that actually work on the plant floor.
You’ll discover:

Why IT tools struggle in OT environments - and where they can help.
How to balance availability, safety, and security in critical systems.
Practical ways to manage legacy hardware, vendor dependencies, and remote access.
The key to uniting IT and OT teams for stronger resilience.

If you’re navigating the evolving world of industrial cybersecurity, this episode will change how you think about tools, processes, and protection.
 Tune in to learn how to bridge the IT–OT divide and build a smarter, safer security culture.
Key Moments: 
03:31 "Adapting IT Products for OT Use"
08:53 IT and OT Crossover Tools
11:05 Balancing OT Risk in Cybersecurity
13:37 Cybersecurity and Remote Secure Access
18:25 Designing Resilient, Independent Systems
21:40 Unified Cybersecurity Through Training & Collaboration
24:24 "IT and OT Integration Challenges"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X:]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Why “One Size Fits All” Fails in OT Cybersecurity: Real-World Fixes for IT–OT Gaps]]>
                </itunes:title>
                                    <itunes:episode>76</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">OT cybersecurity isn’t about installing more firewalls - it’s about adapting your entire mindset.</span></p>
<p><span style="font-weight:400;">In this episode of </span><strong>Protect It All</strong><span style="font-weight:400;">, host </span><strong>Aaron Crow</strong><span style="font-weight:400;"> breaks down why IT security tools often fall short in industrial environments and what it really takes to protect operational systems. Drawing from </span><strong>25+ years of hands-on experience</strong><span style="font-weight:400;">, Aaron explores the differences between IT and OT priorities, why “silver bullet” solutions don’t exist, and how to build defense-in-depth strategies that actually work on the plant floor.</span></p>
<p><em><span style="font-weight:400;">You’ll discover:</span></em></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Why IT tools struggle in OT environments - and where they </span><em><span style="font-weight:400;">can</span></em><span style="font-weight:400;"> help.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">How to balance </span><strong>availability, safety, and security</strong><span style="font-weight:400;"> in critical systems.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Practical ways to manage </span><strong>legacy hardware, vendor dependencies, and remote access</strong><span style="font-weight:400;">.</span><span style="font-weight:400;"><br /><br /></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The key to uniting </span><strong>IT and OT teams</strong><span style="font-weight:400;"> for stronger resilience.</span><span style="font-weight:400;"><br /><br /></span></li>
</ul>
<p><span style="font-weight:400;">If you’re navigating the evolving world of </span><strong>industrial cybersecurity</strong><span style="font-weight:400;">, this episode will change how you think about tools, processes, and protection.</span></p>
<p><span style="font-weight:400;"> </span><strong>Tune in to learn how to bridge the IT–OT divide and build a smarter, safer security culture.</strong></p>
<p><strong>Key Moments: </strong><span style="font-weight:400;"><br /><br /></span></p>
<p><span style="font-weight:400;">03:31 "Adapting IT Products for OT Use"</span></p>
<p><span style="font-weight:400;">08:53 IT and OT Crossover Tools</span></p>
<p><span style="font-weight:400;">11:05 Balancing OT Risk in Cybersecurity</span></p>
<p><span style="font-weight:400;">13:37 Cybersecurity and Remote Secure Access</span></p>
<p><span style="font-weight:400;">18:25 Designing Resilient, Independent Systems</span></p>
<p><span style="font-weight:400;">21:40 Unified Cybersecurity Through Training &amp; Collaboration</span></p>
<p><span style="font-weight:400;">24:24 "IT and OT Integration Challenges"</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2158859/c1e-n57kvbdq3mvfd3478-pkv99rz4iqw9-bv8eil.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2158859&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=ad32a6b2a574abf72fb1cc33744bf3a44bd6c55f6ace41ec8876db076614714a" length="28371884"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[OT cybersecurity isn’t about installing more firewalls - it’s about adapting your entire mindset.
In this episode of Protect It All, host Aaron Crow breaks down why IT security tools often fall short in industrial environments and what it really takes to protect operational systems. Drawing from 25+ years of hands-on experience, Aaron explores the differences between IT and OT priorities, why “silver bullet” solutions don’t exist, and how to build defense-in-depth strategies that actually work on the plant floor.
You’ll discover:

Why IT tools struggle in OT environments - and where they can help.
How to balance availability, safety, and security in critical systems.
Practical ways to manage legacy hardware, vendor dependencies, and remote access.
The key to uniting IT and OT teams for stronger resilience.

If you’re navigating the evolving world of industrial cybersecurity, this episode will change how you think about tools, processes, and protection.
 Tune in to learn how to bridge the IT–OT divide and build a smarter, safer security culture.
Key Moments: 
03:31 "Adapting IT Products for OT Use"
08:53 IT and OT Crossover Tools
11:05 Balancing OT Risk in Cybersecurity
13:37 Cybersecurity and Remote Secure Access
18:25 Designing Resilient, Independent Systems
21:40 Unified Cybersecurity Through Training & Collaboration
24:24 "IT and OT Integration Challenges"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X:]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2158859/c1a-w52rp-5zdgg08os0qn-xi9wn1.jpg"></itunes:image>
                                                                            <itunes:duration>00:28:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Protect Kids in a Digital World: Online Safety, AI Dangers, and Parental Guidance]]>
                </title>
                <pubDate>Mon, 22 Sep 2025 12:27:11 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2146605</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow welcomes cybersecurity expert John Schimanski Jr., Chief Information Security Officer at </span><span style="font-weight:400;">Trivigil</span><span style="font-weight:400;">, for an eye-opening conversation that every parent, educator, and technologist needs to hear. Together, they delve into the escalating dangers children face online - from the alarming rise of cyber predators and social media manipulation, to the misuse of AI and increasingly sophisticated scams targeting families.</span></p>
<p><span style="font-weight:400;">John shares powerful stories from his work with educational institutions and law enforcement, highlighting how digital threats are evolving far faster than most parents can keep up with. Aaron reflects on personal challenges as a parent navigating device safety and digital boundaries, and the two discuss practical strategies for protecting kids in today’s hyper-connected world.</span></p>
<p><span style="font-weight:400;">This episode doesn’t just explore the risks - it offers hope and tangible action, including details about cybersecurity education initiatives like the MASK Next Gen Shield game, designed to give kids and parents the knowledge they need to stay safe online. Whether you’re a concerned parent, a teacher, or someone working in the cybersecurity field, this discussion is packed with real-world advice and resources you can use right now.</span></p>
<p><span style="font-weight:400;">Tune in for a timely conversation on the front lines of digital safety—and learn why, when it comes to protecting our kids, awareness and action are more important than ever.</span></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">05:00 Digital Image Blacklist Management</span></p>
<p><span style="font-weight:400;">08:08 Parental Cybersecurity and Tech Awareness</span></p>
<p><span style="font-weight:400;">10:06 Fake Arrest Warrant Scam Alert</span></p>
<p><span style="font-weight:400;">13:27 AI Development Concerns and Future</span></p>
<p><span style="font-weight:400;">21:13 Online Predator Alert &amp; Teen Safety</span></p>
<p><span style="font-weight:400;">25:33 Limits of Facebook Moderation</span></p>
<p><span style="font-weight:400;">27:29 Managing Digital Challenges for Parents</span></p>
<p><span style="font-weight:400;">30:46 Teen Sextortion Crisis Emerges</span></p>
<p><span style="font-weight:400;">33:44 "Saving Kids Amidst Social Media"</span></p>
<p><span style="font-weight:400;">42:23 Broken Graphics Card Issue Resolved</span></p>
<p><span style="font-weight:400;">45:33 Internet Safety Tips for Parents</span></p>
<p><span style="font-weight:400;">49:43 Pause Before Reacting</span></p>
<p><span style="font-weight:400;">51:17 Future Concerns and Optimism</span></p>
<p><span style="font-weight:400;">56:46 "Essential Curriculum for Schools"</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p> </p>
<p><span style="font-weight:400;">John Schimanski Jr.</span><span style="font-weight:400;"> brings more than three decades of experience in physical and cybersecurity, spanning private and public sectors. Beginning his career in 1994, he worked as a physical security specialist protecting super-regional shopping centers in high-crime areas, focusing on stolen vehicles and safety operations. During this time, he earned two master’s degrees—one in Criminal Justice and Security Administration and another in Managing Information Systems—along with a bachelor’s in Business Administration.</span></p>
<p> </p>
<p><span style="font-weight:400;">He transitioned into cybersecurity in 2007, when ransomware was still a $5,000 payment on a green dot credit card. While working in a small data center, he developed customized web services and interfaces for organizations such as the Las Vegas Motor Speedway and Electric Daisy Carnival (EDC).</span></p>
<p> </p>
<p><span></span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow welcomes cybersecurity expert John Schimanski Jr., Chief Information Security Officer at Trivigil, for an eye-opening conversation that every parent, educator, and technologist needs to hear. Together, they delve into the escalating dangers children face online - from the alarming rise of cyber predators and social media manipulation, to the misuse of AI and increasingly sophisticated scams targeting families.
John shares powerful stories from his work with educational institutions and law enforcement, highlighting how digital threats are evolving far faster than most parents can keep up with. Aaron reflects on personal challenges as a parent navigating device safety and digital boundaries, and the two discuss practical strategies for protecting kids in today’s hyper-connected world.
This episode doesn’t just explore the risks - it offers hope and tangible action, including details about cybersecurity education initiatives like the MASK Next Gen Shield game, designed to give kids and parents the knowledge they need to stay safe online. Whether you’re a concerned parent, a teacher, or someone working in the cybersecurity field, this discussion is packed with real-world advice and resources you can use right now.
Tune in for a timely conversation on the front lines of digital safety—and learn why, when it comes to protecting our kids, awareness and action are more important than ever.
Key Moments: 
05:00 Digital Image Blacklist Management
08:08 Parental Cybersecurity and Tech Awareness
10:06 Fake Arrest Warrant Scam Alert
13:27 AI Development Concerns and Future
21:13 Online Predator Alert & Teen Safety
25:33 Limits of Facebook Moderation
27:29 Managing Digital Challenges for Parents
30:46 Teen Sextortion Crisis Emerges
33:44 "Saving Kids Amidst Social Media"
42:23 Broken Graphics Card Issue Resolved
45:33 Internet Safety Tips for Parents
49:43 Pause Before Reacting
51:17 Future Concerns and Optimism
56:46 "Essential Curriculum for Schools"
About the guest : 
 
John Schimanski Jr. brings more than three decades of experience in physical and cybersecurity, spanning private and public sectors. Beginning his career in 1994, he worked as a physical security specialist protecting super-regional shopping centers in high-crime areas, focusing on stolen vehicles and safety operations. During this time, he earned two master’s degrees—one in Criminal Justice and Security Administration and another in Managing Information Systems—along with a bachelor’s in Business Administration.
 
He transitioned into cybersecurity in 2007, when ransomware was still a $5,000 payment on a green dot credit card. While working in a small data center, he developed customized web services and interfaces for organizations such as the Las Vegas Motor Speedway and Electric Daisy Carnival (EDC).
 
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[How to Protect Kids in a Digital World: Online Safety, AI Dangers, and Parental Guidance]]>
                </itunes:title>
                                    <itunes:episode>75</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow welcomes cybersecurity expert John Schimanski Jr., Chief Information Security Officer at </span><span style="font-weight:400;">Trivigil</span><span style="font-weight:400;">, for an eye-opening conversation that every parent, educator, and technologist needs to hear. Together, they delve into the escalating dangers children face online - from the alarming rise of cyber predators and social media manipulation, to the misuse of AI and increasingly sophisticated scams targeting families.</span></p>
<p><span style="font-weight:400;">John shares powerful stories from his work with educational institutions and law enforcement, highlighting how digital threats are evolving far faster than most parents can keep up with. Aaron reflects on personal challenges as a parent navigating device safety and digital boundaries, and the two discuss practical strategies for protecting kids in today’s hyper-connected world.</span></p>
<p><span style="font-weight:400;">This episode doesn’t just explore the risks - it offers hope and tangible action, including details about cybersecurity education initiatives like the MASK Next Gen Shield game, designed to give kids and parents the knowledge they need to stay safe online. Whether you’re a concerned parent, a teacher, or someone working in the cybersecurity field, this discussion is packed with real-world advice and resources you can use right now.</span></p>
<p><span style="font-weight:400;">Tune in for a timely conversation on the front lines of digital safety—and learn why, when it comes to protecting our kids, awareness and action are more important than ever.</span></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">05:00 Digital Image Blacklist Management</span></p>
<p><span style="font-weight:400;">08:08 Parental Cybersecurity and Tech Awareness</span></p>
<p><span style="font-weight:400;">10:06 Fake Arrest Warrant Scam Alert</span></p>
<p><span style="font-weight:400;">13:27 AI Development Concerns and Future</span></p>
<p><span style="font-weight:400;">21:13 Online Predator Alert &amp; Teen Safety</span></p>
<p><span style="font-weight:400;">25:33 Limits of Facebook Moderation</span></p>
<p><span style="font-weight:400;">27:29 Managing Digital Challenges for Parents</span></p>
<p><span style="font-weight:400;">30:46 Teen Sextortion Crisis Emerges</span></p>
<p><span style="font-weight:400;">33:44 "Saving Kids Amidst Social Media"</span></p>
<p><span style="font-weight:400;">42:23 Broken Graphics Card Issue Resolved</span></p>
<p><span style="font-weight:400;">45:33 Internet Safety Tips for Parents</span></p>
<p><span style="font-weight:400;">49:43 Pause Before Reacting</span></p>
<p><span style="font-weight:400;">51:17 Future Concerns and Optimism</span></p>
<p><span style="font-weight:400;">56:46 "Essential Curriculum for Schools"</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p> </p>
<p><span style="font-weight:400;">John Schimanski Jr.</span><span style="font-weight:400;"> brings more than three decades of experience in physical and cybersecurity, spanning private and public sectors. Beginning his career in 1994, he worked as a physical security specialist protecting super-regional shopping centers in high-crime areas, focusing on stolen vehicles and safety operations. During this time, he earned two master’s degrees—one in Criminal Justice and Security Administration and another in Managing Information Systems—along with a bachelor’s in Business Administration.</span></p>
<p> </p>
<p><span style="font-weight:400;">He transitioned into cybersecurity in 2007, when ransomware was still a $5,000 payment on a green dot credit card. While working in a small data center, he developed customized web services and interfaces for organizations such as the Las Vegas Motor Speedway and Electric Daisy Carnival (EDC).</span></p>
<p> </p>
<p><span style="font-weight:400;">After building deep experience in the private sector, John moved into public service with the Texas Comptroller of Public Accounts and later served as Deputy CISO for the Texas Department of Criminal Justice. These roles gave him extensive insight into securing critical state systems and navigating the complex challenges of public-sector cybersecurity.</span></p>
<p> </p>
<p><span style="font-weight:400;">Today, John serves at Trivigil, a cybersecurity firm focused on strengthening the cyber posture of K-12 schools and universities. His career reflects a unique blend of front-line physical security, technical expertise, and leadership across sectors—making him a trusted advisor and advocate for strong, resilient security practices.</span></p>
<p> </p>
<p><span style="font-weight:400;">Links to connect John : </span></p>
<p><span style="font-weight:400;">LinkedIn : </span><a href="https://www.linkedin.com/in/johnschimanski/"><span style="font-weight:400;">https://www.linkedin.com/in/johnschimanski/</span></a></p>
<p><span style="font-weight:400;">Link to October Event - </span><span style="font-weight:400;">Mask Nectgen - </span><a href="https://s14tu.share-na2.hsforms.com/2K3tpMqlmQ8SR_cGWXsitSw"><span style="font-weight:400;">https://s14tu.share-na2.hsforms.com/2K3tpMqlmQ8SR_cGWXsitSw</span></a></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2146605/c1e-1q3v7i5o5kph4poop-xx4qxrzoivpg-oypmuz.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2146605&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=60fc5af557a782e327399fa2dd9c9db2526cd38d552cde16a132e7eac6fa694b" length="56011958"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow welcomes cybersecurity expert John Schimanski Jr., Chief Information Security Officer at Trivigil, for an eye-opening conversation that every parent, educator, and technologist needs to hear. Together, they delve into the escalating dangers children face online - from the alarming rise of cyber predators and social media manipulation, to the misuse of AI and increasingly sophisticated scams targeting families.
John shares powerful stories from his work with educational institutions and law enforcement, highlighting how digital threats are evolving far faster than most parents can keep up with. Aaron reflects on personal challenges as a parent navigating device safety and digital boundaries, and the two discuss practical strategies for protecting kids in today’s hyper-connected world.
This episode doesn’t just explore the risks - it offers hope and tangible action, including details about cybersecurity education initiatives like the MASK Next Gen Shield game, designed to give kids and parents the knowledge they need to stay safe online. Whether you’re a concerned parent, a teacher, or someone working in the cybersecurity field, this discussion is packed with real-world advice and resources you can use right now.
Tune in for a timely conversation on the front lines of digital safety—and learn why, when it comes to protecting our kids, awareness and action are more important than ever.
Key Moments: 
05:00 Digital Image Blacklist Management
08:08 Parental Cybersecurity and Tech Awareness
10:06 Fake Arrest Warrant Scam Alert
13:27 AI Development Concerns and Future
21:13 Online Predator Alert & Teen Safety
25:33 Limits of Facebook Moderation
27:29 Managing Digital Challenges for Parents
30:46 Teen Sextortion Crisis Emerges
33:44 "Saving Kids Amidst Social Media"
42:23 Broken Graphics Card Issue Resolved
45:33 Internet Safety Tips for Parents
49:43 Pause Before Reacting
51:17 Future Concerns and Optimism
56:46 "Essential Curriculum for Schools"
About the guest : 
 
John Schimanski Jr. brings more than three decades of experience in physical and cybersecurity, spanning private and public sectors. Beginning his career in 1994, he worked as a physical security specialist protecting super-regional shopping centers in high-crime areas, focusing on stolen vehicles and safety operations. During this time, he earned two master’s degrees—one in Criminal Justice and Security Administration and another in Managing Information Systems—along with a bachelor’s in Business Administration.
 
He transitioned into cybersecurity in 2007, when ransomware was still a $5,000 payment on a green dot credit card. While working in a small data center, he developed customized web services and interfaces for organizations such as the Las Vegas Motor Speedway and Electric Daisy Carnival (EDC).
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2146605/c1a-w52rp-1p5mpzn5f8n6-oxirb1.jpg"></itunes:image>
                                                                            <itunes:duration>00:58:51</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Bridging Military and Civilian Cybersecurity: Leadership, Skills, and Lifelong Learning with Christopher Ross]]>
                </title>
                <pubDate>Mon, 15 Sep 2025 11:47:45 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2141173</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow sits down with cybersecurity leader and National Guard threat hunt team lead Christopher Ross, diving into the real-world experiences that shape careers in the intersecting worlds of IT and OT security. Chris shares his 18-year journey from joining the military with a passion for computers to leading critical infrastructure cybersecurity efforts - both in uniform and in the private sector. Together, Aaron and Chris break down myths about gatekeeping, discuss the unique challenges of military versus civilian roles, and highlight lessons learned along the way.</span></p>
<p><span style="font-weight:400;">From imposter syndrome to servant leadership, the conversation unpacks how effective communication, continuous training, and the willingness to learn from failure fuel professional growth. Chris also reflects on how military training instills risk mitigation and teamwork, and how those skills can translate - and sometimes clash - with civilian cybersecurity cultures. They talk certifications, hands-on learning, the importance of meaningful tabletop exercises, and the evolving landscape as AI powers both attackers and defenders.</span></p>
<p><span style="font-weight:400;">Whether you’re a veteran, a fresh analyst, or just passionate about cybersecurity, this honest and energetic exchange will leave you motivated to keep learning, keep growing, and keep protecting it all. So grab your energy drink and tune in for a conversation that proves everyone in cyber, no matter their path, has wisdom worth sharing.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:30 Military Adventures Surpass Civilian Opportunities</span></p>
<p><span style="font-weight:400;">07:28 Military vs. Civilian Leadership Dynamics</span></p>
<p><span style="font-weight:400;">10:42 Clarifying Civilian vs Military Missions</span></p>
<p><span style="font-weight:400;">12:22 Leadership: Addressing Miscommunication &amp; Misalignment</span></p>
<p><span style="font-weight:400;">15:45 Toxic Leadership and Military Transition</span></p>
<p><span style="font-weight:400;">20:01 Reliance on Tools vs. Core Skills</span></p>
<p><span style="font-weight:400;">22:29 "Forgotten Skills Fade Over Time"</span></p>
<p><span style="font-weight:400;">25:13 Boosting Confidence in New Roles</span></p>
<p><span style="font-weight:400;">29:42 Interactive Training and Environmental Protection</span></p>
<p><span style="font-weight:400;">32:37 Purple Teaming Strategy Insights</span></p>
<p><span style="font-weight:400;">36:15 Persistence in Skill Development</span></p>
<p><span style="font-weight:400;">39:04 Soft Skills Matter for Career Growth</span></p>
<p><span style="font-weight:400;">42:44 "Technical &amp; Business Acumen Fusion"</span></p>
<p><span style="font-weight:400;">44:41 Military: Career Value and Benefits</span></p>
<p><span style="font-weight:400;">48:09 "Cyber Education for K-12"</span></p>
<p><strong>Resources Mentioned : </strong></p>
<p><a href="https://www.ransomware.live/"><span style="font-weight:400;">https://www.ransomware.live/</span></a></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">comprehensive resource that tracks and monitors ransomware groups and their activities.</span></li>
</ul>
<p><a href="https://ransomwhe.re/"><span style="font-weight:400;">https://ransomwhe.re/</span></a></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">tracks ransomware payments by collecting and analyzing cryptocurrency addresses associated with ransomware attacks. </span></li>
</ul>
<p><a href="https://www.ransom-db.com/"><span style="font-weight:400;">https://www.ransom-db.com/</span></a></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">real-time ransomware tracking platform that collects, indexes, and centralizes information on ransomware groups and their victims. </span></li>
</ul>
<p><strong>About the Gu...</strong></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow sits down with cybersecurity leader and National Guard threat hunt team lead Christopher Ross, diving into the real-world experiences that shape careers in the intersecting worlds of IT and OT security. Chris shares his 18-year journey from joining the military with a passion for computers to leading critical infrastructure cybersecurity efforts - both in uniform and in the private sector. Together, Aaron and Chris break down myths about gatekeeping, discuss the unique challenges of military versus civilian roles, and highlight lessons learned along the way.
From imposter syndrome to servant leadership, the conversation unpacks how effective communication, continuous training, and the willingness to learn from failure fuel professional growth. Chris also reflects on how military training instills risk mitigation and teamwork, and how those skills can translate - and sometimes clash - with civilian cybersecurity cultures. They talk certifications, hands-on learning, the importance of meaningful tabletop exercises, and the evolving landscape as AI powers both attackers and defenders.
Whether you’re a veteran, a fresh analyst, or just passionate about cybersecurity, this honest and energetic exchange will leave you motivated to keep learning, keep growing, and keep protecting it all. So grab your energy drink and tune in for a conversation that proves everyone in cyber, no matter their path, has wisdom worth sharing.
 
Key Moments: 
05:30 Military Adventures Surpass Civilian Opportunities
07:28 Military vs. Civilian Leadership Dynamics
10:42 Clarifying Civilian vs Military Missions
12:22 Leadership: Addressing Miscommunication & Misalignment
15:45 Toxic Leadership and Military Transition
20:01 Reliance on Tools vs. Core Skills
22:29 "Forgotten Skills Fade Over Time"
25:13 Boosting Confidence in New Roles
29:42 Interactive Training and Environmental Protection
32:37 Purple Teaming Strategy Insights
36:15 Persistence in Skill Development
39:04 Soft Skills Matter for Career Growth
42:44 "Technical & Business Acumen Fusion"
44:41 Military: Career Value and Benefits
48:09 "Cyber Education for K-12"
Resources Mentioned : 
https://www.ransomware.live/

comprehensive resource that tracks and monitors ransomware groups and their activities.

https://ransomwhe.re/

tracks ransomware payments by collecting and analyzing cryptocurrency addresses associated with ransomware attacks. 

https://www.ransom-db.com/

real-time ransomware tracking platform that collects, indexes, and centralizes information on ransomware groups and their victims. 

About the Gu...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Bridging Military and Civilian Cybersecurity: Leadership, Skills, and Lifelong Learning with Christopher Ross]]>
                </itunes:title>
                                    <itunes:episode>74</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow sits down with cybersecurity leader and National Guard threat hunt team lead Christopher Ross, diving into the real-world experiences that shape careers in the intersecting worlds of IT and OT security. Chris shares his 18-year journey from joining the military with a passion for computers to leading critical infrastructure cybersecurity efforts - both in uniform and in the private sector. Together, Aaron and Chris break down myths about gatekeeping, discuss the unique challenges of military versus civilian roles, and highlight lessons learned along the way.</span></p>
<p><span style="font-weight:400;">From imposter syndrome to servant leadership, the conversation unpacks how effective communication, continuous training, and the willingness to learn from failure fuel professional growth. Chris also reflects on how military training instills risk mitigation and teamwork, and how those skills can translate - and sometimes clash - with civilian cybersecurity cultures. They talk certifications, hands-on learning, the importance of meaningful tabletop exercises, and the evolving landscape as AI powers both attackers and defenders.</span></p>
<p><span style="font-weight:400;">Whether you’re a veteran, a fresh analyst, or just passionate about cybersecurity, this honest and energetic exchange will leave you motivated to keep learning, keep growing, and keep protecting it all. So grab your energy drink and tune in for a conversation that proves everyone in cyber, no matter their path, has wisdom worth sharing.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:30 Military Adventures Surpass Civilian Opportunities</span></p>
<p><span style="font-weight:400;">07:28 Military vs. Civilian Leadership Dynamics</span></p>
<p><span style="font-weight:400;">10:42 Clarifying Civilian vs Military Missions</span></p>
<p><span style="font-weight:400;">12:22 Leadership: Addressing Miscommunication &amp; Misalignment</span></p>
<p><span style="font-weight:400;">15:45 Toxic Leadership and Military Transition</span></p>
<p><span style="font-weight:400;">20:01 Reliance on Tools vs. Core Skills</span></p>
<p><span style="font-weight:400;">22:29 "Forgotten Skills Fade Over Time"</span></p>
<p><span style="font-weight:400;">25:13 Boosting Confidence in New Roles</span></p>
<p><span style="font-weight:400;">29:42 Interactive Training and Environmental Protection</span></p>
<p><span style="font-weight:400;">32:37 Purple Teaming Strategy Insights</span></p>
<p><span style="font-weight:400;">36:15 Persistence in Skill Development</span></p>
<p><span style="font-weight:400;">39:04 Soft Skills Matter for Career Growth</span></p>
<p><span style="font-weight:400;">42:44 "Technical &amp; Business Acumen Fusion"</span></p>
<p><span style="font-weight:400;">44:41 Military: Career Value and Benefits</span></p>
<p><span style="font-weight:400;">48:09 "Cyber Education for K-12"</span></p>
<p><strong>Resources Mentioned : </strong></p>
<p><a href="https://www.ransomware.live/"><span style="font-weight:400;">https://www.ransomware.live/</span></a></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">comprehensive resource that tracks and monitors ransomware groups and their activities.</span></li>
</ul>
<p><a href="https://ransomwhe.re/"><span style="font-weight:400;">https://ransomwhe.re/</span></a></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">tracks ransomware payments by collecting and analyzing cryptocurrency addresses associated with ransomware attacks. </span></li>
</ul>
<p><a href="https://www.ransom-db.com/"><span style="font-weight:400;">https://www.ransom-db.com/</span></a></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">real-time ransomware tracking platform that collects, indexes, and centralizes information on ransomware groups and their victims. </span></li>
</ul>
<p><strong>About the Guest : </strong></p>
<p><span style="font-weight:400;">Christopher Ross is a veteran and cybersecurity leader with over 15 years of experience in Security Operations, Incident Response, and threat hunting across defense and fintech. A Chief Warrant Officer in the Army National Guard’s Cyber Brigade, he has led blue and purple team operations, translating military discipline and teamwork into enterprise cyber defense strategies.</span></p>
<p> </p>
<p><span style="font-weight:400;">In his civilian career, Christopher has built and led SOC teams, integrated MSSPs, and driven automation to strengthen detection and response capabilities at organizations including MACOM, CFGI, Draper, and Abiomed. He holds a Master of Science in Information Security Engineering from the SANS Technology Institute and more than a dozen GIAC certifications. An Order of Thor recipient from the Military Cyber Professional Association. </span></p>
<p> </p>
<p><span style="font-weight:400;">Christopher is passionate about developing playbooks, advancing training pipelines, and mentoring the next generation of defenders. Sharing lessons from his veteran-to-cyber journey, practical insights on certification paths and ROI, and real-world stories from blue-team operations and purple-team collaboration.</span></p>
<p> </p>
<p><span style="font-weight:400;">Visit  </span><a href="https://public.milcyber.org/"><span style="font-weight:400;">https://public.milcyber.org/</span></a><span style="font-weight:400;"> The Military Cyber Professionals Association is the only U.S. military professional association with cyber at its core. It connects, supports, and elevates those who serve in or support the military cyber domain, while investing in future generations through education and mentorship.</span></p>
<p><span style="font-weight:400;">Connect Christopher : <a href="https://www.linkedin.com/in/christopheraross-ma/">https://www.linkedin.com/in/christopheraross-ma/</a></span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2141173/c1e-4p03ms1xv8dcm0ngw-rk3rjjmwb2kd-fbu5ov.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2141173&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=bd4cee64c279e7a7ba0bc1804509c2505cb6bda64511d7c3f75ff0eecfad3626" length="50631707"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow sits down with cybersecurity leader and National Guard threat hunt team lead Christopher Ross, diving into the real-world experiences that shape careers in the intersecting worlds of IT and OT security. Chris shares his 18-year journey from joining the military with a passion for computers to leading critical infrastructure cybersecurity efforts - both in uniform and in the private sector. Together, Aaron and Chris break down myths about gatekeeping, discuss the unique challenges of military versus civilian roles, and highlight lessons learned along the way.
From imposter syndrome to servant leadership, the conversation unpacks how effective communication, continuous training, and the willingness to learn from failure fuel professional growth. Chris also reflects on how military training instills risk mitigation and teamwork, and how those skills can translate - and sometimes clash - with civilian cybersecurity cultures. They talk certifications, hands-on learning, the importance of meaningful tabletop exercises, and the evolving landscape as AI powers both attackers and defenders.
Whether you’re a veteran, a fresh analyst, or just passionate about cybersecurity, this honest and energetic exchange will leave you motivated to keep learning, keep growing, and keep protecting it all. So grab your energy drink and tune in for a conversation that proves everyone in cyber, no matter their path, has wisdom worth sharing.
 
Key Moments: 
05:30 Military Adventures Surpass Civilian Opportunities
07:28 Military vs. Civilian Leadership Dynamics
10:42 Clarifying Civilian vs Military Missions
12:22 Leadership: Addressing Miscommunication & Misalignment
15:45 Toxic Leadership and Military Transition
20:01 Reliance on Tools vs. Core Skills
22:29 "Forgotten Skills Fade Over Time"
25:13 Boosting Confidence in New Roles
29:42 Interactive Training and Environmental Protection
32:37 Purple Teaming Strategy Insights
36:15 Persistence in Skill Development
39:04 Soft Skills Matter for Career Growth
42:44 "Technical & Business Acumen Fusion"
44:41 Military: Career Value and Benefits
48:09 "Cyber Education for K-12"
Resources Mentioned : 
https://www.ransomware.live/

comprehensive resource that tracks and monitors ransomware groups and their activities.

https://ransomwhe.re/

tracks ransomware payments by collecting and analyzing cryptocurrency addresses associated with ransomware attacks. 

https://www.ransom-db.com/

real-time ransomware tracking platform that collects, indexes, and centralizes information on ransomware groups and their victims. 

About the Gu...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2141173/c1a-w52rp-jp357704b6mq-x8immh.jpg"></itunes:image>
                                                                            <itunes:duration>00:56:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[AI, Quantum, and Cybersecurity: Protecting Critical Infrastructure in a Digital World]]>
                </title>
                <pubDate>Mon, 08 Sep 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2133874</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by Kathryn Wang, Principal of Public Sector at SandboxAQ, for a wide-ranging and candid conversation about the critical role AI and quantum technology are playing in today's cybersecurity landscape. </span></p>
<p><span style="font-weight:400;">Kathryn and Aaron break down complex concepts like quantum cryptography and the growing risks of deepfakes, data poisoning, and behavioral warfare - all with real-world examples that hit close to home. They dig into why cryptographic resilience is now more urgent than ever, how AI can both strengthen and threaten our defenses, and why your grandma shouldn’t be left in charge of her own data security.</span></p>
<p><span style="font-weight:400;">From lessons learned in power plants and national defense to the nuances of protecting everything from nuclear codes to family recipes, this episode dives deep into how we can balance innovation with critical risk management. </span></p>
<p><span style="font-weight:400;">Kathryn shares practical advice on securing the basics, educating your network, and making smart decisions about what truly needs to be connected to AI. Whether you’re an IT, OT, or cybersecurity professional—or just trying to keep ahead of the next cyber threat - this episode will arm you with insights, strategies, and a little bit of much-needed perspective. Tune in for a mix of expert knowledge, humor, and actionable takeaways to help you protect it all.</span></p>
<p> </p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p> </p>
<p><span style="font-weight:400;">04:02 "Securing Assets in Post-Quantum Era"</span></p>
<p><span style="font-weight:400;">07:44 AI and Cybersecurity Concerns</span></p>
<p><span style="font-weight:400;">12:26 "Full-Time Job: Crafting LLM Prompts"</span></p>
<p><span style="font-weight:400;">15:28 AI Vulnerabilities Exploited at DEFCON</span></p>
<p><span style="font-weight:400;">19:30 AI Data Poisoning Concerns</span></p>
<p><span style="font-weight:400;">20:21 AI Vulnerability in Critical Infrastructure</span></p>
<p><span style="font-weight:400;">23:45 Deepfake Threats and Cybersecurity Concerns</span></p>
<p><span style="font-weight:400;">28:34 Question Everything: Trust, Verify, Repeat</span></p>
<p><span style="font-weight:400;">33:20 "Digital Systems' Security Vulnerabilities"</span></p>
<p><span style="font-weight:400;">35:12 Digital Awareness for Children</span></p>
<p><span style="font-weight:400;">39:10 "Understanding Data Privacy Risks"</span></p>
<p><span style="font-weight:400;">43:31 "Leveling Up: VCs Embrace Futurism"</span></p>
<p><span style="font-weight:400;">45:16 AI-Powered Personalized Medicine</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Kathryn Wang is a seasoned executive with over 20 years of leadership in the technology and security sectors, specializing in the fusion of cutting-edge innovations and cybersecurity strategies. </span></p>
<p> </p>
<p><span style="font-weight:400;">She currently serves as the Public Sector Principal at SandboxAQ, where she bridges advancements in post-quantum cryptography (PQC) and data protection with the mission-critical needs of government agencies. Her work focuses on equipping these organizations with a zero-trust approach to securing sensitive systems against the rapidly evolving landscape of cyber threats.</span></p>
<p> </p>
<p><span style="font-weight:400;">During her 16-year tenure at Google and its incubator Area120, Kathryn drove global efforts to develop and implement Secure by Design principles in emerging technologies, including Large Language Models (LLMs) and Generative AI.</span></p>
<p> </p>
<p><span style="font-weight:400;">How to connect Kathryn : </span></p>
<p><a href="https://www.linkedin.com/in/kathryn-wang/"><span style="font-weight:400;">https://www.linkedin.com/in/kathryn-wang/</span></a></p>
<p><br /><br /></p>
<p>&lt;...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow is joined by Kathryn Wang, Principal of Public Sector at SandboxAQ, for a wide-ranging and candid conversation about the critical role AI and quantum technology are playing in today's cybersecurity landscape. 
Kathryn and Aaron break down complex concepts like quantum cryptography and the growing risks of deepfakes, data poisoning, and behavioral warfare - all with real-world examples that hit close to home. They dig into why cryptographic resilience is now more urgent than ever, how AI can both strengthen and threaten our defenses, and why your grandma shouldn’t be left in charge of her own data security.
From lessons learned in power plants and national defense to the nuances of protecting everything from nuclear codes to family recipes, this episode dives deep into how we can balance innovation with critical risk management. 
Kathryn shares practical advice on securing the basics, educating your network, and making smart decisions about what truly needs to be connected to AI. Whether you’re an IT, OT, or cybersecurity professional—or just trying to keep ahead of the next cyber threat - this episode will arm you with insights, strategies, and a little bit of much-needed perspective. Tune in for a mix of expert knowledge, humor, and actionable takeaways to help you protect it all.
 
Key Moments: 
 
04:02 "Securing Assets in Post-Quantum Era"
07:44 AI and Cybersecurity Concerns
12:26 "Full-Time Job: Crafting LLM Prompts"
15:28 AI Vulnerabilities Exploited at DEFCON
19:30 AI Data Poisoning Concerns
20:21 AI Vulnerability in Critical Infrastructure
23:45 Deepfake Threats and Cybersecurity Concerns
28:34 Question Everything: Trust, Verify, Repeat
33:20 "Digital Systems' Security Vulnerabilities"
35:12 Digital Awareness for Children
39:10 "Understanding Data Privacy Risks"
43:31 "Leveling Up: VCs Embrace Futurism"
45:16 AI-Powered Personalized Medicine
About the guest : 
Kathryn Wang is a seasoned executive with over 20 years of leadership in the technology and security sectors, specializing in the fusion of cutting-edge innovations and cybersecurity strategies. 
 
She currently serves as the Public Sector Principal at SandboxAQ, where she bridges advancements in post-quantum cryptography (PQC) and data protection with the mission-critical needs of government agencies. Her work focuses on equipping these organizations with a zero-trust approach to securing sensitive systems against the rapidly evolving landscape of cyber threats.
 
During her 16-year tenure at Google and its incubator Area120, Kathryn drove global efforts to develop and implement Secure by Design principles in emerging technologies, including Large Language Models (LLMs) and Generative AI.
 
How to connect Kathryn : 
https://www.linkedin.com/in/kathryn-wang/

<...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[AI, Quantum, and Cybersecurity: Protecting Critical Infrastructure in a Digital World]]>
                </itunes:title>
                                    <itunes:episode>73</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by Kathryn Wang, Principal of Public Sector at SandboxAQ, for a wide-ranging and candid conversation about the critical role AI and quantum technology are playing in today's cybersecurity landscape. </span></p>
<p><span style="font-weight:400;">Kathryn and Aaron break down complex concepts like quantum cryptography and the growing risks of deepfakes, data poisoning, and behavioral warfare - all with real-world examples that hit close to home. They dig into why cryptographic resilience is now more urgent than ever, how AI can both strengthen and threaten our defenses, and why your grandma shouldn’t be left in charge of her own data security.</span></p>
<p><span style="font-weight:400;">From lessons learned in power plants and national defense to the nuances of protecting everything from nuclear codes to family recipes, this episode dives deep into how we can balance innovation with critical risk management. </span></p>
<p><span style="font-weight:400;">Kathryn shares practical advice on securing the basics, educating your network, and making smart decisions about what truly needs to be connected to AI. Whether you’re an IT, OT, or cybersecurity professional—or just trying to keep ahead of the next cyber threat - this episode will arm you with insights, strategies, and a little bit of much-needed perspective. Tune in for a mix of expert knowledge, humor, and actionable takeaways to help you protect it all.</span></p>
<p> </p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p> </p>
<p><span style="font-weight:400;">04:02 "Securing Assets in Post-Quantum Era"</span></p>
<p><span style="font-weight:400;">07:44 AI and Cybersecurity Concerns</span></p>
<p><span style="font-weight:400;">12:26 "Full-Time Job: Crafting LLM Prompts"</span></p>
<p><span style="font-weight:400;">15:28 AI Vulnerabilities Exploited at DEFCON</span></p>
<p><span style="font-weight:400;">19:30 AI Data Poisoning Concerns</span></p>
<p><span style="font-weight:400;">20:21 AI Vulnerability in Critical Infrastructure</span></p>
<p><span style="font-weight:400;">23:45 Deepfake Threats and Cybersecurity Concerns</span></p>
<p><span style="font-weight:400;">28:34 Question Everything: Trust, Verify, Repeat</span></p>
<p><span style="font-weight:400;">33:20 "Digital Systems' Security Vulnerabilities"</span></p>
<p><span style="font-weight:400;">35:12 Digital Awareness for Children</span></p>
<p><span style="font-weight:400;">39:10 "Understanding Data Privacy Risks"</span></p>
<p><span style="font-weight:400;">43:31 "Leveling Up: VCs Embrace Futurism"</span></p>
<p><span style="font-weight:400;">45:16 AI-Powered Personalized Medicine</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Kathryn Wang is a seasoned executive with over 20 years of leadership in the technology and security sectors, specializing in the fusion of cutting-edge innovations and cybersecurity strategies. </span></p>
<p> </p>
<p><span style="font-weight:400;">She currently serves as the Public Sector Principal at SandboxAQ, where she bridges advancements in post-quantum cryptography (PQC) and data protection with the mission-critical needs of government agencies. Her work focuses on equipping these organizations with a zero-trust approach to securing sensitive systems against the rapidly evolving landscape of cyber threats.</span></p>
<p> </p>
<p><span style="font-weight:400;">During her 16-year tenure at Google and its incubator Area120, Kathryn drove global efforts to develop and implement Secure by Design principles in emerging technologies, including Large Language Models (LLMs) and Generative AI.</span></p>
<p> </p>
<p><span style="font-weight:400;">How to connect Kathryn : </span></p>
<p><a href="https://www.linkedin.com/in/kathryn-wang/"><span style="font-weight:400;">https://www.linkedin.com/in/kathryn-wang/</span></a></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2133874/c1e-m257wuq1dm1fxdjmz-mkj5rx9psj42-lgnhuk.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2133874&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=0b1e298dbdc14c73efe9d32d0188bff8d60cfe0dc33d4d119af3ecd7aa034f6a" length="49650419"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow is joined by Kathryn Wang, Principal of Public Sector at SandboxAQ, for a wide-ranging and candid conversation about the critical role AI and quantum technology are playing in today's cybersecurity landscape. 
Kathryn and Aaron break down complex concepts like quantum cryptography and the growing risks of deepfakes, data poisoning, and behavioral warfare - all with real-world examples that hit close to home. They dig into why cryptographic resilience is now more urgent than ever, how AI can both strengthen and threaten our defenses, and why your grandma shouldn’t be left in charge of her own data security.
From lessons learned in power plants and national defense to the nuances of protecting everything from nuclear codes to family recipes, this episode dives deep into how we can balance innovation with critical risk management. 
Kathryn shares practical advice on securing the basics, educating your network, and making smart decisions about what truly needs to be connected to AI. Whether you’re an IT, OT, or cybersecurity professional—or just trying to keep ahead of the next cyber threat - this episode will arm you with insights, strategies, and a little bit of much-needed perspective. Tune in for a mix of expert knowledge, humor, and actionable takeaways to help you protect it all.
 
Key Moments: 
 
04:02 "Securing Assets in Post-Quantum Era"
07:44 AI and Cybersecurity Concerns
12:26 "Full-Time Job: Crafting LLM Prompts"
15:28 AI Vulnerabilities Exploited at DEFCON
19:30 AI Data Poisoning Concerns
20:21 AI Vulnerability in Critical Infrastructure
23:45 Deepfake Threats and Cybersecurity Concerns
28:34 Question Everything: Trust, Verify, Repeat
33:20 "Digital Systems' Security Vulnerabilities"
35:12 Digital Awareness for Children
39:10 "Understanding Data Privacy Risks"
43:31 "Leveling Up: VCs Embrace Futurism"
45:16 AI-Powered Personalized Medicine
About the guest : 
Kathryn Wang is a seasoned executive with over 20 years of leadership in the technology and security sectors, specializing in the fusion of cutting-edge innovations and cybersecurity strategies. 
 
She currently serves as the Public Sector Principal at SandboxAQ, where she bridges advancements in post-quantum cryptography (PQC) and data protection with the mission-critical needs of government agencies. Her work focuses on equipping these organizations with a zero-trust approach to securing sensitive systems against the rapidly evolving landscape of cyber threats.
 
During her 16-year tenure at Google and its incubator Area120, Kathryn drove global efforts to develop and implement Secure by Design principles in emerging technologies, including Large Language Models (LLMs) and Generative AI.
 
How to connect Kathryn : 
https://www.linkedin.com/in/kathryn-wang/

<...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2133874/c1a-w52rp-z3k8nd10ig4-uzgios.jpg"></itunes:image>
                                                                            <itunes:duration>00:57:17</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Bridging IT and OT Cybersecurity: Lessons from the Field with Patrick Gillespie]]>
                </title>
                <pubDate>Mon, 01 Sep 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2128373</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Welcome to another episode of Protect It All, where we dive deep into the world of IT and OT cybersecurity! In this episode, host Aaron Crow sits down with Patrick Gillespie, OT Practice Director at GuidePoint Security, for a candid conversation that's as insightful as it is relatable. Patrick, whose journey has taken him from working in manufacturing and building freight trains to leading OT security initiatives, shares real-world stories about the challenges and realities of protecting operational technology. </span></p>
<p><span style="font-weight:400;">Together, Aaron and Patrick discuss the blurred lines between IT and OT, the importance of understanding business priorities in security, and why collaboration rather than heavy-handed mandates makes all the difference in securing critical infrastructure. </span></p>
<p><span style="font-weight:400;">Whether you’re a seasoned professional or just getting started in cyber, you’ll come away with practical insights on risk management, building trust with operations teams, and the vital role of mentorship in developing the next generation of OT security experts. </span></p>
<p><span style="font-weight:400;">Stay tuned for a grounded, actionable conversation that reminds us all: when it comes to securing the intersection of IT and OT, it’s about more than just technology -it’s about people, process, and the bigger business picture.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:53 IT and OT System Confusion</span></p>
<p><span style="font-weight:400;">07:43 Implementing Fortigate and Managing Risks</span></p>
<p><span style="font-weight:400;">11:21 Outdated Systems and Patch Challenges</span></p>
<p><span style="font-weight:400;">15:43 Comprehensive Onsite Assessment Toolkit</span></p>
<p><span style="font-weight:400;">17:56 AI or Traditional? Balancing Approaches</span></p>
<p><span style="font-weight:400;">21:16 "Securing OT: Remote Access and Training"</span></p>
<p><span style="font-weight:400;">25:47 Cybersecurity Skill Growth Forecast</span></p>
<p><span style="font-weight:400;">26:38 "Mentorship in Cybersecurity Careers"</span></p>
<p><span style="font-weight:400;">30:22 Understanding Your Network Setup</span></p>
<p><span style="font-weight:400;">35:39 Balancing Security and Accessibility</span></p>
<p><span style="font-weight:400;">36:09 Leveraging Operational Team Buy-In</span></p>
<p><span style="font-weight:400;">39:27 IT Budget Prioritization for OT Needs</span></p>
<p><span style="font-weight:400;">42:44 Challenges in OT Security Adoption</span></p>
<p><span style="font-weight:400;">46:56 Tech Growth &amp; Infrastructure Expansion</span></p>
<p><strong>About the Guest : </strong></p>
<p><strong>Patrick Gillespie</strong><span style="font-weight:400;"> has spent over 15 years immersed in the world of cybersecurity, with the last three and a half years serving as the OT Practice Director at GuidePoint, a leading value-added reseller specializing in cybersecurity products. </span></p>
<p><span style="font-weight:400;">At GuidePoint, Patrick leads a dedicated team of OT engineers focused on securing both operational technology (OT) environments and the rapidly growing array of IoT devices. Recognizing that clients often CISOs may not directly own OT assets or remediation processes, Patrick excels at bridging the gap between IT security leaders and their operational counterparts, such as plant managers and controls engineers. </span></p>
<p><span style="font-weight:400;">Through his work, Patrick guides organizations to understand and address the unique challenges of OT security, helping them build collaboration across teams to strengthen their overall cyber defenses.</span></p>
<p><strong>How to connect Patrick : </strong></p>
<p><span style="font-weight:400;">GuidePoint Security University: </span><a href="https://www.guidepointsecurity.com/gpsu/"><span style="font-weight:400;">https://www.guidep...</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Welcome to another episode of Protect It All, where we dive deep into the world of IT and OT cybersecurity! In this episode, host Aaron Crow sits down with Patrick Gillespie, OT Practice Director at GuidePoint Security, for a candid conversation that's as insightful as it is relatable. Patrick, whose journey has taken him from working in manufacturing and building freight trains to leading OT security initiatives, shares real-world stories about the challenges and realities of protecting operational technology. 
Together, Aaron and Patrick discuss the blurred lines between IT and OT, the importance of understanding business priorities in security, and why collaboration rather than heavy-handed mandates makes all the difference in securing critical infrastructure. 
Whether you’re a seasoned professional or just getting started in cyber, you’ll come away with practical insights on risk management, building trust with operations teams, and the vital role of mentorship in developing the next generation of OT security experts. 
Stay tuned for a grounded, actionable conversation that reminds us all: when it comes to securing the intersection of IT and OT, it’s about more than just technology -it’s about people, process, and the bigger business picture.
Key Moments: 
05:53 IT and OT System Confusion
07:43 Implementing Fortigate and Managing Risks
11:21 Outdated Systems and Patch Challenges
15:43 Comprehensive Onsite Assessment Toolkit
17:56 AI or Traditional? Balancing Approaches
21:16 "Securing OT: Remote Access and Training"
25:47 Cybersecurity Skill Growth Forecast
26:38 "Mentorship in Cybersecurity Careers"
30:22 Understanding Your Network Setup
35:39 Balancing Security and Accessibility
36:09 Leveraging Operational Team Buy-In
39:27 IT Budget Prioritization for OT Needs
42:44 Challenges in OT Security Adoption
46:56 Tech Growth & Infrastructure Expansion
About the Guest : 
Patrick Gillespie has spent over 15 years immersed in the world of cybersecurity, with the last three and a half years serving as the OT Practice Director at GuidePoint, a leading value-added reseller specializing in cybersecurity products. 
At GuidePoint, Patrick leads a dedicated team of OT engineers focused on securing both operational technology (OT) environments and the rapidly growing array of IoT devices. Recognizing that clients often CISOs may not directly own OT assets or remediation processes, Patrick excels at bridging the gap between IT security leaders and their operational counterparts, such as plant managers and controls engineers. 
Through his work, Patrick guides organizations to understand and address the unique challenges of OT security, helping them build collaboration across teams to strengthen their overall cyber defenses.
How to connect Patrick : 
GuidePoint Security University: https://www.guidep...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Bridging IT and OT Cybersecurity: Lessons from the Field with Patrick Gillespie]]>
                </itunes:title>
                                    <itunes:episode>72</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Welcome to another episode of Protect It All, where we dive deep into the world of IT and OT cybersecurity! In this episode, host Aaron Crow sits down with Patrick Gillespie, OT Practice Director at GuidePoint Security, for a candid conversation that's as insightful as it is relatable. Patrick, whose journey has taken him from working in manufacturing and building freight trains to leading OT security initiatives, shares real-world stories about the challenges and realities of protecting operational technology. </span></p>
<p><span style="font-weight:400;">Together, Aaron and Patrick discuss the blurred lines between IT and OT, the importance of understanding business priorities in security, and why collaboration rather than heavy-handed mandates makes all the difference in securing critical infrastructure. </span></p>
<p><span style="font-weight:400;">Whether you’re a seasoned professional or just getting started in cyber, you’ll come away with practical insights on risk management, building trust with operations teams, and the vital role of mentorship in developing the next generation of OT security experts. </span></p>
<p><span style="font-weight:400;">Stay tuned for a grounded, actionable conversation that reminds us all: when it comes to securing the intersection of IT and OT, it’s about more than just technology -it’s about people, process, and the bigger business picture.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:53 IT and OT System Confusion</span></p>
<p><span style="font-weight:400;">07:43 Implementing Fortigate and Managing Risks</span></p>
<p><span style="font-weight:400;">11:21 Outdated Systems and Patch Challenges</span></p>
<p><span style="font-weight:400;">15:43 Comprehensive Onsite Assessment Toolkit</span></p>
<p><span style="font-weight:400;">17:56 AI or Traditional? Balancing Approaches</span></p>
<p><span style="font-weight:400;">21:16 "Securing OT: Remote Access and Training"</span></p>
<p><span style="font-weight:400;">25:47 Cybersecurity Skill Growth Forecast</span></p>
<p><span style="font-weight:400;">26:38 "Mentorship in Cybersecurity Careers"</span></p>
<p><span style="font-weight:400;">30:22 Understanding Your Network Setup</span></p>
<p><span style="font-weight:400;">35:39 Balancing Security and Accessibility</span></p>
<p><span style="font-weight:400;">36:09 Leveraging Operational Team Buy-In</span></p>
<p><span style="font-weight:400;">39:27 IT Budget Prioritization for OT Needs</span></p>
<p><span style="font-weight:400;">42:44 Challenges in OT Security Adoption</span></p>
<p><span style="font-weight:400;">46:56 Tech Growth &amp; Infrastructure Expansion</span></p>
<p><strong>About the Guest : </strong></p>
<p><strong>Patrick Gillespie</strong><span style="font-weight:400;"> has spent over 15 years immersed in the world of cybersecurity, with the last three and a half years serving as the OT Practice Director at GuidePoint, a leading value-added reseller specializing in cybersecurity products. </span></p>
<p><span style="font-weight:400;">At GuidePoint, Patrick leads a dedicated team of OT engineers focused on securing both operational technology (OT) environments and the rapidly growing array of IoT devices. Recognizing that clients often CISOs may not directly own OT assets or remediation processes, Patrick excels at bridging the gap between IT security leaders and their operational counterparts, such as plant managers and controls engineers. </span></p>
<p><span style="font-weight:400;">Through his work, Patrick guides organizations to understand and address the unique challenges of OT security, helping them build collaboration across teams to strengthen their overall cyber defenses.</span></p>
<p><strong>How to connect Patrick : </strong></p>
<p><span style="font-weight:400;">GuidePoint Security University: </span><a href="https://www.guidepointsecurity.com/gpsu/"><span style="font-weight:400;">https://www.guidepointsecurity.com/gpsu/</span></a></p>
<p><span style="font-weight:400;">MilMentor: </span><a href="https://www.milmentor.com/"><span style="font-weight:400;">https://www.milmentor.com/</span></a></p>
<p><span style="font-weight:400;">Linkedin:  </span><a href="https://www.linkedin.com/in/cpgillespie/"><span style="font-weight:400;">https://www.linkedin.com/in/cpgillespie/</span></a></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2128373/c1e-7wg0xh9mdq4cqwqnz-7z9o1d96cv62-x325xt.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2128373&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=08c65904f8c001b910addd28f17e80ad5cccf49c7559b7fd190229db9ab6175c" length="46157250"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Welcome to another episode of Protect It All, where we dive deep into the world of IT and OT cybersecurity! In this episode, host Aaron Crow sits down with Patrick Gillespie, OT Practice Director at GuidePoint Security, for a candid conversation that's as insightful as it is relatable. Patrick, whose journey has taken him from working in manufacturing and building freight trains to leading OT security initiatives, shares real-world stories about the challenges and realities of protecting operational technology. 
Together, Aaron and Patrick discuss the blurred lines between IT and OT, the importance of understanding business priorities in security, and why collaboration rather than heavy-handed mandates makes all the difference in securing critical infrastructure. 
Whether you’re a seasoned professional or just getting started in cyber, you’ll come away with practical insights on risk management, building trust with operations teams, and the vital role of mentorship in developing the next generation of OT security experts. 
Stay tuned for a grounded, actionable conversation that reminds us all: when it comes to securing the intersection of IT and OT, it’s about more than just technology -it’s about people, process, and the bigger business picture.
Key Moments: 
05:53 IT and OT System Confusion
07:43 Implementing Fortigate and Managing Risks
11:21 Outdated Systems and Patch Challenges
15:43 Comprehensive Onsite Assessment Toolkit
17:56 AI or Traditional? Balancing Approaches
21:16 "Securing OT: Remote Access and Training"
25:47 Cybersecurity Skill Growth Forecast
26:38 "Mentorship in Cybersecurity Careers"
30:22 Understanding Your Network Setup
35:39 Balancing Security and Accessibility
36:09 Leveraging Operational Team Buy-In
39:27 IT Budget Prioritization for OT Needs
42:44 Challenges in OT Security Adoption
46:56 Tech Growth & Infrastructure Expansion
About the Guest : 
Patrick Gillespie has spent over 15 years immersed in the world of cybersecurity, with the last three and a half years serving as the OT Practice Director at GuidePoint, a leading value-added reseller specializing in cybersecurity products. 
At GuidePoint, Patrick leads a dedicated team of OT engineers focused on securing both operational technology (OT) environments and the rapidly growing array of IoT devices. Recognizing that clients often CISOs may not directly own OT assets or remediation processes, Patrick excels at bridging the gap between IT security leaders and their operational counterparts, such as plant managers and controls engineers. 
Through his work, Patrick guides organizations to understand and address the unique challenges of OT security, helping them build collaboration across teams to strengthen their overall cyber defenses.
How to connect Patrick : 
GuidePoint Security University: https://www.guidep...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2128373/c1a-w52rp-1p5w985ma405-rnhtlb.jpg"></itunes:image>
                                                                            <itunes:duration>00:48:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Lessons From 34 Years in OT Cybersecurity: Growth, Challenges, and Leading Change with Scott Rosenberger]]>
                </title>
                <pubDate>Mon, 25 Aug 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2121192</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow sits down with longtime friend and colleague Scott Rosenberger, the cybersecurity leader for Vistra Corporation’s generation fleet. Together, they take a deep dive into Scott’s fascinating journey from an engineering background in nuclear power to overseeing cybersecurity across a sprawling, nationwide utility portfolio.</span></p>
<p><span style="font-weight:400;">You’ll hear insightful stories from the early days of OT cybersecurity - before most of today’s tools even existed - and how foundational principles like alignment, engagement, and standardization have driven years of progress. </span></p>
<p><span style="font-weight:400;">Scott and Aaron reflect on the importance of building cross-disciplinary teams, developing strong communication strategies, and embracing the reality that real security is about continuous improvement, collaboration, and sometimes learning from mistakes.</span></p>
<p><span style="font-weight:400;">From tales of rolling out firewalls at power plants and negotiating with skeptical vendors, to lessons in leadership, trust-building, and the ever-evolving challenges of protecting critical infrastructure, this episode is packed with practical wisdom, industry anecdotes, and a look at what’s coming over the cybersecurity horizon. Whether you’re just entering the field or a seasoned pro, grab your headphones - you won’t want to miss this candid, insightful conversation.</span></p>
<p><strong>Key Moments:</strong><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">04:37 Bridging IT and Cybersecurity</span></p>
<p><span style="font-weight:400;">08:40 Revolutionizing Program Development Together</span></p>
<p><span style="font-weight:400;">10:08 Building Consensus Through Communication</span></p>
<p><span style="font-weight:400;">12:33 "Business Insights and NERC SIP Evolution"</span></p>
<p><span style="font-weight:400;">17:18 Utility's Major Implementation Challenge</span></p>
<p><span style="font-weight:400;">20:08 Corporate Cybersecurity Challenges Uncovered</span></p>
<p><span style="font-weight:400;">21:58 "Automated Inventory and Cybersecurity Insight"</span></p>
<p><span style="font-weight:400;">27:21 Optimizing Cybersecurity and Metrics</span></p>
<p><span style="font-weight:400;">30:56 Essential Infrastructure Basics Lacking</span></p>
<p><span style="font-weight:400;">34:17 "Identifying and Resolving Hidden Issues"</span></p>
<p><span style="font-weight:400;">37:21 Encouraging Change in Industrial Practices</span></p>
<p><span style="font-weight:400;">42:11 "Finding the Right Team Mindset"</span></p>
<p><span style="font-weight:400;">46:11 "Importance of Pre-Job Briefs"</span></p>
<p><span style="font-weight:400;">About the guest: </span></p>
<p><span style="font-weight:400;">Scott Rosenberger is currently the manager of Operational Technology for Luminant.  He developed the Luminant program to address the reliability, security and ongoing maintenance of Operational Technology for Luminant’s Fossil Generation Fleet.  He has a Bachelor of Engineering from Stevens Institute of Technology and is a registered professional Engineer in Texas.  In his 23+ years with Luminant he has worked in nuclear and fossil plants, many corporate roles and for 3 years as Director of IT Security and Compliance.  Scott also spent 3 years as a member of the NERC CIP drafting team.</span></p>
<p><span style="font-weight:400;">Links to connect Scott: </span></p>
<p><a href="https://www.linkedin.com/in/scottrosenberger/"><span style="font-weight:400;">https://www.linkedin.com/in/scottrosenberger/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;"></span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow sits down with longtime friend and colleague Scott Rosenberger, the cybersecurity leader for Vistra Corporation’s generation fleet. Together, they take a deep dive into Scott’s fascinating journey from an engineering background in nuclear power to overseeing cybersecurity across a sprawling, nationwide utility portfolio.
You’ll hear insightful stories from the early days of OT cybersecurity - before most of today’s tools even existed - and how foundational principles like alignment, engagement, and standardization have driven years of progress. 
Scott and Aaron reflect on the importance of building cross-disciplinary teams, developing strong communication strategies, and embracing the reality that real security is about continuous improvement, collaboration, and sometimes learning from mistakes.
From tales of rolling out firewalls at power plants and negotiating with skeptical vendors, to lessons in leadership, trust-building, and the ever-evolving challenges of protecting critical infrastructure, this episode is packed with practical wisdom, industry anecdotes, and a look at what’s coming over the cybersecurity horizon. Whether you’re just entering the field or a seasoned pro, grab your headphones - you won’t want to miss this candid, insightful conversation.
Key Moments: 
04:37 Bridging IT and Cybersecurity
08:40 Revolutionizing Program Development Together
10:08 Building Consensus Through Communication
12:33 "Business Insights and NERC SIP Evolution"
17:18 Utility's Major Implementation Challenge
20:08 Corporate Cybersecurity Challenges Uncovered
21:58 "Automated Inventory and Cybersecurity Insight"
27:21 Optimizing Cybersecurity and Metrics
30:56 Essential Infrastructure Basics Lacking
34:17 "Identifying and Resolving Hidden Issues"
37:21 Encouraging Change in Industrial Practices
42:11 "Finding the Right Team Mindset"
46:11 "Importance of Pre-Job Briefs"
About the guest: 
Scott Rosenberger is currently the manager of Operational Technology for Luminant.  He developed the Luminant program to address the reliability, security and ongoing maintenance of Operational Technology for Luminant’s Fossil Generation Fleet.  He has a Bachelor of Engineering from Stevens Institute of Technology and is a registered professional Engineer in Texas.  In his 23+ years with Luminant he has worked in nuclear and fossil plants, many corporate roles and for 3 years as Director of IT Security and Compliance.  Scott also spent 3 years as a member of the NERC CIP drafting team.
Links to connect Scott: 
https://www.linkedin.com/in/scottrosenberger/
Connect With Aaron Crow:

Website: www.corvosec.com 
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Lessons From 34 Years in OT Cybersecurity: Growth, Challenges, and Leading Change with Scott Rosenberger]]>
                </itunes:title>
                                    <itunes:episode>71</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow sits down with longtime friend and colleague Scott Rosenberger, the cybersecurity leader for Vistra Corporation’s generation fleet. Together, they take a deep dive into Scott’s fascinating journey from an engineering background in nuclear power to overseeing cybersecurity across a sprawling, nationwide utility portfolio.</span></p>
<p><span style="font-weight:400;">You’ll hear insightful stories from the early days of OT cybersecurity - before most of today’s tools even existed - and how foundational principles like alignment, engagement, and standardization have driven years of progress. </span></p>
<p><span style="font-weight:400;">Scott and Aaron reflect on the importance of building cross-disciplinary teams, developing strong communication strategies, and embracing the reality that real security is about continuous improvement, collaboration, and sometimes learning from mistakes.</span></p>
<p><span style="font-weight:400;">From tales of rolling out firewalls at power plants and negotiating with skeptical vendors, to lessons in leadership, trust-building, and the ever-evolving challenges of protecting critical infrastructure, this episode is packed with practical wisdom, industry anecdotes, and a look at what’s coming over the cybersecurity horizon. Whether you’re just entering the field or a seasoned pro, grab your headphones - you won’t want to miss this candid, insightful conversation.</span></p>
<p><strong>Key Moments:</strong><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">04:37 Bridging IT and Cybersecurity</span></p>
<p><span style="font-weight:400;">08:40 Revolutionizing Program Development Together</span></p>
<p><span style="font-weight:400;">10:08 Building Consensus Through Communication</span></p>
<p><span style="font-weight:400;">12:33 "Business Insights and NERC SIP Evolution"</span></p>
<p><span style="font-weight:400;">17:18 Utility's Major Implementation Challenge</span></p>
<p><span style="font-weight:400;">20:08 Corporate Cybersecurity Challenges Uncovered</span></p>
<p><span style="font-weight:400;">21:58 "Automated Inventory and Cybersecurity Insight"</span></p>
<p><span style="font-weight:400;">27:21 Optimizing Cybersecurity and Metrics</span></p>
<p><span style="font-weight:400;">30:56 Essential Infrastructure Basics Lacking</span></p>
<p><span style="font-weight:400;">34:17 "Identifying and Resolving Hidden Issues"</span></p>
<p><span style="font-weight:400;">37:21 Encouraging Change in Industrial Practices</span></p>
<p><span style="font-weight:400;">42:11 "Finding the Right Team Mindset"</span></p>
<p><span style="font-weight:400;">46:11 "Importance of Pre-Job Briefs"</span></p>
<p><span style="font-weight:400;">About the guest: </span></p>
<p><span style="font-weight:400;">Scott Rosenberger is currently the manager of Operational Technology for Luminant.  He developed the Luminant program to address the reliability, security and ongoing maintenance of Operational Technology for Luminant’s Fossil Generation Fleet.  He has a Bachelor of Engineering from Stevens Institute of Technology and is a registered professional Engineer in Texas.  In his 23+ years with Luminant he has worked in nuclear and fossil plants, many corporate roles and for 3 years as Director of IT Security and Compliance.  Scott also spent 3 years as a member of the NERC CIP drafting team.</span></p>
<p><span style="font-weight:400;">Links to connect Scott: </span></p>
<p><a href="https://www.linkedin.com/in/scottrosenberger/"><span style="font-weight:400;">https://www.linkedin.com/in/scottrosenberger/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2121192/c1e-64mrqaon96gh5ord7-xx40855mbr5r-rl5yvb.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2121192&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=4f20a9248cf001a88eb43cbdde1e53dbe96f8b79e2d041e22f2d2e2f2c73cdb4" length="53617456"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow sits down with longtime friend and colleague Scott Rosenberger, the cybersecurity leader for Vistra Corporation’s generation fleet. Together, they take a deep dive into Scott’s fascinating journey from an engineering background in nuclear power to overseeing cybersecurity across a sprawling, nationwide utility portfolio.
You’ll hear insightful stories from the early days of OT cybersecurity - before most of today’s tools even existed - and how foundational principles like alignment, engagement, and standardization have driven years of progress. 
Scott and Aaron reflect on the importance of building cross-disciplinary teams, developing strong communication strategies, and embracing the reality that real security is about continuous improvement, collaboration, and sometimes learning from mistakes.
From tales of rolling out firewalls at power plants and negotiating with skeptical vendors, to lessons in leadership, trust-building, and the ever-evolving challenges of protecting critical infrastructure, this episode is packed with practical wisdom, industry anecdotes, and a look at what’s coming over the cybersecurity horizon. Whether you’re just entering the field or a seasoned pro, grab your headphones - you won’t want to miss this candid, insightful conversation.
Key Moments: 
04:37 Bridging IT and Cybersecurity
08:40 Revolutionizing Program Development Together
10:08 Building Consensus Through Communication
12:33 "Business Insights and NERC SIP Evolution"
17:18 Utility's Major Implementation Challenge
20:08 Corporate Cybersecurity Challenges Uncovered
21:58 "Automated Inventory and Cybersecurity Insight"
27:21 Optimizing Cybersecurity and Metrics
30:56 Essential Infrastructure Basics Lacking
34:17 "Identifying and Resolving Hidden Issues"
37:21 Encouraging Change in Industrial Practices
42:11 "Finding the Right Team Mindset"
46:11 "Importance of Pre-Job Briefs"
About the guest: 
Scott Rosenberger is currently the manager of Operational Technology for Luminant.  He developed the Luminant program to address the reliability, security and ongoing maintenance of Operational Technology for Luminant’s Fossil Generation Fleet.  He has a Bachelor of Engineering from Stevens Institute of Technology and is a registered professional Engineer in Texas.  In his 23+ years with Luminant he has worked in nuclear and fossil plants, many corporate roles and for 3 years as Director of IT Security and Compliance.  Scott also spent 3 years as a member of the NERC CIP drafting team.
Links to connect Scott: 
https://www.linkedin.com/in/scottrosenberger/
Connect With Aaron Crow:

Website: www.corvosec.com 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2121192/c1a-w52rp-v649z0zrcr1-q0mzai.jpg"></itunes:image>
                                                                            <itunes:duration>00:55:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Reflections from Black Hat and DEFCON: Trends, Community Energy, and the Future of OT Cybersecurity]]>
                </title>
                <pubDate>Mon, 11 Aug 2025 15:32:19 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2109675</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, Aaron returns from an action-packed week at Black Hat and DEFCON in the sweltering heat of Las Vegas. He shares his firsthand impressions on the changing atmosphere of these legendary conferences, from skyrocketing prices to a slightly thinner crowd, and digs into hot topics like the surge in AI discussions and the ongoing clash of perspectives between IT and OT professionals. </span></p>
<p><span style="font-weight:400;">Aaron also highlights the unmatched energy and camaraderie in the DEFCON villages—especially the ICS Village—and offers a sneak peek at exciting upcoming events, such as ResetCon and Lone Star Cyber Shootout. </span></p>
<p><span style="font-weight:400;">Whether you’re a conference veteran or just OT-curious, this episode is packed with personal stories, industry trends, and tips for making the most out of these must-attend cybersecurity gatherings. Tune in and get ready to protect it all!</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Aaron returns from an action-packed week at Black Hat and DEFCON in the sweltering heat of Las Vegas. He shares his firsthand impressions on the changing atmosphere of these legendary conferences, from skyrocketing prices to a slightly thinner crowd, and digs into hot topics like the surge in AI discussions and the ongoing clash of perspectives between IT and OT professionals. 
Aaron also highlights the unmatched energy and camaraderie in the DEFCON villages—especially the ICS Village—and offers a sneak peek at exciting upcoming events, such as ResetCon and Lone Star Cyber Shootout. 
Whether you’re a conference veteran or just OT-curious, this episode is packed with personal stories, industry trends, and tips for making the most out of these must-attend cybersecurity gatherings. Tune in and get ready to protect it all!
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Reflections from Black Hat and DEFCON: Trends, Community Energy, and the Future of OT Cybersecurity]]>
                </itunes:title>
                                    <itunes:episode>70</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, Aaron returns from an action-packed week at Black Hat and DEFCON in the sweltering heat of Las Vegas. He shares his firsthand impressions on the changing atmosphere of these legendary conferences, from skyrocketing prices to a slightly thinner crowd, and digs into hot topics like the surge in AI discussions and the ongoing clash of perspectives between IT and OT professionals. </span></p>
<p><span style="font-weight:400;">Aaron also highlights the unmatched energy and camaraderie in the DEFCON villages—especially the ICS Village—and offers a sneak peek at exciting upcoming events, such as ResetCon and Lone Star Cyber Shootout. </span></p>
<p><span style="font-weight:400;">Whether you’re a conference veteran or just OT-curious, this episode is packed with personal stories, industry trends, and tips for making the most out of these must-attend cybersecurity gatherings. Tune in and get ready to protect it all!</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2109675/c1e-1q3v7i50163u4m1ox-6z3z76n0s6ow-d93dxd.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2109675&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=cbb1788e4e048fce030f69a846170389393c1ac4bc845e7db32976b0d7052272" length="16236866"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Aaron returns from an action-packed week at Black Hat and DEFCON in the sweltering heat of Las Vegas. He shares his firsthand impressions on the changing atmosphere of these legendary conferences, from skyrocketing prices to a slightly thinner crowd, and digs into hot topics like the surge in AI discussions and the ongoing clash of perspectives between IT and OT professionals. 
Aaron also highlights the unmatched energy and camaraderie in the DEFCON villages—especially the ICS Village—and offers a sneak peek at exciting upcoming events, such as ResetCon and Lone Star Cyber Shootout. 
Whether you’re a conference veteran or just OT-curious, this episode is packed with personal stories, industry trends, and tips for making the most out of these must-attend cybersecurity gatherings. Tune in and get ready to protect it all!
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2109675/c1a-w52rp-9jqjv61ja463-ot2sge.jpg"></itunes:image>
                                                                            <itunes:duration>00:14:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Maximize the ROI at Cybersecurity Conferences]]>
                </title>
                <pubDate>Mon, 04 Aug 2025 12:26:37 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2103893</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Welcome back to Protect It All, the podcast where host Aaron Crow goes beyond the basics of OT to explore the dynamic intersection of IT and OT cybersecurity. In this episode, Aaron takes us inside a hacker summer camp in Las Vegas - home to industry giants Black Hat and DEFCON, where tens of thousands of security professionals gather each year. </span></p>
<p><span style="font-weight:400;">Drawing from his years of experience attending these events, Aaron unpacks the good, the bad, and the ugly of the conference circuit: from the value of in-person networking and the buzz of vendor events, to the challenges of ROI, overwhelming hype, and the evolving role of sponsors.</span></p>
<p><span style="font-weight:400;">Plus, he shares hard-won tips for making the most of Vegas - including how to find your tribe, engage meaningfully with vendors, and stay cool (literally and figuratively) amidst the chaos. </span></p>
<p><span style="font-weight:400;">Whether you’re a first-timer or a seasoned attendee, this episode is packed with honest insights and actionable advice to help you navigate the ever-evolving world of cybersecurity conferences.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">03:05 Networking’s Importance in Vegas</span></p>
<p><span style="font-weight:400;">08:29 Evaluating Black Hat Conference ROI</span></p>
<p><span style="font-weight:400;">12:17 "CISOs' Discreet Presence at Vendor Events"</span></p>
<p><span style="font-weight:400;">13:22 Buzzword Overload at Conferences</span></p>
<p><span style="font-weight:400;">18:40 Relationship-Driven Sales Strategy</span></p>
<p><span style="font-weight:400;">21:02 Balancing Conference Costs and Value</span></p>
<p><span style="font-weight:400;">25:44 "Prioritize Genuine Leads Only"</span></p>
<p><span style="font-weight:400;">27:05 Enhancing Cybersecurity Events</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.a...</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Welcome back to Protect It All, the podcast where host Aaron Crow goes beyond the basics of OT to explore the dynamic intersection of IT and OT cybersecurity. In this episode, Aaron takes us inside a hacker summer camp in Las Vegas - home to industry giants Black Hat and DEFCON, where tens of thousands of security professionals gather each year. 
Drawing from his years of experience attending these events, Aaron unpacks the good, the bad, and the ugly of the conference circuit: from the value of in-person networking and the buzz of vendor events, to the challenges of ROI, overwhelming hype, and the evolving role of sponsors.
Plus, he shares hard-won tips for making the most of Vegas - including how to find your tribe, engage meaningfully with vendors, and stay cool (literally and figuratively) amidst the chaos. 
Whether you’re a first-timer or a seasoned attendee, this episode is packed with honest insights and actionable advice to help you navigate the ever-evolving world of cybersecurity conferences.
Key Moments: 
03:05 Networking’s Importance in Vegas
08:29 Evaluating Black Hat Conference ROI
12:17 "CISOs' Discreet Presence at Vendor Events"
13:22 Buzzword Overload at Conferences
18:40 Relationship-Driven Sales Strategy
21:02 Balancing Conference Costs and Value
25:44 "Prioritize Genuine Leads Only"
27:05 Enhancing Cybersecurity Events
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.a...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[How to Maximize the ROI at Cybersecurity Conferences]]>
                </itunes:title>
                                    <itunes:episode>69</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Welcome back to Protect It All, the podcast where host Aaron Crow goes beyond the basics of OT to explore the dynamic intersection of IT and OT cybersecurity. In this episode, Aaron takes us inside a hacker summer camp in Las Vegas - home to industry giants Black Hat and DEFCON, where tens of thousands of security professionals gather each year. </span></p>
<p><span style="font-weight:400;">Drawing from his years of experience attending these events, Aaron unpacks the good, the bad, and the ugly of the conference circuit: from the value of in-person networking and the buzz of vendor events, to the challenges of ROI, overwhelming hype, and the evolving role of sponsors.</span></p>
<p><span style="font-weight:400;">Plus, he shares hard-won tips for making the most of Vegas - including how to find your tribe, engage meaningfully with vendors, and stay cool (literally and figuratively) amidst the chaos. </span></p>
<p><span style="font-weight:400;">Whether you’re a first-timer or a seasoned attendee, this episode is packed with honest insights and actionable advice to help you navigate the ever-evolving world of cybersecurity conferences.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">03:05 Networking’s Importance in Vegas</span></p>
<p><span style="font-weight:400;">08:29 Evaluating Black Hat Conference ROI</span></p>
<p><span style="font-weight:400;">12:17 "CISOs' Discreet Presence at Vendor Events"</span></p>
<p><span style="font-weight:400;">13:22 Buzzword Overload at Conferences</span></p>
<p><span style="font-weight:400;">18:40 Relationship-Driven Sales Strategy</span></p>
<p><span style="font-weight:400;">21:02 Balancing Conference Costs and Value</span></p>
<p><span style="font-weight:400;">25:44 "Prioritize Genuine Leads Only"</span></p>
<p><span style="font-weight:400;">27:05 Enhancing Cybersecurity Events</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2103893/c1e-1q3v7i50w1jb4dmj4-ndzr6vp6tjz-9u7kgh.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2103893&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=07775bf14917a928728b3415c4aa365cd64c7cdfbb22431a633993efa8321c2b" length="28917315"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Welcome back to Protect It All, the podcast where host Aaron Crow goes beyond the basics of OT to explore the dynamic intersection of IT and OT cybersecurity. In this episode, Aaron takes us inside a hacker summer camp in Las Vegas - home to industry giants Black Hat and DEFCON, where tens of thousands of security professionals gather each year. 
Drawing from his years of experience attending these events, Aaron unpacks the good, the bad, and the ugly of the conference circuit: from the value of in-person networking and the buzz of vendor events, to the challenges of ROI, overwhelming hype, and the evolving role of sponsors.
Plus, he shares hard-won tips for making the most of Vegas - including how to find your tribe, engage meaningfully with vendors, and stay cool (literally and figuratively) amidst the chaos. 
Whether you’re a first-timer or a seasoned attendee, this episode is packed with honest insights and actionable advice to help you navigate the ever-evolving world of cybersecurity conferences.
Key Moments: 
03:05 Networking’s Importance in Vegas
08:29 Evaluating Black Hat Conference ROI
12:17 "CISOs' Discreet Presence at Vendor Events"
13:22 Buzzword Overload at Conferences
18:40 Relationship-Driven Sales Strategy
21:02 Balancing Conference Costs and Value
25:44 "Prioritize Genuine Leads Only"
27:05 Enhancing Cybersecurity Events
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.a...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2103893/c1a-w52rp-jp3x6n08a10k-67owow.jpg"></itunes:image>
                                                                            <itunes:duration>00:28:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Lessons Learned in OT Security: Regulation, Collaboration, and the Rise of AI Threats with Kam Chumley-Soltani]]>
                </title>
                <pubDate>Mon, 28 Jul 2025 11:05:34 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2098744</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by Kam Chumley-Soltani, Director of OT Security at Armis, for a candid conversation that dives into the ever-evolving landscape of OT (operational technology) and IT cybersecurity. After several rescheduling attempts across time zones and even parking lots, Aaron and Kam finally sit down to share their frontline experiences and insights from the world of critical infrastructure security.</span></p>
<p><span style="font-weight:400;">From the increasing visibility of OT threats and the surge in regulatory requirements, to the convergence of IT and OT teams, they dig into what’s driving organizations to prioritize real-time visibility, risk management, and collaboration. Kam reflects on his diverse background in the military, at Cisco, Dragos, and now Armis, while Aaron draws on decades of experience leading teams across power plants and utilities in Texas. They both underscore the importance of people, process, and technology - reminding us that even the best tools are only as valuable as the teams that wield them.</span></p>
<p><span style="font-weight:400;">The discussion explores the challenges smaller utilities face, balancing regulation with limited resources, and the need for cyber-informed engineering from the very start. Plus, they look ahead at the role of AI in cybersecurity, the daisy-chain effects of infrastructure attacks, and the importance of community and continuous learning in keeping ahead of the curve.</span></p>
<p><span style="font-weight:400;">Whether you’re a cybersecurity veteran, just breaking into OT, or simply want to understand why your electricity bill matters, this episode is packed with anecdotes, practical advice, and a few laughs. So pull up a chair and get ready to protect it all!</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">03:18 Cybersecurity Developments and Regulatory Changes</span></p>
<p><span style="font-weight:400;">06:33 Demand for Consulting and Assessments</span></p>
<p><span style="font-weight:400;">09:51 Future of Regulation and Community</span></p>
<p><span style="font-weight:400;">13:06 Regulating Small Utilities Challenges</span></p>
<p><span style="font-weight:400;">16:41 Cybersecurity in Critical Infrastructure</span></p>
<p><span style="font-weight:400;">19:43 Simplifying Complex Issues for All</span></p>
<p><span style="font-weight:400;">26:12 Embracing AI in Cybersecurity</span></p>
<p><span style="font-weight:400;">27:39 "Embrace Challenges, Educate Yourself"</span></p>
<p><span style="font-weight:400;">30:14 Cybersecurity Threats to Infrastructure</span></p>
<p><span style="font-weight:400;">34:29 Evaluating Automated Alerting Systems</span></p>
<p><span style="font-weight:400;">39:38 Controlled Network Configuration Risks</span></p>
<p><span style="font-weight:400;">42:10 Underfunded Team: Multi-Skill Necessity</span></p>
<p><span style="font-weight:400;">45:31 "Collective Progress and Contribution"</span></p>
<p><span style="font-weight:400;">48:13 "Geopolitical Threats to Infrastructure"</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Kam Chumley-Soltani serves as the Director of OT Solutions Engineering for the U.S. Public Sector at Armis, where he specializes in industrial cybersecurity. His expertise lies in designing secure and resilient network architectures for critical infrastructure environments.</span></p>
<p><span style="font-weight:400;">Previously, Kam led Cisco’s OT Solutions Engineering team for the entire U.S. Public Sector, delivering end-to-end solutions across IoT/OT security, network architecture, diverse RF wireless deployments, embedded systems, and edge computing.</span></p>
<p><span style="font-weight:400;">He has guided numerous global enterprises, federal agencies, and SLED organizations in architecting solutions that incorporate robust networking, cybersecurity controls, advanced threat dete...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow is joined by Kam Chumley-Soltani, Director of OT Security at Armis, for a candid conversation that dives into the ever-evolving landscape of OT (operational technology) and IT cybersecurity. After several rescheduling attempts across time zones and even parking lots, Aaron and Kam finally sit down to share their frontline experiences and insights from the world of critical infrastructure security.
From the increasing visibility of OT threats and the surge in regulatory requirements, to the convergence of IT and OT teams, they dig into what’s driving organizations to prioritize real-time visibility, risk management, and collaboration. Kam reflects on his diverse background in the military, at Cisco, Dragos, and now Armis, while Aaron draws on decades of experience leading teams across power plants and utilities in Texas. They both underscore the importance of people, process, and technology - reminding us that even the best tools are only as valuable as the teams that wield them.
The discussion explores the challenges smaller utilities face, balancing regulation with limited resources, and the need for cyber-informed engineering from the very start. Plus, they look ahead at the role of AI in cybersecurity, the daisy-chain effects of infrastructure attacks, and the importance of community and continuous learning in keeping ahead of the curve.
Whether you’re a cybersecurity veteran, just breaking into OT, or simply want to understand why your electricity bill matters, this episode is packed with anecdotes, practical advice, and a few laughs. So pull up a chair and get ready to protect it all!
Key Moments: 
03:18 Cybersecurity Developments and Regulatory Changes
06:33 Demand for Consulting and Assessments
09:51 Future of Regulation and Community
13:06 Regulating Small Utilities Challenges
16:41 Cybersecurity in Critical Infrastructure
19:43 Simplifying Complex Issues for All
26:12 Embracing AI in Cybersecurity
27:39 "Embrace Challenges, Educate Yourself"
30:14 Cybersecurity Threats to Infrastructure
34:29 Evaluating Automated Alerting Systems
39:38 Controlled Network Configuration Risks
42:10 Underfunded Team: Multi-Skill Necessity
45:31 "Collective Progress and Contribution"
48:13 "Geopolitical Threats to Infrastructure"
About the guest : 
Kam Chumley-Soltani serves as the Director of OT Solutions Engineering for the U.S. Public Sector at Armis, where he specializes in industrial cybersecurity. His expertise lies in designing secure and resilient network architectures for critical infrastructure environments.
Previously, Kam led Cisco’s OT Solutions Engineering team for the entire U.S. Public Sector, delivering end-to-end solutions across IoT/OT security, network architecture, diverse RF wireless deployments, embedded systems, and edge computing.
He has guided numerous global enterprises, federal agencies, and SLED organizations in architecting solutions that incorporate robust networking, cybersecurity controls, advanced threat dete...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Lessons Learned in OT Security: Regulation, Collaboration, and the Rise of AI Threats with Kam Chumley-Soltani]]>
                </itunes:title>
                                    <itunes:episode>68</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by Kam Chumley-Soltani, Director of OT Security at Armis, for a candid conversation that dives into the ever-evolving landscape of OT (operational technology) and IT cybersecurity. After several rescheduling attempts across time zones and even parking lots, Aaron and Kam finally sit down to share their frontline experiences and insights from the world of critical infrastructure security.</span></p>
<p><span style="font-weight:400;">From the increasing visibility of OT threats and the surge in regulatory requirements, to the convergence of IT and OT teams, they dig into what’s driving organizations to prioritize real-time visibility, risk management, and collaboration. Kam reflects on his diverse background in the military, at Cisco, Dragos, and now Armis, while Aaron draws on decades of experience leading teams across power plants and utilities in Texas. They both underscore the importance of people, process, and technology - reminding us that even the best tools are only as valuable as the teams that wield them.</span></p>
<p><span style="font-weight:400;">The discussion explores the challenges smaller utilities face, balancing regulation with limited resources, and the need for cyber-informed engineering from the very start. Plus, they look ahead at the role of AI in cybersecurity, the daisy-chain effects of infrastructure attacks, and the importance of community and continuous learning in keeping ahead of the curve.</span></p>
<p><span style="font-weight:400;">Whether you’re a cybersecurity veteran, just breaking into OT, or simply want to understand why your electricity bill matters, this episode is packed with anecdotes, practical advice, and a few laughs. So pull up a chair and get ready to protect it all!</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">03:18 Cybersecurity Developments and Regulatory Changes</span></p>
<p><span style="font-weight:400;">06:33 Demand for Consulting and Assessments</span></p>
<p><span style="font-weight:400;">09:51 Future of Regulation and Community</span></p>
<p><span style="font-weight:400;">13:06 Regulating Small Utilities Challenges</span></p>
<p><span style="font-weight:400;">16:41 Cybersecurity in Critical Infrastructure</span></p>
<p><span style="font-weight:400;">19:43 Simplifying Complex Issues for All</span></p>
<p><span style="font-weight:400;">26:12 Embracing AI in Cybersecurity</span></p>
<p><span style="font-weight:400;">27:39 "Embrace Challenges, Educate Yourself"</span></p>
<p><span style="font-weight:400;">30:14 Cybersecurity Threats to Infrastructure</span></p>
<p><span style="font-weight:400;">34:29 Evaluating Automated Alerting Systems</span></p>
<p><span style="font-weight:400;">39:38 Controlled Network Configuration Risks</span></p>
<p><span style="font-weight:400;">42:10 Underfunded Team: Multi-Skill Necessity</span></p>
<p><span style="font-weight:400;">45:31 "Collective Progress and Contribution"</span></p>
<p><span style="font-weight:400;">48:13 "Geopolitical Threats to Infrastructure"</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Kam Chumley-Soltani serves as the Director of OT Solutions Engineering for the U.S. Public Sector at Armis, where he specializes in industrial cybersecurity. His expertise lies in designing secure and resilient network architectures for critical infrastructure environments.</span></p>
<p><span style="font-weight:400;">Previously, Kam led Cisco’s OT Solutions Engineering team for the entire U.S. Public Sector, delivering end-to-end solutions across IoT/OT security, network architecture, diverse RF wireless deployments, embedded systems, and edge computing.</span></p>
<p><span style="font-weight:400;">He has guided numerous global enterprises, federal agencies, and SLED organizations in architecting solutions that incorporate robust networking, cybersecurity controls, advanced threat detection, and proactive vulnerability management.</span></p>
<p><span style="font-weight:400;">A Navy veteran, Kam served as a flight systems engineer and mission operations planner. He holds a B.S. in Cyber Operations from the United States Naval Academy, an M.S. in Cybersecurity from Brown University, and an M.B.A. from Northwestern University's Kellogg School of Management. He is currently pursuing his Doctor of Engineering (D.Eng.) in AI/ML from George Washington University. </span></p>
<p><strong>How to connect Kam: </strong></p>
<p><strong>Linkedin:</strong> <a href="https://www.linkedin.com/in/kam-chumley-soltani/"><span style="font-weight:400;">https://www.linkedin.com/in/kam-chumley-soltani/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2098744/c1e-d308xcmo58xi3d3n3-6z3q633nb1qk-azvsvh.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2098744&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=c67c168f8dd7c0af6d7ac606a508ca32d36ce8452cddebc6d4e74b905628c81e" length="53741643"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow is joined by Kam Chumley-Soltani, Director of OT Security at Armis, for a candid conversation that dives into the ever-evolving landscape of OT (operational technology) and IT cybersecurity. After several rescheduling attempts across time zones and even parking lots, Aaron and Kam finally sit down to share their frontline experiences and insights from the world of critical infrastructure security.
From the increasing visibility of OT threats and the surge in regulatory requirements, to the convergence of IT and OT teams, they dig into what’s driving organizations to prioritize real-time visibility, risk management, and collaboration. Kam reflects on his diverse background in the military, at Cisco, Dragos, and now Armis, while Aaron draws on decades of experience leading teams across power plants and utilities in Texas. They both underscore the importance of people, process, and technology - reminding us that even the best tools are only as valuable as the teams that wield them.
The discussion explores the challenges smaller utilities face, balancing regulation with limited resources, and the need for cyber-informed engineering from the very start. Plus, they look ahead at the role of AI in cybersecurity, the daisy-chain effects of infrastructure attacks, and the importance of community and continuous learning in keeping ahead of the curve.
Whether you’re a cybersecurity veteran, just breaking into OT, or simply want to understand why your electricity bill matters, this episode is packed with anecdotes, practical advice, and a few laughs. So pull up a chair and get ready to protect it all!
Key Moments: 
03:18 Cybersecurity Developments and Regulatory Changes
06:33 Demand for Consulting and Assessments
09:51 Future of Regulation and Community
13:06 Regulating Small Utilities Challenges
16:41 Cybersecurity in Critical Infrastructure
19:43 Simplifying Complex Issues for All
26:12 Embracing AI in Cybersecurity
27:39 "Embrace Challenges, Educate Yourself"
30:14 Cybersecurity Threats to Infrastructure
34:29 Evaluating Automated Alerting Systems
39:38 Controlled Network Configuration Risks
42:10 Underfunded Team: Multi-Skill Necessity
45:31 "Collective Progress and Contribution"
48:13 "Geopolitical Threats to Infrastructure"
About the guest : 
Kam Chumley-Soltani serves as the Director of OT Solutions Engineering for the U.S. Public Sector at Armis, where he specializes in industrial cybersecurity. His expertise lies in designing secure and resilient network architectures for critical infrastructure environments.
Previously, Kam led Cisco’s OT Solutions Engineering team for the entire U.S. Public Sector, delivering end-to-end solutions across IoT/OT security, network architecture, diverse RF wireless deployments, embedded systems, and edge computing.
He has guided numerous global enterprises, federal agencies, and SLED organizations in architecting solutions that incorporate robust networking, cybersecurity controls, advanced threat dete...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2098744/c1a-w52rp-5zoqx583iz2k-zbekwt.jpg"></itunes:image>
                                                                            <itunes:duration>00:53:50</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[The Double-Edged Sword of AI in Cybersecurity and Critical Infrastructure]]>
                </title>
                <pubDate>Tue, 22 Jul 2025 11:37:49 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2094792</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this solo episode, host Aaron Crow takes us on a fast-paced journey through the latest critical developments in both IT and OT cybersecurity. Aaron breaks down the month’s most pressing zero-day exploits, including high-profile attacks on Microsoft SharePoint and CrushFTP, and explores the implications of rapidly evolving threats - especially as attackers leverage AI for faster, more innovative hacks.</span></p>
<p><span style="font-weight:400;"><strong>But it’s not all doom and gloom:</strong> Aaron dives into how AI is also becoming a game-changer for defense, from Google’s use of AI agents to spot vulnerabilities ahead of attackers, to the promise (and dangers) of deepfake technology. He discusses new policy moves, like the FCC’s proposal to ban Chinese tech in undersea internet cables and the US Coast Guard’s push for cyber resilience in maritime infrastructure.</span></p>
<p><span style="font-weight:400;">Throughout the episode, Aaron offers strategic advice for organizations of all sizes - from patch management and digital twins to incident response plans designed for today’s AI-driven threat landscape. Whether you’re in cyber, tech, critical infrastructure, or just want to stay a step ahead, this episode is packed with actionable insights and timely analysis to boost your cyber resilience. Plug in for a conversation that’s equal parts eye-opening and empowering!</span></p>
<p><span style="font-weight:400;">Key Moments; </span></p>
<p><span style="font-weight:400;">01:20 High-Level Tactical Briefing</span></p>
<p><span style="font-weight:400;">05:31 Digital Twin for System Security</span></p>
<p><span style="font-weight:400;">09:39 Dual Role of Tools</span></p>
<p><span style="font-weight:400;">12:00 Emergency Procedures Reminder</span></p>
<p><span style="font-weight:400;">14:24 Challenges in OT System Integration</span></p>
<p><span style="font-weight:400;">18:32 Deep Fake Detection and Response</span></p>
<p><span style="font-weight:400;">20:12 "AI Persistence and Impact"</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">App...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this solo episode, host Aaron Crow takes us on a fast-paced journey through the latest critical developments in both IT and OT cybersecurity. Aaron breaks down the month’s most pressing zero-day exploits, including high-profile attacks on Microsoft SharePoint and CrushFTP, and explores the implications of rapidly evolving threats - especially as attackers leverage AI for faster, more innovative hacks.
But it’s not all doom and gloom: Aaron dives into how AI is also becoming a game-changer for defense, from Google’s use of AI agents to spot vulnerabilities ahead of attackers, to the promise (and dangers) of deepfake technology. He discusses new policy moves, like the FCC’s proposal to ban Chinese tech in undersea internet cables and the US Coast Guard’s push for cyber resilience in maritime infrastructure.
Throughout the episode, Aaron offers strategic advice for organizations of all sizes - from patch management and digital twins to incident response plans designed for today’s AI-driven threat landscape. Whether you’re in cyber, tech, critical infrastructure, or just want to stay a step ahead, this episode is packed with actionable insights and timely analysis to boost your cyber resilience. Plug in for a conversation that’s equal parts eye-opening and empowering!
Key Moments; 
01:20 High-Level Tactical Briefing
05:31 Digital Twin for System Security
09:39 Dual Role of Tools
12:00 Emergency Procedures Reminder
14:24 Challenges in OT System Integration
18:32 Deep Fake Detection and Response
20:12 "AI Persistence and Impact"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
App...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[The Double-Edged Sword of AI in Cybersecurity and Critical Infrastructure]]>
                </itunes:title>
                                    <itunes:episode>67</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this solo episode, host Aaron Crow takes us on a fast-paced journey through the latest critical developments in both IT and OT cybersecurity. Aaron breaks down the month’s most pressing zero-day exploits, including high-profile attacks on Microsoft SharePoint and CrushFTP, and explores the implications of rapidly evolving threats - especially as attackers leverage AI for faster, more innovative hacks.</span></p>
<p><span style="font-weight:400;"><strong>But it’s not all doom and gloom:</strong> Aaron dives into how AI is also becoming a game-changer for defense, from Google’s use of AI agents to spot vulnerabilities ahead of attackers, to the promise (and dangers) of deepfake technology. He discusses new policy moves, like the FCC’s proposal to ban Chinese tech in undersea internet cables and the US Coast Guard’s push for cyber resilience in maritime infrastructure.</span></p>
<p><span style="font-weight:400;">Throughout the episode, Aaron offers strategic advice for organizations of all sizes - from patch management and digital twins to incident response plans designed for today’s AI-driven threat landscape. Whether you’re in cyber, tech, critical infrastructure, or just want to stay a step ahead, this episode is packed with actionable insights and timely analysis to boost your cyber resilience. Plug in for a conversation that’s equal parts eye-opening and empowering!</span></p>
<p><span style="font-weight:400;">Key Moments; </span></p>
<p><span style="font-weight:400;">01:20 High-Level Tactical Briefing</span></p>
<p><span style="font-weight:400;">05:31 Digital Twin for System Security</span></p>
<p><span style="font-weight:400;">09:39 Dual Role of Tools</span></p>
<p><span style="font-weight:400;">12:00 Emergency Procedures Reminder</span></p>
<p><span style="font-weight:400;">14:24 Challenges in OT System Integration</span></p>
<p><span style="font-weight:400;">18:32 Deep Fake Detection and Response</span></p>
<p><span style="font-weight:400;">20:12 "AI Persistence and Impact"</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2094792/c1e-p5o2vb1wq24hv9d03-z3kkpxdvuvr8-uol24a.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2094792&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=c1b8b7f33efebb2ca119a6b697adc0b4130c89ca4b9f20951b83b2b355f18549" length="22267308"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this solo episode, host Aaron Crow takes us on a fast-paced journey through the latest critical developments in both IT and OT cybersecurity. Aaron breaks down the month’s most pressing zero-day exploits, including high-profile attacks on Microsoft SharePoint and CrushFTP, and explores the implications of rapidly evolving threats - especially as attackers leverage AI for faster, more innovative hacks.
But it’s not all doom and gloom: Aaron dives into how AI is also becoming a game-changer for defense, from Google’s use of AI agents to spot vulnerabilities ahead of attackers, to the promise (and dangers) of deepfake technology. He discusses new policy moves, like the FCC’s proposal to ban Chinese tech in undersea internet cables and the US Coast Guard’s push for cyber resilience in maritime infrastructure.
Throughout the episode, Aaron offers strategic advice for organizations of all sizes - from patch management and digital twins to incident response plans designed for today’s AI-driven threat landscape. Whether you’re in cyber, tech, critical infrastructure, or just want to stay a step ahead, this episode is packed with actionable insights and timely analysis to boost your cyber resilience. Plug in for a conversation that’s equal parts eye-opening and empowering!
Key Moments; 
01:20 High-Level Tactical Briefing
05:31 Digital Twin for System Security
09:39 Dual Role of Tools
12:00 Emergency Procedures Reminder
14:24 Challenges in OT System Integration
18:32 Deep Fake Detection and Response
20:12 "AI Persistence and Impact"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
App...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2094792/c1a-w52rp-v644pk2xfdjr-l33rql.jpg"></itunes:image>
                                                                            <itunes:duration>00:21:57</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Powering the Future: The Overlooked Cyber Risks in Our Expanding Electric Grid]]>
                </title>
                <pubDate>Mon, 14 Jul 2025 11:13:18 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2087922</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow gets into one of the most pressing issues facing our future power grid: the explosive impact of AI, electric vehicles, and data centers on energy demand and what happens when cybersecurity gets left out of the equation. </span></p>
<p><span style="font-weight:400;">As Texas and other states stare down a projected 50% surge in peak energy load by 2030, Aaron shares firsthand insights from his decades in the power utility industry and raises urgent questions about how we’re building the next generation of critical infrastructure.</span></p>
<p><span style="font-weight:400;">From the logistical nightmare of charging a million electric cars in urban apartment complexes to the cold reality that most new power plants are being commissioned without cybersecurity in mind, Aaron pulls back the curtain on missed opportunities and potential threats. </span></p>
<p><span style="font-weight:400;">Why isn’t OT security part of major DOE planning reports? Who’s responsible for managing cyber risks in this rapidly evolving landscape? And what’s at stake if we don’t build security into our systems from day one?</span></p>
<p><span style="font-weight:400;">If you’re in IT, OT, operations, or simply care about keeping the lights on in our data-driven world, this is a conversation you don’t want to miss. Tune in as Aaron calls for a united front: making cybersecurity a non-negotiable priority in the grid transformation ahead.</span></p>
<p> </p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">01:12 "Urgent Power Capacity Boost by 2030"</span></p>
<p><span style="font-weight:400;">05:21 Electric Car Charging Challenges</span></p>
<p><span style="font-weight:400;">08:59 System Vulnerabilities and Design Flaws</span></p>
<p><span style="font-weight:400;">10:01 Cybersecurity: Everyone's Responsibility</span></p>
<p><span style="font-weight:400;">15:20 Complexity of Grid Black Start Process</span></p>
<p><span style="font-weight:400;">18:53 Urgency in Tech and Power Security</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow gets into one of the most pressing issues facing our future power grid: the explosive impact of AI, electric vehicles, and data centers on energy demand and what happens when cybersecurity gets left out of the equation. 
As Texas and other states stare down a projected 50% surge in peak energy load by 2030, Aaron shares firsthand insights from his decades in the power utility industry and raises urgent questions about how we’re building the next generation of critical infrastructure.
From the logistical nightmare of charging a million electric cars in urban apartment complexes to the cold reality that most new power plants are being commissioned without cybersecurity in mind, Aaron pulls back the curtain on missed opportunities and potential threats. 
Why isn’t OT security part of major DOE planning reports? Who’s responsible for managing cyber risks in this rapidly evolving landscape? And what’s at stake if we don’t build security into our systems from day one?
If you’re in IT, OT, operations, or simply care about keeping the lights on in our data-driven world, this is a conversation you don’t want to miss. Tune in as Aaron calls for a united front: making cybersecurity a non-negotiable priority in the grid transformation ahead.
 
Key Moments: 
01:12 "Urgent Power Capacity Boost by 2030"
05:21 Electric Car Charging Challenges
08:59 System Vulnerabilities and Design Flaws
10:01 Cybersecurity: Everyone's Responsibility
15:20 Complexity of Grid Black Start Process
18:53 Urgency in Tech and Power Security
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Powering the Future: The Overlooked Cyber Risks in Our Expanding Electric Grid]]>
                </itunes:title>
                                    <itunes:episode>66</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow gets into one of the most pressing issues facing our future power grid: the explosive impact of AI, electric vehicles, and data centers on energy demand and what happens when cybersecurity gets left out of the equation. </span></p>
<p><span style="font-weight:400;">As Texas and other states stare down a projected 50% surge in peak energy load by 2030, Aaron shares firsthand insights from his decades in the power utility industry and raises urgent questions about how we’re building the next generation of critical infrastructure.</span></p>
<p><span style="font-weight:400;">From the logistical nightmare of charging a million electric cars in urban apartment complexes to the cold reality that most new power plants are being commissioned without cybersecurity in mind, Aaron pulls back the curtain on missed opportunities and potential threats. </span></p>
<p><span style="font-weight:400;">Why isn’t OT security part of major DOE planning reports? Who’s responsible for managing cyber risks in this rapidly evolving landscape? And what’s at stake if we don’t build security into our systems from day one?</span></p>
<p><span style="font-weight:400;">If you’re in IT, OT, operations, or simply care about keeping the lights on in our data-driven world, this is a conversation you don’t want to miss. Tune in as Aaron calls for a united front: making cybersecurity a non-negotiable priority in the grid transformation ahead.</span></p>
<p> </p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">01:12 "Urgent Power Capacity Boost by 2030"</span></p>
<p><span style="font-weight:400;">05:21 Electric Car Charging Challenges</span></p>
<p><span style="font-weight:400;">08:59 System Vulnerabilities and Design Flaws</span></p>
<p><span style="font-weight:400;">10:01 Cybersecurity: Everyone's Responsibility</span></p>
<p><span style="font-weight:400;">15:20 Complexity of Grid Black Start Process</span></p>
<p><span style="font-weight:400;">18:53 Urgency in Tech and Power Security</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2087922/c1e-9pzm3sd29x0c0ogj0-kp9w4vv1tjj-kurxyg.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2087922&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=1759ed020e85559c5690dee894c5a1c0e4c1e1d2eec8aded95897525af328519" length="23623132"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow gets into one of the most pressing issues facing our future power grid: the explosive impact of AI, electric vehicles, and data centers on energy demand and what happens when cybersecurity gets left out of the equation. 
As Texas and other states stare down a projected 50% surge in peak energy load by 2030, Aaron shares firsthand insights from his decades in the power utility industry and raises urgent questions about how we’re building the next generation of critical infrastructure.
From the logistical nightmare of charging a million electric cars in urban apartment complexes to the cold reality that most new power plants are being commissioned without cybersecurity in mind, Aaron pulls back the curtain on missed opportunities and potential threats. 
Why isn’t OT security part of major DOE planning reports? Who’s responsible for managing cyber risks in this rapidly evolving landscape? And what’s at stake if we don’t build security into our systems from day one?
If you’re in IT, OT, operations, or simply care about keeping the lights on in our data-driven world, this is a conversation you don’t want to miss. Tune in as Aaron calls for a united front: making cybersecurity a non-negotiable priority in the grid transformation ahead.
 
Key Moments: 
01:12 "Urgent Power Capacity Boost by 2030"
05:21 Electric Car Charging Challenges
08:59 System Vulnerabilities and Design Flaws
10:01 Cybersecurity: Everyone's Responsibility
15:20 Complexity of Grid Black Start Process
18:53 Urgency in Tech and Power Security
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2087922/c1a-w52rp-gpzw3gg0tp74-u6zi8p.jpg"></itunes:image>
                                                                            <itunes:duration>00:23:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How AI Became the Ultimate Cybersecurity Blind Spot: Understanding the Microsoft 365 Copilot Vulnerability]]>
                </title>
                <pubDate>Mon, 07 Jul 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2077779</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk. </span></p>
<p><span style="font-weight:400;">From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI’s efficiencies. </span></p>
<p><span style="font-weight:400;">Whether you’re in a large enterprise or a lean team with limited resources, you’ll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let’s jump in and explore how to protect it all as AI advances.</span></p>
<p><span style="font-weight:400;">Key Moments : </span></p>
<p><span style="font-weight:400;">01:20 AI's Rising Role in Media</span></p>
<p><span style="font-weight:400;">03:22 Guidelines for Using AI Safely</span></p>
<p><span style="font-weight:400;">07:06 "AI Integration and Automation Strategies"</span></p>
<p><span style="font-weight:400;">10:03 Automating Windows Management Tasks</span></p>
<p><span style="font-weight:400;">14:29 Exploring AI for Personal Tasks</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://o...</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk. 
From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI’s efficiencies. 
Whether you’re in a large enterprise or a lean team with limited resources, you’ll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let’s jump in and explore how to protect it all as AI advances.
Key Moments : 
01:20 AI's Rising Role in Media
03:22 Guidelines for Using AI Safely
07:06 "AI Integration and Automation Strategies"
10:03 Automating Windows Management Tasks
14:29 Exploring AI for Personal Tasks
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://o...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[How AI Became the Ultimate Cybersecurity Blind Spot: Understanding the Microsoft 365 Copilot Vulnerability]]>
                </itunes:title>
                                    <itunes:episode>65</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk. </span></p>
<p><span style="font-weight:400;">From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI’s efficiencies. </span></p>
<p><span style="font-weight:400;">Whether you’re in a large enterprise or a lean team with limited resources, you’ll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let’s jump in and explore how to protect it all as AI advances.</span></p>
<p><span style="font-weight:400;">Key Moments : </span></p>
<p><span style="font-weight:400;">01:20 AI's Rising Role in Media</span></p>
<p><span style="font-weight:400;">03:22 Guidelines for Using AI Safely</span></p>
<p><span style="font-weight:400;">07:06 "AI Integration and Automation Strategies"</span></p>
<p><span style="font-weight:400;">10:03 Automating Windows Management Tasks</span></p>
<p><span style="font-weight:400;">14:29 Exploring AI for Personal Tasks</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2077779/c1e-p5o2vb11w10sv9x8o-5zxvqd1gum8v-cfynzn.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2077779&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=757d087db66aea070e6d926e314c64627e29289f897ea8dfc1b3066a227bf3e7" length="18575757"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk. 
From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI’s efficiencies. 
Whether you’re in a large enterprise or a lean team with limited resources, you’ll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let’s jump in and explore how to protect it all as AI advances.
Key Moments : 
01:20 AI's Rising Role in Media
03:22 Guidelines for Using AI Safely
07:06 "AI Integration and Automation Strategies"
10:03 Automating Windows Management Tasks
14:29 Exploring AI for Personal Tasks
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://o...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2077779/c1a-w52rp-pk40nvgjs842-dbthx1.jpg"></itunes:image>
                                                                            <itunes:duration>00:17:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Harness AI Without Breaking Security or Corporate Policies]]>
                </title>
                <pubDate>Mon, 30 Jun 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2077769</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk. </span></p>
<p><span style="font-weight:400;">From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI’s efficiencies. </span></p>
<p><span style="font-weight:400;">Whether you’re in a large enterprise or a lean team with limited resources, you’ll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let’s jump in and explore how to protect it all as AI advances.</span></p>
<p><span style="font-weight:400;">Key Moments : </span></p>
<p><span style="font-weight:400;">01:20 AI's Rising Role in Media</span></p>
<p><span style="font-weight:400;">03:22 Guidelines for Using AI Safely</span></p>
<p><span style="font-weight:400;">07:06 "AI Integration and Automation Strategies"</span></p>
<p><span style="font-weight:400;">10:03 Automating Windows Management Tasks</span></p>
<p><span style="font-weight:400;">14:29 Exploring AI for Personal Tasks</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://o...</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk. 
From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI’s efficiencies. 
Whether you’re in a large enterprise or a lean team with limited resources, you’ll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let’s jump in and explore how to protect it all as AI advances.
Key Moments : 
01:20 AI's Rising Role in Media
03:22 Guidelines for Using AI Safely
07:06 "AI Integration and Automation Strategies"
10:03 Automating Windows Management Tasks
14:29 Exploring AI for Personal Tasks
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://o...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[How to Harness AI Without Breaking Security or Corporate Policies]]>
                </itunes:title>
                                    <itunes:episode>64</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk. </span></p>
<p><span style="font-weight:400;">From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI’s efficiencies. </span></p>
<p><span style="font-weight:400;">Whether you’re in a large enterprise or a lean team with limited resources, you’ll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let’s jump in and explore how to protect it all as AI advances.</span></p>
<p><span style="font-weight:400;">Key Moments : </span></p>
<p><span style="font-weight:400;">01:20 AI's Rising Role in Media</span></p>
<p><span style="font-weight:400;">03:22 Guidelines for Using AI Safely</span></p>
<p><span style="font-weight:400;">07:06 "AI Integration and Automation Strategies"</span></p>
<p><span style="font-weight:400;">10:03 Automating Windows Management Tasks</span></p>
<p><span style="font-weight:400;">14:29 Exploring AI for Personal Tasks</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2077769/c1e-52n9du117mqtr21z8-7z35rqxnan74-ji8ltz.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2077769&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=38ec439ae7c7f0fa100c46a37d7c8cb504df0af154d231e4b5990d11fdd2da99" length="16076991"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow dives deep into the fast-evolving world of AI automation and its impact on cybersecurity. Aaron breaks down practical, real-world ways security professionals can leverage AI to streamline their workflows without breaking data loss prevention policies or putting proprietary information at risk. 
From drafting reports and playbooks to automating repetitive tasks and managing vulnerability data, Aaron offers actionable advice for using both public AI tools like ChatGPT and more advanced private AI models. He also addresses common fears CISOs and business leaders have about unsanctioned AI use in the workplace and shares tips for staying safe and compliant while taking advantage of AI’s efficiencies. 
Whether you’re in a large enterprise or a lean team with limited resources, you’ll come away with a fresh perspective on how to use AI responsibly to work smarter and protect your organization. Plus, Aaron invites listeners to share their own creative AI use cases and lessons learned. Let’s jump in and explore how to protect it all as AI advances.
Key Moments : 
01:20 AI's Rising Role in Media
03:22 Guidelines for Using AI Safely
07:06 "AI Integration and Automation Strategies"
10:03 Automating Windows Management Tasks
14:29 Exploring AI for Personal Tasks
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://o...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2077769/c1a-w52rp-wwxv7gpwio95-hjdaxm.jpg"></itunes:image>
                                                                            <itunes:duration>00:15:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Driving OT Security Innovation: AI, Risk Reduction, and the Future of Critical Infrastructure]]>
                </title>
                <pubDate>Mon, 23 Jun 2025 12:00:21 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2072084</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Welcome back to Protect It All! In this episode, host Aaron Crow sits down with longtime friend and OT cybersecurity veteran Brian Proctor for a deep dive into the current state—and future—of the OT cyber landscape. Together, they trade stories from the front lines, reflecting on how their early experiences as asset owners shaped their passion for innovation and helping critical infrastructure run safely and securely.</span></p>
<p><span style="font-weight:400;">Brian, whose career spans roles from OT engineer to startup co-founder, opens up about his journey—highlighting his drive to push the boundaries of traditional OT security and the evolution of key industry technologies. The conversation explores everything from the persistent lack of innovation in OT, to AI’s growing role in tackling the daunting challenges of risk reduction, visibility, and scaling assessments across sprawling environments.</span></p>
<p><span style="font-weight:400;">If you’ve ever wondered how new tech like AI is reshaping industrial cybersecurity, why “we’ve always done it this way” just doesn’t cut it anymore, or how organizations can realistically stay ahead without breaking the bank, this episode delivers honest insights, practical advice, and a look toward an exciting, if sometimes daunting, future.</span></p>
<p><span style="font-weight:400;">So grab your headphones and settle in as Aaron and Brian share stories, hot takes, and strategies designed to protect it all—because in critical infrastructure, the stakes have never been higher.</span></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">06:45 OT Cyber Industry Evolution</span></p>
<p><span style="font-weight:400;">11:57 Evolving Challenges in OT Security</span></p>
<p><span style="font-weight:400;">19:34 Bridging the OT Security Skills Gap</span></p>
<p><span style="font-weight:400;">21:54 Enhancing OT Security Understanding</span></p>
<p><span style="font-weight:400;">30:46 AI Model Security Challenges</span></p>
<p><span style="font-weight:400;">34:26 Rapid Scaling for Site Assessments</span></p>
<p><span style="font-weight:400;">40:56 Simulating Cyber Threat Responses</span></p>
<p><span style="font-weight:400;">47:19 Operational Priorities: Equipment vs. Cyber Tools</span></p>
<p><span style="font-weight:400;">49:30 Focus on Meaningful Security Metrics</span></p>
<p><span style="font-weight:400;">56:30 Rapid AI Adoption vs. Internet</span></p>
<p><span style="font-weight:400;">01:02:12 Cybersecurity: Small Targets are Vulnerable</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Brian Proctor is a cybersecurity leader with over 20 years of experience protecting critical infrastructure across energy, industrial automation, and operational technology sectors. As the co-founder and CEO of Frenos, he empowers critical infrastructure operators to proactively secure their environments against evolving cyber threats.</span></p>
<p><span style="font-weight:400;">Brian built his foundation in ICS/OT cybersecurity during his 13+ year tenure at two progressive California Investor Owned Utilities, San Diego Gas &amp; Electric and Southern California Edison serving the 2nd and 8th largest cities in the United States. He managed a team of 15 security engineers and researchers across 150+ projects, established OT security roadmaps, and co-invented an R&amp;D Magazine Top 100 award-winning GPS anti-spoofing mitigation technology that earned him a patent.</span></p>
<p><span style="font-weight:400;">Brian has published IEEE papers on security monitoring, served as Critical Infrastructure Co-Chair for Securing Our eCity, and regularly speaks at conferences to educate and build the ICS/OT cybersecurity community. He holds technical certifications including GICSP, CISSP, and CRISC, along with a Business Administration degree from the University of San Diego.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Welcome back to Protect It All! In this episode, host Aaron Crow sits down with longtime friend and OT cybersecurity veteran Brian Proctor for a deep dive into the current state—and future—of the OT cyber landscape. Together, they trade stories from the front lines, reflecting on how their early experiences as asset owners shaped their passion for innovation and helping critical infrastructure run safely and securely.
Brian, whose career spans roles from OT engineer to startup co-founder, opens up about his journey—highlighting his drive to push the boundaries of traditional OT security and the evolution of key industry technologies. The conversation explores everything from the persistent lack of innovation in OT, to AI’s growing role in tackling the daunting challenges of risk reduction, visibility, and scaling assessments across sprawling environments.
If you’ve ever wondered how new tech like AI is reshaping industrial cybersecurity, why “we’ve always done it this way” just doesn’t cut it anymore, or how organizations can realistically stay ahead without breaking the bank, this episode delivers honest insights, practical advice, and a look toward an exciting, if sometimes daunting, future.
So grab your headphones and settle in as Aaron and Brian share stories, hot takes, and strategies designed to protect it all—because in critical infrastructure, the stakes have never been higher.
Key Moments: 
06:45 OT Cyber Industry Evolution
11:57 Evolving Challenges in OT Security
19:34 Bridging the OT Security Skills Gap
21:54 Enhancing OT Security Understanding
30:46 AI Model Security Challenges
34:26 Rapid Scaling for Site Assessments
40:56 Simulating Cyber Threat Responses
47:19 Operational Priorities: Equipment vs. Cyber Tools
49:30 Focus on Meaningful Security Metrics
56:30 Rapid AI Adoption vs. Internet
01:02:12 Cybersecurity: Small Targets are Vulnerable
About the guest : 
Brian Proctor is a cybersecurity leader with over 20 years of experience protecting critical infrastructure across energy, industrial automation, and operational technology sectors. As the co-founder and CEO of Frenos, he empowers critical infrastructure operators to proactively secure their environments against evolving cyber threats.
Brian built his foundation in ICS/OT cybersecurity during his 13+ year tenure at two progressive California Investor Owned Utilities, San Diego Gas & Electric and Southern California Edison serving the 2nd and 8th largest cities in the United States. He managed a team of 15 security engineers and researchers across 150+ projects, established OT security roadmaps, and co-invented an R&D Magazine Top 100 award-winning GPS anti-spoofing mitigation technology that earned him a patent.
Brian has published IEEE papers on security monitoring, served as Critical Infrastructure Co-Chair for Securing Our eCity, and regularly speaks at conferences to educate and build the ICS/OT cybersecurity community. He holds technical certifications including GICSP, CISSP, and CRISC, along with a Business Administration degree from the University of San Diego.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Driving OT Security Innovation: AI, Risk Reduction, and the Future of Critical Infrastructure]]>
                </itunes:title>
                                    <itunes:episode>63</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Welcome back to Protect It All! In this episode, host Aaron Crow sits down with longtime friend and OT cybersecurity veteran Brian Proctor for a deep dive into the current state—and future—of the OT cyber landscape. Together, they trade stories from the front lines, reflecting on how their early experiences as asset owners shaped their passion for innovation and helping critical infrastructure run safely and securely.</span></p>
<p><span style="font-weight:400;">Brian, whose career spans roles from OT engineer to startup co-founder, opens up about his journey—highlighting his drive to push the boundaries of traditional OT security and the evolution of key industry technologies. The conversation explores everything from the persistent lack of innovation in OT, to AI’s growing role in tackling the daunting challenges of risk reduction, visibility, and scaling assessments across sprawling environments.</span></p>
<p><span style="font-weight:400;">If you’ve ever wondered how new tech like AI is reshaping industrial cybersecurity, why “we’ve always done it this way” just doesn’t cut it anymore, or how organizations can realistically stay ahead without breaking the bank, this episode delivers honest insights, practical advice, and a look toward an exciting, if sometimes daunting, future.</span></p>
<p><span style="font-weight:400;">So grab your headphones and settle in as Aaron and Brian share stories, hot takes, and strategies designed to protect it all—because in critical infrastructure, the stakes have never been higher.</span></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">06:45 OT Cyber Industry Evolution</span></p>
<p><span style="font-weight:400;">11:57 Evolving Challenges in OT Security</span></p>
<p><span style="font-weight:400;">19:34 Bridging the OT Security Skills Gap</span></p>
<p><span style="font-weight:400;">21:54 Enhancing OT Security Understanding</span></p>
<p><span style="font-weight:400;">30:46 AI Model Security Challenges</span></p>
<p><span style="font-weight:400;">34:26 Rapid Scaling for Site Assessments</span></p>
<p><span style="font-weight:400;">40:56 Simulating Cyber Threat Responses</span></p>
<p><span style="font-weight:400;">47:19 Operational Priorities: Equipment vs. Cyber Tools</span></p>
<p><span style="font-weight:400;">49:30 Focus on Meaningful Security Metrics</span></p>
<p><span style="font-weight:400;">56:30 Rapid AI Adoption vs. Internet</span></p>
<p><span style="font-weight:400;">01:02:12 Cybersecurity: Small Targets are Vulnerable</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Brian Proctor is a cybersecurity leader with over 20 years of experience protecting critical infrastructure across energy, industrial automation, and operational technology sectors. As the co-founder and CEO of Frenos, he empowers critical infrastructure operators to proactively secure their environments against evolving cyber threats.</span></p>
<p><span style="font-weight:400;">Brian built his foundation in ICS/OT cybersecurity during his 13+ year tenure at two progressive California Investor Owned Utilities, San Diego Gas &amp; Electric and Southern California Edison serving the 2nd and 8th largest cities in the United States. He managed a team of 15 security engineers and researchers across 150+ projects, established OT security roadmaps, and co-invented an R&amp;D Magazine Top 100 award-winning GPS anti-spoofing mitigation technology that earned him a patent.</span></p>
<p><span style="font-weight:400;">Brian has published IEEE papers on security monitoring, served as Critical Infrastructure Co-Chair for Securing Our eCity, and regularly speaks at conferences to educate and build the ICS/OT cybersecurity community. He holds technical certifications including GICSP, CISSP, and CRISC, along with a Business Administration degree from the University of San Diego.</span></p>
<p><strong>Links: </strong></p>
<p><a href="https://frenos.io/services"><span style="font-weight:400;">https://frenos.io/services</span></a><span style="font-weight:400;"> - Learn more about Optica, the industry's first tech-enabled rapid OT visibility service </span></p>
<p><a href="https://frenos.io/autonomous-ot-security-assessment-platform"><span style="font-weight:400;">https://frenos.io/autonomous-ot-security-assessment-platform</span></a><span style="font-weight:400;"> - Learn more about how to automate OT security risk assessments</span></p>
<p><span style="font-weight:400;">Connect Brian : </span><a href="https://www.linkedin.com/in/brianproctor67/"><span style="font-weight:400;">https://www.linkedin.com/in/brianproctor67/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2072084/c1e-p5o2vb15kmrav9w92-34d1rjm9udvo-c0vgrr.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2072084&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=fda4e0ae13ba96cb79f3b42dc8b6f785bbc0ddd39d09f27d3ad5ce157e32b728" length="62002657"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Welcome back to Protect It All! In this episode, host Aaron Crow sits down with longtime friend and OT cybersecurity veteran Brian Proctor for a deep dive into the current state—and future—of the OT cyber landscape. Together, they trade stories from the front lines, reflecting on how their early experiences as asset owners shaped their passion for innovation and helping critical infrastructure run safely and securely.
Brian, whose career spans roles from OT engineer to startup co-founder, opens up about his journey—highlighting his drive to push the boundaries of traditional OT security and the evolution of key industry technologies. The conversation explores everything from the persistent lack of innovation in OT, to AI’s growing role in tackling the daunting challenges of risk reduction, visibility, and scaling assessments across sprawling environments.
If you’ve ever wondered how new tech like AI is reshaping industrial cybersecurity, why “we’ve always done it this way” just doesn’t cut it anymore, or how organizations can realistically stay ahead without breaking the bank, this episode delivers honest insights, practical advice, and a look toward an exciting, if sometimes daunting, future.
So grab your headphones and settle in as Aaron and Brian share stories, hot takes, and strategies designed to protect it all—because in critical infrastructure, the stakes have never been higher.
Key Moments: 
06:45 OT Cyber Industry Evolution
11:57 Evolving Challenges in OT Security
19:34 Bridging the OT Security Skills Gap
21:54 Enhancing OT Security Understanding
30:46 AI Model Security Challenges
34:26 Rapid Scaling for Site Assessments
40:56 Simulating Cyber Threat Responses
47:19 Operational Priorities: Equipment vs. Cyber Tools
49:30 Focus on Meaningful Security Metrics
56:30 Rapid AI Adoption vs. Internet
01:02:12 Cybersecurity: Small Targets are Vulnerable
About the guest : 
Brian Proctor is a cybersecurity leader with over 20 years of experience protecting critical infrastructure across energy, industrial automation, and operational technology sectors. As the co-founder and CEO of Frenos, he empowers critical infrastructure operators to proactively secure their environments against evolving cyber threats.
Brian built his foundation in ICS/OT cybersecurity during his 13+ year tenure at two progressive California Investor Owned Utilities, San Diego Gas & Electric and Southern California Edison serving the 2nd and 8th largest cities in the United States. He managed a team of 15 security engineers and researchers across 150+ projects, established OT security roadmaps, and co-invented an R&D Magazine Top 100 award-winning GPS anti-spoofing mitigation technology that earned him a patent.
Brian has published IEEE papers on security monitoring, served as Critical Infrastructure Co-Chair for Securing Our eCity, and regularly speaks at conferences to educate and build the ICS/OT cybersecurity community. He holds technical certifications including GICSP, CISSP, and CRISC, along with a Business Administration degree from the University of San Diego.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2072084/c1a-w52rp-z32x80p6u2g9-pyktdo.jpg"></itunes:image>
                                                                            <itunes:duration>01:08:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Inside OT Penetration Testing: Red Teaming, Risks, and Real-World Lessons for Critical Infrastructure with Justin Searle]]>
                </title>
                <pubDate>Mon, 16 Jun 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2065742</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow sits down with OT security expert Justin Searle, Director of ICS Security at InGuardians, for a deep dive into the ever-evolving world of OT and IT cybersecurity. </span></p>
<p><span style="font-weight:400;">With over 25 years of experience, ranging from hands-on engineering and water treatment facilities to red-team penetration testing on critical infrastructures such as airports and power plants, Justin brings a wealth of insight and real-world anecdotes.</span></p>
<p><span style="font-weight:400;">This episode unpacks what it really takes to assess and secure operational technology environments. Whether you’re a C-suite executive, a seasoned cyber pro, or brand new to OT security, you’ll hear why network expertise, cross-team trust, and careful, collaborative engagement with engineers are so crucial when testing high-stakes environments. Aaron and Justin also discuss how the industry has matured, the importance of dedicated OT cybersecurity teams, and why practical, people-first approaches make all the difference, especially when lives, reliability, and national infrastructure are on the line.</span></p>
<p><span style="font-weight:400;">Get ready for actionable advice, hard-earned lessons from the field, and a candid look at both the progress and the ongoing challenges in protecting our most critical systems.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:55 Breaking Into Cybersecurity Without Classes</span></p>
<p><span style="font-weight:400;">09:26 Production Environment Security Testing</span></p>
<p><span style="font-weight:400;">13:28 Credential Evaluation and Light Probing</span></p>
<p><span style="font-weight:400;">14:33 Firewall Misconfiguration Comedy</span></p>
<p><span style="font-weight:400;">19:14 Dedicated OT Cybersecurity Professionals</span></p>
<p><span style="font-weight:400;">20:50 "Prioritize Reliability Over Latest Features"</span></p>
<p><span style="font-weight:400;">24:18 "IT-OT Convergence Challenges"</span></p>
<p><span style="font-weight:400;">29:04 Patching Program and OT Security</span></p>
<p><span style="font-weight:400;">32:08 Complexity of OT Environments</span></p>
<p><span style="font-weight:400;">35:45 Dress-Code Trust in Industry</span></p>
<p><span style="font-weight:400;">38:23 Legacy System Security Challenges</span></p>
<p><span style="font-weight:400;">42:15 OT Cybersecurity for IT Professionals</span></p>
<p><span style="font-weight:400;">43:40 "Building Rapport with Food"</span></p>
<p><span style="font-weight:400;">47:59 Future OT Cyber Risks and Readiness</span></p>
<p><span style="font-weight:400;">51:30 Skill Building for Tech Professionals</span></p>
<p> </p>
<p><strong>About the Guest : </strong></p>
<p><span style="font-weight:400;">Justin Searle is the Director of ICS Security at InGuardians, specializing in ICS security architecture design and penetration testing.  He led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and played critical roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).  </span></p>
<p> </p>
<p><span style="font-weight:400;">Justin has taught hacking techniques, forensics, networking, and intrusion detection courses for multiple universities, corporations, and security conferences.  His current courses at SANS and Black Hat are among the world's most attended ICS cybersecurity courses.  Justin is currently a Senior Instructor for the SANS Institute and a faculty member at IANS. In addition to electric power industry conferences, he frequently presents at top international security conferences such as Black Hat, DEFCON, OWASP, HITBSecConf, Brucon, Shmoocon, Toorcon, Nullcon, Hardware.io, and AusCERT.  </span></p>
<p> </p>
<p><span></span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow sits down with OT security expert Justin Searle, Director of ICS Security at InGuardians, for a deep dive into the ever-evolving world of OT and IT cybersecurity. 
With over 25 years of experience, ranging from hands-on engineering and water treatment facilities to red-team penetration testing on critical infrastructures such as airports and power plants, Justin brings a wealth of insight and real-world anecdotes.
This episode unpacks what it really takes to assess and secure operational technology environments. Whether you’re a C-suite executive, a seasoned cyber pro, or brand new to OT security, you’ll hear why network expertise, cross-team trust, and careful, collaborative engagement with engineers are so crucial when testing high-stakes environments. Aaron and Justin also discuss how the industry has matured, the importance of dedicated OT cybersecurity teams, and why practical, people-first approaches make all the difference, especially when lives, reliability, and national infrastructure are on the line.
Get ready for actionable advice, hard-earned lessons from the field, and a candid look at both the progress and the ongoing challenges in protecting our most critical systems.
 
Key Moments: 
05:55 Breaking Into Cybersecurity Without Classes
09:26 Production Environment Security Testing
13:28 Credential Evaluation and Light Probing
14:33 Firewall Misconfiguration Comedy
19:14 Dedicated OT Cybersecurity Professionals
20:50 "Prioritize Reliability Over Latest Features"
24:18 "IT-OT Convergence Challenges"
29:04 Patching Program and OT Security
32:08 Complexity of OT Environments
35:45 Dress-Code Trust in Industry
38:23 Legacy System Security Challenges
42:15 OT Cybersecurity for IT Professionals
43:40 "Building Rapport with Food"
47:59 Future OT Cyber Risks and Readiness
51:30 Skill Building for Tech Professionals
 
About the Guest : 
Justin Searle is the Director of ICS Security at InGuardians, specializing in ICS security architecture design and penetration testing.  He led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and played critical roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).  
 
Justin has taught hacking techniques, forensics, networking, and intrusion detection courses for multiple universities, corporations, and security conferences.  His current courses at SANS and Black Hat are among the world's most attended ICS cybersecurity courses.  Justin is currently a Senior Instructor for the SANS Institute and a faculty member at IANS. In addition to electric power industry conferences, he frequently presents at top international security conferences such as Black Hat, DEFCON, OWASP, HITBSecConf, Brucon, Shmoocon, Toorcon, Nullcon, Hardware.io, and AusCERT.  
 
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Inside OT Penetration Testing: Red Teaming, Risks, and Real-World Lessons for Critical Infrastructure with Justin Searle]]>
                </itunes:title>
                                    <itunes:episode>62</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow sits down with OT security expert Justin Searle, Director of ICS Security at InGuardians, for a deep dive into the ever-evolving world of OT and IT cybersecurity. </span></p>
<p><span style="font-weight:400;">With over 25 years of experience, ranging from hands-on engineering and water treatment facilities to red-team penetration testing on critical infrastructures such as airports and power plants, Justin brings a wealth of insight and real-world anecdotes.</span></p>
<p><span style="font-weight:400;">This episode unpacks what it really takes to assess and secure operational technology environments. Whether you’re a C-suite executive, a seasoned cyber pro, or brand new to OT security, you’ll hear why network expertise, cross-team trust, and careful, collaborative engagement with engineers are so crucial when testing high-stakes environments. Aaron and Justin also discuss how the industry has matured, the importance of dedicated OT cybersecurity teams, and why practical, people-first approaches make all the difference, especially when lives, reliability, and national infrastructure are on the line.</span></p>
<p><span style="font-weight:400;">Get ready for actionable advice, hard-earned lessons from the field, and a candid look at both the progress and the ongoing challenges in protecting our most critical systems.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:55 Breaking Into Cybersecurity Without Classes</span></p>
<p><span style="font-weight:400;">09:26 Production Environment Security Testing</span></p>
<p><span style="font-weight:400;">13:28 Credential Evaluation and Light Probing</span></p>
<p><span style="font-weight:400;">14:33 Firewall Misconfiguration Comedy</span></p>
<p><span style="font-weight:400;">19:14 Dedicated OT Cybersecurity Professionals</span></p>
<p><span style="font-weight:400;">20:50 "Prioritize Reliability Over Latest Features"</span></p>
<p><span style="font-weight:400;">24:18 "IT-OT Convergence Challenges"</span></p>
<p><span style="font-weight:400;">29:04 Patching Program and OT Security</span></p>
<p><span style="font-weight:400;">32:08 Complexity of OT Environments</span></p>
<p><span style="font-weight:400;">35:45 Dress-Code Trust in Industry</span></p>
<p><span style="font-weight:400;">38:23 Legacy System Security Challenges</span></p>
<p><span style="font-weight:400;">42:15 OT Cybersecurity for IT Professionals</span></p>
<p><span style="font-weight:400;">43:40 "Building Rapport with Food"</span></p>
<p><span style="font-weight:400;">47:59 Future OT Cyber Risks and Readiness</span></p>
<p><span style="font-weight:400;">51:30 Skill Building for Tech Professionals</span></p>
<p> </p>
<p><strong>About the Guest : </strong></p>
<p><span style="font-weight:400;">Justin Searle is the Director of ICS Security at InGuardians, specializing in ICS security architecture design and penetration testing.  He led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and played critical roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).  </span></p>
<p> </p>
<p><span style="font-weight:400;">Justin has taught hacking techniques, forensics, networking, and intrusion detection courses for multiple universities, corporations, and security conferences.  His current courses at SANS and Black Hat are among the world's most attended ICS cybersecurity courses.  Justin is currently a Senior Instructor for the SANS Institute and a faculty member at IANS. In addition to electric power industry conferences, he frequently presents at top international security conferences such as Black Hat, DEFCON, OWASP, HITBSecConf, Brucon, Shmoocon, Toorcon, Nullcon, Hardware.io, and AusCERT.  </span></p>
<p> </p>
<p><span style="font-weight:400;">Justin leads prominent open-source projects, including The Control Thing Platform, Samurai Web Testing Framework (SamuraiWTF), and Samurai Security Testing Framework for Utilities (SamuraiSTFU).  He has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), Web Application Penetration Tester (GWAPT), and GIAC Industrial Control Security Professional (GICSP)</span></p>
<p> </p>
<p><strong>How to connect Justin: </strong></p>
<p><a href="https://www.controlthings.io/"><span style="font-weight:400;">https://www.controlthings.io</span></a></p>
<p><a href="https://www.linkedin.com/in/meeas/"><span style="font-weight:400;">https://www.linkedin.com/in/meeas/</span></a></p>
<p><span style="font-weight:400;">Email: justin@controlthings.io</span></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode,</strong><span style="font-weight:400;"> please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2065742/c1e-q237vud2vr9i73kn7-jpd58qzjsm1w-ylzm7b.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2065742&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=db55215d034c613230c124fbdc415e69fc404e4f395b5f84ffffb8edce3349a1" length="52330275"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow sits down with OT security expert Justin Searle, Director of ICS Security at InGuardians, for a deep dive into the ever-evolving world of OT and IT cybersecurity. 
With over 25 years of experience, ranging from hands-on engineering and water treatment facilities to red-team penetration testing on critical infrastructures such as airports and power plants, Justin brings a wealth of insight and real-world anecdotes.
This episode unpacks what it really takes to assess and secure operational technology environments. Whether you’re a C-suite executive, a seasoned cyber pro, or brand new to OT security, you’ll hear why network expertise, cross-team trust, and careful, collaborative engagement with engineers are so crucial when testing high-stakes environments. Aaron and Justin also discuss how the industry has matured, the importance of dedicated OT cybersecurity teams, and why practical, people-first approaches make all the difference, especially when lives, reliability, and national infrastructure are on the line.
Get ready for actionable advice, hard-earned lessons from the field, and a candid look at both the progress and the ongoing challenges in protecting our most critical systems.
 
Key Moments: 
05:55 Breaking Into Cybersecurity Without Classes
09:26 Production Environment Security Testing
13:28 Credential Evaluation and Light Probing
14:33 Firewall Misconfiguration Comedy
19:14 Dedicated OT Cybersecurity Professionals
20:50 "Prioritize Reliability Over Latest Features"
24:18 "IT-OT Convergence Challenges"
29:04 Patching Program and OT Security
32:08 Complexity of OT Environments
35:45 Dress-Code Trust in Industry
38:23 Legacy System Security Challenges
42:15 OT Cybersecurity for IT Professionals
43:40 "Building Rapport with Food"
47:59 Future OT Cyber Risks and Readiness
51:30 Skill Building for Tech Professionals
 
About the Guest : 
Justin Searle is the Director of ICS Security at InGuardians, specializing in ICS security architecture design and penetration testing.  He led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and played critical roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).  
 
Justin has taught hacking techniques, forensics, networking, and intrusion detection courses for multiple universities, corporations, and security conferences.  His current courses at SANS and Black Hat are among the world's most attended ICS cybersecurity courses.  Justin is currently a Senior Instructor for the SANS Institute and a faculty member at IANS. In addition to electric power industry conferences, he frequently presents at top international security conferences such as Black Hat, DEFCON, OWASP, HITBSecConf, Brucon, Shmoocon, Toorcon, Nullcon, Hardware.io, and AusCERT.  
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2065742/c1a-w52rp-wwx127q6s4r4-fnzlzo.jpg"></itunes:image>
                                                                            <itunes:duration>00:54:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Y2K to 2038: Uncovering Time Bombs in OT and ICS Systems with Pedro Umbelino]]>
                </title>
                <pubDate>Mon, 09 Jun 2025 12:34:48 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2060628</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode of Protect It All, host Aaron Crow welcomes Pedro Umbelino, Principal Research Scientist at BitSight, for an insightful and lively conversation recorded shortly after they met at RSA. Pedro shares stories of his early days in computing, from scavenging parts as a kid to teaching himself programming on a ZX Spectrum. The discussion quickly dives into critical cybersecurity issues across the interconnected worlds of IT and OT, focusing on dramatic vulnerabilities in Automatic Tank Gauges (ATGs) at gas stations—exposing ways attackers could cause significant physical damage and even spark major operational disruptions, all through insecure legacy protocols.</span></p>
<p> </p>
<p><span style="font-weight:400;">Pedro also brings attention to a ticking time bomb: the “Year 2038” problem, where millions (if not billions) of 32-bit systems might fail due to an epoch time rollover—an issue that could have consequences reminiscent of Y2K, but on a potentially broader scale, especially for OT and critical infrastructure.</span></p>
<p> </p>
<p><span style="font-weight:400;">Throughout the episode, Aaron and Pedro share practical strategies, lessons from the field, and the sobering reminder that many of these vulnerabilities are still lurking below the surface. The conversation highlights the importance of awareness, collaboration across industry and ISPs, and a proactive approach to understanding and hardening both new and legacy systems. Whether you're an OT engineer, a security researcher, or just curious about what it means to truly “protect it all,” this episode offers a fascinating look at the evolving landscape of digital and physical security risks.</span></p>
<p> </p>
<p><strong>Key Moments: </strong><strong><br /><br /></strong></p>
<p><span style="font-weight:400;">06:37 Letting Go of Old Memories</span></p>
<p><span style="font-weight:400;">15:12 Refueling Spill Risks Concern Technicians</span></p>
<p><span style="font-weight:400;">17:37 Understanding Risks Beyond Fear</span></p>
<p><span style="font-weight:400;">23:24 Internet Exposure Risks for OT Devices</span></p>
<p><span style="font-weight:400;">32:17 Global Cyber Incident Response Challenges</span></p>
<p><span style="font-weight:400;">35:30 Legacy System Challenges</span></p>
<p><span style="font-weight:400;">39:19 Unidentified Cyber Assets Risk</span></p>
<p><span style="font-weight:400;">48:41 "Understanding the Epochalypse Project's Challenges"</span></p>
<p><span style="font-weight:400;">49:31 Testing System Vulnerabilities at Scale</span></p>
<p><span style="font-weight:400;">55:12 Tech Vulnerabilities Analogous to Y2K</span></p>
<p><span style="font-weight:400;">01:03:08 Challenges in OT Modernization</span></p>
<p> </p>
<p><strong>About the Guest:</strong></p>
<p><span style="font-weight:400;">Pedro Umbelino currently holds the position of Principal Research Scientist at Bitsight Technologies and brings over a decade of experience in dedicated security research.</span></p>
<p><span style="font-weight:400;">⁤His eclectic curiosity has led to the uncovering of vulnerabilities spanning a gamut of technologies, highlighting critical issues in multiple devices and software, ranging from your everyday smartphone to household smart vacuums, from the intricacies of HTTP servers to the nuances of NFC radio frequencies, from vehicle GPS trackers to protocol-level denial of service attacks. </span></p>
<p><span style="font-weight:400;">Pedro is committed to advancing cybersecurity knowledge and has shared his findings at prominent conferences, including Bsides Lisbon, DEF CON, Hack.lu and RSA.</span></p>
<p><strong>How to connect Pedro : </strong><span style="font-weight:400;"><br /></span><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/pedroumbelino/"><span style="font-weight:400;">https://www.linkedin.com/in/pedroumbelino/</span><span style="font-weight:400;"><br /></span></a><span></span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of Protect It All, host Aaron Crow welcomes Pedro Umbelino, Principal Research Scientist at BitSight, for an insightful and lively conversation recorded shortly after they met at RSA. Pedro shares stories of his early days in computing, from scavenging parts as a kid to teaching himself programming on a ZX Spectrum. The discussion quickly dives into critical cybersecurity issues across the interconnected worlds of IT and OT, focusing on dramatic vulnerabilities in Automatic Tank Gauges (ATGs) at gas stations—exposing ways attackers could cause significant physical damage and even spark major operational disruptions, all through insecure legacy protocols.
 
Pedro also brings attention to a ticking time bomb: the “Year 2038” problem, where millions (if not billions) of 32-bit systems might fail due to an epoch time rollover—an issue that could have consequences reminiscent of Y2K, but on a potentially broader scale, especially for OT and critical infrastructure.
 
Throughout the episode, Aaron and Pedro share practical strategies, lessons from the field, and the sobering reminder that many of these vulnerabilities are still lurking below the surface. The conversation highlights the importance of awareness, collaboration across industry and ISPs, and a proactive approach to understanding and hardening both new and legacy systems. Whether you're an OT engineer, a security researcher, or just curious about what it means to truly “protect it all,” this episode offers a fascinating look at the evolving landscape of digital and physical security risks.
 
Key Moments: 
06:37 Letting Go of Old Memories
15:12 Refueling Spill Risks Concern Technicians
17:37 Understanding Risks Beyond Fear
23:24 Internet Exposure Risks for OT Devices
32:17 Global Cyber Incident Response Challenges
35:30 Legacy System Challenges
39:19 Unidentified Cyber Assets Risk
48:41 "Understanding the Epochalypse Project's Challenges"
49:31 Testing System Vulnerabilities at Scale
55:12 Tech Vulnerabilities Analogous to Y2K
01:03:08 Challenges in OT Modernization
 
About the Guest:
Pedro Umbelino currently holds the position of Principal Research Scientist at Bitsight Technologies and brings over a decade of experience in dedicated security research.
⁤His eclectic curiosity has led to the uncovering of vulnerabilities spanning a gamut of technologies, highlighting critical issues in multiple devices and software, ranging from your everyday smartphone to household smart vacuums, from the intricacies of HTTP servers to the nuances of NFC radio frequencies, from vehicle GPS trackers to protocol-level denial of service attacks. 
Pedro is committed to advancing cybersecurity knowledge and has shared his findings at prominent conferences, including Bsides Lisbon, DEF CON, Hack.lu and RSA.
How to connect Pedro : LinkedIn: https://www.linkedin.com/in/pedroumbelino/]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[From Y2K to 2038: Uncovering Time Bombs in OT and ICS Systems with Pedro Umbelino]]>
                </itunes:title>
                                    <itunes:episode>61</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode of Protect It All, host Aaron Crow welcomes Pedro Umbelino, Principal Research Scientist at BitSight, for an insightful and lively conversation recorded shortly after they met at RSA. Pedro shares stories of his early days in computing, from scavenging parts as a kid to teaching himself programming on a ZX Spectrum. The discussion quickly dives into critical cybersecurity issues across the interconnected worlds of IT and OT, focusing on dramatic vulnerabilities in Automatic Tank Gauges (ATGs) at gas stations—exposing ways attackers could cause significant physical damage and even spark major operational disruptions, all through insecure legacy protocols.</span></p>
<p> </p>
<p><span style="font-weight:400;">Pedro also brings attention to a ticking time bomb: the “Year 2038” problem, where millions (if not billions) of 32-bit systems might fail due to an epoch time rollover—an issue that could have consequences reminiscent of Y2K, but on a potentially broader scale, especially for OT and critical infrastructure.</span></p>
<p> </p>
<p><span style="font-weight:400;">Throughout the episode, Aaron and Pedro share practical strategies, lessons from the field, and the sobering reminder that many of these vulnerabilities are still lurking below the surface. The conversation highlights the importance of awareness, collaboration across industry and ISPs, and a proactive approach to understanding and hardening both new and legacy systems. Whether you're an OT engineer, a security researcher, or just curious about what it means to truly “protect it all,” this episode offers a fascinating look at the evolving landscape of digital and physical security risks.</span></p>
<p> </p>
<p><strong>Key Moments: </strong><strong><br /><br /></strong></p>
<p><span style="font-weight:400;">06:37 Letting Go of Old Memories</span></p>
<p><span style="font-weight:400;">15:12 Refueling Spill Risks Concern Technicians</span></p>
<p><span style="font-weight:400;">17:37 Understanding Risks Beyond Fear</span></p>
<p><span style="font-weight:400;">23:24 Internet Exposure Risks for OT Devices</span></p>
<p><span style="font-weight:400;">32:17 Global Cyber Incident Response Challenges</span></p>
<p><span style="font-weight:400;">35:30 Legacy System Challenges</span></p>
<p><span style="font-weight:400;">39:19 Unidentified Cyber Assets Risk</span></p>
<p><span style="font-weight:400;">48:41 "Understanding the Epochalypse Project's Challenges"</span></p>
<p><span style="font-weight:400;">49:31 Testing System Vulnerabilities at Scale</span></p>
<p><span style="font-weight:400;">55:12 Tech Vulnerabilities Analogous to Y2K</span></p>
<p><span style="font-weight:400;">01:03:08 Challenges in OT Modernization</span></p>
<p> </p>
<p><strong>About the Guest:</strong></p>
<p><span style="font-weight:400;">Pedro Umbelino currently holds the position of Principal Research Scientist at Bitsight Technologies and brings over a decade of experience in dedicated security research.</span></p>
<p><span style="font-weight:400;">⁤His eclectic curiosity has led to the uncovering of vulnerabilities spanning a gamut of technologies, highlighting critical issues in multiple devices and software, ranging from your everyday smartphone to household smart vacuums, from the intricacies of HTTP servers to the nuances of NFC radio frequencies, from vehicle GPS trackers to protocol-level denial of service attacks. </span></p>
<p><span style="font-weight:400;">Pedro is committed to advancing cybersecurity knowledge and has shared his findings at prominent conferences, including Bsides Lisbon, DEF CON, Hack.lu and RSA.</span></p>
<p><strong>How to connect Pedro : </strong><span style="font-weight:400;"><br /></span><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/pedroumbelino/"><span style="font-weight:400;">https://www.linkedin.com/in/pedroumbelino/</span><span style="font-weight:400;"><br /></span></a><span style="font-weight:400;">X: </span><a href="https://x.com/kripthor"><span style="font-weight:400;">https://x.com/kripthor</span><span style="font-weight:400;"><br /></span></a><span style="font-weight:400;">Website: </span><a href="https://www.bitsight.com/"><span style="font-weight:400;">https://www.bitsight.com/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2060628/c1e-v5m9pb79j2qa4o2kq-wwx0m7k1t7qm-u4v2wt.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2060628&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=f7a46b24ca8d8f04fd7be799431f4d5ed845c5e46950b40ac39864c3b3c7c1fb" length="60218191"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of Protect It All, host Aaron Crow welcomes Pedro Umbelino, Principal Research Scientist at BitSight, for an insightful and lively conversation recorded shortly after they met at RSA. Pedro shares stories of his early days in computing, from scavenging parts as a kid to teaching himself programming on a ZX Spectrum. The discussion quickly dives into critical cybersecurity issues across the interconnected worlds of IT and OT, focusing on dramatic vulnerabilities in Automatic Tank Gauges (ATGs) at gas stations—exposing ways attackers could cause significant physical damage and even spark major operational disruptions, all through insecure legacy protocols.
 
Pedro also brings attention to a ticking time bomb: the “Year 2038” problem, where millions (if not billions) of 32-bit systems might fail due to an epoch time rollover—an issue that could have consequences reminiscent of Y2K, but on a potentially broader scale, especially for OT and critical infrastructure.
 
Throughout the episode, Aaron and Pedro share practical strategies, lessons from the field, and the sobering reminder that many of these vulnerabilities are still lurking below the surface. The conversation highlights the importance of awareness, collaboration across industry and ISPs, and a proactive approach to understanding and hardening both new and legacy systems. Whether you're an OT engineer, a security researcher, or just curious about what it means to truly “protect it all,” this episode offers a fascinating look at the evolving landscape of digital and physical security risks.
 
Key Moments: 
06:37 Letting Go of Old Memories
15:12 Refueling Spill Risks Concern Technicians
17:37 Understanding Risks Beyond Fear
23:24 Internet Exposure Risks for OT Devices
32:17 Global Cyber Incident Response Challenges
35:30 Legacy System Challenges
39:19 Unidentified Cyber Assets Risk
48:41 "Understanding the Epochalypse Project's Challenges"
49:31 Testing System Vulnerabilities at Scale
55:12 Tech Vulnerabilities Analogous to Y2K
01:03:08 Challenges in OT Modernization
 
About the Guest:
Pedro Umbelino currently holds the position of Principal Research Scientist at Bitsight Technologies and brings over a decade of experience in dedicated security research.
⁤His eclectic curiosity has led to the uncovering of vulnerabilities spanning a gamut of technologies, highlighting critical issues in multiple devices and software, ranging from your everyday smartphone to household smart vacuums, from the intricacies of HTTP servers to the nuances of NFC radio frequencies, from vehicle GPS trackers to protocol-level denial of service attacks. 
Pedro is committed to advancing cybersecurity knowledge and has shared his findings at prominent conferences, including Bsides Lisbon, DEF CON, Hack.lu and RSA.
How to connect Pedro : LinkedIn: https://www.linkedin.com/in/pedroumbelino/]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2060628/c1a-w52rp-pk47jw1ps21-qhx22k.jpg"></itunes:image>
                                                                            <itunes:duration>01:07:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Building Trust and Bridging the Gap in OT and IT Cybersecurity]]>
                </title>
                <pubDate>Mon, 02 Jun 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2056126</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow sits down with Dean Parsons, one of the most recognized names in the OT and industrial control systems (ICS) security world, for a candid and insightful conversation.</span></p>
<p> </p>
<p><span style="font-weight:400;">Join Aaron and Dean as they explore what it truly takes to bridge the worlds of IT and OT. Drawing from decades of industry experience, their discussion covers everything from building trust across teams, to the superpower of understanding both operational technology and cybersecurity. Expect real-world stories, practical advice on breaking into OT cybersecurity, and memorable lessons from the plant floor to the boardroom.</span></p>
<p> </p>
<p><span style="font-weight:400;">They also break down what makes OT security fundamentally different from traditional IT approaches, why risk-based strategies are essential, and how building relationships, sometimes over donuts and coffee—can be just as important as deploying firewalls and patching systems. Whether you’re new to ICS and OT security, or a seasoned defender looking for fresh perspective, this episode brings actionable tips, honest assessments, and inspiration to help you better protect what matters most.</span></p>
<p> </p>
<p><span style="font-weight:400;">So grab your hard hat (and maybe a box of donuts!), and get ready for a masterclass on collaboration, building skills, and why trust is the real currency in the fight to secure our critical infrastructure.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">05:32 Listening Over Speaking in Legacy Spaces</span></p>
<p><span style="font-weight:400;">07:01 IT Security Teamwork and Trust</span></p>
<p><span style="font-weight:400;">11:21 Cost-Efficient ICS Security Solutions</span></p>
<p><span style="font-weight:400;">15:42 Converging Skill Sets in IT Security</span></p>
<p><span style="font-weight:400;">17:36 OT vs IT: Different Risks</span></p>
<p><span style="font-weight:400;">22:28 Prioritizing Post-Assessment Actions</span></p>
<p><span style="font-weight:400;">23:20 Prioritize SANS ICS Critical Controls</span></p>
<p><span style="font-weight:400;">29:31 Engineering Perspective on Critical Assets</span></p>
<p><span style="font-weight:400;">30:47 Detecting Misuse of Control Systems</span></p>
<p><span style="font-weight:400;">35:52 Collaborative Incident Response Dynamics</span></p>
<p><span style="font-weight:400;">39:03 Remote Hydroelectric Plant Journey</span></p>
<p><span style="font-weight:400;">40:45 Building Trust with Baked Goods</span></p>
<p><span style="font-weight:400;">44:55 "Safety Crucial in Facility Disruptions"</span></p>
<p><span style="font-weight:400;">48:50 ICS Security: Closing Safety Gaps</span></p>
<p><span style="font-weight:400;">53:37 Enhancing ICS Security Controls</span></p>
<p><span style="font-weight:400;">57:18 "ICS Summit and LinkedIn Activities"</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;"><br /></span><span style="font-weight:400;">Dean is the CEO and Principal Consultant of ICS Defense Force and brings over 20 years of technical and management experience to the classroom. He has worked in both Information Technology and Industrial Control System (ICS) Cyber Defense in critical infrastructure sectors such as telecommunications, electric generation, transmission, distribution, and oil &amp; gas refineries, storage, and distribution, and water management. Dean is an ambassador for defending industrial systems and an advocate for the safety, reliability, and cyber protection of critical infrastructure. His mission as an instructor is to empower each of his students, and he earnestly preaches that “Defense is Do-able!” </span></p>
<p> </p>
<p><span style="font-weight:400;">Over the course of his career, Dean’s accomplishments include establishing entire ICS security programs for critical infrastructure se...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow sits down with Dean Parsons, one of the most recognized names in the OT and industrial control systems (ICS) security world, for a candid and insightful conversation.
 
Join Aaron and Dean as they explore what it truly takes to bridge the worlds of IT and OT. Drawing from decades of industry experience, their discussion covers everything from building trust across teams, to the superpower of understanding both operational technology and cybersecurity. Expect real-world stories, practical advice on breaking into OT cybersecurity, and memorable lessons from the plant floor to the boardroom.
 
They also break down what makes OT security fundamentally different from traditional IT approaches, why risk-based strategies are essential, and how building relationships, sometimes over donuts and coffee—can be just as important as deploying firewalls and patching systems. Whether you’re new to ICS and OT security, or a seasoned defender looking for fresh perspective, this episode brings actionable tips, honest assessments, and inspiration to help you better protect what matters most.
 
So grab your hard hat (and maybe a box of donuts!), and get ready for a masterclass on collaboration, building skills, and why trust is the real currency in the fight to secure our critical infrastructure.
 
Key Moments: 
 
05:32 Listening Over Speaking in Legacy Spaces
07:01 IT Security Teamwork and Trust
11:21 Cost-Efficient ICS Security Solutions
15:42 Converging Skill Sets in IT Security
17:36 OT vs IT: Different Risks
22:28 Prioritizing Post-Assessment Actions
23:20 Prioritize SANS ICS Critical Controls
29:31 Engineering Perspective on Critical Assets
30:47 Detecting Misuse of Control Systems
35:52 Collaborative Incident Response Dynamics
39:03 Remote Hydroelectric Plant Journey
40:45 Building Trust with Baked Goods
44:55 "Safety Crucial in Facility Disruptions"
48:50 ICS Security: Closing Safety Gaps
53:37 Enhancing ICS Security Controls
57:18 "ICS Summit and LinkedIn Activities"
 
About the guest : 
Dean is the CEO and Principal Consultant of ICS Defense Force and brings over 20 years of technical and management experience to the classroom. He has worked in both Information Technology and Industrial Control System (ICS) Cyber Defense in critical infrastructure sectors such as telecommunications, electric generation, transmission, distribution, and oil & gas refineries, storage, and distribution, and water management. Dean is an ambassador for defending industrial systems and an advocate for the safety, reliability, and cyber protection of critical infrastructure. His mission as an instructor is to empower each of his students, and he earnestly preaches that “Defense is Do-able!” 
 
Over the course of his career, Dean’s accomplishments include establishing entire ICS security programs for critical infrastructure se...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Building Trust and Bridging the Gap in OT and IT Cybersecurity]]>
                </itunes:title>
                                    <itunes:episode>60</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow sits down with Dean Parsons, one of the most recognized names in the OT and industrial control systems (ICS) security world, for a candid and insightful conversation.</span></p>
<p> </p>
<p><span style="font-weight:400;">Join Aaron and Dean as they explore what it truly takes to bridge the worlds of IT and OT. Drawing from decades of industry experience, their discussion covers everything from building trust across teams, to the superpower of understanding both operational technology and cybersecurity. Expect real-world stories, practical advice on breaking into OT cybersecurity, and memorable lessons from the plant floor to the boardroom.</span></p>
<p> </p>
<p><span style="font-weight:400;">They also break down what makes OT security fundamentally different from traditional IT approaches, why risk-based strategies are essential, and how building relationships, sometimes over donuts and coffee—can be just as important as deploying firewalls and patching systems. Whether you’re new to ICS and OT security, or a seasoned defender looking for fresh perspective, this episode brings actionable tips, honest assessments, and inspiration to help you better protect what matters most.</span></p>
<p> </p>
<p><span style="font-weight:400;">So grab your hard hat (and maybe a box of donuts!), and get ready for a masterclass on collaboration, building skills, and why trust is the real currency in the fight to secure our critical infrastructure.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">05:32 Listening Over Speaking in Legacy Spaces</span></p>
<p><span style="font-weight:400;">07:01 IT Security Teamwork and Trust</span></p>
<p><span style="font-weight:400;">11:21 Cost-Efficient ICS Security Solutions</span></p>
<p><span style="font-weight:400;">15:42 Converging Skill Sets in IT Security</span></p>
<p><span style="font-weight:400;">17:36 OT vs IT: Different Risks</span></p>
<p><span style="font-weight:400;">22:28 Prioritizing Post-Assessment Actions</span></p>
<p><span style="font-weight:400;">23:20 Prioritize SANS ICS Critical Controls</span></p>
<p><span style="font-weight:400;">29:31 Engineering Perspective on Critical Assets</span></p>
<p><span style="font-weight:400;">30:47 Detecting Misuse of Control Systems</span></p>
<p><span style="font-weight:400;">35:52 Collaborative Incident Response Dynamics</span></p>
<p><span style="font-weight:400;">39:03 Remote Hydroelectric Plant Journey</span></p>
<p><span style="font-weight:400;">40:45 Building Trust with Baked Goods</span></p>
<p><span style="font-weight:400;">44:55 "Safety Crucial in Facility Disruptions"</span></p>
<p><span style="font-weight:400;">48:50 ICS Security: Closing Safety Gaps</span></p>
<p><span style="font-weight:400;">53:37 Enhancing ICS Security Controls</span></p>
<p><span style="font-weight:400;">57:18 "ICS Summit and LinkedIn Activities"</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;"><br /></span><span style="font-weight:400;">Dean is the CEO and Principal Consultant of ICS Defense Force and brings over 20 years of technical and management experience to the classroom. He has worked in both Information Technology and Industrial Control System (ICS) Cyber Defense in critical infrastructure sectors such as telecommunications, electric generation, transmission, distribution, and oil &amp; gas refineries, storage, and distribution, and water management. Dean is an ambassador for defending industrial systems and an advocate for the safety, reliability, and cyber protection of critical infrastructure. His mission as an instructor is to empower each of his students, and he earnestly preaches that “Defense is Do-able!” </span></p>
<p> </p>
<p><span style="font-weight:400;">Over the course of his career, Dean’s accomplishments include establishing entire ICS security programs for critical infrastructure sectors, successfully conducting industrial-grade incident response and tabletops, ICS digital forensics, and ICS/OT Cybersecurity assessments across multiple sectors. As a SANS Principal Instructor, Dean teaches ICS515: ICS Visibility, Detection, and Response, is a co-author of the SANS Course ICS418: ICS Security Essentials for Managers and an author of SANS ICS Engineer Technical Awareness Training. Dean is a member of the SANS GIAC Advisory Board and holds many cybersecurity professional certifications including the GICSP, GRID, GSLC, and GCIA, as well as the CISSP®, and holds a BS in computer science. When not in the field, Dean spends tine chasing icebergs off the coast of Newfoundland on a jetski, or writing electric 80s inspired electronic music in this band Arcade Knights.</span></p>
<p> </p>
<p><strong>Resources Mentioned: </strong></p>
<p><span style="font-weight:400;">5 ICS Cybersecurity Critical Controls: </span><a href="https://www.sans.org/white-papers/five-ics-cybersecurity-critical-controls/"><span style="font-weight:400;">https://www.sans.org/white-papers/five-ics-cybersecurity-critical-controls/</span></a></p>
<p><span style="font-weight:400;">SANS ICS Cybersecurity Summit: </span><a href="https://www.sans.org/cyber-security-training-events/ics-security-summit-2025/"><span style="font-weight:400;">https://www.sans.org/cyber-security-training-events/ics-security-summit-2025/</span></a></p>
<p><br /><br /></p>
<p><strong>How to connect Dean: </strong></p>
<p><a href="https://www.linkedin.com/in/dean-parsons-cybersecurity/"><span style="font-weight:400;">https://www.linkedin.com/in/dean-parsons-cybersecurity/</span></a></p>
<p><a href="https://www.sans.org/profiles/dean-parsons/"><span style="font-weight:400;">https://www.sans.org/profiles/dean-parsons/</span></a></p>
<p><span style="font-weight:400;">Dean’s Book:</span></p>
<p><a href="https://www.amazon.com/ICS-Cybersecurity-Field-Manual-EXCLUSIVE/dp/B0CGG6GMHW/"><span style="font-weight:400;">https://www.amazon.com/ICS-Cybersecurity-Field-Manual-EXCLUSIVE/dp/B0CGG6GMHW/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><strong>info@protectitall.co</strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2056126/c1e-q237vud4381h723r5-gp369k4jfjrx-yymnzj.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2056126&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=c250719f92238fbdf2368f80d41c3decb552287091b36e5e57e99d36607c40a7" length="58980708"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow sits down with Dean Parsons, one of the most recognized names in the OT and industrial control systems (ICS) security world, for a candid and insightful conversation.
 
Join Aaron and Dean as they explore what it truly takes to bridge the worlds of IT and OT. Drawing from decades of industry experience, their discussion covers everything from building trust across teams, to the superpower of understanding both operational technology and cybersecurity. Expect real-world stories, practical advice on breaking into OT cybersecurity, and memorable lessons from the plant floor to the boardroom.
 
They also break down what makes OT security fundamentally different from traditional IT approaches, why risk-based strategies are essential, and how building relationships, sometimes over donuts and coffee—can be just as important as deploying firewalls and patching systems. Whether you’re new to ICS and OT security, or a seasoned defender looking for fresh perspective, this episode brings actionable tips, honest assessments, and inspiration to help you better protect what matters most.
 
So grab your hard hat (and maybe a box of donuts!), and get ready for a masterclass on collaboration, building skills, and why trust is the real currency in the fight to secure our critical infrastructure.
 
Key Moments: 
 
05:32 Listening Over Speaking in Legacy Spaces
07:01 IT Security Teamwork and Trust
11:21 Cost-Efficient ICS Security Solutions
15:42 Converging Skill Sets in IT Security
17:36 OT vs IT: Different Risks
22:28 Prioritizing Post-Assessment Actions
23:20 Prioritize SANS ICS Critical Controls
29:31 Engineering Perspective on Critical Assets
30:47 Detecting Misuse of Control Systems
35:52 Collaborative Incident Response Dynamics
39:03 Remote Hydroelectric Plant Journey
40:45 Building Trust with Baked Goods
44:55 "Safety Crucial in Facility Disruptions"
48:50 ICS Security: Closing Safety Gaps
53:37 Enhancing ICS Security Controls
57:18 "ICS Summit and LinkedIn Activities"
 
About the guest : 
Dean is the CEO and Principal Consultant of ICS Defense Force and brings over 20 years of technical and management experience to the classroom. He has worked in both Information Technology and Industrial Control System (ICS) Cyber Defense in critical infrastructure sectors such as telecommunications, electric generation, transmission, distribution, and oil & gas refineries, storage, and distribution, and water management. Dean is an ambassador for defending industrial systems and an advocate for the safety, reliability, and cyber protection of critical infrastructure. His mission as an instructor is to empower each of his students, and he earnestly preaches that “Defense is Do-able!” 
 
Over the course of his career, Dean’s accomplishments include establishing entire ICS security programs for critical infrastructure se...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2056126/c1a-w52rp-v6dopzn6uj6p-vimvcz.jpg"></itunes:image>
                                                                            <itunes:duration>01:00:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Plant Operator to OT Security: Stories of Failures and Breakthroughs]]>
                </title>
                <pubDate>Mon, 26 May 2025 12:24:29 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2046039</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives deep into the intersection of IT and OT cybersecurity with special guest Gavin Dilworth—a plant operator turned automation engineer and cybersecurity expert. Listen in as Gavin shares his candid and often humorous journey from factory floors to global consulting, including how a workplace near-miss sparked his “lightbulb moment” about the similarities between health and safety and cybersecurity.</span></p>
<p><span style="font-weight:400;">Aaron and Gavin discuss everything from operators’ creative workarounds on the plant floor, to the importance of trust and rapport between IT and OT teams, and why having hands-on experience is key to building effective cybersecurity programs in critical infrastructure environments. </span></p>
<p><span style="font-weight:400;">You’ll also hear real-world stories of technology mishaps, the critical role of plant culture, and the practical challenges organizations face in securing legacy systems while keeping operations running.</span></p>
<p><span style="font-weight:400;">If you want honest, relatable insights and actionable advice on bridging the IT-OT divide—and a few laughs along the way—this episode is for you.</span></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">10:12 Operator Rounds and RFID Challenges</span></p>
<p><span style="font-weight:400;">12:56 Operators' Ingenuity and Knowledge</span></p>
<p><span style="font-weight:400;">21:29 IT vs. OT: Firmware Update Challenges</span></p>
<p><span style="font-weight:400;">26:49 Understanding and Accepting Risk</span></p>
<p><span style="font-weight:400;">28:12 Standards, Frameworks, and Continuity</span></p>
<p><span style="font-weight:400;">33:08 High Voltage Safety Precautions</span></p>
<p><span style="font-weight:400;">40:41 Bridging OT and IT Skills</span></p>
<p><span style="font-weight:400;">43:46 Cybersecurity Cross-Training Surge</span></p>
<p><span style="font-weight:400;">52:38 CISO Knowledge Gap in OT Security</span></p>
<p><span style="font-weight:400;">54:32 "Experience: Essential for Understanding"</span></p>
<p><span style="font-weight:400;">01:03:34 DCS System Configuration Challenges</span></p>
<p><span style="font-weight:400;">01:06:52 Neglecting Redundancy Risks Operations</span></p>
<p><span style="font-weight:400;">01:11:00 Optimizing Underutilized IT Resources</span></p>
<p><span style="font-weight:400;">01:20:04 "Understanding Systems Before Advice"</span></p>
<p><span style="font-weight:400;">01:22:06 Old Cables Remain Untouched</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Gavin Dilworth’s career took an unconventional path. As a plant operator, he was tasked with keeping production running smoothly and monitoring sensor readings, both on the computer and around the factory. However, Gavin was never quite the model operator—rather than dutifully making rounds and comparing readings, he often found himself absorbed in books, dreaming of a future in IT. Though he laughs about being a “pretty terrible operator,” Gavin’s story reflects his early drive to pursue his true interests in technology, even when duty called elsewhere.</span></p>
<p><strong>How to connect Gavin : </strong></p>
<p><span style="font-weight:400;">Linkedin : </span><a href="https://www.linkedin.com/in/gavin-dilworth/"><span style="font-weight:400;">https://www.linkedin.com/in/gavin-dilworth/</span></a></p>
<p><span style="font-weight:400;">Website: </span><a href="https://assessmentplus.co.nz/"><span style="font-weight:400;">https://assessmentplus.co.nz/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span></span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow dives deep into the intersection of IT and OT cybersecurity with special guest Gavin Dilworth—a plant operator turned automation engineer and cybersecurity expert. Listen in as Gavin shares his candid and often humorous journey from factory floors to global consulting, including how a workplace near-miss sparked his “lightbulb moment” about the similarities between health and safety and cybersecurity.
Aaron and Gavin discuss everything from operators’ creative workarounds on the plant floor, to the importance of trust and rapport between IT and OT teams, and why having hands-on experience is key to building effective cybersecurity programs in critical infrastructure environments. 
You’ll also hear real-world stories of technology mishaps, the critical role of plant culture, and the practical challenges organizations face in securing legacy systems while keeping operations running.
If you want honest, relatable insights and actionable advice on bridging the IT-OT divide—and a few laughs along the way—this episode is for you.
Key Moments: 
10:12 Operator Rounds and RFID Challenges
12:56 Operators' Ingenuity and Knowledge
21:29 IT vs. OT: Firmware Update Challenges
26:49 Understanding and Accepting Risk
28:12 Standards, Frameworks, and Continuity
33:08 High Voltage Safety Precautions
40:41 Bridging OT and IT Skills
43:46 Cybersecurity Cross-Training Surge
52:38 CISO Knowledge Gap in OT Security
54:32 "Experience: Essential for Understanding"
01:03:34 DCS System Configuration Challenges
01:06:52 Neglecting Redundancy Risks Operations
01:11:00 Optimizing Underutilized IT Resources
01:20:04 "Understanding Systems Before Advice"
01:22:06 Old Cables Remain Untouched
About the guest : 
Gavin Dilworth’s career took an unconventional path. As a plant operator, he was tasked with keeping production running smoothly and monitoring sensor readings, both on the computer and around the factory. However, Gavin was never quite the model operator—rather than dutifully making rounds and comparing readings, he often found himself absorbed in books, dreaming of a future in IT. Though he laughs about being a “pretty terrible operator,” Gavin’s story reflects his early drive to pursue his true interests in technology, even when duty called elsewhere.
How to connect Gavin : 
Linkedin : https://www.linkedin.com/in/gavin-dilworth/
Website: https://assessmentplus.co.nz/
Connect With Aaron Crow:

Website: www.corvosec.com 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From Plant Operator to OT Security: Stories of Failures and Breakthroughs]]>
                </itunes:title>
                                    <itunes:episode>59</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives deep into the intersection of IT and OT cybersecurity with special guest Gavin Dilworth—a plant operator turned automation engineer and cybersecurity expert. Listen in as Gavin shares his candid and often humorous journey from factory floors to global consulting, including how a workplace near-miss sparked his “lightbulb moment” about the similarities between health and safety and cybersecurity.</span></p>
<p><span style="font-weight:400;">Aaron and Gavin discuss everything from operators’ creative workarounds on the plant floor, to the importance of trust and rapport between IT and OT teams, and why having hands-on experience is key to building effective cybersecurity programs in critical infrastructure environments. </span></p>
<p><span style="font-weight:400;">You’ll also hear real-world stories of technology mishaps, the critical role of plant culture, and the practical challenges organizations face in securing legacy systems while keeping operations running.</span></p>
<p><span style="font-weight:400;">If you want honest, relatable insights and actionable advice on bridging the IT-OT divide—and a few laughs along the way—this episode is for you.</span></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">10:12 Operator Rounds and RFID Challenges</span></p>
<p><span style="font-weight:400;">12:56 Operators' Ingenuity and Knowledge</span></p>
<p><span style="font-weight:400;">21:29 IT vs. OT: Firmware Update Challenges</span></p>
<p><span style="font-weight:400;">26:49 Understanding and Accepting Risk</span></p>
<p><span style="font-weight:400;">28:12 Standards, Frameworks, and Continuity</span></p>
<p><span style="font-weight:400;">33:08 High Voltage Safety Precautions</span></p>
<p><span style="font-weight:400;">40:41 Bridging OT and IT Skills</span></p>
<p><span style="font-weight:400;">43:46 Cybersecurity Cross-Training Surge</span></p>
<p><span style="font-weight:400;">52:38 CISO Knowledge Gap in OT Security</span></p>
<p><span style="font-weight:400;">54:32 "Experience: Essential for Understanding"</span></p>
<p><span style="font-weight:400;">01:03:34 DCS System Configuration Challenges</span></p>
<p><span style="font-weight:400;">01:06:52 Neglecting Redundancy Risks Operations</span></p>
<p><span style="font-weight:400;">01:11:00 Optimizing Underutilized IT Resources</span></p>
<p><span style="font-weight:400;">01:20:04 "Understanding Systems Before Advice"</span></p>
<p><span style="font-weight:400;">01:22:06 Old Cables Remain Untouched</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Gavin Dilworth’s career took an unconventional path. As a plant operator, he was tasked with keeping production running smoothly and monitoring sensor readings, both on the computer and around the factory. However, Gavin was never quite the model operator—rather than dutifully making rounds and comparing readings, he often found himself absorbed in books, dreaming of a future in IT. Though he laughs about being a “pretty terrible operator,” Gavin’s story reflects his early drive to pursue his true interests in technology, even when duty called elsewhere.</span></p>
<p><strong>How to connect Gavin : </strong></p>
<p><span style="font-weight:400;">Linkedin : </span><a href="https://www.linkedin.com/in/gavin-dilworth/"><span style="font-weight:400;">https://www.linkedin.com/in/gavin-dilworth/</span></a></p>
<p><span style="font-weight:400;">Website: </span><a href="https://assessmentplus.co.nz/"><span style="font-weight:400;">https://assessmentplus.co.nz/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2046039/c1e-odx2ju29r01ujd5zq-wwxrw0g5cd35-pjutur.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2046039&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=6514b2276585865f18312d40e164cbc8133d45150d0509603c3743d1efb9ee5c" length="78019116"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow dives deep into the intersection of IT and OT cybersecurity with special guest Gavin Dilworth—a plant operator turned automation engineer and cybersecurity expert. Listen in as Gavin shares his candid and often humorous journey from factory floors to global consulting, including how a workplace near-miss sparked his “lightbulb moment” about the similarities between health and safety and cybersecurity.
Aaron and Gavin discuss everything from operators’ creative workarounds on the plant floor, to the importance of trust and rapport between IT and OT teams, and why having hands-on experience is key to building effective cybersecurity programs in critical infrastructure environments. 
You’ll also hear real-world stories of technology mishaps, the critical role of plant culture, and the practical challenges organizations face in securing legacy systems while keeping operations running.
If you want honest, relatable insights and actionable advice on bridging the IT-OT divide—and a few laughs along the way—this episode is for you.
Key Moments: 
10:12 Operator Rounds and RFID Challenges
12:56 Operators' Ingenuity and Knowledge
21:29 IT vs. OT: Firmware Update Challenges
26:49 Understanding and Accepting Risk
28:12 Standards, Frameworks, and Continuity
33:08 High Voltage Safety Precautions
40:41 Bridging OT and IT Skills
43:46 Cybersecurity Cross-Training Surge
52:38 CISO Knowledge Gap in OT Security
54:32 "Experience: Essential for Understanding"
01:03:34 DCS System Configuration Challenges
01:06:52 Neglecting Redundancy Risks Operations
01:11:00 Optimizing Underutilized IT Resources
01:20:04 "Understanding Systems Before Advice"
01:22:06 Old Cables Remain Untouched
About the guest : 
Gavin Dilworth’s career took an unconventional path. As a plant operator, he was tasked with keeping production running smoothly and monitoring sensor readings, both on the computer and around the factory. However, Gavin was never quite the model operator—rather than dutifully making rounds and comparing readings, he often found himself absorbed in books, dreaming of a future in IT. Though he laughs about being a “pretty terrible operator,” Gavin’s story reflects his early drive to pursue his true interests in technology, even when duty called elsewhere.
How to connect Gavin : 
Linkedin : https://www.linkedin.com/in/gavin-dilworth/
Website: https://assessmentplus.co.nz/
Connect With Aaron Crow:

Website: www.corvosec.com 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2046039/c1a-w52rp-47k37nv3uk92-fxsvm5.jpg"></itunes:image>
                                                                            <itunes:duration>01:25:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Why Cybersecurity Is More Than Just Technology and Tools with Paul Marco]]>
                </title>
                <pubDate>Mon, 19 May 2025 15:18:05 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2042524</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow welcomes lifelong cybersecurity professional Paul Marco to the podcast. Fresh off of a fun, bourbon-fueled appearance on Paul and Evan’s podcast, Cyber After Hours, Aaron and Paul sit down for a candid conversation that covers everything from the pitfalls of shiny new cyber tools, to the real-world challenges of defending both networks and people.</span></p>
<p> </p>
<p><span style="font-weight:400;">Tune in as they discuss the importance of making the most of what you already have, the realities of cyber as a “cost center,” and how availability increasingly trumps confidentiality in today’s threat landscape. Paul shares powerful insights from decades in cyber operations, the difference between theory and real value, and why storytelling and business skills are now just as vital as technical chops.</span></p>
<p> </p>
<p><span style="font-weight:400;">From protecting small businesses to demystifying the impact of AI and quantum computing on everyday cybersecurity, this episode is packed with practical advice, plenty of war stories, and even a few laughs. Whether you’re a seasoned security pro or just starting out, you won’t want to miss this lively and wide-ranging discussion on how to protect it all.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:38 Tech Rationalization Over Product Dependence</span></p>
<p><span style="font-weight:400;">10:42 "Cybersecurity: A Costly Necessity"</span></p>
<p><span style="font-weight:400;">17:44 Privacy Is Obsolete</span></p>
<p><span style="font-weight:400;">25:51 Cyber Crime Funds Dark Activities</span></p>
<p><span style="font-weight:400;">26:39 "Preventing Cyber-Facilitated Crime"</span></p>
<p><span style="font-weight:400;">37:50 "Exploiting AI: Ethics Versus Greed"</span></p>
<p><span style="font-weight:400;">46:44 Understanding Business Elevates Cybersecurity</span></p>
<p><span style="font-weight:400;">48:01 Broadening Skills Beyond Cybersecurity</span></p>
<p><span style="font-weight:400;">54:19 CISOs Need More Than Tech Skills</span></p>
<p><span style="font-weight:400;">58:56 "Tech Threatens Critical Thinking"</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">Paul is the Co-Founder of TALAS Security and the Co-Host of the Cyber After Hours Podcast. With over twenty years of experience in IT and Cybersecurity, Paul is a senior cybersecurity leader who has built, maintained, and operated enterprise-grade Cybersecurity programs in highly complex environments. His expertise lies in taking a "controls first" approach to Cybersecurity. He specializes in designing programs that maximize the use of existing capabilities to balance both defense and compliance to accelerate organizational maturity. He creates sustainable solutions that enable organizations to effectively manage their cybersecurity risks and is committed to staying ahead of the curve in an ever-evolving cybersecurity landscape and helping organizations securely achieve their business objectives.</span></p>
<p><strong>How to connect Paul: </strong></p>
<p><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/pm01/"><span style="font-weight:400;">https://www.linkedin.com/in/pm01/</span></a></p>
<p><span style="font-weight:400;">Talas Security: </span><a href="https://www.talas.io/"><span style="font-weight:400;">https://www.talas.io/</span></a></p>
<p><span style="font-weight:400;">Cyber after Hours Podcast: </span><a href="https://www.cahpodcast.com/"><span style="font-weight:400;">https://www.cahpodcast.com/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow welcomes lifelong cybersecurity professional Paul Marco to the podcast. Fresh off of a fun, bourbon-fueled appearance on Paul and Evan’s podcast, Cyber After Hours, Aaron and Paul sit down for a candid conversation that covers everything from the pitfalls of shiny new cyber tools, to the real-world challenges of defending both networks and people.
 
Tune in as they discuss the importance of making the most of what you already have, the realities of cyber as a “cost center,” and how availability increasingly trumps confidentiality in today’s threat landscape. Paul shares powerful insights from decades in cyber operations, the difference between theory and real value, and why storytelling and business skills are now just as vital as technical chops.
 
From protecting small businesses to demystifying the impact of AI and quantum computing on everyday cybersecurity, this episode is packed with practical advice, plenty of war stories, and even a few laughs. Whether you’re a seasoned security pro or just starting out, you won’t want to miss this lively and wide-ranging discussion on how to protect it all.
 
Key Moments: 
05:38 Tech Rationalization Over Product Dependence
10:42 "Cybersecurity: A Costly Necessity"
17:44 Privacy Is Obsolete
25:51 Cyber Crime Funds Dark Activities
26:39 "Preventing Cyber-Facilitated Crime"
37:50 "Exploiting AI: Ethics Versus Greed"
46:44 Understanding Business Elevates Cybersecurity
48:01 Broadening Skills Beyond Cybersecurity
54:19 CISOs Need More Than Tech Skills
58:56 "Tech Threatens Critical Thinking"
 
About the guest : 
 
Paul is the Co-Founder of TALAS Security and the Co-Host of the Cyber After Hours Podcast. With over twenty years of experience in IT and Cybersecurity, Paul is a senior cybersecurity leader who has built, maintained, and operated enterprise-grade Cybersecurity programs in highly complex environments. His expertise lies in taking a "controls first" approach to Cybersecurity. He specializes in designing programs that maximize the use of existing capabilities to balance both defense and compliance to accelerate organizational maturity. He creates sustainable solutions that enable organizations to effectively manage their cybersecurity risks and is committed to staying ahead of the curve in an ever-evolving cybersecurity landscape and helping organizations securely achieve their business objectives.
How to connect Paul: 
LinkedIn: https://www.linkedin.com/in/pm01/
Talas Security: https://www.talas.io/
Cyber after Hours Podcast: https://www.cahpodcast.com/
 
Connect With Aaron Crow:

Website: www.corvosec.com 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Why Cybersecurity Is More Than Just Technology and Tools with Paul Marco]]>
                </itunes:title>
                                    <itunes:episode>58</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow welcomes lifelong cybersecurity professional Paul Marco to the podcast. Fresh off of a fun, bourbon-fueled appearance on Paul and Evan’s podcast, Cyber After Hours, Aaron and Paul sit down for a candid conversation that covers everything from the pitfalls of shiny new cyber tools, to the real-world challenges of defending both networks and people.</span></p>
<p> </p>
<p><span style="font-weight:400;">Tune in as they discuss the importance of making the most of what you already have, the realities of cyber as a “cost center,” and how availability increasingly trumps confidentiality in today’s threat landscape. Paul shares powerful insights from decades in cyber operations, the difference between theory and real value, and why storytelling and business skills are now just as vital as technical chops.</span></p>
<p> </p>
<p><span style="font-weight:400;">From protecting small businesses to demystifying the impact of AI and quantum computing on everyday cybersecurity, this episode is packed with practical advice, plenty of war stories, and even a few laughs. Whether you’re a seasoned security pro or just starting out, you won’t want to miss this lively and wide-ranging discussion on how to protect it all.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:38 Tech Rationalization Over Product Dependence</span></p>
<p><span style="font-weight:400;">10:42 "Cybersecurity: A Costly Necessity"</span></p>
<p><span style="font-weight:400;">17:44 Privacy Is Obsolete</span></p>
<p><span style="font-weight:400;">25:51 Cyber Crime Funds Dark Activities</span></p>
<p><span style="font-weight:400;">26:39 "Preventing Cyber-Facilitated Crime"</span></p>
<p><span style="font-weight:400;">37:50 "Exploiting AI: Ethics Versus Greed"</span></p>
<p><span style="font-weight:400;">46:44 Understanding Business Elevates Cybersecurity</span></p>
<p><span style="font-weight:400;">48:01 Broadening Skills Beyond Cybersecurity</span></p>
<p><span style="font-weight:400;">54:19 CISOs Need More Than Tech Skills</span></p>
<p><span style="font-weight:400;">58:56 "Tech Threatens Critical Thinking"</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">Paul is the Co-Founder of TALAS Security and the Co-Host of the Cyber After Hours Podcast. With over twenty years of experience in IT and Cybersecurity, Paul is a senior cybersecurity leader who has built, maintained, and operated enterprise-grade Cybersecurity programs in highly complex environments. His expertise lies in taking a "controls first" approach to Cybersecurity. He specializes in designing programs that maximize the use of existing capabilities to balance both defense and compliance to accelerate organizational maturity. He creates sustainable solutions that enable organizations to effectively manage their cybersecurity risks and is committed to staying ahead of the curve in an ever-evolving cybersecurity landscape and helping organizations securely achieve their business objectives.</span></p>
<p><strong>How to connect Paul: </strong></p>
<p><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/pm01/"><span style="font-weight:400;">https://www.linkedin.com/in/pm01/</span></a></p>
<p><span style="font-weight:400;">Talas Security: </span><a href="https://www.talas.io/"><span style="font-weight:400;">https://www.talas.io/</span></a></p>
<p><span style="font-weight:400;">Cyber after Hours Podcast: </span><a href="https://www.cahpodcast.com/"><span style="font-weight:400;">https://www.cahpodcast.com/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2042524/c1e-w52rpb3zw49ajz90z-8drv3z52tx1-asmaio.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2042524&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=a7d8de73acdfacecc465901bc13c1f5890e7bfbdd53fb919a795e28cf7842694" length="67389275"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow welcomes lifelong cybersecurity professional Paul Marco to the podcast. Fresh off of a fun, bourbon-fueled appearance on Paul and Evan’s podcast, Cyber After Hours, Aaron and Paul sit down for a candid conversation that covers everything from the pitfalls of shiny new cyber tools, to the real-world challenges of defending both networks and people.
 
Tune in as they discuss the importance of making the most of what you already have, the realities of cyber as a “cost center,” and how availability increasingly trumps confidentiality in today’s threat landscape. Paul shares powerful insights from decades in cyber operations, the difference between theory and real value, and why storytelling and business skills are now just as vital as technical chops.
 
From protecting small businesses to demystifying the impact of AI and quantum computing on everyday cybersecurity, this episode is packed with practical advice, plenty of war stories, and even a few laughs. Whether you’re a seasoned security pro or just starting out, you won’t want to miss this lively and wide-ranging discussion on how to protect it all.
 
Key Moments: 
05:38 Tech Rationalization Over Product Dependence
10:42 "Cybersecurity: A Costly Necessity"
17:44 Privacy Is Obsolete
25:51 Cyber Crime Funds Dark Activities
26:39 "Preventing Cyber-Facilitated Crime"
37:50 "Exploiting AI: Ethics Versus Greed"
46:44 Understanding Business Elevates Cybersecurity
48:01 Broadening Skills Beyond Cybersecurity
54:19 CISOs Need More Than Tech Skills
58:56 "Tech Threatens Critical Thinking"
 
About the guest : 
 
Paul is the Co-Founder of TALAS Security and the Co-Host of the Cyber After Hours Podcast. With over twenty years of experience in IT and Cybersecurity, Paul is a senior cybersecurity leader who has built, maintained, and operated enterprise-grade Cybersecurity programs in highly complex environments. His expertise lies in taking a "controls first" approach to Cybersecurity. He specializes in designing programs that maximize the use of existing capabilities to balance both defense and compliance to accelerate organizational maturity. He creates sustainable solutions that enable organizations to effectively manage their cybersecurity risks and is committed to staying ahead of the curve in an ever-evolving cybersecurity landscape and helping organizations securely achieve their business objectives.
How to connect Paul: 
LinkedIn: https://www.linkedin.com/in/pm01/
Talas Security: https://www.talas.io/
Cyber after Hours Podcast: https://www.cahpodcast.com/
 
Connect With Aaron Crow:

Website: www.corvosec.com 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2042524/c1a-w52rp-wwx93jojh87x-lshdgb.jpg"></itunes:image>
                                                                            <itunes:duration>01:07:57</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Building Trust in OT Cybersecurity: Patching, Communication, and Personal Branding for Success]]>
                </title>
                <pubDate>Mon, 12 May 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2038365</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by his longtime friend and fellow OT (Operational Technology) aficionado, Oren Niskin. Oren dives into his unconventional journey from Navy electrician to offshore rig automation, through to OT cybersecurity consulting—sharing the highs, the lessons learned, and the unique perspective gained from crawling through the “belly of the ship” rather than a college lecture hall.</span></p>
<p><span style="font-weight:400;">Aaron and Oren discuss the real-world value of hands-on experience versus formal education, the evolving relationship between IT and OT teams, and why personal branding and communication skills are key for career growth in the cybersecurity field. They unpack the challenges and misconceptions around patching in the OT environment, and Oren reveals practical advice from his recent presentation on how organizations can dramatically reduce their vulnerability management workload while maintaining operational safety.</span></p>
<p><span style="font-weight:400;">Tune in for thoughtful reflections, war stories from the rig, and actionable tips for aspiring and seasoned cybersecurity professionals alike—plus a heartwarming nod to inspiring the next generation. Whether you’re just getting started in OT or looking to take your cyber game to the next level, this episode is packed with honest advice and community spirit.</span></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">05:58 College: Not the Ultimate Answer</span></p>
<p><span style="font-weight:400;">08:26 Consulting Perspective Accelerates Career Growth</span></p>
<p><span style="font-weight:400;">13:36 "Building Value with Personal Branding"</span></p>
<p><span style="font-weight:400;">16:49 "Everyone's a Salesman Everywhere"</span></p>
<p><span style="font-weight:400;">19:44 "Patching Essential for System Health"</span></p>
<p><span style="font-weight:400;">21:14 Firmware Updates Resolve Most Issues</span></p>
<p><span style="font-weight:400;">26:18 Robots Dominate Manufacturing Line</span></p>
<p><span style="font-weight:400;">28:08 Prioritizing Critical Drilling Vulnerability Fixes</span></p>
<p><span style="font-weight:400;">33:29 "Prioritizing Business-Critical Systems"</span></p>
<p><span style="font-weight:400;">36:57 Cyber-Resilient Tech Design</span></p>
<p><span style="font-weight:400;">39:20 "Virtualization Best Practices: Snapshot Safety"</span></p>
<p><span style="font-weight:400;">41:18 OT Cybersecurity: Focus on Basics</span></p>
<p><span style="font-weight:400;">44:37 Unexpected Changes Disrupt Startup Plans</span></p>
<p><span style="font-weight:400;">47:44 "Building Trust in Business"</span></p>
<p><span style="font-weight:400;">50:52 "IT-OT Collaboration Importance"</span></p>
<p><strong>Oren Niskin – From the Navy to OT Cybersecurity: Bridging the Gap Between the Plant Floor and Secure Operations</strong></p>
<p><span style="font-weight:400;">Oren Niskin is an OT cybersecurity consultant with over two decades of hands-on industrial experience spanning the U.S. Navy, offshore drilling operations, and global OT network management. His career began not in a classroom, but aboard the USS Harry S. Truman, where he served as an electrician and shutdown reactor operator after enlisting in the Navy post-9/11.</span></p>
<p><span style="font-weight:400;">Since then, he’s steadily climbed the OT ranks—from maintaining electrical systems at sea to managing IACS networks for a global fleet of drilling rigs, and now, advising critical infrastructure on how to secure their operational environments. Oren brings a rare combination of deep technical insight and real-world plant floor experience to the evolving challenges of OT cybersecurity.</span></p>
<p><span style="font-weight:400;">He holds a Bachelor's degree in Nuclear Engineering Technology and a Master’s in Information Security Engineering from the SANS Institute. Oren is passionat...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow is joined by his longtime friend and fellow OT (Operational Technology) aficionado, Oren Niskin. Oren dives into his unconventional journey from Navy electrician to offshore rig automation, through to OT cybersecurity consulting—sharing the highs, the lessons learned, and the unique perspective gained from crawling through the “belly of the ship” rather than a college lecture hall.
Aaron and Oren discuss the real-world value of hands-on experience versus formal education, the evolving relationship between IT and OT teams, and why personal branding and communication skills are key for career growth in the cybersecurity field. They unpack the challenges and misconceptions around patching in the OT environment, and Oren reveals practical advice from his recent presentation on how organizations can dramatically reduce their vulnerability management workload while maintaining operational safety.
Tune in for thoughtful reflections, war stories from the rig, and actionable tips for aspiring and seasoned cybersecurity professionals alike—plus a heartwarming nod to inspiring the next generation. Whether you’re just getting started in OT or looking to take your cyber game to the next level, this episode is packed with honest advice and community spirit.
Key Moments: 
05:58 College: Not the Ultimate Answer
08:26 Consulting Perspective Accelerates Career Growth
13:36 "Building Value with Personal Branding"
16:49 "Everyone's a Salesman Everywhere"
19:44 "Patching Essential for System Health"
21:14 Firmware Updates Resolve Most Issues
26:18 Robots Dominate Manufacturing Line
28:08 Prioritizing Critical Drilling Vulnerability Fixes
33:29 "Prioritizing Business-Critical Systems"
36:57 Cyber-Resilient Tech Design
39:20 "Virtualization Best Practices: Snapshot Safety"
41:18 OT Cybersecurity: Focus on Basics
44:37 Unexpected Changes Disrupt Startup Plans
47:44 "Building Trust in Business"
50:52 "IT-OT Collaboration Importance"
Oren Niskin – From the Navy to OT Cybersecurity: Bridging the Gap Between the Plant Floor and Secure Operations
Oren Niskin is an OT cybersecurity consultant with over two decades of hands-on industrial experience spanning the U.S. Navy, offshore drilling operations, and global OT network management. His career began not in a classroom, but aboard the USS Harry S. Truman, where he served as an electrician and shutdown reactor operator after enlisting in the Navy post-9/11.
Since then, he’s steadily climbed the OT ranks—from maintaining electrical systems at sea to managing IACS networks for a global fleet of drilling rigs, and now, advising critical infrastructure on how to secure their operational environments. Oren brings a rare combination of deep technical insight and real-world plant floor experience to the evolving challenges of OT cybersecurity.
He holds a Bachelor's degree in Nuclear Engineering Technology and a Master’s in Information Security Engineering from the SANS Institute. Oren is passionat...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Building Trust in OT Cybersecurity: Patching, Communication, and Personal Branding for Success]]>
                </itunes:title>
                                    <itunes:episode>57</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by his longtime friend and fellow OT (Operational Technology) aficionado, Oren Niskin. Oren dives into his unconventional journey from Navy electrician to offshore rig automation, through to OT cybersecurity consulting—sharing the highs, the lessons learned, and the unique perspective gained from crawling through the “belly of the ship” rather than a college lecture hall.</span></p>
<p><span style="font-weight:400;">Aaron and Oren discuss the real-world value of hands-on experience versus formal education, the evolving relationship between IT and OT teams, and why personal branding and communication skills are key for career growth in the cybersecurity field. They unpack the challenges and misconceptions around patching in the OT environment, and Oren reveals practical advice from his recent presentation on how organizations can dramatically reduce their vulnerability management workload while maintaining operational safety.</span></p>
<p><span style="font-weight:400;">Tune in for thoughtful reflections, war stories from the rig, and actionable tips for aspiring and seasoned cybersecurity professionals alike—plus a heartwarming nod to inspiring the next generation. Whether you’re just getting started in OT or looking to take your cyber game to the next level, this episode is packed with honest advice and community spirit.</span></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">05:58 College: Not the Ultimate Answer</span></p>
<p><span style="font-weight:400;">08:26 Consulting Perspective Accelerates Career Growth</span></p>
<p><span style="font-weight:400;">13:36 "Building Value with Personal Branding"</span></p>
<p><span style="font-weight:400;">16:49 "Everyone's a Salesman Everywhere"</span></p>
<p><span style="font-weight:400;">19:44 "Patching Essential for System Health"</span></p>
<p><span style="font-weight:400;">21:14 Firmware Updates Resolve Most Issues</span></p>
<p><span style="font-weight:400;">26:18 Robots Dominate Manufacturing Line</span></p>
<p><span style="font-weight:400;">28:08 Prioritizing Critical Drilling Vulnerability Fixes</span></p>
<p><span style="font-weight:400;">33:29 "Prioritizing Business-Critical Systems"</span></p>
<p><span style="font-weight:400;">36:57 Cyber-Resilient Tech Design</span></p>
<p><span style="font-weight:400;">39:20 "Virtualization Best Practices: Snapshot Safety"</span></p>
<p><span style="font-weight:400;">41:18 OT Cybersecurity: Focus on Basics</span></p>
<p><span style="font-weight:400;">44:37 Unexpected Changes Disrupt Startup Plans</span></p>
<p><span style="font-weight:400;">47:44 "Building Trust in Business"</span></p>
<p><span style="font-weight:400;">50:52 "IT-OT Collaboration Importance"</span></p>
<p><strong>Oren Niskin – From the Navy to OT Cybersecurity: Bridging the Gap Between the Plant Floor and Secure Operations</strong></p>
<p><span style="font-weight:400;">Oren Niskin is an OT cybersecurity consultant with over two decades of hands-on industrial experience spanning the U.S. Navy, offshore drilling operations, and global OT network management. His career began not in a classroom, but aboard the USS Harry S. Truman, where he served as an electrician and shutdown reactor operator after enlisting in the Navy post-9/11.</span></p>
<p><span style="font-weight:400;">Since then, he’s steadily climbed the OT ranks—from maintaining electrical systems at sea to managing IACS networks for a global fleet of drilling rigs, and now, advising critical infrastructure on how to secure their operational environments. Oren brings a rare combination of deep technical insight and real-world plant floor experience to the evolving challenges of OT cybersecurity.</span></p>
<p><span style="font-weight:400;">He holds a Bachelor's degree in Nuclear Engineering Technology and a Master’s in Information Security Engineering from the SANS Institute. Oren is passionate about translating complex OT security needs into practical outcomes—turning big visions into tangible progress.</span></p>
<p><strong>Connect with Oren on LinkedIn at </strong><a href="https://www.linkedin.com/in/orenniskin/"><strong>https://www.linkedin.com/in/orenniskin/</strong></a><strong> or catch him in person at HouSecCon this September.</strong></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2038365/c1e-d308xcmv35gs34n9g-v6d69xj6hjz-rqlpgg.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2038365&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=2a407f5388e79f22c9a07ab8f52b7dd56e388c7b8b62bf97a8e5597a1cc372f2" length="58657484"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow is joined by his longtime friend and fellow OT (Operational Technology) aficionado, Oren Niskin. Oren dives into his unconventional journey from Navy electrician to offshore rig automation, through to OT cybersecurity consulting—sharing the highs, the lessons learned, and the unique perspective gained from crawling through the “belly of the ship” rather than a college lecture hall.
Aaron and Oren discuss the real-world value of hands-on experience versus formal education, the evolving relationship between IT and OT teams, and why personal branding and communication skills are key for career growth in the cybersecurity field. They unpack the challenges and misconceptions around patching in the OT environment, and Oren reveals practical advice from his recent presentation on how organizations can dramatically reduce their vulnerability management workload while maintaining operational safety.
Tune in for thoughtful reflections, war stories from the rig, and actionable tips for aspiring and seasoned cybersecurity professionals alike—plus a heartwarming nod to inspiring the next generation. Whether you’re just getting started in OT or looking to take your cyber game to the next level, this episode is packed with honest advice and community spirit.
Key Moments: 
05:58 College: Not the Ultimate Answer
08:26 Consulting Perspective Accelerates Career Growth
13:36 "Building Value with Personal Branding"
16:49 "Everyone's a Salesman Everywhere"
19:44 "Patching Essential for System Health"
21:14 Firmware Updates Resolve Most Issues
26:18 Robots Dominate Manufacturing Line
28:08 Prioritizing Critical Drilling Vulnerability Fixes
33:29 "Prioritizing Business-Critical Systems"
36:57 Cyber-Resilient Tech Design
39:20 "Virtualization Best Practices: Snapshot Safety"
41:18 OT Cybersecurity: Focus on Basics
44:37 Unexpected Changes Disrupt Startup Plans
47:44 "Building Trust in Business"
50:52 "IT-OT Collaboration Importance"
Oren Niskin – From the Navy to OT Cybersecurity: Bridging the Gap Between the Plant Floor and Secure Operations
Oren Niskin is an OT cybersecurity consultant with over two decades of hands-on industrial experience spanning the U.S. Navy, offshore drilling operations, and global OT network management. His career began not in a classroom, but aboard the USS Harry S. Truman, where he served as an electrician and shutdown reactor operator after enlisting in the Navy post-9/11.
Since then, he’s steadily climbed the OT ranks—from maintaining electrical systems at sea to managing IACS networks for a global fleet of drilling rigs, and now, advising critical infrastructure on how to secure their operational environments. Oren brings a rare combination of deep technical insight and real-world plant floor experience to the evolving challenges of OT cybersecurity.
He holds a Bachelor's degree in Nuclear Engineering Technology and a Master’s in Information Security Engineering from the SANS Institute. Oren is passionat...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2038365/c1a-w52rp-ndndk85vb5w5-ebihes.jpg"></itunes:image>
                                                                            <itunes:duration>00:56:51</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Beyond Compliance Cybersecurity Insights With Blake Hoge and Aaron Crow]]>
                </title>
                <pubDate>Mon, 05 May 2025 11:33:11 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2025077</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow sits down with cybersecurity professional Blake Hoge for an unscripted deep dive into the world of IT, OT, and everything in between. In this engaging conversation, Aaron and Blake share their personal journeys through the cybersecurity landscape—from consulting roots and data center audits, to navigating third-party risk, compliance programs, and even some unforgettable experiences in global call centers and power plants.</span></p>
<p> </p>
<p><span style="font-weight:400;">This episode goes beyond the technicalities, exploring the importance of hands-on assessments, the unexpected vulnerabilities that linger in even the most sophisticated environments, and why fresh eyes are crucial for spotting hidden risks. </span></p>
<p><span style="font-weight:400;">Aaron and Blake also open up about their favorite use cases for AI—both on and off the job, and how these evolving tools are reshaping everything from incident response planning to everyday productivity.</span></p>
<p> </p>
<p><span style="font-weight:400;">But it’s not all about cyber threats and compliance checklists. The conversation takes a thoughtful turn as the two discuss the vital role of mental health, physical wellness, and community in sustaining long careers in high-pressure fields. From rucking at dawn and cycling in Moab to decompressing at cyber shootouts and embracing new technologies, Aaron and Blake remind us that protecting it all starts with taking care of ourselves and each other.</span></p>
<p><span style="font-weight:400;">Join us for a lively, candid episode packed with actionable insights, relatable stories, and a reminder that cybersecurity is, above all, a people business.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">09:47 Power Plant Fire Recovery Chaos</span></p>
<p><span style="font-weight:400;">13:36 Infrastructure Maintenance &amp; Security Compliance</span></p>
<p><span style="font-weight:400;">16:10 Access Control Testing Concerns</span></p>
<p><span style="font-weight:400;">23:22 "Design Process: Theory vs. Reality"</span></p>
<p><span style="font-weight:400;">31:22 Dynamic Incident Response Planning</span></p>
<p><span style="font-weight:400;">33:07 Commitment to Security and Transparency</span></p>
<p><span style="font-weight:400;">39:21 Customized Consultancy for Unique Needs</span></p>
<p><span style="font-weight:400;">47:05 "Understanding Contract Essentials"</span></p>
<p><span style="font-weight:400;">50:42 In-House AI to Safeguard Data</span></p>
<p><span style="font-weight:400;">57:47 AI Simplifies Search and Booking</span></p>
<p><span style="font-weight:400;">59:13 Mental Wellness Strategies in Tech</span></p>
<p><span style="font-weight:400;">01:03:52 Fitness and Energy Through Activity</span></p>
<p><span style="font-weight:400;">01:10:44 "Business is a People Endeavor"</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Blake Hoge leads third-party security at Airbnb, strengthening partnerships, and founded AmplifyGRC to support small businesses in building security and trust. At Instacart, he developed and scaled security and trust programs and compliance programs. At Salesforce, he managed security for global data and call centers. With over a decade in governance, risk, and compliance, Blake holds CISA, CDPSE, and PMP certifications, reflecting his expertise. Blake lives in the greater Austin, Texas area, and enjoys connecting with other professionals locally.</span></p>
<p> </p>
<p><strong>How to connect Blake: </strong></p>
<p><span style="font-weight:400;">Linkedin page: </span><a href="https://calendly.com/url?q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fblakehoge%2F&amp;user_uuid=FAHBGEJWSJ33C5P3&amp;stage=1&amp;hmac=9252c7ee1ee9572af0d31a282f73477db3ad8a0eabb0a2f24d52c4495a62e1d3"><span style="font-weight:400;">https://www.linkedin.com/in/blakehoge/</span>...</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow sits down with cybersecurity professional Blake Hoge for an unscripted deep dive into the world of IT, OT, and everything in between. In this engaging conversation, Aaron and Blake share their personal journeys through the cybersecurity landscape—from consulting roots and data center audits, to navigating third-party risk, compliance programs, and even some unforgettable experiences in global call centers and power plants.
 
This episode goes beyond the technicalities, exploring the importance of hands-on assessments, the unexpected vulnerabilities that linger in even the most sophisticated environments, and why fresh eyes are crucial for spotting hidden risks. 
Aaron and Blake also open up about their favorite use cases for AI—both on and off the job, and how these evolving tools are reshaping everything from incident response planning to everyday productivity.
 
But it’s not all about cyber threats and compliance checklists. The conversation takes a thoughtful turn as the two discuss the vital role of mental health, physical wellness, and community in sustaining long careers in high-pressure fields. From rucking at dawn and cycling in Moab to decompressing at cyber shootouts and embracing new technologies, Aaron and Blake remind us that protecting it all starts with taking care of ourselves and each other.
Join us for a lively, candid episode packed with actionable insights, relatable stories, and a reminder that cybersecurity is, above all, a people business.
 
Key Moments: 
 
09:47 Power Plant Fire Recovery Chaos
13:36 Infrastructure Maintenance & Security Compliance
16:10 Access Control Testing Concerns
23:22 "Design Process: Theory vs. Reality"
31:22 Dynamic Incident Response Planning
33:07 Commitment to Security and Transparency
39:21 Customized Consultancy for Unique Needs
47:05 "Understanding Contract Essentials"
50:42 In-House AI to Safeguard Data
57:47 AI Simplifies Search and Booking
59:13 Mental Wellness Strategies in Tech
01:03:52 Fitness and Energy Through Activity
01:10:44 "Business is a People Endeavor"
 
About the guest : 
Blake Hoge leads third-party security at Airbnb, strengthening partnerships, and founded AmplifyGRC to support small businesses in building security and trust. At Instacart, he developed and scaled security and trust programs and compliance programs. At Salesforce, he managed security for global data and call centers. With over a decade in governance, risk, and compliance, Blake holds CISA, CDPSE, and PMP certifications, reflecting his expertise. Blake lives in the greater Austin, Texas area, and enjoys connecting with other professionals locally.
 
How to connect Blake: 
Linkedin page: https://www.linkedin.com/in/blakehoge/...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Beyond Compliance Cybersecurity Insights With Blake Hoge and Aaron Crow]]>
                </itunes:title>
                                    <itunes:episode>56</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow sits down with cybersecurity professional Blake Hoge for an unscripted deep dive into the world of IT, OT, and everything in between. In this engaging conversation, Aaron and Blake share their personal journeys through the cybersecurity landscape—from consulting roots and data center audits, to navigating third-party risk, compliance programs, and even some unforgettable experiences in global call centers and power plants.</span></p>
<p> </p>
<p><span style="font-weight:400;">This episode goes beyond the technicalities, exploring the importance of hands-on assessments, the unexpected vulnerabilities that linger in even the most sophisticated environments, and why fresh eyes are crucial for spotting hidden risks. </span></p>
<p><span style="font-weight:400;">Aaron and Blake also open up about their favorite use cases for AI—both on and off the job, and how these evolving tools are reshaping everything from incident response planning to everyday productivity.</span></p>
<p> </p>
<p><span style="font-weight:400;">But it’s not all about cyber threats and compliance checklists. The conversation takes a thoughtful turn as the two discuss the vital role of mental health, physical wellness, and community in sustaining long careers in high-pressure fields. From rucking at dawn and cycling in Moab to decompressing at cyber shootouts and embracing new technologies, Aaron and Blake remind us that protecting it all starts with taking care of ourselves and each other.</span></p>
<p><span style="font-weight:400;">Join us for a lively, candid episode packed with actionable insights, relatable stories, and a reminder that cybersecurity is, above all, a people business.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">09:47 Power Plant Fire Recovery Chaos</span></p>
<p><span style="font-weight:400;">13:36 Infrastructure Maintenance &amp; Security Compliance</span></p>
<p><span style="font-weight:400;">16:10 Access Control Testing Concerns</span></p>
<p><span style="font-weight:400;">23:22 "Design Process: Theory vs. Reality"</span></p>
<p><span style="font-weight:400;">31:22 Dynamic Incident Response Planning</span></p>
<p><span style="font-weight:400;">33:07 Commitment to Security and Transparency</span></p>
<p><span style="font-weight:400;">39:21 Customized Consultancy for Unique Needs</span></p>
<p><span style="font-weight:400;">47:05 "Understanding Contract Essentials"</span></p>
<p><span style="font-weight:400;">50:42 In-House AI to Safeguard Data</span></p>
<p><span style="font-weight:400;">57:47 AI Simplifies Search and Booking</span></p>
<p><span style="font-weight:400;">59:13 Mental Wellness Strategies in Tech</span></p>
<p><span style="font-weight:400;">01:03:52 Fitness and Energy Through Activity</span></p>
<p><span style="font-weight:400;">01:10:44 "Business is a People Endeavor"</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Blake Hoge leads third-party security at Airbnb, strengthening partnerships, and founded AmplifyGRC to support small businesses in building security and trust. At Instacart, he developed and scaled security and trust programs and compliance programs. At Salesforce, he managed security for global data and call centers. With over a decade in governance, risk, and compliance, Blake holds CISA, CDPSE, and PMP certifications, reflecting his expertise. Blake lives in the greater Austin, Texas area, and enjoys connecting with other professionals locally.</span></p>
<p> </p>
<p><strong>How to connect Blake: </strong></p>
<p><span style="font-weight:400;">Linkedin page: </span><a href="https://calendly.com/url?q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fblakehoge%2F&amp;user_uuid=FAHBGEJWSJ33C5P3&amp;stage=1&amp;hmac=9252c7ee1ee9572af0d31a282f73477db3ad8a0eabb0a2f24d52c4495a62e1d3"><span style="font-weight:400;">https://www.linkedin.com/in/blakehoge/</span></a></p>
<p><span style="font-weight:400;">Company website: </span><a href="https://calendly.com/url?q=https%3A%2F%2Fwww.amplifygrc.com%2F&amp;user_uuid=FAHBGEJWSJ33C5P3&amp;stage=1&amp;hmac=bef2fcb251fbb3839238deb00edc4a7f9cc7d2cdc40321bbdbd2dd63322004b0"><span style="font-weight:400;">https://www.amplifygrc.com/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2025077/c1e-k1vqntgrw6ju2zw31-9jrgkw1gfd53-g3nzvc.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2025077&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=605444cde2ac5aeaa006ff9f458c0cc21f2137bcf2721862138d95a8a0d2329f" length="73263178"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow sits down with cybersecurity professional Blake Hoge for an unscripted deep dive into the world of IT, OT, and everything in between. In this engaging conversation, Aaron and Blake share their personal journeys through the cybersecurity landscape—from consulting roots and data center audits, to navigating third-party risk, compliance programs, and even some unforgettable experiences in global call centers and power plants.
 
This episode goes beyond the technicalities, exploring the importance of hands-on assessments, the unexpected vulnerabilities that linger in even the most sophisticated environments, and why fresh eyes are crucial for spotting hidden risks. 
Aaron and Blake also open up about their favorite use cases for AI—both on and off the job, and how these evolving tools are reshaping everything from incident response planning to everyday productivity.
 
But it’s not all about cyber threats and compliance checklists. The conversation takes a thoughtful turn as the two discuss the vital role of mental health, physical wellness, and community in sustaining long careers in high-pressure fields. From rucking at dawn and cycling in Moab to decompressing at cyber shootouts and embracing new technologies, Aaron and Blake remind us that protecting it all starts with taking care of ourselves and each other.
Join us for a lively, candid episode packed with actionable insights, relatable stories, and a reminder that cybersecurity is, above all, a people business.
 
Key Moments: 
 
09:47 Power Plant Fire Recovery Chaos
13:36 Infrastructure Maintenance & Security Compliance
16:10 Access Control Testing Concerns
23:22 "Design Process: Theory vs. Reality"
31:22 Dynamic Incident Response Planning
33:07 Commitment to Security and Transparency
39:21 Customized Consultancy for Unique Needs
47:05 "Understanding Contract Essentials"
50:42 In-House AI to Safeguard Data
57:47 AI Simplifies Search and Booking
59:13 Mental Wellness Strategies in Tech
01:03:52 Fitness and Energy Through Activity
01:10:44 "Business is a People Endeavor"
 
About the guest : 
Blake Hoge leads third-party security at Airbnb, strengthening partnerships, and founded AmplifyGRC to support small businesses in building security and trust. At Instacart, he developed and scaled security and trust programs and compliance programs. At Salesforce, he managed security for global data and call centers. With over a decade in governance, risk, and compliance, Blake holds CISA, CDPSE, and PMP certifications, reflecting his expertise. Blake lives in the greater Austin, Texas area, and enjoys connecting with other professionals locally.
 
How to connect Blake: 
Linkedin page: https://www.linkedin.com/in/blakehoge/...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2025077/c1a-w52rp-wwx4vnzxhvrv-7g7tor.png"></itunes:image>
                                                                            <itunes:duration>01:13:17</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How AI is Transforming the SOC: Automation, Challenges, and the Future of Cybersecurity with Amy Tom]]>
                </title>
                <pubDate>Mon, 28 Apr 2025 12:18:22 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2021306</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode,  host Aaron Crow dives deep into the buzzing world of AI in cybersecurity, joined by special guest Amy Tom, Community Manager at D3 Security. With everyone chatting about AI these days, Aaron and Amy cut through the noise to explore how artificial intelligence is shaking up Security Operations Centers (SOCs)—from automating manual processes to transforming traditional analyst roles. </span></p>
<p><span style="font-weight:400;">Amy shares her unconventional journey into cybersecurity, demystifies what it means to be a "nerd translator," and unpacks how AI-driven platforms like D3’s Morpheus are changing the game for SOC teams.</span></p>
<p><span style="font-weight:400;">Whether you’re a student considering a path in cybersecurity, a seasoned pro, or just curious about the future of AI in this field, you’ll hear practical advice, real-world examples, and insight into both the promise and challenges of adopting AI in high-stakes security environments. </span></p>
<p><span style="font-weight:400;">Plus, they touch on hot topics like AI fatigue, the evolving role of junior analysts, and the importance of business and communication skills in tech. Tune in for a candid, informative conversation to get you up to speed on one of cybersecurity’s most exciting frontiers!</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">04:27 "Nerd Translator: Bridging Tech Gaps"</span></p>
<p><span style="font-weight:400;">08:29 "Questioning Data Metrics and Value"</span></p>
<p><span style="font-weight:400;">10:57 AI Streamlining Security Automation</span></p>
<p><span style="font-weight:400;">15:14 "AI and Low-Code Automation Evolution"</span></p>
<p><span style="font-weight:400;">17:27 API Management Complexity</span></p>
<p><span style="font-weight:400;">22:12 Migrating from Legacy SOAR Platforms</span></p>
<p><span style="font-weight:400;">26:55 Streamlining Phishing Response with SOAR</span></p>
<p><span style="font-weight:400;">36:05 AI-Driven Incident Remediation</span></p>
<p><span style="font-weight:400;">39:49 AI Summaries vs. Human Summaries</span></p>
<p><span style="font-weight:400;">41:19 Effective Communication for All Audiences</span></p>
<p><span style="font-weight:400;">46:24 AI Transforming SOC Analyst Roles</span></p>
<p><span style="font-weight:400;">48:33 Versatile Skills Boost Career Success</span></p>
<p><span style="font-weight:400;">51:58 "Explore and Experiment Creatively"</span></p>
<p><strong>About the guest :</strong><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">Amy Tom’s journey into cybersecurity is anything but conventional. With no background in IT or security, she started out answering phones, unsure of how to respond to technical questions and heavily relying on engineers for answers. Through curiosity and persistence, Amy asked questions, learned on the job, and gradually built a deep understanding of the cybersecurity landscape. Today, she works on the business side, supporting engineers and helping solve real problems by bridging the gap between business needs and technical solutions. Her path is a testament to learning by doing and growing into expertise through determination and collaboration.</span></p>
<p> </p>
<p><strong>How to connect Amy : </strong></p>
<p><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/amymtom/"><span style="font-weight:400;">https://www.linkedin.com/in/amymtom/</span></a></p>
<p><span style="font-weight:400;">D3 security podcast:  </span><a href="https://d3security.com/lets-soc-about-it-podcast/"><span style="font-weight:400;">https://d3security.com/lets-soc-about-it-podcast/=</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span></span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode,  host Aaron Crow dives deep into the buzzing world of AI in cybersecurity, joined by special guest Amy Tom, Community Manager at D3 Security. With everyone chatting about AI these days, Aaron and Amy cut through the noise to explore how artificial intelligence is shaking up Security Operations Centers (SOCs)—from automating manual processes to transforming traditional analyst roles. 
Amy shares her unconventional journey into cybersecurity, demystifies what it means to be a "nerd translator," and unpacks how AI-driven platforms like D3’s Morpheus are changing the game for SOC teams.
Whether you’re a student considering a path in cybersecurity, a seasoned pro, or just curious about the future of AI in this field, you’ll hear practical advice, real-world examples, and insight into both the promise and challenges of adopting AI in high-stakes security environments. 
Plus, they touch on hot topics like AI fatigue, the evolving role of junior analysts, and the importance of business and communication skills in tech. Tune in for a candid, informative conversation to get you up to speed on one of cybersecurity’s most exciting frontiers!
Key Moments: 
04:27 "Nerd Translator: Bridging Tech Gaps"
08:29 "Questioning Data Metrics and Value"
10:57 AI Streamlining Security Automation
15:14 "AI and Low-Code Automation Evolution"
17:27 API Management Complexity
22:12 Migrating from Legacy SOAR Platforms
26:55 Streamlining Phishing Response with SOAR
36:05 AI-Driven Incident Remediation
39:49 AI Summaries vs. Human Summaries
41:19 Effective Communication for All Audiences
46:24 AI Transforming SOC Analyst Roles
48:33 Versatile Skills Boost Career Success
51:58 "Explore and Experiment Creatively"
About the guest : 
Amy Tom’s journey into cybersecurity is anything but conventional. With no background in IT or security, she started out answering phones, unsure of how to respond to technical questions and heavily relying on engineers for answers. Through curiosity and persistence, Amy asked questions, learned on the job, and gradually built a deep understanding of the cybersecurity landscape. Today, she works on the business side, supporting engineers and helping solve real problems by bridging the gap between business needs and technical solutions. Her path is a testament to learning by doing and growing into expertise through determination and collaboration.
 
How to connect Amy : 
LinkedIn: https://www.linkedin.com/in/amymtom/
D3 security podcast:  https://d3security.com/lets-soc-about-it-podcast/=
Connect With Aaron Crow:

Website: www.corvosec.com]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[How AI is Transforming the SOC: Automation, Challenges, and the Future of Cybersecurity with Amy Tom]]>
                </itunes:title>
                                    <itunes:episode>55</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode,  host Aaron Crow dives deep into the buzzing world of AI in cybersecurity, joined by special guest Amy Tom, Community Manager at D3 Security. With everyone chatting about AI these days, Aaron and Amy cut through the noise to explore how artificial intelligence is shaking up Security Operations Centers (SOCs)—from automating manual processes to transforming traditional analyst roles. </span></p>
<p><span style="font-weight:400;">Amy shares her unconventional journey into cybersecurity, demystifies what it means to be a "nerd translator," and unpacks how AI-driven platforms like D3’s Morpheus are changing the game for SOC teams.</span></p>
<p><span style="font-weight:400;">Whether you’re a student considering a path in cybersecurity, a seasoned pro, or just curious about the future of AI in this field, you’ll hear practical advice, real-world examples, and insight into both the promise and challenges of adopting AI in high-stakes security environments. </span></p>
<p><span style="font-weight:400;">Plus, they touch on hot topics like AI fatigue, the evolving role of junior analysts, and the importance of business and communication skills in tech. Tune in for a candid, informative conversation to get you up to speed on one of cybersecurity’s most exciting frontiers!</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">04:27 "Nerd Translator: Bridging Tech Gaps"</span></p>
<p><span style="font-weight:400;">08:29 "Questioning Data Metrics and Value"</span></p>
<p><span style="font-weight:400;">10:57 AI Streamlining Security Automation</span></p>
<p><span style="font-weight:400;">15:14 "AI and Low-Code Automation Evolution"</span></p>
<p><span style="font-weight:400;">17:27 API Management Complexity</span></p>
<p><span style="font-weight:400;">22:12 Migrating from Legacy SOAR Platforms</span></p>
<p><span style="font-weight:400;">26:55 Streamlining Phishing Response with SOAR</span></p>
<p><span style="font-weight:400;">36:05 AI-Driven Incident Remediation</span></p>
<p><span style="font-weight:400;">39:49 AI Summaries vs. Human Summaries</span></p>
<p><span style="font-weight:400;">41:19 Effective Communication for All Audiences</span></p>
<p><span style="font-weight:400;">46:24 AI Transforming SOC Analyst Roles</span></p>
<p><span style="font-weight:400;">48:33 Versatile Skills Boost Career Success</span></p>
<p><span style="font-weight:400;">51:58 "Explore and Experiment Creatively"</span></p>
<p><strong>About the guest :</strong><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">Amy Tom’s journey into cybersecurity is anything but conventional. With no background in IT or security, she started out answering phones, unsure of how to respond to technical questions and heavily relying on engineers for answers. Through curiosity and persistence, Amy asked questions, learned on the job, and gradually built a deep understanding of the cybersecurity landscape. Today, she works on the business side, supporting engineers and helping solve real problems by bridging the gap between business needs and technical solutions. Her path is a testament to learning by doing and growing into expertise through determination and collaboration.</span></p>
<p> </p>
<p><strong>How to connect Amy : </strong></p>
<p><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/amymtom/"><span style="font-weight:400;">https://www.linkedin.com/in/amymtom/</span></a></p>
<p><span style="font-weight:400;">D3 security podcast:  </span><a href="https://d3security.com/lets-soc-about-it-podcast/"><span style="font-weight:400;">https://d3security.com/lets-soc-about-it-podcast/=</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2021306/c1e-jg87nu50qq0cp634v-xxo7w2rvi62v-qnf5so.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2021306&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=e84d85eb7beb83e9c2c902995ba04c83fc6cc3979e019c3e538910b3de33fd2d" length="56835210"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode,  host Aaron Crow dives deep into the buzzing world of AI in cybersecurity, joined by special guest Amy Tom, Community Manager at D3 Security. With everyone chatting about AI these days, Aaron and Amy cut through the noise to explore how artificial intelligence is shaking up Security Operations Centers (SOCs)—from automating manual processes to transforming traditional analyst roles. 
Amy shares her unconventional journey into cybersecurity, demystifies what it means to be a "nerd translator," and unpacks how AI-driven platforms like D3’s Morpheus are changing the game for SOC teams.
Whether you’re a student considering a path in cybersecurity, a seasoned pro, or just curious about the future of AI in this field, you’ll hear practical advice, real-world examples, and insight into both the promise and challenges of adopting AI in high-stakes security environments. 
Plus, they touch on hot topics like AI fatigue, the evolving role of junior analysts, and the importance of business and communication skills in tech. Tune in for a candid, informative conversation to get you up to speed on one of cybersecurity’s most exciting frontiers!
Key Moments: 
04:27 "Nerd Translator: Bridging Tech Gaps"
08:29 "Questioning Data Metrics and Value"
10:57 AI Streamlining Security Automation
15:14 "AI and Low-Code Automation Evolution"
17:27 API Management Complexity
22:12 Migrating from Legacy SOAR Platforms
26:55 Streamlining Phishing Response with SOAR
36:05 AI-Driven Incident Remediation
39:49 AI Summaries vs. Human Summaries
41:19 Effective Communication for All Audiences
46:24 AI Transforming SOC Analyst Roles
48:33 Versatile Skills Boost Career Success
51:58 "Explore and Experiment Creatively"
About the guest : 
Amy Tom’s journey into cybersecurity is anything but conventional. With no background in IT or security, she started out answering phones, unsure of how to respond to technical questions and heavily relying on engineers for answers. Through curiosity and persistence, Amy asked questions, learned on the job, and gradually built a deep understanding of the cybersecurity landscape. Today, she works on the business side, supporting engineers and helping solve real problems by bridging the gap between business needs and technical solutions. Her path is a testament to learning by doing and growing into expertise through determination and collaboration.
 
How to connect Amy : 
LinkedIn: https://www.linkedin.com/in/amymtom/
D3 security podcast:  https://d3security.com/lets-soc-about-it-podcast/=
Connect With Aaron Crow:

Website: www.corvosec.com]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2021306/c1a-w52rp-v6dw2g3zfzok-q5k5wf.jpg"></itunes:image>
                                                                            <itunes:duration>00:57:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Simplifying OT Cybersecurity: Tools and Strategies for Non-Experts in Critical Infrastructure with Steve Kiss]]>
                </title>
                <pubDate>Mon, 21 Apr 2025 11:49:32 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2016700</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode of </span><em><span style="font-weight:400;">Protect It All</span></em><span style="font-weight:400;">, host Aaron Crow sits down with Steve Kiss, founder and CEO of IPMeter, for an eye-opening discussion on the future of OT (Operational Technology) and IT cybersecurity. With over 25 years of hands-on experience, Steve shares his journey from network engineering to designing practical cybersecurity tools for real-world OT environments.</span></p>
<p><span style="font-weight:400;">They dive into the unique challenges faced by operators in sectors like wastewater treatment, building management, and power utilities—where frontline professionals often shoulder critical cybersecurity responsibilities without formal training or extensive resources. Steve and Aaron emphasize the urgent need for simple, scalable, and reliable tools that empower these “full stack” operators to secure critical infrastructure effectively.</span></p>
<p><span style="font-weight:400;">From bridging the IT-OT divide to managing legacy system risks and improving procurement practices, this conversation offers actionable insights for municipalities, utilities, and smaller organizations aiming to take greater ownership of their cyber defenses. Packed with real-world examples, strategic advice, and a touch of industry humor, this episode is essential listening for anyone focused on protecting essential services and strengthening community resilience.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">10:40 Understanding Factory Acceptance Test (FAT)</span></p>
<p><span style="font-weight:400;">16:41 Transitioning to Local Water Management</span></p>
<p><span style="font-weight:400;">19:52 Compliance and Cybersecurity Standards</span></p>
<p><span style="font-weight:400;">25:03 "Digital Spins on Security Concepts"</span></p>
<p><span style="font-weight:400;">32:30 Standardizing Power Systems Configurations</span></p>
<p><span style="font-weight:400;">35:00 Basic Security Steps for Operators</span></p>
<p><span style="font-weight:400;">40:28 Balancing IoT Features and Control</span></p>
<p><span style="font-weight:400;">45:01 Durability and Setup for Rail Tech</span></p>
<p><span style="font-weight:400;">48:58 "Basic Network Foundations Needed"</span></p>
<p><span style="font-weight:400;">54:35 Wastewater's Overlooked Importance</span></p>
<p><br /><br /><br /><br /></p>
<p><strong>About the guest: </strong></p>
<p> </p>
<p><span style="font-weight:400;">Steve Kiss is a seasoned cybersecurity leader with over two decades of experience in engineering, infrastructure security, and strategic leadership. As the inventor of IPMeter™ and a contributor to the NIST 800-53 SP2 standards, he has played a pivotal role in advancing vulnerability management practices. Throughout his career, Steve has been deeply involved in the design, construction, and security of critical infrastructure across sectors such as aviation, defense, data centers, and utilities. </span></p>
<p><span style="font-weight:400;">His expertise uniquely bridges the worlds of operational technology (OT) and information technology (IT), addressing the evolving challenges of modern network environments. In addition to founding multiple companies focused on infrastructure security, Steve regularly shares his insights at industry events, including the IMRON Security &amp; Safety Summit at SoFi Stadium. </span></p>
<p><span style="font-weight:400;">He also publishes a weekly newsletter, HOTw (Hack of the Week), spotlighting trends and incidents in OT cybersecurity. Through his latest venture, IPMeter, Steve continues to drive innovation in cybersecurity testing and resilience.</span></p>
<p> </p>
<p><strong>How to connect Steve : </strong></p>
<p> </p>
<p><strong>Website for IPMeter</strong></p>
<p><a href="http://www.ipmeter.net/"><span style="font-weight:400;">www.ipmeter.net</span></a></p>
<p><span style="font-weight:400;"> ...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of Protect It All, host Aaron Crow sits down with Steve Kiss, founder and CEO of IPMeter, for an eye-opening discussion on the future of OT (Operational Technology) and IT cybersecurity. With over 25 years of hands-on experience, Steve shares his journey from network engineering to designing practical cybersecurity tools for real-world OT environments.
They dive into the unique challenges faced by operators in sectors like wastewater treatment, building management, and power utilities—where frontline professionals often shoulder critical cybersecurity responsibilities without formal training or extensive resources. Steve and Aaron emphasize the urgent need for simple, scalable, and reliable tools that empower these “full stack” operators to secure critical infrastructure effectively.
From bridging the IT-OT divide to managing legacy system risks and improving procurement practices, this conversation offers actionable insights for municipalities, utilities, and smaller organizations aiming to take greater ownership of their cyber defenses. Packed with real-world examples, strategic advice, and a touch of industry humor, this episode is essential listening for anyone focused on protecting essential services and strengthening community resilience.
Key Moments: 
10:40 Understanding Factory Acceptance Test (FAT)
16:41 Transitioning to Local Water Management
19:52 Compliance and Cybersecurity Standards
25:03 "Digital Spins on Security Concepts"
32:30 Standardizing Power Systems Configurations
35:00 Basic Security Steps for Operators
40:28 Balancing IoT Features and Control
45:01 Durability and Setup for Rail Tech
48:58 "Basic Network Foundations Needed"
54:35 Wastewater's Overlooked Importance

About the guest: 
 
Steve Kiss is a seasoned cybersecurity leader with over two decades of experience in engineering, infrastructure security, and strategic leadership. As the inventor of IPMeter™ and a contributor to the NIST 800-53 SP2 standards, he has played a pivotal role in advancing vulnerability management practices. Throughout his career, Steve has been deeply involved in the design, construction, and security of critical infrastructure across sectors such as aviation, defense, data centers, and utilities. 
His expertise uniquely bridges the worlds of operational technology (OT) and information technology (IT), addressing the evolving challenges of modern network environments. In addition to founding multiple companies focused on infrastructure security, Steve regularly shares his insights at industry events, including the IMRON Security & Safety Summit at SoFi Stadium. 
He also publishes a weekly newsletter, HOTw (Hack of the Week), spotlighting trends and incidents in OT cybersecurity. Through his latest venture, IPMeter, Steve continues to drive innovation in cybersecurity testing and resilience.
 
How to connect Steve : 
 
Website for IPMeter
www.ipmeter.net
 ...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Simplifying OT Cybersecurity: Tools and Strategies for Non-Experts in Critical Infrastructure with Steve Kiss]]>
                </itunes:title>
                                    <itunes:episode>54</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode of </span><em><span style="font-weight:400;">Protect It All</span></em><span style="font-weight:400;">, host Aaron Crow sits down with Steve Kiss, founder and CEO of IPMeter, for an eye-opening discussion on the future of OT (Operational Technology) and IT cybersecurity. With over 25 years of hands-on experience, Steve shares his journey from network engineering to designing practical cybersecurity tools for real-world OT environments.</span></p>
<p><span style="font-weight:400;">They dive into the unique challenges faced by operators in sectors like wastewater treatment, building management, and power utilities—where frontline professionals often shoulder critical cybersecurity responsibilities without formal training or extensive resources. Steve and Aaron emphasize the urgent need for simple, scalable, and reliable tools that empower these “full stack” operators to secure critical infrastructure effectively.</span></p>
<p><span style="font-weight:400;">From bridging the IT-OT divide to managing legacy system risks and improving procurement practices, this conversation offers actionable insights for municipalities, utilities, and smaller organizations aiming to take greater ownership of their cyber defenses. Packed with real-world examples, strategic advice, and a touch of industry humor, this episode is essential listening for anyone focused on protecting essential services and strengthening community resilience.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">10:40 Understanding Factory Acceptance Test (FAT)</span></p>
<p><span style="font-weight:400;">16:41 Transitioning to Local Water Management</span></p>
<p><span style="font-weight:400;">19:52 Compliance and Cybersecurity Standards</span></p>
<p><span style="font-weight:400;">25:03 "Digital Spins on Security Concepts"</span></p>
<p><span style="font-weight:400;">32:30 Standardizing Power Systems Configurations</span></p>
<p><span style="font-weight:400;">35:00 Basic Security Steps for Operators</span></p>
<p><span style="font-weight:400;">40:28 Balancing IoT Features and Control</span></p>
<p><span style="font-weight:400;">45:01 Durability and Setup for Rail Tech</span></p>
<p><span style="font-weight:400;">48:58 "Basic Network Foundations Needed"</span></p>
<p><span style="font-weight:400;">54:35 Wastewater's Overlooked Importance</span></p>
<p><br /><br /><br /><br /></p>
<p><strong>About the guest: </strong></p>
<p> </p>
<p><span style="font-weight:400;">Steve Kiss is a seasoned cybersecurity leader with over two decades of experience in engineering, infrastructure security, and strategic leadership. As the inventor of IPMeter™ and a contributor to the NIST 800-53 SP2 standards, he has played a pivotal role in advancing vulnerability management practices. Throughout his career, Steve has been deeply involved in the design, construction, and security of critical infrastructure across sectors such as aviation, defense, data centers, and utilities. </span></p>
<p><span style="font-weight:400;">His expertise uniquely bridges the worlds of operational technology (OT) and information technology (IT), addressing the evolving challenges of modern network environments. In addition to founding multiple companies focused on infrastructure security, Steve regularly shares his insights at industry events, including the IMRON Security &amp; Safety Summit at SoFi Stadium. </span></p>
<p><span style="font-weight:400;">He also publishes a weekly newsletter, HOTw (Hack of the Week), spotlighting trends and incidents in OT cybersecurity. Through his latest venture, IPMeter, Steve continues to drive innovation in cybersecurity testing and resilience.</span></p>
<p> </p>
<p><strong>How to connect Steve : </strong></p>
<p> </p>
<p><strong>Website for IPMeter</strong></p>
<p><a href="http://www.ipmeter.net/"><span style="font-weight:400;">www.ipmeter.net</span></a></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>LinkedIn</strong></p>
<p><a href="https://www.linkedin.com/in/stevekiss/"><span style="font-weight:400;">https://www.linkedin.com/in/stevekiss/</span></a></p>
<p><strong> </strong></p>
<p><strong>Blog (once to twice a month- includes HOTw (IoT hack of the week)</strong></p>
<p><a href="https://www.ipmeter.net/blog"><span style="font-weight:400;">https://www.ipmeter.net/blog</span></a></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>Contact for IPMeter demos</strong></p>
<p><span style="font-weight:400;">sales@ipmeter.net</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2016700/c1e-52n9du1n9mkirj7pk-25n40275c9m9-os039r.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2016700&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=85c4144ca0b46c46d5ef9ef669c6bffc98bc0d4ac3667932f245a9fd3bcd8a95" length="57560576"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of Protect It All, host Aaron Crow sits down with Steve Kiss, founder and CEO of IPMeter, for an eye-opening discussion on the future of OT (Operational Technology) and IT cybersecurity. With over 25 years of hands-on experience, Steve shares his journey from network engineering to designing practical cybersecurity tools for real-world OT environments.
They dive into the unique challenges faced by operators in sectors like wastewater treatment, building management, and power utilities—where frontline professionals often shoulder critical cybersecurity responsibilities without formal training or extensive resources. Steve and Aaron emphasize the urgent need for simple, scalable, and reliable tools that empower these “full stack” operators to secure critical infrastructure effectively.
From bridging the IT-OT divide to managing legacy system risks and improving procurement practices, this conversation offers actionable insights for municipalities, utilities, and smaller organizations aiming to take greater ownership of their cyber defenses. Packed with real-world examples, strategic advice, and a touch of industry humor, this episode is essential listening for anyone focused on protecting essential services and strengthening community resilience.
Key Moments: 
10:40 Understanding Factory Acceptance Test (FAT)
16:41 Transitioning to Local Water Management
19:52 Compliance and Cybersecurity Standards
25:03 "Digital Spins on Security Concepts"
32:30 Standardizing Power Systems Configurations
35:00 Basic Security Steps for Operators
40:28 Balancing IoT Features and Control
45:01 Durability and Setup for Rail Tech
48:58 "Basic Network Foundations Needed"
54:35 Wastewater's Overlooked Importance

About the guest: 
 
Steve Kiss is a seasoned cybersecurity leader with over two decades of experience in engineering, infrastructure security, and strategic leadership. As the inventor of IPMeter™ and a contributor to the NIST 800-53 SP2 standards, he has played a pivotal role in advancing vulnerability management practices. Throughout his career, Steve has been deeply involved in the design, construction, and security of critical infrastructure across sectors such as aviation, defense, data centers, and utilities. 
His expertise uniquely bridges the worlds of operational technology (OT) and information technology (IT), addressing the evolving challenges of modern network environments. In addition to founding multiple companies focused on infrastructure security, Steve regularly shares his insights at industry events, including the IMRON Security & Safety Summit at SoFi Stadium. 
He also publishes a weekly newsletter, HOTw (Hack of the Week), spotlighting trends and incidents in OT cybersecurity. Through his latest venture, IPMeter, Steve continues to drive innovation in cybersecurity testing and resilience.
 
How to connect Steve : 
 
Website for IPMeter
www.ipmeter.net
 ...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2016700/c1a-w52rp-z32k4xdncpv-5kober.jpg"></itunes:image>
                                                                            <itunes:duration>01:01:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Navigating Cybersecurity Challenges in State Agencies with Joshua Kuntz]]>
                </title>
                <pubDate>Mon, 14 Apr 2025 10:49:14 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2012724</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Episode 53 gets into the intricate world of IT and OT cybersecurity with host Aaron Crow and guest Joshua Kuntz, the Chief Information Security Officer for a state agency in Texas. With a comprehensive background spanning two decades and involvement with seven state agencies, Joshua shares his journey from the Marine Corps to leading security programs in the public sector. </span></p>
<p> </p>
<p><span style="font-weight:400;">The episode covers a range of topics, including the transition from military to government cybersecurity roles, the intricacies of budget allocation, and the significance of mastering both technical and business soft skills in cybersecurity leadership. </span></p>
<p> </p>
<p><span style="font-weight:400;">Joshua provides insights into navigating legislative changes, adapting to rapid technological advances, and the essential task of balancing cybersecurity risks with operational priorities. </span></p>
<p> </p>
<p><span style="font-weight:400;">Listeners are treated to an engaging conversation that offers practical strategies and real-world experiences aimed at protecting critical assets in today’s dynamic cyber landscape.</span></p>
<p><br /><br /><br /></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:46 Ownership Alters Risk Perception</span></p>
<p><span style="font-weight:400;">09:39 Technical Leaders Developed Through Soft Skills</span></p>
<p><span style="font-weight:400;">11:52 "Value of MBA Over Technical Expertise"</span></p>
<p><span style="font-weight:400;">14:29 Navigating Ambiguity in Future Planning</span></p>
<p><span style="font-weight:400;">19:46 "Questioning Budget Cuts Amid Surplus"</span></p>
<p><span style="font-weight:400;">21:05 Efficient Resource Sharing in Texas</span></p>
<p><span style="font-weight:400;">25:31 Remote Work Cybersecurity Challenges</span></p>
<p><span style="font-weight:400;">27:36 VPN Secure Access for Remote Work</span></p>
<p><span style="font-weight:400;">33:21 Prioritizing Critical Executive Decisions</span></p>
<p><span style="font-weight:400;">34:45 Understanding Cyber Risk Impact</span></p>
<p><span style="font-weight:400;">38:16 CISO Role: Beyond "Yes Men"</span></p>
<p><span style="font-weight:400;">41:05 "Exploring IT and OT Cybersecurity"</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Joshua Kuntz is a dedicated professional who successfully transitioned from a military career as an electronics technician to a role with the Texas Department of Public Safety. Embracing the paramilitary structure of the department, Joshua leveraged his military experience to adapt to the law enforcement environment, focusing on protecting citizens. </span></p>
<p><span style="font-weight:400;">While he found comfort in the familiar rank structure and chain of command, Joshua faced challenges in adjusting to personnel management outside the military realm. Despite the loss of certain disciplinary tools common in the military, Joshua continues to evolve as a leader, emphasizing adaptability and commitment to public service.</span></p>
<p><span style="font-weight:400;">How to connect Joshua  - </span><a href="https://www.linkedin.com/in/joshua-kuntz-cissp-35a825176/"><span style="font-weight:400;">https://www.linkedin.com/in/joshua-kuntz-cissp-35a825176/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Episode 53 gets into the intricate world of IT and OT cybersecurity with host Aaron Crow and guest Joshua Kuntz, the Chief Information Security Officer for a state agency in Texas. With a comprehensive background spanning two decades and involvement with seven state agencies, Joshua shares his journey from the Marine Corps to leading security programs in the public sector. 
 
The episode covers a range of topics, including the transition from military to government cybersecurity roles, the intricacies of budget allocation, and the significance of mastering both technical and business soft skills in cybersecurity leadership. 
 
Joshua provides insights into navigating legislative changes, adapting to rapid technological advances, and the essential task of balancing cybersecurity risks with operational priorities. 
 
Listeners are treated to an engaging conversation that offers practical strategies and real-world experiences aimed at protecting critical assets in today’s dynamic cyber landscape.

Key Moments: 
05:46 Ownership Alters Risk Perception
09:39 Technical Leaders Developed Through Soft Skills
11:52 "Value of MBA Over Technical Expertise"
14:29 Navigating Ambiguity in Future Planning
19:46 "Questioning Budget Cuts Amid Surplus"
21:05 Efficient Resource Sharing in Texas
25:31 Remote Work Cybersecurity Challenges
27:36 VPN Secure Access for Remote Work
33:21 Prioritizing Critical Executive Decisions
34:45 Understanding Cyber Risk Impact
38:16 CISO Role: Beyond "Yes Men"
41:05 "Exploring IT and OT Cybersecurity"
About the guest : 
Joshua Kuntz is a dedicated professional who successfully transitioned from a military career as an electronics technician to a role with the Texas Department of Public Safety. Embracing the paramilitary structure of the department, Joshua leveraged his military experience to adapt to the law enforcement environment, focusing on protecting citizens. 
While he found comfort in the familiar rank structure and chain of command, Joshua faced challenges in adjusting to personnel management outside the military realm. Despite the loss of certain disciplinary tools common in the military, Joshua continues to evolve as a leader, emphasizing adaptability and commitment to public service.
How to connect Joshua  - https://www.linkedin.com/in/joshua-kuntz-cissp-35a825176/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Navigating Cybersecurity Challenges in State Agencies with Joshua Kuntz]]>
                </itunes:title>
                                    <itunes:episode>53</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Episode 53 gets into the intricate world of IT and OT cybersecurity with host Aaron Crow and guest Joshua Kuntz, the Chief Information Security Officer for a state agency in Texas. With a comprehensive background spanning two decades and involvement with seven state agencies, Joshua shares his journey from the Marine Corps to leading security programs in the public sector. </span></p>
<p> </p>
<p><span style="font-weight:400;">The episode covers a range of topics, including the transition from military to government cybersecurity roles, the intricacies of budget allocation, and the significance of mastering both technical and business soft skills in cybersecurity leadership. </span></p>
<p> </p>
<p><span style="font-weight:400;">Joshua provides insights into navigating legislative changes, adapting to rapid technological advances, and the essential task of balancing cybersecurity risks with operational priorities. </span></p>
<p> </p>
<p><span style="font-weight:400;">Listeners are treated to an engaging conversation that offers practical strategies and real-world experiences aimed at protecting critical assets in today’s dynamic cyber landscape.</span></p>
<p><br /><br /><br /></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:46 Ownership Alters Risk Perception</span></p>
<p><span style="font-weight:400;">09:39 Technical Leaders Developed Through Soft Skills</span></p>
<p><span style="font-weight:400;">11:52 "Value of MBA Over Technical Expertise"</span></p>
<p><span style="font-weight:400;">14:29 Navigating Ambiguity in Future Planning</span></p>
<p><span style="font-weight:400;">19:46 "Questioning Budget Cuts Amid Surplus"</span></p>
<p><span style="font-weight:400;">21:05 Efficient Resource Sharing in Texas</span></p>
<p><span style="font-weight:400;">25:31 Remote Work Cybersecurity Challenges</span></p>
<p><span style="font-weight:400;">27:36 VPN Secure Access for Remote Work</span></p>
<p><span style="font-weight:400;">33:21 Prioritizing Critical Executive Decisions</span></p>
<p><span style="font-weight:400;">34:45 Understanding Cyber Risk Impact</span></p>
<p><span style="font-weight:400;">38:16 CISO Role: Beyond "Yes Men"</span></p>
<p><span style="font-weight:400;">41:05 "Exploring IT and OT Cybersecurity"</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Joshua Kuntz is a dedicated professional who successfully transitioned from a military career as an electronics technician to a role with the Texas Department of Public Safety. Embracing the paramilitary structure of the department, Joshua leveraged his military experience to adapt to the law enforcement environment, focusing on protecting citizens. </span></p>
<p><span style="font-weight:400;">While he found comfort in the familiar rank structure and chain of command, Joshua faced challenges in adjusting to personnel management outside the military realm. Despite the loss of certain disciplinary tools common in the military, Joshua continues to evolve as a leader, emphasizing adaptability and commitment to public service.</span></p>
<p><span style="font-weight:400;">How to connect Joshua  - </span><a href="https://www.linkedin.com/in/joshua-kuntz-cissp-35a825176/"><span style="font-weight:400;">https://www.linkedin.com/in/joshua-kuntz-cissp-35a825176/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2012724/c1e-x510gb9rq16bro811-okmw91n5a96k-7ufujd.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2012724&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=565c4850f907c148f4367cf30c80a35155238750f6d5d23adae3b5d0281d8524" length="37153688"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Episode 53 gets into the intricate world of IT and OT cybersecurity with host Aaron Crow and guest Joshua Kuntz, the Chief Information Security Officer for a state agency in Texas. With a comprehensive background spanning two decades and involvement with seven state agencies, Joshua shares his journey from the Marine Corps to leading security programs in the public sector. 
 
The episode covers a range of topics, including the transition from military to government cybersecurity roles, the intricacies of budget allocation, and the significance of mastering both technical and business soft skills in cybersecurity leadership. 
 
Joshua provides insights into navigating legislative changes, adapting to rapid technological advances, and the essential task of balancing cybersecurity risks with operational priorities. 
 
Listeners are treated to an engaging conversation that offers practical strategies and real-world experiences aimed at protecting critical assets in today’s dynamic cyber landscape.

Key Moments: 
05:46 Ownership Alters Risk Perception
09:39 Technical Leaders Developed Through Soft Skills
11:52 "Value of MBA Over Technical Expertise"
14:29 Navigating Ambiguity in Future Planning
19:46 "Questioning Budget Cuts Amid Surplus"
21:05 Efficient Resource Sharing in Texas
25:31 Remote Work Cybersecurity Challenges
27:36 VPN Secure Access for Remote Work
33:21 Prioritizing Critical Executive Decisions
34:45 Understanding Cyber Risk Impact
38:16 CISO Role: Beyond "Yes Men"
41:05 "Exploring IT and OT Cybersecurity"
About the guest : 
Joshua Kuntz is a dedicated professional who successfully transitioned from a military career as an electronics technician to a role with the Texas Department of Public Safety. Embracing the paramilitary structure of the department, Joshua leveraged his military experience to adapt to the law enforcement environment, focusing on protecting citizens. 
While he found comfort in the familiar rank structure and chain of command, Joshua faced challenges in adjusting to personnel management outside the military realm. Despite the loss of certain disciplinary tools common in the military, Joshua continues to evolve as a leader, emphasizing adaptability and commitment to public service.
How to connect Joshua  - https://www.linkedin.com/in/joshua-kuntz-cissp-35a825176/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2012724/c1a-w52rp-0vk5xn1zsd8j-bu0geu.png"></itunes:image>
                                                                            <itunes:duration>00:41:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[A Year in Cyber Podcasting: Building Trust and Community in Cybersecurity]]>
                </title>
                <pubDate>Mon, 07 Apr 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2007464</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow celebrates the first anniversary of this insightful podcast. Over the past year, Aaron has delved deep into the world of cybersecurity, bringing listeners compelling stories and expert insights from across the globe, including guests from the United States, Iraq, South Africa, and New Zealand.</span></p>
<p><span style="font-weight:400;">In this milestone episode, Aaron reflects on the journey so far, recounting pivotal moments and important lessons learned. The podcast has covered a wide range of topics, from AI and cloud technology to IT/OT convergence, always aiming to provide real value and foster a community of learners and protectors.</span></p>
<p><span style="font-weight:400;">Listeners can expect a continuation of this engaging content, with plans for more panel discussions, live events, and an ongoing focus on building trusted relationships in the cybersecurity field. </span></p>
<p><span style="font-weight:400;">As Aaron emphasizes, the podcast isn't just about defending digital assets; it's about empowering individuals, fostering dialogue, and driving innovation in the industry. </span></p>
<p><span style="font-weight:400;">Join Aaron in celebrating this landmark and look forward to the exciting path ahead.</span></p>
<p><br /><br /></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p> </p>
<p><span style="font-weight:400;">06:21 Building Trust in Cybersecurity Careers</span></p>
<p><span style="font-weight:400;">08:36 Candid Cybersecurity Conversations</span></p>
<p><span style="font-weight:400;">13:16 Unified IT and OT Collaboration</span></p>
<p><span style="font-weight:400;">16:03 "Embrace Salesmanship and Global Insights"</span></p>
<p><span style="font-weight:400;">19:22 "Podcast Topic Suggestions Welcome"</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span></span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow celebrates the first anniversary of this insightful podcast. Over the past year, Aaron has delved deep into the world of cybersecurity, bringing listeners compelling stories and expert insights from across the globe, including guests from the United States, Iraq, South Africa, and New Zealand.
In this milestone episode, Aaron reflects on the journey so far, recounting pivotal moments and important lessons learned. The podcast has covered a wide range of topics, from AI and cloud technology to IT/OT convergence, always aiming to provide real value and foster a community of learners and protectors.
Listeners can expect a continuation of this engaging content, with plans for more panel discussions, live events, and an ongoing focus on building trusted relationships in the cybersecurity field. 
As Aaron emphasizes, the podcast isn't just about defending digital assets; it's about empowering individuals, fostering dialogue, and driving innovation in the industry. 
Join Aaron in celebrating this landmark and look forward to the exciting path ahead.

Key Moments: 
 
06:21 Building Trust in Cybersecurity Careers
08:36 Candid Cybersecurity Conversations
13:16 Unified IT and OT Collaboration
16:03 "Embrace Salesmanship and Global Insights"
19:22 "Podcast Topic Suggestions Welcome"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[A Year in Cyber Podcasting: Building Trust and Community in Cybersecurity]]>
                </itunes:title>
                                    <itunes:episode>52</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow celebrates the first anniversary of this insightful podcast. Over the past year, Aaron has delved deep into the world of cybersecurity, bringing listeners compelling stories and expert insights from across the globe, including guests from the United States, Iraq, South Africa, and New Zealand.</span></p>
<p><span style="font-weight:400;">In this milestone episode, Aaron reflects on the journey so far, recounting pivotal moments and important lessons learned. The podcast has covered a wide range of topics, from AI and cloud technology to IT/OT convergence, always aiming to provide real value and foster a community of learners and protectors.</span></p>
<p><span style="font-weight:400;">Listeners can expect a continuation of this engaging content, with plans for more panel discussions, live events, and an ongoing focus on building trusted relationships in the cybersecurity field. </span></p>
<p><span style="font-weight:400;">As Aaron emphasizes, the podcast isn't just about defending digital assets; it's about empowering individuals, fostering dialogue, and driving innovation in the industry. </span></p>
<p><span style="font-weight:400;">Join Aaron in celebrating this landmark and look forward to the exciting path ahead.</span></p>
<p><br /><br /></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p> </p>
<p><span style="font-weight:400;">06:21 Building Trust in Cybersecurity Careers</span></p>
<p><span style="font-weight:400;">08:36 Candid Cybersecurity Conversations</span></p>
<p><span style="font-weight:400;">13:16 Unified IT and OT Collaboration</span></p>
<p><span style="font-weight:400;">16:03 "Embrace Salesmanship and Global Insights"</span></p>
<p><span style="font-weight:400;">19:22 "Podcast Topic Suggestions Welcome"</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2007464/c1e-52n9du1nmkocr21ww-7z34m1o4iwx3-79fiyg.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2007464&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=d0625e9b53c2efa948cd3fbe979dd253690a439fb3058580434c89ca3f589102" length="22790460"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow celebrates the first anniversary of this insightful podcast. Over the past year, Aaron has delved deep into the world of cybersecurity, bringing listeners compelling stories and expert insights from across the globe, including guests from the United States, Iraq, South Africa, and New Zealand.
In this milestone episode, Aaron reflects on the journey so far, recounting pivotal moments and important lessons learned. The podcast has covered a wide range of topics, from AI and cloud technology to IT/OT convergence, always aiming to provide real value and foster a community of learners and protectors.
Listeners can expect a continuation of this engaging content, with plans for more panel discussions, live events, and an ongoing focus on building trusted relationships in the cybersecurity field. 
As Aaron emphasizes, the podcast isn't just about defending digital assets; it's about empowering individuals, fostering dialogue, and driving innovation in the industry. 
Join Aaron in celebrating this landmark and look forward to the exciting path ahead.

Key Moments: 
 
06:21 Building Trust in Cybersecurity Careers
08:36 Candid Cybersecurity Conversations
13:16 Unified IT and OT Collaboration
16:03 "Embrace Salesmanship and Global Insights"
19:22 "Podcast Topic Suggestions Welcome"
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2007464/c1a-w52rp-34dk90wnb76-ty9e6w.jpg"></itunes:image>
                                                                            <itunes:duration>00:21:49</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Chemistry to Cybersecurity: Oakley Cox's Unique Journey]]>
                </title>
                <pubDate>Mon, 31 Mar 2025 12:57:07 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/2004309</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives deep into the world of OT cybersecurity alongside guest Oakley Cox, the director of product for Darktrace OT. They explore the unique journey of how Oakley transitioned from a chemistry background to cybersecurity, highlighting the role of AI and machine learning in evolving OT environments. </span></p>
<p><span style="font-weight:400;">With a focus on strategies for tackling cybersecurity challenges in critical infrastructure, the conversation covers the innovative ways AI is being used to enhance security measures and prepare for future threats. </span></p>
<p><span style="font-weight:400;">Tune in for insights on how Darktrace is redefining security through AI, and the importance of adapting and innovating in the ever-evolving landscape of OT and IT cybersecurity convergence.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:49 Bridging IT and OT Skills</span></p>
<p><span style="font-weight:400;">11:00 AI's Practical Use and Future Prospects</span></p>
<p><span style="font-weight:400;">13:28 Rethinking Tabletop Exercises</span></p>
<p><span style="font-weight:400;">16:39 Self-Learning AI for Network Security</span></p>
<p><span style="font-weight:400;">21:37 "Security Vendor: Adapting to Cloud Risks"</span></p>
<p><span style="font-weight:400;">26:22 OT Environment Change Awareness</span></p>
<p><span style="font-weight:400;">35:28 Embracing Ambiguity in Data Analysis</span></p>
<p><span style="font-weight:400;">38:52 AI-Assisted Unusual Activity Blocking</span></p>
<p><span style="font-weight:400;">41:51 Enhancing Security with Smarter Tools</span></p>
<p><span style="font-weight:400;">44:50 Power Utility Data Management Constraints</span></p>
<p><strong>About the guest :</strong><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">Oakley Cox embarked on an academic journey in chemistry, completing an undergraduate degree which led to a PhD position. During their doctoral studies, Oakley discovered a passion not for the hands-on lab work typically associated with chemistry, but rather for the emerging field of machine learning and big data. Their PhD research focused on integrating these computational tools to streamline laboratory processes, thus bridging the gap between traditional chemistry and modern technology. Recognizing that his genuine interest lay in the computational aspects, Oakley shifted his career focus post-PhD, seeking opportunities that allowed them to apply machine learning and big data solutions outside of the chemistry lab.</span></p>
<p><strong>How to connect Oakley Cox :</strong> <a href="https://www.linkedin.com/in/oakley-c-73aa27111/"><span style="font-weight:400;">https://www.linkedin.com/in/oakley-c-73aa27111/</span></a></p>
<p><strong>Resources Mentioned: </strong><span style="font-weight:400;"><br /></span><strong>The AI Arsenal (Darktrace White Paper):</strong> <a href="https://www.darktrace.com/resources/the-ai-arsenal"><span style="font-weight:400;">https://www.darktrace.com/resources/the-ai-arsenal</span></a></p>
<p><strong>Comparing AI Approaches for anomaly based threat detection (Research Journal): </strong><a href="https://hstalks.com/article/7177/anomaly-based-threat-detection-behavioural-fingerp/"><span style="font-weight:400;">https://hstalks.com/article/7177/anomaly-based-threat-detection-behavioural-fingerp/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOT...</strong></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow dives deep into the world of OT cybersecurity alongside guest Oakley Cox, the director of product for Darktrace OT. They explore the unique journey of how Oakley transitioned from a chemistry background to cybersecurity, highlighting the role of AI and machine learning in evolving OT environments. 
With a focus on strategies for tackling cybersecurity challenges in critical infrastructure, the conversation covers the innovative ways AI is being used to enhance security measures and prepare for future threats. 
Tune in for insights on how Darktrace is redefining security through AI, and the importance of adapting and innovating in the ever-evolving landscape of OT and IT cybersecurity convergence.
Key Moments: 
05:49 Bridging IT and OT Skills
11:00 AI's Practical Use and Future Prospects
13:28 Rethinking Tabletop Exercises
16:39 Self-Learning AI for Network Security
21:37 "Security Vendor: Adapting to Cloud Risks"
26:22 OT Environment Change Awareness
35:28 Embracing Ambiguity in Data Analysis
38:52 AI-Assisted Unusual Activity Blocking
41:51 Enhancing Security with Smarter Tools
44:50 Power Utility Data Management Constraints
About the guest : 
Oakley Cox embarked on an academic journey in chemistry, completing an undergraduate degree which led to a PhD position. During their doctoral studies, Oakley discovered a passion not for the hands-on lab work typically associated with chemistry, but rather for the emerging field of machine learning and big data. Their PhD research focused on integrating these computational tools to streamline laboratory processes, thus bridging the gap between traditional chemistry and modern technology. Recognizing that his genuine interest lay in the computational aspects, Oakley shifted his career focus post-PhD, seeking opportunities that allowed them to apply machine learning and big data solutions outside of the chemistry lab.
How to connect Oakley Cox : https://www.linkedin.com/in/oakley-c-73aa27111/
Resources Mentioned: The AI Arsenal (Darktrace White Paper): https://www.darktrace.com/resources/the-ai-arsenal
Comparing AI Approaches for anomaly based threat detection (Research Journal): https://hstalks.com/article/7177/anomaly-based-threat-detection-behavioural-fingerp/
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOT...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Chemistry to Cybersecurity: Oakley Cox's Unique Journey]]>
                </itunes:title>
                                    <itunes:episode>51</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives deep into the world of OT cybersecurity alongside guest Oakley Cox, the director of product for Darktrace OT. They explore the unique journey of how Oakley transitioned from a chemistry background to cybersecurity, highlighting the role of AI and machine learning in evolving OT environments. </span></p>
<p><span style="font-weight:400;">With a focus on strategies for tackling cybersecurity challenges in critical infrastructure, the conversation covers the innovative ways AI is being used to enhance security measures and prepare for future threats. </span></p>
<p><span style="font-weight:400;">Tune in for insights on how Darktrace is redefining security through AI, and the importance of adapting and innovating in the ever-evolving landscape of OT and IT cybersecurity convergence.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:49 Bridging IT and OT Skills</span></p>
<p><span style="font-weight:400;">11:00 AI's Practical Use and Future Prospects</span></p>
<p><span style="font-weight:400;">13:28 Rethinking Tabletop Exercises</span></p>
<p><span style="font-weight:400;">16:39 Self-Learning AI for Network Security</span></p>
<p><span style="font-weight:400;">21:37 "Security Vendor: Adapting to Cloud Risks"</span></p>
<p><span style="font-weight:400;">26:22 OT Environment Change Awareness</span></p>
<p><span style="font-weight:400;">35:28 Embracing Ambiguity in Data Analysis</span></p>
<p><span style="font-weight:400;">38:52 AI-Assisted Unusual Activity Blocking</span></p>
<p><span style="font-weight:400;">41:51 Enhancing Security with Smarter Tools</span></p>
<p><span style="font-weight:400;">44:50 Power Utility Data Management Constraints</span></p>
<p><strong>About the guest :</strong><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">Oakley Cox embarked on an academic journey in chemistry, completing an undergraduate degree which led to a PhD position. During their doctoral studies, Oakley discovered a passion not for the hands-on lab work typically associated with chemistry, but rather for the emerging field of machine learning and big data. Their PhD research focused on integrating these computational tools to streamline laboratory processes, thus bridging the gap between traditional chemistry and modern technology. Recognizing that his genuine interest lay in the computational aspects, Oakley shifted his career focus post-PhD, seeking opportunities that allowed them to apply machine learning and big data solutions outside of the chemistry lab.</span></p>
<p><strong>How to connect Oakley Cox :</strong> <a href="https://www.linkedin.com/in/oakley-c-73aa27111/"><span style="font-weight:400;">https://www.linkedin.com/in/oakley-c-73aa27111/</span></a></p>
<p><strong>Resources Mentioned: </strong><span style="font-weight:400;"><br /></span><strong>The AI Arsenal (Darktrace White Paper):</strong> <a href="https://www.darktrace.com/resources/the-ai-arsenal"><span style="font-weight:400;">https://www.darktrace.com/resources/the-ai-arsenal</span></a></p>
<p><strong>Comparing AI Approaches for anomaly based threat detection (Research Journal): </strong><a href="https://hstalks.com/article/7177/anomaly-based-threat-detection-behavioural-fingerp/"><span style="font-weight:400;">https://hstalks.com/article/7177/anomaly-based-threat-detection-behavioural-fingerp/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/2004309/c1e-jg87nu5wnodipjnjm-rkzm78z7cm16-9txopi.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F2004309&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=75dceecc2e17936a0db31b7b74ca68574cbbb3634c2f1deacf539ffee21750c0" length="56711027"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow dives deep into the world of OT cybersecurity alongside guest Oakley Cox, the director of product for Darktrace OT. They explore the unique journey of how Oakley transitioned from a chemistry background to cybersecurity, highlighting the role of AI and machine learning in evolving OT environments. 
With a focus on strategies for tackling cybersecurity challenges in critical infrastructure, the conversation covers the innovative ways AI is being used to enhance security measures and prepare for future threats. 
Tune in for insights on how Darktrace is redefining security through AI, and the importance of adapting and innovating in the ever-evolving landscape of OT and IT cybersecurity convergence.
Key Moments: 
05:49 Bridging IT and OT Skills
11:00 AI's Practical Use and Future Prospects
13:28 Rethinking Tabletop Exercises
16:39 Self-Learning AI for Network Security
21:37 "Security Vendor: Adapting to Cloud Risks"
26:22 OT Environment Change Awareness
35:28 Embracing Ambiguity in Data Analysis
38:52 AI-Assisted Unusual Activity Blocking
41:51 Enhancing Security with Smarter Tools
44:50 Power Utility Data Management Constraints
About the guest : 
Oakley Cox embarked on an academic journey in chemistry, completing an undergraduate degree which led to a PhD position. During their doctoral studies, Oakley discovered a passion not for the hands-on lab work typically associated with chemistry, but rather for the emerging field of machine learning and big data. Their PhD research focused on integrating these computational tools to streamline laboratory processes, thus bridging the gap between traditional chemistry and modern technology. Recognizing that his genuine interest lay in the computational aspects, Oakley shifted his career focus post-PhD, seeking opportunities that allowed them to apply machine learning and big data solutions outside of the chemistry lab.
How to connect Oakley Cox : https://www.linkedin.com/in/oakley-c-73aa27111/
Resources Mentioned: The AI Arsenal (Darktrace White Paper): https://www.darktrace.com/resources/the-ai-arsenal
Comparing AI Approaches for anomaly based threat detection (Research Journal): https://hstalks.com/article/7177/anomaly-based-threat-detection-behavioural-fingerp/
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOT...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/2004309/c1a-w52rp-qdwn5zw8hj05-xj3kes.jpg"></itunes:image>
                                                                            <itunes:duration>00:52:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Safeguarding Operations: The Role of Cybersecurity in IT and OT Environments]]>
                </title>
                <pubDate>Mon, 24 Mar 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1998161</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by Peter Jackson, a seasoned expert from New Zealand with a robust background in industrial automation and cybersecurity. Together, they unravel the intricacies of balancing security with reliable operations and explore the evolving landscape of OT cybersecurity in critical infrastructure. Listen in as they discuss everything from the importance of safe operations and risk management to the nuances of vulnerability management in diverse industrial environments. </span></p>
<p><span style="font-weight:400;">Whether you're an OT professional or an IT practitioner, this episode is packed with insights that cater to both ends of the spectrum, all shared with a passion for protecting the future of our interconnected systems. </span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:22 Bridging IT and OT Silos</span></p>
<p><span style="font-weight:400;">14:53 Business Risk Beyond Cyber Concerns</span></p>
<p><span style="font-weight:400;">17:46 "OT Security Risks in Business"</span></p>
<p><span style="font-weight:400;">25:46 Simplifying Complex OT Management</span></p>
<p><span style="font-weight:400;">30:10 Cybersecurity Misunderstandings in Safety Systems</span></p>
<p><span style="font-weight:400;">36:58 Prioritizing Systems and Security Integration</span></p>
<p><span style="font-weight:400;">39:51 Improving Business Trust Tolerance Journey</span></p>
<p><span style="font-weight:400;">44:42 Hesitancy and Future of OT Cloud</span></p>
<p><span style="font-weight:400;">52:07 Operational Resilience and Risk Reduction</span></p>
<p><span style="font-weight:400;">55:26 "Assessing System Security Strategies"</span></p>
<p><span style="font-weight:400;">58:59 Network Security Maturity Strategies</span></p>
<p><span style="font-weight:400;">01:05:00 "Improving IT Resilience and Preparedness"</span></p>
<p><span style="font-weight:400;">01:13:43 "Towards Improved System Security Awareness"</span></p>
<p><span style="font-weight:400;">01:15:03 Continuous Security Improvement Basics</span></p>
<p><span style="font-weight:400;">01:20:00 Safety First: A Unique Culture</span></p>
<p><strong>About the guest : </strong></p>
<p>Peter Jackson is a seasoned OT/ICS cybersecurity expert with deep roots in ICS programming, SIS engineering, and alarm management. He’s built high-performing OT security teams, led global projects across NZ, ANZ, APAC, and supported major acquisitions with his cyber expertise.</p>
<p>A certified SANS ICS515 instructor and global speaker, Peter also leads the <strong>NZ ICS Cyber Technical Network</strong>, driving collaboration and innovation in industrial cybersecurity.</p>
<p style="font-weight:400;"> </p>
<p><strong>Feel free to follow Peter on LinkedIn:</strong> <a href="https://www.linkedin.com/in/peterjnz/">https://www.linkedin.com/in/peterjnz/ </a><br /><strong>If you’re interested in the NZ ICS/OT cyber community:</strong> <a href="https://icscyber.org.nz">https://icscyber.org.nz </a></p>
<p><strong>If you’re interested in the work that he does with the SGS team:</strong> <a href="https://www.sgs.com/en/services/operational-technology-cyber-safety">https://www.sgs.com/en/services/operational-technology-cyber-safety</a>  or email global.otcyber@sgs.com</p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow is joined by Peter Jackson, a seasoned expert from New Zealand with a robust background in industrial automation and cybersecurity. Together, they unravel the intricacies of balancing security with reliable operations and explore the evolving landscape of OT cybersecurity in critical infrastructure. Listen in as they discuss everything from the importance of safe operations and risk management to the nuances of vulnerability management in diverse industrial environments. 
Whether you're an OT professional or an IT practitioner, this episode is packed with insights that cater to both ends of the spectrum, all shared with a passion for protecting the future of our interconnected systems. 
 
Key Moments: 
05:22 Bridging IT and OT Silos
14:53 Business Risk Beyond Cyber Concerns
17:46 "OT Security Risks in Business"
25:46 Simplifying Complex OT Management
30:10 Cybersecurity Misunderstandings in Safety Systems
36:58 Prioritizing Systems and Security Integration
39:51 Improving Business Trust Tolerance Journey
44:42 Hesitancy and Future of OT Cloud
52:07 Operational Resilience and Risk Reduction
55:26 "Assessing System Security Strategies"
58:59 Network Security Maturity Strategies
01:05:00 "Improving IT Resilience and Preparedness"
01:13:43 "Towards Improved System Security Awareness"
01:15:03 Continuous Security Improvement Basics
01:20:00 Safety First: A Unique Culture
About the guest : 
Peter Jackson is a seasoned OT/ICS cybersecurity expert with deep roots in ICS programming, SIS engineering, and alarm management. He’s built high-performing OT security teams, led global projects across NZ, ANZ, APAC, and supported major acquisitions with his cyber expertise.
A certified SANS ICS515 instructor and global speaker, Peter also leads the NZ ICS Cyber Technical Network, driving collaboration and innovation in industrial cybersecurity.
 
Feel free to follow Peter on LinkedIn: https://www.linkedin.com/in/peterjnz/ If you’re interested in the NZ ICS/OT cyber community: https://icscyber.org.nz 
If you’re interested in the work that he does with the SGS team: https://www.sgs.com/en/services/operational-technology-cyber-safety  or email global.otcyber@sgs.com
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Safeguarding Operations: The Role of Cybersecurity in IT and OT Environments]]>
                </itunes:title>
                                    <itunes:episode>50</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by Peter Jackson, a seasoned expert from New Zealand with a robust background in industrial automation and cybersecurity. Together, they unravel the intricacies of balancing security with reliable operations and explore the evolving landscape of OT cybersecurity in critical infrastructure. Listen in as they discuss everything from the importance of safe operations and risk management to the nuances of vulnerability management in diverse industrial environments. </span></p>
<p><span style="font-weight:400;">Whether you're an OT professional or an IT practitioner, this episode is packed with insights that cater to both ends of the spectrum, all shared with a passion for protecting the future of our interconnected systems. </span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">05:22 Bridging IT and OT Silos</span></p>
<p><span style="font-weight:400;">14:53 Business Risk Beyond Cyber Concerns</span></p>
<p><span style="font-weight:400;">17:46 "OT Security Risks in Business"</span></p>
<p><span style="font-weight:400;">25:46 Simplifying Complex OT Management</span></p>
<p><span style="font-weight:400;">30:10 Cybersecurity Misunderstandings in Safety Systems</span></p>
<p><span style="font-weight:400;">36:58 Prioritizing Systems and Security Integration</span></p>
<p><span style="font-weight:400;">39:51 Improving Business Trust Tolerance Journey</span></p>
<p><span style="font-weight:400;">44:42 Hesitancy and Future of OT Cloud</span></p>
<p><span style="font-weight:400;">52:07 Operational Resilience and Risk Reduction</span></p>
<p><span style="font-weight:400;">55:26 "Assessing System Security Strategies"</span></p>
<p><span style="font-weight:400;">58:59 Network Security Maturity Strategies</span></p>
<p><span style="font-weight:400;">01:05:00 "Improving IT Resilience and Preparedness"</span></p>
<p><span style="font-weight:400;">01:13:43 "Towards Improved System Security Awareness"</span></p>
<p><span style="font-weight:400;">01:15:03 Continuous Security Improvement Basics</span></p>
<p><span style="font-weight:400;">01:20:00 Safety First: A Unique Culture</span></p>
<p><strong>About the guest : </strong></p>
<p>Peter Jackson is a seasoned OT/ICS cybersecurity expert with deep roots in ICS programming, SIS engineering, and alarm management. He’s built high-performing OT security teams, led global projects across NZ, ANZ, APAC, and supported major acquisitions with his cyber expertise.</p>
<p>A certified SANS ICS515 instructor and global speaker, Peter also leads the <strong>NZ ICS Cyber Technical Network</strong>, driving collaboration and innovation in industrial cybersecurity.</p>
<p style="font-weight:400;"> </p>
<p><strong>Feel free to follow Peter on LinkedIn:</strong> <a href="https://www.linkedin.com/in/peterjnz/">https://www.linkedin.com/in/peterjnz/ </a><br /><strong>If you’re interested in the NZ ICS/OT cyber community:</strong> <a href="https://icscyber.org.nz">https://icscyber.org.nz </a></p>
<p><strong>If you’re interested in the work that he does with the SGS team:</strong> <a href="https://www.sgs.com/en/services/operational-technology-cyber-safety">https://www.sgs.com/en/services/operational-technology-cyber-safety</a>  or email global.otcyber@sgs.com</p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1998161/c1e-n57kvbdm7mphdw02j-6z1v62m2hd4z-biflxh.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1998161&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=2c32f4a4f90de6236afe30af02099648f5740c5c8d1309d73cb1baf2e40421c9" length="80813007"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow is joined by Peter Jackson, a seasoned expert from New Zealand with a robust background in industrial automation and cybersecurity. Together, they unravel the intricacies of balancing security with reliable operations and explore the evolving landscape of OT cybersecurity in critical infrastructure. Listen in as they discuss everything from the importance of safe operations and risk management to the nuances of vulnerability management in diverse industrial environments. 
Whether you're an OT professional or an IT practitioner, this episode is packed with insights that cater to both ends of the spectrum, all shared with a passion for protecting the future of our interconnected systems. 
 
Key Moments: 
05:22 Bridging IT and OT Silos
14:53 Business Risk Beyond Cyber Concerns
17:46 "OT Security Risks in Business"
25:46 Simplifying Complex OT Management
30:10 Cybersecurity Misunderstandings in Safety Systems
36:58 Prioritizing Systems and Security Integration
39:51 Improving Business Trust Tolerance Journey
44:42 Hesitancy and Future of OT Cloud
52:07 Operational Resilience and Risk Reduction
55:26 "Assessing System Security Strategies"
58:59 Network Security Maturity Strategies
01:05:00 "Improving IT Resilience and Preparedness"
01:13:43 "Towards Improved System Security Awareness"
01:15:03 Continuous Security Improvement Basics
01:20:00 Safety First: A Unique Culture
About the guest : 
Peter Jackson is a seasoned OT/ICS cybersecurity expert with deep roots in ICS programming, SIS engineering, and alarm management. He’s built high-performing OT security teams, led global projects across NZ, ANZ, APAC, and supported major acquisitions with his cyber expertise.
A certified SANS ICS515 instructor and global speaker, Peter also leads the NZ ICS Cyber Technical Network, driving collaboration and innovation in industrial cybersecurity.
 
Feel free to follow Peter on LinkedIn: https://www.linkedin.com/in/peterjnz/ If you’re interested in the NZ ICS/OT cyber community: https://icscyber.org.nz 
If you’re interested in the work that he does with the SGS team: https://www.sgs.com/en/services/operational-technology-cyber-safety  or email global.otcyber@sgs.com
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1998161/c1a-w52rp-gpwor8grivg-bglo9q.jpg"></itunes:image>
                                                                            <itunes:duration>01:24:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[The Intersection of IT and OT: Highlights from S4 Conference with Jori VanAntwerp]]>
                </title>
                <pubDate>Mon, 17 Mar 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1989266</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, Aaron is joined by Jori VanAntwerp live from the s4 conference. Together, they unpack the intricacies of networking at industry events, the challenges and opportunities in OT cybersecurity, and the evolving technologies and strategies that are reshaping the field. </span></p>
<p><span style="font-weight:400;">From the significance of understanding asset owner needs to the promising future of AI and blockchain in cybersecurity, Aaron and Jori cover it all. Whether you're a seasoned professional or new to the field, this episode is packed with insights that will keep you informed and ahead in the ever-evolving cybersecurity landscape. </span></p>
<p><span style="font-weight:400;">So, tune in and get ready to explore the essential strategies for protecting it all.</span></p>
<p><span style="font-weight:400;">Key moments: </span></p>
<p><span style="font-weight:400;">04:38 Asset Owner's Conference Dilemma</span></p>
<p><span style="font-weight:400;">08:14 "Business at Speed of Trust"</span></p>
<p><span style="font-weight:400;">10:45 Career Transition Acceptance</span></p>
<p><span style="font-weight:400;">16:09 Limited Solution Compatibility Issues</span></p>
<p><span style="font-weight:400;">18:41 Exploring Blockchain for Data Integration</span></p>
<p><span style="font-weight:400;">20:47 Adapting to Imperfection with Technology</span></p>
<p><span style="font-weight:400;">25:12 Dynamic Detection in Modern Substations</span></p>
<p><span style="font-weight:400;">28:28 Rethinking Staffing for Power Utilities</span></p>
<p><span style="font-weight:400;">31:45 Retiree Saves Power Plant Upgrade</span></p>
<p><span style="font-weight:400;">35:37 Ford F-150 Taillights Theft Spike</span></p>
<p><span style="font-weight:400;">39:08 Modular Redundancy in OT Security</span></p>
<p><span style="font-weight:400;">42:20 "Advocating for Chipset Optimization"</span></p>
<p><span style="font-weight:400;">45:32 "Call for Advanced PLC Monitoring Chip"</span></p>
<p><span style="font-weight:400;">48:12 Complicated Security Measures Challenge Efficiency</span></p>
<p><span style="font-weight:400;">49:28 Balancing Security and Operational Needs</span></p>
<p><span style="font-weight:400;">52:57 IT Policy Disrupts Control Room Ops</span></p>
<p><span style="font-weight:400;">56:43 Bridging OT and IT Teams</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">For nearly two decades, Jori has enabled industrial and IT organizations to be successful in reducing risk, increasing compliance, and their overall security efforts. Jori has the ability to quickly evaluate situations and determine innovative solutions and possible pitfalls due to his diverse background in security, technology, partnering and client-facing experience. Approaching situations with intuitive insight and methodology, leveraging his deep understanding of business and technology, ranging from silicon to the cloud. He had the pleasure of working with such great companies as Gravwell, Dragos, CrowdStrike, FireEye, McAfee, and is now Founder and Chief Executive Officer at EmberOT, a cybersecurity startup focused on making security a reality.</span></p>
<p><strong>How to connect Jori : </strong></p>
<p><span style="font-weight:400;">Website : </span><a href="https://emberot.com/"><span style="font-weight:400;">https://emberot.com/</span></a></p>
<p><span style="font-weight:400;">Linkedin : </span><a href="https://www.linkedin.com/in/jvanantwerp/"><span style="font-weight:400;">https://www.linkedin.com/in/jvanantwerp/</span></a></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Aaron is joined by Jori VanAntwerp live from the s4 conference. Together, they unpack the intricacies of networking at industry events, the challenges and opportunities in OT cybersecurity, and the evolving technologies and strategies that are reshaping the field. 
From the significance of understanding asset owner needs to the promising future of AI and blockchain in cybersecurity, Aaron and Jori cover it all. Whether you're a seasoned professional or new to the field, this episode is packed with insights that will keep you informed and ahead in the ever-evolving cybersecurity landscape. 
So, tune in and get ready to explore the essential strategies for protecting it all.
Key moments: 
04:38 Asset Owner's Conference Dilemma
08:14 "Business at Speed of Trust"
10:45 Career Transition Acceptance
16:09 Limited Solution Compatibility Issues
18:41 Exploring Blockchain for Data Integration
20:47 Adapting to Imperfection with Technology
25:12 Dynamic Detection in Modern Substations
28:28 Rethinking Staffing for Power Utilities
31:45 Retiree Saves Power Plant Upgrade
35:37 Ford F-150 Taillights Theft Spike
39:08 Modular Redundancy in OT Security
42:20 "Advocating for Chipset Optimization"
45:32 "Call for Advanced PLC Monitoring Chip"
48:12 Complicated Security Measures Challenge Efficiency
49:28 Balancing Security and Operational Needs
52:57 IT Policy Disrupts Control Room Ops
56:43 Bridging OT and IT Teams
About the guest : 
For nearly two decades, Jori has enabled industrial and IT organizations to be successful in reducing risk, increasing compliance, and their overall security efforts. Jori has the ability to quickly evaluate situations and determine innovative solutions and possible pitfalls due to his diverse background in security, technology, partnering and client-facing experience. Approaching situations with intuitive insight and methodology, leveraging his deep understanding of business and technology, ranging from silicon to the cloud. He had the pleasure of working with such great companies as Gravwell, Dragos, CrowdStrike, FireEye, McAfee, and is now Founder and Chief Executive Officer at EmberOT, a cybersecurity startup focused on making security a reality.
How to connect Jori : 
Website : https://emberot.com/
Linkedin : https://www.linkedin.com/in/jvanantwerp/

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn:]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[The Intersection of IT and OT: Highlights from S4 Conference with Jori VanAntwerp]]>
                </itunes:title>
                                    <itunes:episode>49</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, Aaron is joined by Jori VanAntwerp live from the s4 conference. Together, they unpack the intricacies of networking at industry events, the challenges and opportunities in OT cybersecurity, and the evolving technologies and strategies that are reshaping the field. </span></p>
<p><span style="font-weight:400;">From the significance of understanding asset owner needs to the promising future of AI and blockchain in cybersecurity, Aaron and Jori cover it all. Whether you're a seasoned professional or new to the field, this episode is packed with insights that will keep you informed and ahead in the ever-evolving cybersecurity landscape. </span></p>
<p><span style="font-weight:400;">So, tune in and get ready to explore the essential strategies for protecting it all.</span></p>
<p><span style="font-weight:400;">Key moments: </span></p>
<p><span style="font-weight:400;">04:38 Asset Owner's Conference Dilemma</span></p>
<p><span style="font-weight:400;">08:14 "Business at Speed of Trust"</span></p>
<p><span style="font-weight:400;">10:45 Career Transition Acceptance</span></p>
<p><span style="font-weight:400;">16:09 Limited Solution Compatibility Issues</span></p>
<p><span style="font-weight:400;">18:41 Exploring Blockchain for Data Integration</span></p>
<p><span style="font-weight:400;">20:47 Adapting to Imperfection with Technology</span></p>
<p><span style="font-weight:400;">25:12 Dynamic Detection in Modern Substations</span></p>
<p><span style="font-weight:400;">28:28 Rethinking Staffing for Power Utilities</span></p>
<p><span style="font-weight:400;">31:45 Retiree Saves Power Plant Upgrade</span></p>
<p><span style="font-weight:400;">35:37 Ford F-150 Taillights Theft Spike</span></p>
<p><span style="font-weight:400;">39:08 Modular Redundancy in OT Security</span></p>
<p><span style="font-weight:400;">42:20 "Advocating for Chipset Optimization"</span></p>
<p><span style="font-weight:400;">45:32 "Call for Advanced PLC Monitoring Chip"</span></p>
<p><span style="font-weight:400;">48:12 Complicated Security Measures Challenge Efficiency</span></p>
<p><span style="font-weight:400;">49:28 Balancing Security and Operational Needs</span></p>
<p><span style="font-weight:400;">52:57 IT Policy Disrupts Control Room Ops</span></p>
<p><span style="font-weight:400;">56:43 Bridging OT and IT Teams</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">For nearly two decades, Jori has enabled industrial and IT organizations to be successful in reducing risk, increasing compliance, and their overall security efforts. Jori has the ability to quickly evaluate situations and determine innovative solutions and possible pitfalls due to his diverse background in security, technology, partnering and client-facing experience. Approaching situations with intuitive insight and methodology, leveraging his deep understanding of business and technology, ranging from silicon to the cloud. He had the pleasure of working with such great companies as Gravwell, Dragos, CrowdStrike, FireEye, McAfee, and is now Founder and Chief Executive Officer at EmberOT, a cybersecurity startup focused on making security a reality.</span></p>
<p><strong>How to connect Jori : </strong></p>
<p><span style="font-weight:400;">Website : </span><a href="https://emberot.com/"><span style="font-weight:400;">https://emberot.com/</span></a></p>
<p><span style="font-weight:400;">Linkedin : </span><a href="https://www.linkedin.com/in/jvanantwerp/"><span style="font-weight:400;">https://www.linkedin.com/in/jvanantwerp/</span></a></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p><br /><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1989266/c1e-n57kvb5krx4c90241-5z1mdgq0inog-2ii6ov.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1989266&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=c7df1deb6c301dd1d4fe489136dcc325a09af5ede1d4d058819f55480be96718" length="44769790"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Aaron is joined by Jori VanAntwerp live from the s4 conference. Together, they unpack the intricacies of networking at industry events, the challenges and opportunities in OT cybersecurity, and the evolving technologies and strategies that are reshaping the field. 
From the significance of understanding asset owner needs to the promising future of AI and blockchain in cybersecurity, Aaron and Jori cover it all. Whether you're a seasoned professional or new to the field, this episode is packed with insights that will keep you informed and ahead in the ever-evolving cybersecurity landscape. 
So, tune in and get ready to explore the essential strategies for protecting it all.
Key moments: 
04:38 Asset Owner's Conference Dilemma
08:14 "Business at Speed of Trust"
10:45 Career Transition Acceptance
16:09 Limited Solution Compatibility Issues
18:41 Exploring Blockchain for Data Integration
20:47 Adapting to Imperfection with Technology
25:12 Dynamic Detection in Modern Substations
28:28 Rethinking Staffing for Power Utilities
31:45 Retiree Saves Power Plant Upgrade
35:37 Ford F-150 Taillights Theft Spike
39:08 Modular Redundancy in OT Security
42:20 "Advocating for Chipset Optimization"
45:32 "Call for Advanced PLC Monitoring Chip"
48:12 Complicated Security Measures Challenge Efficiency
49:28 Balancing Security and Operational Needs
52:57 IT Policy Disrupts Control Room Ops
56:43 Bridging OT and IT Teams
About the guest : 
For nearly two decades, Jori has enabled industrial and IT organizations to be successful in reducing risk, increasing compliance, and their overall security efforts. Jori has the ability to quickly evaluate situations and determine innovative solutions and possible pitfalls due to his diverse background in security, technology, partnering and client-facing experience. Approaching situations with intuitive insight and methodology, leveraging his deep understanding of business and technology, ranging from silicon to the cloud. He had the pleasure of working with such great companies as Gravwell, Dragos, CrowdStrike, FireEye, McAfee, and is now Founder and Chief Executive Officer at EmberOT, a cybersecurity startup focused on making security a reality.
How to connect Jori : 
Website : https://emberot.com/
Linkedin : https://www.linkedin.com/in/jvanantwerp/

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn:]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1989266/c1a-w52rp-pkg7v9nmb03-voexeh.jpg"></itunes:image>
                                                                            <itunes:duration>00:59:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Rethinking IT and OT - Lessons from Colonial Pipeline and Other Cyber Incidents]]>
                </title>
                <pubDate>Mon, 10 Mar 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1989262</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow tackles the ongoing debate of IT versus OT attacks, using the example of the Colonial Pipeline incident and others to illustrate his point. Aaron argues that focusing on whether an attack is an IT or OT issue misses the bigger picture - the real impact on operations. </span></p>
<p><span style="font-weight:400;">Through engaging stories and industry insights, Aaron emphasizes that asset owners ultimately care about operational continuity, revenue, safety, and risk management, rather than rigid definitions. </span></p>
<p><span style="font-weight:400;">Join us as we explore why understanding the broader business risks is crucial and how organizations can better protect themselves in this evolving landscape.</span></p>
<p><span style="font-weight:400;">Key Moments; </span></p>
<p> </p>
<p><span style="font-weight:400;">04:48 Key Role of OSI PI in Utilities</span></p>
<p><span style="font-weight:400;">09:05 New Domain Issue: Same Name, No Access</span></p>
<p><span style="font-weight:400;">11:26 IT vs. OT Asset Management Dilemma</span></p>
<p><span style="font-weight:400;">15:28 OT Cybersecurity: Beyond Securing PLCs</span></p>
<p><span style="font-weight:400;">18:47 Blurring Lines Between IT and OT</span></p>
<p><span style="font-weight:400;">19:36 Business Risk and Cyber Protection</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow tackles the ongoing debate of IT versus OT attacks, using the example of the Colonial Pipeline incident and others to illustrate his point. Aaron argues that focusing on whether an attack is an IT or OT issue misses the bigger picture - the real impact on operations. 
Through engaging stories and industry insights, Aaron emphasizes that asset owners ultimately care about operational continuity, revenue, safety, and risk management, rather than rigid definitions. 
Join us as we explore why understanding the broader business risks is crucial and how organizations can better protect themselves in this evolving landscape.
Key Moments; 
 
04:48 Key Role of OSI PI in Utilities
09:05 New Domain Issue: Same Name, No Access
11:26 IT vs. OT Asset Management Dilemma
15:28 OT Cybersecurity: Beyond Securing PLCs
18:47 Blurring Lines Between IT and OT
19:36 Business Risk and Cyber Protection
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Rethinking IT and OT - Lessons from Colonial Pipeline and Other Cyber Incidents]]>
                </itunes:title>
                                    <itunes:episode>48</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow tackles the ongoing debate of IT versus OT attacks, using the example of the Colonial Pipeline incident and others to illustrate his point. Aaron argues that focusing on whether an attack is an IT or OT issue misses the bigger picture - the real impact on operations. </span></p>
<p><span style="font-weight:400;">Through engaging stories and industry insights, Aaron emphasizes that asset owners ultimately care about operational continuity, revenue, safety, and risk management, rather than rigid definitions. </span></p>
<p><span style="font-weight:400;">Join us as we explore why understanding the broader business risks is crucial and how organizations can better protect themselves in this evolving landscape.</span></p>
<p><span style="font-weight:400;">Key Moments; </span></p>
<p> </p>
<p><span style="font-weight:400;">04:48 Key Role of OSI PI in Utilities</span></p>
<p><span style="font-weight:400;">09:05 New Domain Issue: Same Name, No Access</span></p>
<p><span style="font-weight:400;">11:26 IT vs. OT Asset Management Dilemma</span></p>
<p><span style="font-weight:400;">15:28 OT Cybersecurity: Beyond Securing PLCs</span></p>
<p><span style="font-weight:400;">18:47 Blurring Lines Between IT and OT</span></p>
<p><span style="font-weight:400;">19:36 Business Risk and Cyber Protection</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1989262/c1e-q237vu25061agndd2o-5z1mop5ka6o-w14vcw.mp4?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1989262&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=0892b1fe6da9f6a7968b572df6a3da0fa2e1f9089a1f619b0587741fc07f6fe0" length="3162298293"
                        type="video/mp4">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow tackles the ongoing debate of IT versus OT attacks, using the example of the Colonial Pipeline incident and others to illustrate his point. Aaron argues that focusing on whether an attack is an IT or OT issue misses the bigger picture - the real impact on operations. 
Through engaging stories and industry insights, Aaron emphasizes that asset owners ultimately care about operational continuity, revenue, safety, and risk management, rather than rigid definitions. 
Join us as we explore why understanding the broader business risks is crucial and how organizations can better protect themselves in this evolving landscape.
Key Moments; 
 
04:48 Key Role of OSI PI in Utilities
09:05 New Domain Issue: Same Name, No Access
11:26 IT vs. OT Asset Management Dilemma
15:28 OT Cybersecurity: Beyond Securing PLCs
18:47 Blurring Lines Between IT and OT
19:36 Business Risk and Cyber Protection
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1989262/c1a-w52rp-9jn8qd40adpk-kbuhpq.png"></itunes:image>
                                                                            <itunes:duration>00:21:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[The Intersection of AI, OT, and Cybersecurity with Sulaiman Alhasawi]]>
                </title>
                <pubDate>Mon, 03 Mar 2025 11:01:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1984568</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by Sulaiman Alhasawi, a cybersecurity expert based in Kuwait. Sulaiman shares his journey into OT security, beginning with his PhD research in Liverpool and leading to his creation of ICSrank.com, a search engine for OT devices. </span></p>
<p> </p>
<p><span style="font-weight:400;">The discussion gets into individuals' unique cybersecurity paths, emphasizing the importance of learning from diverse experiences. They explore the challenges asset owners face in understanding vulnerabilities, the role of AI in cybersecurity, and the international perspective on OT security. </span></p>
<p> </p>
<p><span style="font-weight:400;">Throughout the episode, Aaron and Sulaiman highlight the significance of community, knowledge sharing, and taking actionable steps to improve cybersecurity posture in critical infrastructure. Whether you’re an industry veteran or a newcomer, this episode is packed with insights and practical advice to help you protect it all.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">01:10 Sharing Diverse Experiences</span></p>
<p><span style="font-weight:400;">05:44 Simplifying Asset Management Challenges</span></p>
<p><span style="font-weight:400;">08:15 Action Transforms Ideas to Value</span></p>
<p><span style="font-weight:400;">11:44 Unexpected Targets in Cyber Attacks</span></p>
<p><span style="font-weight:400;">13:20 "Obscurity Isn't Security"</span></p>
<p><span style="font-weight:400;">16:50 Simplifying Cybersecurity Communication</span></p>
<p><span style="font-weight:400;">21:12 Unintended Internet Exposure Risks</span></p>
<p><span style="font-weight:400;">24:49 Podcasting for Community Impact</span></p>
<p><span style="font-weight:400;">28:53 OT's Vital Role in Hospitals</span></p>
<p><span style="font-weight:400;">32:26 Diverse Experiences in Power Plants</span></p>
<p><span style="font-weight:400;">35:54 OT Data Integration Priorities</span></p>
<p><span style="font-weight:400;">36:55 Prioritizing Safety Over Immediate Updates</span></p>
<p><span style="font-weight:400;">42:10 Global Business Resource Allocation Challenges</span></p>
<p><span style="font-weight:400;">46:08 Finding Our Podcast &amp; Resources</span></p>
<p><span style="font-weight:400;">47:25 Global Unity in Shared Struggles</span></p>
<p> </p>
<p><strong>About The Guest : </strong></p>
<p> </p>
<p><strong>Sulaiman Alhasawi</strong><span style="font-weight:400;"> is an active researcher  in ICS/OT cybersecurity, with a PhD specializing in securing critical infrastructure. He is the founder of ICSrank.com, a platform dedicated to discovering and assessing security risks in Industrial Control Systems (ICS), Operational Technology (OT), and Industrial IoT.</span></p>
<p><span style="font-weight:400;">As the host of the ICS Arabia Podcast, Sulaiman brings together global experts to discuss cutting-edge topics in OT security, bridging the gap between research, industry, and real-world cyber threats.</span></p>
<p><span style="font-weight:400;">His latest research, "How to Find Water Systems on the Internet", was featured in SecurityWeek magazine, shedding light on OSINT techniques used to uncover vulnerable water infrastructure. (Read it here: </span><a href="https://zerontek.com/zt/2024/09/30/how-to-find-water-systems-on-the-internet-a-guide-to-ics-ot-osint"><span style="font-weight:400;">https://zerontek.com/zt/2024/09/30/how-to-find-water-systems-on-the-internet-a-guide-to-ics-ot-osint/</span></a><span style="font-weight:400;">)</span></p>
<p><span style="font-weight:400;">Follow Sulaiman for insights on ICS/OT security, threat intelligence, and ethical hacking:</span></p>
<p> </p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">ICSrank Website: </span><a href="https://icsrank.com/"><span style="font-weight:400;">ICSrank.com</span></a></li>
<li style="font-weight:400;"><span style="font-weight:400;">IC...</span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow is joined by Sulaiman Alhasawi, a cybersecurity expert based in Kuwait. Sulaiman shares his journey into OT security, beginning with his PhD research in Liverpool and leading to his creation of ICSrank.com, a search engine for OT devices. 
 
The discussion gets into individuals' unique cybersecurity paths, emphasizing the importance of learning from diverse experiences. They explore the challenges asset owners face in understanding vulnerabilities, the role of AI in cybersecurity, and the international perspective on OT security. 
 
Throughout the episode, Aaron and Sulaiman highlight the significance of community, knowledge sharing, and taking actionable steps to improve cybersecurity posture in critical infrastructure. Whether you’re an industry veteran or a newcomer, this episode is packed with insights and practical advice to help you protect it all.
 
Key Moments: 
01:10 Sharing Diverse Experiences
05:44 Simplifying Asset Management Challenges
08:15 Action Transforms Ideas to Value
11:44 Unexpected Targets in Cyber Attacks
13:20 "Obscurity Isn't Security"
16:50 Simplifying Cybersecurity Communication
21:12 Unintended Internet Exposure Risks
24:49 Podcasting for Community Impact
28:53 OT's Vital Role in Hospitals
32:26 Diverse Experiences in Power Plants
35:54 OT Data Integration Priorities
36:55 Prioritizing Safety Over Immediate Updates
42:10 Global Business Resource Allocation Challenges
46:08 Finding Our Podcast & Resources
47:25 Global Unity in Shared Struggles
 
About The Guest : 
 
Sulaiman Alhasawi is an active researcher  in ICS/OT cybersecurity, with a PhD specializing in securing critical infrastructure. He is the founder of ICSrank.com, a platform dedicated to discovering and assessing security risks in Industrial Control Systems (ICS), Operational Technology (OT), and Industrial IoT.
As the host of the ICS Arabia Podcast, Sulaiman brings together global experts to discuss cutting-edge topics in OT security, bridging the gap between research, industry, and real-world cyber threats.
His latest research, "How to Find Water Systems on the Internet", was featured in SecurityWeek magazine, shedding light on OSINT techniques used to uncover vulnerable water infrastructure. (Read it here: https://zerontek.com/zt/2024/09/30/how-to-find-water-systems-on-the-internet-a-guide-to-ics-ot-osint/)
Follow Sulaiman for insights on ICS/OT security, threat intelligence, and ethical hacking:
 

ICSrank Website: ICSrank.com
IC...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[The Intersection of AI, OT, and Cybersecurity with Sulaiman Alhasawi]]>
                </itunes:title>
                                    <itunes:episode>47</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by Sulaiman Alhasawi, a cybersecurity expert based in Kuwait. Sulaiman shares his journey into OT security, beginning with his PhD research in Liverpool and leading to his creation of ICSrank.com, a search engine for OT devices. </span></p>
<p> </p>
<p><span style="font-weight:400;">The discussion gets into individuals' unique cybersecurity paths, emphasizing the importance of learning from diverse experiences. They explore the challenges asset owners face in understanding vulnerabilities, the role of AI in cybersecurity, and the international perspective on OT security. </span></p>
<p> </p>
<p><span style="font-weight:400;">Throughout the episode, Aaron and Sulaiman highlight the significance of community, knowledge sharing, and taking actionable steps to improve cybersecurity posture in critical infrastructure. Whether you’re an industry veteran or a newcomer, this episode is packed with insights and practical advice to help you protect it all.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">01:10 Sharing Diverse Experiences</span></p>
<p><span style="font-weight:400;">05:44 Simplifying Asset Management Challenges</span></p>
<p><span style="font-weight:400;">08:15 Action Transforms Ideas to Value</span></p>
<p><span style="font-weight:400;">11:44 Unexpected Targets in Cyber Attacks</span></p>
<p><span style="font-weight:400;">13:20 "Obscurity Isn't Security"</span></p>
<p><span style="font-weight:400;">16:50 Simplifying Cybersecurity Communication</span></p>
<p><span style="font-weight:400;">21:12 Unintended Internet Exposure Risks</span></p>
<p><span style="font-weight:400;">24:49 Podcasting for Community Impact</span></p>
<p><span style="font-weight:400;">28:53 OT's Vital Role in Hospitals</span></p>
<p><span style="font-weight:400;">32:26 Diverse Experiences in Power Plants</span></p>
<p><span style="font-weight:400;">35:54 OT Data Integration Priorities</span></p>
<p><span style="font-weight:400;">36:55 Prioritizing Safety Over Immediate Updates</span></p>
<p><span style="font-weight:400;">42:10 Global Business Resource Allocation Challenges</span></p>
<p><span style="font-weight:400;">46:08 Finding Our Podcast &amp; Resources</span></p>
<p><span style="font-weight:400;">47:25 Global Unity in Shared Struggles</span></p>
<p> </p>
<p><strong>About The Guest : </strong></p>
<p> </p>
<p><strong>Sulaiman Alhasawi</strong><span style="font-weight:400;"> is an active researcher  in ICS/OT cybersecurity, with a PhD specializing in securing critical infrastructure. He is the founder of ICSrank.com, a platform dedicated to discovering and assessing security risks in Industrial Control Systems (ICS), Operational Technology (OT), and Industrial IoT.</span></p>
<p><span style="font-weight:400;">As the host of the ICS Arabia Podcast, Sulaiman brings together global experts to discuss cutting-edge topics in OT security, bridging the gap between research, industry, and real-world cyber threats.</span></p>
<p><span style="font-weight:400;">His latest research, "How to Find Water Systems on the Internet", was featured in SecurityWeek magazine, shedding light on OSINT techniques used to uncover vulnerable water infrastructure. (Read it here: </span><a href="https://zerontek.com/zt/2024/09/30/how-to-find-water-systems-on-the-internet-a-guide-to-ics-ot-osint"><span style="font-weight:400;">https://zerontek.com/zt/2024/09/30/how-to-find-water-systems-on-the-internet-a-guide-to-ics-ot-osint/</span></a><span style="font-weight:400;">)</span></p>
<p><span style="font-weight:400;">Follow Sulaiman for insights on ICS/OT security, threat intelligence, and ethical hacking:</span></p>
<p> </p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">ICSrank Website: </span><a href="https://icsrank.com/"><span style="font-weight:400;">ICSrank.com</span></a></li>
<li style="font-weight:400;"><span style="font-weight:400;">ICS Arabia Podcast (X): </span><a href="https://www.youtube.com/@icsarabiapodcast"><span style="font-weight:400;">https://www.youtube.com/@icsarabiapodcast</span></a></li>
<li style="font-weight:400;"><span style="font-weight:400;">Twitter (X): </span><a href="https://x.com/alhasawi"><span style="font-weight:400;">@alhasawi</span></a></li>
<li style="font-weight:400;"><span style="font-weight:400;">Linkedin : </span><a href="https://www.linkedin.com/in/alhasawi"><span style="font-weight:400;">https://www.linkedin.com/in/alhasawi</span></a></li>
</ul>
<p> </p>
<p><span style="font-weight:400;">Connect With Aaron Crow:</span></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode</em></strong><span style="font-weight:400;">, please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1984568/c1e-jg87nuqn6g8spz7k6-257jq592un4p-yzraqg.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1984568&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=feab01d2e3faa51bec5b99cc1efe5f01c57cda0a731a621b3f1bce239288231c" length="48091761"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow is joined by Sulaiman Alhasawi, a cybersecurity expert based in Kuwait. Sulaiman shares his journey into OT security, beginning with his PhD research in Liverpool and leading to his creation of ICSrank.com, a search engine for OT devices. 
 
The discussion gets into individuals' unique cybersecurity paths, emphasizing the importance of learning from diverse experiences. They explore the challenges asset owners face in understanding vulnerabilities, the role of AI in cybersecurity, and the international perspective on OT security. 
 
Throughout the episode, Aaron and Sulaiman highlight the significance of community, knowledge sharing, and taking actionable steps to improve cybersecurity posture in critical infrastructure. Whether you’re an industry veteran or a newcomer, this episode is packed with insights and practical advice to help you protect it all.
 
Key Moments: 
01:10 Sharing Diverse Experiences
05:44 Simplifying Asset Management Challenges
08:15 Action Transforms Ideas to Value
11:44 Unexpected Targets in Cyber Attacks
13:20 "Obscurity Isn't Security"
16:50 Simplifying Cybersecurity Communication
21:12 Unintended Internet Exposure Risks
24:49 Podcasting for Community Impact
28:53 OT's Vital Role in Hospitals
32:26 Diverse Experiences in Power Plants
35:54 OT Data Integration Priorities
36:55 Prioritizing Safety Over Immediate Updates
42:10 Global Business Resource Allocation Challenges
46:08 Finding Our Podcast & Resources
47:25 Global Unity in Shared Struggles
 
About The Guest : 
 
Sulaiman Alhasawi is an active researcher  in ICS/OT cybersecurity, with a PhD specializing in securing critical infrastructure. He is the founder of ICSrank.com, a platform dedicated to discovering and assessing security risks in Industrial Control Systems (ICS), Operational Technology (OT), and Industrial IoT.
As the host of the ICS Arabia Podcast, Sulaiman brings together global experts to discuss cutting-edge topics in OT security, bridging the gap between research, industry, and real-world cyber threats.
His latest research, "How to Find Water Systems on the Internet", was featured in SecurityWeek magazine, shedding light on OSINT techniques used to uncover vulnerable water infrastructure. (Read it here: https://zerontek.com/zt/2024/09/30/how-to-find-water-systems-on-the-internet-a-guide-to-ics-ot-osint/)
Follow Sulaiman for insights on ICS/OT security, threat intelligence, and ethical hacking:
 

ICSrank Website: ICSrank.com
IC...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1984568/c1a-w52rp-34njv4r8f6j9-mgllmp.jpg"></itunes:image>
                                                                            <itunes:duration>00:48:48</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Encryption Dilemmas: When Government Access May Threaten Individual Security]]>
                </title>
                <pubDate>Mon, 24 Feb 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1980317</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode of Protect It All, host Aaron Crow gets into pressing cybersecurity issues currently making headlines. Listeners are invited to explore the complex challenges governments face to ensure accountability without compromising security. </span></p>
<p><span style="font-weight:400;">Aaron examines the implications of global policies that could force tech companies to undermine encryption. Steering clear of political discourse, he focuses on real cybersecurity risks, from untracked government spending to potential backdoors in personal devices and broader national security concerns. </span></p>
<p><span style="font-weight:400;">Aaron provides critical insights into how these issues impact businesses, private citizens, and infrastructure, raising questions about privacy and data protection in today's digital age. </span></p>
<p><span style="font-weight:400;">Whether you're a cybersecurity expert, a business leader, or someone who values privacy, this episode offers valuable perspectives and strategies to navigate the intricate IT and OT cybersecurity landscape. Join Aaron as he tackles these pressing topics and discusses how to maintain transparency and security for everyone.</span></p>
<p><span style="font-weight:400;">Key Moments</span></p>
<p><span style="font-weight:400;">00:00 Demanding Oversight for Sensitive Expenditures</span></p>
<p><span style="font-weight:400;">05:42 Fragmented Infrastructure and Cybersecurity Challenges</span></p>
<p><span style="font-weight:400;">09:19 Suing for Backdoors in Secure Communication</span></p>
<p><span style="font-weight:400;">11:35 Phone Security and Privacy Concerns</span></p>
<p><span style="font-weight:400;">13:40 Cybersecurity Risks of Government Backdoors</span></p>
<p><span style="font-weight:400;">16:54 Encryption Backdoors: Security vs. Privacy?</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it...</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of Protect It All, host Aaron Crow gets into pressing cybersecurity issues currently making headlines. Listeners are invited to explore the complex challenges governments face to ensure accountability without compromising security. 
Aaron examines the implications of global policies that could force tech companies to undermine encryption. Steering clear of political discourse, he focuses on real cybersecurity risks, from untracked government spending to potential backdoors in personal devices and broader national security concerns. 
Aaron provides critical insights into how these issues impact businesses, private citizens, and infrastructure, raising questions about privacy and data protection in today's digital age. 
Whether you're a cybersecurity expert, a business leader, or someone who values privacy, this episode offers valuable perspectives and strategies to navigate the intricate IT and OT cybersecurity landscape. Join Aaron as he tackles these pressing topics and discusses how to maintain transparency and security for everyone.
Key Moments
00:00 Demanding Oversight for Sensitive Expenditures
05:42 Fragmented Infrastructure and Cybersecurity Challenges
09:19 Suing for Backdoors in Secure Communication
11:35 Phone Security and Privacy Concerns
13:40 Cybersecurity Risks of Government Backdoors
16:54 Encryption Backdoors: Security vs. Privacy?
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Encryption Dilemmas: When Government Access May Threaten Individual Security]]>
                </itunes:title>
                                    <itunes:episode>46</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode of Protect It All, host Aaron Crow gets into pressing cybersecurity issues currently making headlines. Listeners are invited to explore the complex challenges governments face to ensure accountability without compromising security. </span></p>
<p><span style="font-weight:400;">Aaron examines the implications of global policies that could force tech companies to undermine encryption. Steering clear of political discourse, he focuses on real cybersecurity risks, from untracked government spending to potential backdoors in personal devices and broader national security concerns. </span></p>
<p><span style="font-weight:400;">Aaron provides critical insights into how these issues impact businesses, private citizens, and infrastructure, raising questions about privacy and data protection in today's digital age. </span></p>
<p><span style="font-weight:400;">Whether you're a cybersecurity expert, a business leader, or someone who values privacy, this episode offers valuable perspectives and strategies to navigate the intricate IT and OT cybersecurity landscape. Join Aaron as he tackles these pressing topics and discusses how to maintain transparency and security for everyone.</span></p>
<p><span style="font-weight:400;">Key Moments</span></p>
<p><span style="font-weight:400;">00:00 Demanding Oversight for Sensitive Expenditures</span></p>
<p><span style="font-weight:400;">05:42 Fragmented Infrastructure and Cybersecurity Challenges</span></p>
<p><span style="font-weight:400;">09:19 Suing for Backdoors in Secure Communication</span></p>
<p><span style="font-weight:400;">11:35 Phone Security and Privacy Concerns</span></p>
<p><span style="font-weight:400;">13:40 Cybersecurity Risks of Government Backdoors</span></p>
<p><span style="font-weight:400;">16:54 Encryption Backdoors: Security vs. Privacy?</span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1980317/c1e-k1vqntjogzjc2qg0n-0v588wjotm73-jkcfj2.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1980317&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=0360d5f54ecab03a7f62c0c1c034e119506cc86aa7c8d595ee8ddb47f53f11ed" length="21673407"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of Protect It All, host Aaron Crow gets into pressing cybersecurity issues currently making headlines. Listeners are invited to explore the complex challenges governments face to ensure accountability without compromising security. 
Aaron examines the implications of global policies that could force tech companies to undermine encryption. Steering clear of political discourse, he focuses on real cybersecurity risks, from untracked government spending to potential backdoors in personal devices and broader national security concerns. 
Aaron provides critical insights into how these issues impact businesses, private citizens, and infrastructure, raising questions about privacy and data protection in today's digital age. 
Whether you're a cybersecurity expert, a business leader, or someone who values privacy, this episode offers valuable perspectives and strategies to navigate the intricate IT and OT cybersecurity landscape. Join Aaron as he tackles these pressing topics and discusses how to maintain transparency and security for everyone.
Key Moments
00:00 Demanding Oversight for Sensitive Expenditures
05:42 Fragmented Infrastructure and Cybersecurity Challenges
09:19 Suing for Backdoors in Secure Communication
11:35 Phone Security and Privacy Concerns
13:40 Cybersecurity Risks of Government Backdoors
16:54 Encryption Backdoors: Security vs. Privacy?
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1980317/c1a-w52rp-dm488rp9cv4q-hul7ip.jpg"></itunes:image>
                                                                            <itunes:duration>00:19:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Navy to Consulting - Dan Ricci's Unique Perspective on Bridging Security Gaps]]>
                </title>
                <pubDate>Mon, 10 Feb 2025 10:14:27 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1969783</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crowe speaks to Dan Ricci, founder of the ICS Advisory Project, to delve into OT cybersecurity. Dan brings a wealth of experience from his time in the Navy, transitioning through various cybersecurity roles, and finally taking the leap to establish a platform that addresses the complex needs of critical infrastructure sectors. </span></p>
<p><span style="font-weight:400;">In this conversation, they explore the genesis of the ICS Advisory Project, a tool designed to streamline vulnerability management for small to medium-sized organizations. Aaron and Dan also discuss the challenges of transitioning from military service to civilian cybersecurity roles, emphasizing the importance of mentorship, risk-taking, and continual self-improvement. </span></p>
<p><span style="font-weight:400;">This episode offers valuable insights for anyone in the cybersecurity community and those looking to bridge the gap between IT and OT spheres. Join us as we explore strategies to enhance resilience and share lessons from the field.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">09:17 Building Dashboards with Google Studio</span></p>
<p><span style="font-weight:400;">14:41 Cybersecurity: Secondary Concern for Operators</span></p>
<p><span style="font-weight:400;">20:48 Supporting Small Supply Chain Contributors</span></p>
<p><span style="font-weight:400;">23:23  OT Cybersecurity Impact and Mentorship</span></p>
<p><span style="font-weight:400;">27:48 Bridging Cybersecurity and Critical Sectors</span></p>
<p><span style="font-weight:400;">34:16 Opportunities to Share Project Insights</span></p>
<p><span style="font-weight:400;">38:24 Adapting Skills for Career Growth</span></p>
<p><span style="font-weight:400;">45:58 Cyber Career Evolution and Growth</span></p>
<p><span style="font-weight:400;">56:14 Leadership vs. Management Distinction</span></p>
<p><span style="font-weight:400;">01:00:56 Relentless Daily Self-Improvement</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">With over 28 years of Cybersecurity experience, Dan is the Senior Cybersecurity Consultant at</span></p>
<p><span style="font-weight:400;">Ampyx Cyber, leading engagements with Rural Cooperatives and Utilities to improve their</span></p>
<p><span style="font-weight:400;">Cybersecurity programs and protect critical infrastructure. In 2023, he founded Industrial Data Works to provide independent consulting and vulnerability intelligence API subscription services.</span></p>
<p> </p>
<p><span style="font-weight:400;">He is also the founder of the ICS Advisory Project, an open-source initiative to help small and medium-sized ICS asset owners across the 16 critical infrastructure sectors prioritize vulnerabilities and plan mitigation for their ICS/OT environments. He aims to provide free and accessible resources to secure critical infrastructure and protect the public.</span></p>
<p> </p>
<p><strong>Link to Industrial Data Works:</strong></p>
<p><a href="https://www.industrialdataworks.com/ics-advisory-project-api"><span style="font-weight:400;">https://www.industrialdataworks.com/ics-advisory-project-api</span></a></p>
<p> </p>
<p><strong>Links to ICS Advisory Project:</strong></p>
<p><a href="https://www.icsadvisoryproject.com/"><span style="font-weight:400;">https://www.icsadvisoryproject.com/</span></a></p>
<p> </p>
<p><strong>ICS Advisory Project Github Repository:</strong></p>
<p><a href="https://github.com/icsadvprj/ICS-Advisory-Project"><span style="font-weight:400;">https://github.com/icsadvprj/ICS-Advisory-Project</span></a></p>
<p> </p>
<p><strong>Receive ICS Advisory Project Weekly Summary Slides and Other CERT &amp; Vendor Advisory Summaries in your email every Monday:</strong></p>
<p><a href="https://docs.google.com/forms/d/e/1FAIpQLSfC490BHoCR4gHekZcMLBgbHMhUQZr7ZVYZG1OkaWdKGwH73g/viewform"><span style="font-weight:400;">https://docs.goo...</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crowe speaks to Dan Ricci, founder of the ICS Advisory Project, to delve into OT cybersecurity. Dan brings a wealth of experience from his time in the Navy, transitioning through various cybersecurity roles, and finally taking the leap to establish a platform that addresses the complex needs of critical infrastructure sectors. 
In this conversation, they explore the genesis of the ICS Advisory Project, a tool designed to streamline vulnerability management for small to medium-sized organizations. Aaron and Dan also discuss the challenges of transitioning from military service to civilian cybersecurity roles, emphasizing the importance of mentorship, risk-taking, and continual self-improvement. 
This episode offers valuable insights for anyone in the cybersecurity community and those looking to bridge the gap between IT and OT spheres. Join us as we explore strategies to enhance resilience and share lessons from the field.
Key Moments: 
09:17 Building Dashboards with Google Studio
14:41 Cybersecurity: Secondary Concern for Operators
20:48 Supporting Small Supply Chain Contributors
23:23  OT Cybersecurity Impact and Mentorship
27:48 Bridging Cybersecurity and Critical Sectors
34:16 Opportunities to Share Project Insights
38:24 Adapting Skills for Career Growth
45:58 Cyber Career Evolution and Growth
56:14 Leadership vs. Management Distinction
01:00:56 Relentless Daily Self-Improvement
About the guest : 
With over 28 years of Cybersecurity experience, Dan is the Senior Cybersecurity Consultant at
Ampyx Cyber, leading engagements with Rural Cooperatives and Utilities to improve their
Cybersecurity programs and protect critical infrastructure. In 2023, he founded Industrial Data Works to provide independent consulting and vulnerability intelligence API subscription services.
 
He is also the founder of the ICS Advisory Project, an open-source initiative to help small and medium-sized ICS asset owners across the 16 critical infrastructure sectors prioritize vulnerabilities and plan mitigation for their ICS/OT environments. He aims to provide free and accessible resources to secure critical infrastructure and protect the public.
 
Link to Industrial Data Works:
https://www.industrialdataworks.com/ics-advisory-project-api
 
Links to ICS Advisory Project:
https://www.icsadvisoryproject.com/
 
ICS Advisory Project Github Repository:
https://github.com/icsadvprj/ICS-Advisory-Project
 
Receive ICS Advisory Project Weekly Summary Slides and Other CERT & Vendor Advisory Summaries in your email every Monday:
https://docs.goo...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[From Navy to Consulting - Dan Ricci's Unique Perspective on Bridging Security Gaps]]>
                </itunes:title>
                                    <itunes:episode>45</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crowe speaks to Dan Ricci, founder of the ICS Advisory Project, to delve into OT cybersecurity. Dan brings a wealth of experience from his time in the Navy, transitioning through various cybersecurity roles, and finally taking the leap to establish a platform that addresses the complex needs of critical infrastructure sectors. </span></p>
<p><span style="font-weight:400;">In this conversation, they explore the genesis of the ICS Advisory Project, a tool designed to streamline vulnerability management for small to medium-sized organizations. Aaron and Dan also discuss the challenges of transitioning from military service to civilian cybersecurity roles, emphasizing the importance of mentorship, risk-taking, and continual self-improvement. </span></p>
<p><span style="font-weight:400;">This episode offers valuable insights for anyone in the cybersecurity community and those looking to bridge the gap between IT and OT spheres. Join us as we explore strategies to enhance resilience and share lessons from the field.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">09:17 Building Dashboards with Google Studio</span></p>
<p><span style="font-weight:400;">14:41 Cybersecurity: Secondary Concern for Operators</span></p>
<p><span style="font-weight:400;">20:48 Supporting Small Supply Chain Contributors</span></p>
<p><span style="font-weight:400;">23:23  OT Cybersecurity Impact and Mentorship</span></p>
<p><span style="font-weight:400;">27:48 Bridging Cybersecurity and Critical Sectors</span></p>
<p><span style="font-weight:400;">34:16 Opportunities to Share Project Insights</span></p>
<p><span style="font-weight:400;">38:24 Adapting Skills for Career Growth</span></p>
<p><span style="font-weight:400;">45:58 Cyber Career Evolution and Growth</span></p>
<p><span style="font-weight:400;">56:14 Leadership vs. Management Distinction</span></p>
<p><span style="font-weight:400;">01:00:56 Relentless Daily Self-Improvement</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">With over 28 years of Cybersecurity experience, Dan is the Senior Cybersecurity Consultant at</span></p>
<p><span style="font-weight:400;">Ampyx Cyber, leading engagements with Rural Cooperatives and Utilities to improve their</span></p>
<p><span style="font-weight:400;">Cybersecurity programs and protect critical infrastructure. In 2023, he founded Industrial Data Works to provide independent consulting and vulnerability intelligence API subscription services.</span></p>
<p> </p>
<p><span style="font-weight:400;">He is also the founder of the ICS Advisory Project, an open-source initiative to help small and medium-sized ICS asset owners across the 16 critical infrastructure sectors prioritize vulnerabilities and plan mitigation for their ICS/OT environments. He aims to provide free and accessible resources to secure critical infrastructure and protect the public.</span></p>
<p> </p>
<p><strong>Link to Industrial Data Works:</strong></p>
<p><a href="https://www.industrialdataworks.com/ics-advisory-project-api"><span style="font-weight:400;">https://www.industrialdataworks.com/ics-advisory-project-api</span></a></p>
<p> </p>
<p><strong>Links to ICS Advisory Project:</strong></p>
<p><a href="https://www.icsadvisoryproject.com/"><span style="font-weight:400;">https://www.icsadvisoryproject.com/</span></a></p>
<p> </p>
<p><strong>ICS Advisory Project Github Repository:</strong></p>
<p><a href="https://github.com/icsadvprj/ICS-Advisory-Project"><span style="font-weight:400;">https://github.com/icsadvprj/ICS-Advisory-Project</span></a></p>
<p> </p>
<p><strong>Receive ICS Advisory Project Weekly Summary Slides and Other CERT &amp; Vendor Advisory Summaries in your email every Monday:</strong></p>
<p><a href="https://docs.google.com/forms/d/e/1FAIpQLSfC490BHoCR4gHekZcMLBgbHMhUQZr7ZVYZG1OkaWdKGwH73g/viewform"><span style="font-weight:400;">https://docs.google.com/forms/d/e/1FAIpQLSfC490BHoCR4gHekZcMLBgbHMhUQZr7ZVYZG1OkaWdKGwH73g/viewform</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1969783/c1e-9pzm3snzp02aow86v-mkxo1g92cp72-z8aqur.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1969783&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=54edb37159a7b52ef124252d9bba09c4e447c4e0e829a6b7f866972f903574d0" length="65174181"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crowe speaks to Dan Ricci, founder of the ICS Advisory Project, to delve into OT cybersecurity. Dan brings a wealth of experience from his time in the Navy, transitioning through various cybersecurity roles, and finally taking the leap to establish a platform that addresses the complex needs of critical infrastructure sectors. 
In this conversation, they explore the genesis of the ICS Advisory Project, a tool designed to streamline vulnerability management for small to medium-sized organizations. Aaron and Dan also discuss the challenges of transitioning from military service to civilian cybersecurity roles, emphasizing the importance of mentorship, risk-taking, and continual self-improvement. 
This episode offers valuable insights for anyone in the cybersecurity community and those looking to bridge the gap between IT and OT spheres. Join us as we explore strategies to enhance resilience and share lessons from the field.
Key Moments: 
09:17 Building Dashboards with Google Studio
14:41 Cybersecurity: Secondary Concern for Operators
20:48 Supporting Small Supply Chain Contributors
23:23  OT Cybersecurity Impact and Mentorship
27:48 Bridging Cybersecurity and Critical Sectors
34:16 Opportunities to Share Project Insights
38:24 Adapting Skills for Career Growth
45:58 Cyber Career Evolution and Growth
56:14 Leadership vs. Management Distinction
01:00:56 Relentless Daily Self-Improvement
About the guest : 
With over 28 years of Cybersecurity experience, Dan is the Senior Cybersecurity Consultant at
Ampyx Cyber, leading engagements with Rural Cooperatives and Utilities to improve their
Cybersecurity programs and protect critical infrastructure. In 2023, he founded Industrial Data Works to provide independent consulting and vulnerability intelligence API subscription services.
 
He is also the founder of the ICS Advisory Project, an open-source initiative to help small and medium-sized ICS asset owners across the 16 critical infrastructure sectors prioritize vulnerabilities and plan mitigation for their ICS/OT environments. He aims to provide free and accessible resources to secure critical infrastructure and protect the public.
 
Link to Industrial Data Works:
https://www.industrialdataworks.com/ics-advisory-project-api
 
Links to ICS Advisory Project:
https://www.icsadvisoryproject.com/
 
ICS Advisory Project Github Repository:
https://github.com/icsadvprj/ICS-Advisory-Project
 
Receive ICS Advisory Project Weekly Summary Slides and Other CERT & Vendor Advisory Summaries in your email every Monday:
https://docs.goo...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1969783/c1a-w52rp-v62jzwvqs7v8-mwyrax.jpg"></itunes:image>
                                                                            <itunes:duration>01:12:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Bridging the Gap: IT vs. OT Challenges and Solutions in Cybersecurity with Chris Robertson]]>
                </title>
                <pubDate>Mon, 03 Feb 2025 16:00:31 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1965908</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow welcomes Chris Robertson, CISO at Apogee Defense, to discuss the evolving landscape of cybersecurity, focusing on the distinction and strategy behind Virtual CISO (vCSO) roles. </span></p>
<p><span style="font-weight:400;">Chris shares insights from his dual roles at Apogee Defense and as a virtual chief security officer for various companies. The conversation dives into the intricacies and responsibilities of vCSOs, the importance of understanding IT and OT risks, and the necessity of integrating cybersecurity deeply into business practices. </span></p>
<p><span style="font-weight:400;">Chris and Aaron explore practical solutions for businesses, emphasizing adaptability and continuous improvement in security measures, drawing parallels between accounting a century ago and cybersecurity today. </span></p>
<p><span style="font-weight:400;">They also touch on future trends, the impact of AI on security, and the importance of setting aside egos to foster a culture of learning and collaboration. </span></p>
<p><span style="font-weight:400;">Join them as they navigate the challenges and opportunities at the intersection of IT and OT cybersecurity, offering actionable advice and anecdotes from their extensive experience in the field.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:00 Outsourcing Risk Management Expertise</span></p>
<p><span style="font-weight:400;">08:22 Hiring External Experts: Cost-Effective Strategy</span></p>
<p><span style="font-weight:400;">12:04 Understanding OT Risks in Cyber Leadership</span></p>
<p><span style="font-weight:400;">20:36 MBA Curriculum Needs Security Focus</span></p>
<p><span style="font-weight:400;">23:31 Integrating Security in Legacy Systems</span></p>
<p><span style="font-weight:400;">27:47 Tech Efficiency and Shadow IT Challenges</span></p>
<p><span style="font-weight:400;">35:56 Optimizing Inefficient Appointment Systems</span></p>
<p><span style="font-weight:400;">39:08 Bridging Tech and Business Worlds</span></p>
<p><span style="font-weight:400;">45:43 Simplifying Risk Communication</span></p>
<p><span style="font-weight:400;">51:52 Joe Rogan's Impact and Risks</span></p>
<p><span style="font-weight:400;">57:09 AI Evolution: Professionals Riding the Wave</span></p>
<p><span style="font-weight:400;">01:05:53 "Embrace Vulnerability, Seek Help"</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Chris Robertson is a seasoned cybersecurity expert, currently serving as the Chief Information Security Officer (CISO) at Apogee Defense. In addition to this role, Chris extends his expertise as a virtual CISO for various companies across multiple sectors. He specializes in implementing robust security solutions that Apogee Defense delivers to its clients, predominantly within the Small and Medium Business (SMB) space. </span></p>
<p><span style="font-weight:400;">With a keen focus on the defense industrial base, Chris's work also spans various other industries, enabling businesses to strengthen their cybersecurity frameworks. He is highly regarded in the industry for facilitating vital connections and contributing to advancing cybersecurity practices.</span></p>
<p><strong>How to connect Chris:</strong> <a href="https://www.linkedin.com/in/christophersrobertson/"><span style="font-weight:400;">https://www.linkedin.com/in/christophersrobertson/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Le...</strong></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow welcomes Chris Robertson, CISO at Apogee Defense, to discuss the evolving landscape of cybersecurity, focusing on the distinction and strategy behind Virtual CISO (vCSO) roles. 
Chris shares insights from his dual roles at Apogee Defense and as a virtual chief security officer for various companies. The conversation dives into the intricacies and responsibilities of vCSOs, the importance of understanding IT and OT risks, and the necessity of integrating cybersecurity deeply into business practices. 
Chris and Aaron explore practical solutions for businesses, emphasizing adaptability and continuous improvement in security measures, drawing parallels between accounting a century ago and cybersecurity today. 
They also touch on future trends, the impact of AI on security, and the importance of setting aside egos to foster a culture of learning and collaboration. 
Join them as they navigate the challenges and opportunities at the intersection of IT and OT cybersecurity, offering actionable advice and anecdotes from their extensive experience in the field.
Key Moments: 
00:00 Outsourcing Risk Management Expertise
08:22 Hiring External Experts: Cost-Effective Strategy
12:04 Understanding OT Risks in Cyber Leadership
20:36 MBA Curriculum Needs Security Focus
23:31 Integrating Security in Legacy Systems
27:47 Tech Efficiency and Shadow IT Challenges
35:56 Optimizing Inefficient Appointment Systems
39:08 Bridging Tech and Business Worlds
45:43 Simplifying Risk Communication
51:52 Joe Rogan's Impact and Risks
57:09 AI Evolution: Professionals Riding the Wave
01:05:53 "Embrace Vulnerability, Seek Help"
About the guest : 
Chris Robertson is a seasoned cybersecurity expert, currently serving as the Chief Information Security Officer (CISO) at Apogee Defense. In addition to this role, Chris extends his expertise as a virtual CISO for various companies across multiple sectors. He specializes in implementing robust security solutions that Apogee Defense delivers to its clients, predominantly within the Small and Medium Business (SMB) space. 
With a keen focus on the defense industrial base, Chris's work also spans various other industries, enabling businesses to strengthen their cybersecurity frameworks. He is highly regarded in the industry for facilitating vital connections and contributing to advancing cybersecurity practices.
How to connect Chris: https://www.linkedin.com/in/christophersrobertson/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Le...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Bridging the Gap: IT vs. OT Challenges and Solutions in Cybersecurity with Chris Robertson]]>
                </itunes:title>
                                    <itunes:episode>44</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow welcomes Chris Robertson, CISO at Apogee Defense, to discuss the evolving landscape of cybersecurity, focusing on the distinction and strategy behind Virtual CISO (vCSO) roles. </span></p>
<p><span style="font-weight:400;">Chris shares insights from his dual roles at Apogee Defense and as a virtual chief security officer for various companies. The conversation dives into the intricacies and responsibilities of vCSOs, the importance of understanding IT and OT risks, and the necessity of integrating cybersecurity deeply into business practices. </span></p>
<p><span style="font-weight:400;">Chris and Aaron explore practical solutions for businesses, emphasizing adaptability and continuous improvement in security measures, drawing parallels between accounting a century ago and cybersecurity today. </span></p>
<p><span style="font-weight:400;">They also touch on future trends, the impact of AI on security, and the importance of setting aside egos to foster a culture of learning and collaboration. </span></p>
<p><span style="font-weight:400;">Join them as they navigate the challenges and opportunities at the intersection of IT and OT cybersecurity, offering actionable advice and anecdotes from their extensive experience in the field.</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:00 Outsourcing Risk Management Expertise</span></p>
<p><span style="font-weight:400;">08:22 Hiring External Experts: Cost-Effective Strategy</span></p>
<p><span style="font-weight:400;">12:04 Understanding OT Risks in Cyber Leadership</span></p>
<p><span style="font-weight:400;">20:36 MBA Curriculum Needs Security Focus</span></p>
<p><span style="font-weight:400;">23:31 Integrating Security in Legacy Systems</span></p>
<p><span style="font-weight:400;">27:47 Tech Efficiency and Shadow IT Challenges</span></p>
<p><span style="font-weight:400;">35:56 Optimizing Inefficient Appointment Systems</span></p>
<p><span style="font-weight:400;">39:08 Bridging Tech and Business Worlds</span></p>
<p><span style="font-weight:400;">45:43 Simplifying Risk Communication</span></p>
<p><span style="font-weight:400;">51:52 Joe Rogan's Impact and Risks</span></p>
<p><span style="font-weight:400;">57:09 AI Evolution: Professionals Riding the Wave</span></p>
<p><span style="font-weight:400;">01:05:53 "Embrace Vulnerability, Seek Help"</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Chris Robertson is a seasoned cybersecurity expert, currently serving as the Chief Information Security Officer (CISO) at Apogee Defense. In addition to this role, Chris extends his expertise as a virtual CISO for various companies across multiple sectors. He specializes in implementing robust security solutions that Apogee Defense delivers to its clients, predominantly within the Small and Medium Business (SMB) space. </span></p>
<p><span style="font-weight:400;">With a keen focus on the defense industrial base, Chris's work also spans various other industries, enabling businesses to strengthen their cybersecurity frameworks. He is highly regarded in the industry for facilitating vital connections and contributing to advancing cybersecurity practices.</span></p>
<p><strong>How to connect Chris:</strong> <a href="https://www.linkedin.com/in/christophersrobertson/"><span style="font-weight:400;">https://www.linkedin.com/in/christophersrobertson/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1965908/c1e-r59jpbjgjp5cg4pd7-rkzo2922bok5-cxzewy.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1965908&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=782b906158af4374718f33aa72c781542f14d53ba8c61bece592004fb3826072" length="64234373"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow welcomes Chris Robertson, CISO at Apogee Defense, to discuss the evolving landscape of cybersecurity, focusing on the distinction and strategy behind Virtual CISO (vCSO) roles. 
Chris shares insights from his dual roles at Apogee Defense and as a virtual chief security officer for various companies. The conversation dives into the intricacies and responsibilities of vCSOs, the importance of understanding IT and OT risks, and the necessity of integrating cybersecurity deeply into business practices. 
Chris and Aaron explore practical solutions for businesses, emphasizing adaptability and continuous improvement in security measures, drawing parallels between accounting a century ago and cybersecurity today. 
They also touch on future trends, the impact of AI on security, and the importance of setting aside egos to foster a culture of learning and collaboration. 
Join them as they navigate the challenges and opportunities at the intersection of IT and OT cybersecurity, offering actionable advice and anecdotes from their extensive experience in the field.
Key Moments: 
00:00 Outsourcing Risk Management Expertise
08:22 Hiring External Experts: Cost-Effective Strategy
12:04 Understanding OT Risks in Cyber Leadership
20:36 MBA Curriculum Needs Security Focus
23:31 Integrating Security in Legacy Systems
27:47 Tech Efficiency and Shadow IT Challenges
35:56 Optimizing Inefficient Appointment Systems
39:08 Bridging Tech and Business Worlds
45:43 Simplifying Risk Communication
51:52 Joe Rogan's Impact and Risks
57:09 AI Evolution: Professionals Riding the Wave
01:05:53 "Embrace Vulnerability, Seek Help"
About the guest : 
Chris Robertson is a seasoned cybersecurity expert, currently serving as the Chief Information Security Officer (CISO) at Apogee Defense. In addition to this role, Chris extends his expertise as a virtual CISO for various companies across multiple sectors. He specializes in implementing robust security solutions that Apogee Defense delivers to its clients, predominantly within the Small and Medium Business (SMB) space. 
With a keen focus on the defense industrial base, Chris's work also spans various other industries, enabling businesses to strengthen their cybersecurity frameworks. He is highly regarded in the industry for facilitating vital connections and contributing to advancing cybersecurity practices.
How to connect Chris: https://www.linkedin.com/in/christophersrobertson/
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Le...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1965908/c1a-w52rp-rkzo292gi7mk-caoogg.jpg"></itunes:image>
                                                                            <itunes:duration>01:07:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Bridging IT and OT: Exploring Machine Identity and MFA in Cybersecurity with Anusha Iyer]]>
                </title>
                <pubDate>Mon, 27 Jan 2025 16:37:52 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1952191</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of </span><span style="font-weight:400;">Corsha</span><span style="font-weight:400;">, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.</span></p>
<p><span style="font-weight:400;">The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.</span></p>
<p><span style="font-weight:400;">This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.</span></p>
<p><br /><br /></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p> </p>
<p><span style="font-weight:400;">06:16 Machine Identity in OT Environments</span></p>
<p><span style="font-weight:400;">08:40 Machine MFA for Secure Access</span></p>
<p><span style="font-weight:400;">10:23 Understanding Secure Endpoint Communication</span></p>
<p><span style="font-weight:400;">14:07 Cybersecurity vs. Safety Concerns</span></p>
<p><span style="font-weight:400;">17:37 Achieving Zero Trust in Network Security</span></p>
<p><span style="font-weight:400;">20:50 Overcoming Cloud Security Fears</span></p>
<p><span style="font-weight:400;">26:10 Tech Implementation and Management Challenges</span></p>
<p><span style="font-weight:400;">31:54 Complex Architecture: Costly and Complex</span></p>
<p><span style="font-weight:400;">36:05 Understanding System Data Flow Benefits</span></p>
<p><span style="font-weight:400;">40:36 Technology Deployment Before Cybersecurity Era</span></p>
<p><span style="font-weight:400;">47:50 Simplifying Machine Implementation Benefits</span></p>
<p><span style="font-weight:400;">51:19 Manual System Updates Challenges</span></p>
<p><span style="font-weight:400;">51:58 Balancing IT and OT Efficiency</span></p>
<p> </p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p> </p>
<p><span style="font-weight:400;">Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring. </span><span style="font-weight:400;"><br /><br /></span></p>
<p><span style="font-weight:400;">Reach out to Anusha at </span><span style="font-weight:400;">anusha@corsha.com</span><span style="font-weight:400;"> if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">Find out more about Corsha and request a demo here: </span><a href="https://corsha.com/request-a-demo"><span style="font-weight:400;">https://corsha.com/request-a-demo</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a></a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of Corsha, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.
The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.
This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.

Key Moments: 
 
06:16 Machine Identity in OT Environments
08:40 Machine MFA for Secure Access
10:23 Understanding Secure Endpoint Communication
14:07 Cybersecurity vs. Safety Concerns
17:37 Achieving Zero Trust in Network Security
20:50 Overcoming Cloud Security Fears
26:10 Tech Implementation and Management Challenges
31:54 Complex Architecture: Costly and Complex
36:05 Understanding System Data Flow Benefits
40:36 Technology Deployment Before Cybersecurity Era
47:50 Simplifying Machine Implementation Benefits
51:19 Manual System Updates Challenges
51:58 Balancing IT and OT Efficiency
 
About the guest : 
 
Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring. 
Reach out to Anusha at anusha@corsha.com if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.
 
Find out more about Corsha and request a demo here: https://corsha.com/request-a-demo
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn:]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Bridging IT and OT: Exploring Machine Identity and MFA in Cybersecurity with Anusha Iyer]]>
                </itunes:title>
                                    <itunes:episode>43</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of </span><span style="font-weight:400;">Corsha</span><span style="font-weight:400;">, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.</span></p>
<p><span style="font-weight:400;">The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.</span></p>
<p><span style="font-weight:400;">This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.</span></p>
<p><br /><br /></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p> </p>
<p><span style="font-weight:400;">06:16 Machine Identity in OT Environments</span></p>
<p><span style="font-weight:400;">08:40 Machine MFA for Secure Access</span></p>
<p><span style="font-weight:400;">10:23 Understanding Secure Endpoint Communication</span></p>
<p><span style="font-weight:400;">14:07 Cybersecurity vs. Safety Concerns</span></p>
<p><span style="font-weight:400;">17:37 Achieving Zero Trust in Network Security</span></p>
<p><span style="font-weight:400;">20:50 Overcoming Cloud Security Fears</span></p>
<p><span style="font-weight:400;">26:10 Tech Implementation and Management Challenges</span></p>
<p><span style="font-weight:400;">31:54 Complex Architecture: Costly and Complex</span></p>
<p><span style="font-weight:400;">36:05 Understanding System Data Flow Benefits</span></p>
<p><span style="font-weight:400;">40:36 Technology Deployment Before Cybersecurity Era</span></p>
<p><span style="font-weight:400;">47:50 Simplifying Machine Implementation Benefits</span></p>
<p><span style="font-weight:400;">51:19 Manual System Updates Challenges</span></p>
<p><span style="font-weight:400;">51:58 Balancing IT and OT Efficiency</span></p>
<p> </p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p> </p>
<p><span style="font-weight:400;">Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring. </span><span style="font-weight:400;"><br /><br /></span></p>
<p><span style="font-weight:400;">Reach out to Anusha at </span><span style="font-weight:400;">anusha@corsha.com</span><span style="font-weight:400;"> if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">Find out more about Corsha and request a demo here: </span><a href="https://corsha.com/request-a-demo"><span style="font-weight:400;">https://corsha.com/request-a-demo</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1952191/c1e-q237vu20227f7268k-dm41n4d8s6kj-7l1zbe.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1952191&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=1a96622e4977acb909947d16eeae42185480e1958a013a0e6905bafb2ab3a76f" length="57653478"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of Corsha, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.
The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.
This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.

Key Moments: 
 
06:16 Machine Identity in OT Environments
08:40 Machine MFA for Secure Access
10:23 Understanding Secure Endpoint Communication
14:07 Cybersecurity vs. Safety Concerns
17:37 Achieving Zero Trust in Network Security
20:50 Overcoming Cloud Security Fears
26:10 Tech Implementation and Management Challenges
31:54 Complex Architecture: Costly and Complex
36:05 Understanding System Data Flow Benefits
40:36 Technology Deployment Before Cybersecurity Era
47:50 Simplifying Machine Implementation Benefits
51:19 Manual System Updates Challenges
51:58 Balancing IT and OT Efficiency
 
About the guest : 
 
Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring. 
Reach out to Anusha at anusha@corsha.com if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.
 
Find out more about Corsha and request a demo here: https://corsha.com/request-a-demo
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn:]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1952191/c1a-w52rp-qdw1gwxqtrdp-tyfmid.jpg"></itunes:image>
                                                                            <itunes:duration>00:59:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Troubleshooting OT Environments with Next-Gen Firewalls with Adam Robbie]]>
                </title>
                <pubDate>Thu, 23 Jan 2025 11:33:18 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1948733</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron is joined by cybersecurity expert Adam Robbie, the head of OT threat research at Palo Alto Networks. The discussion begins with Aaron sharing his extensive experience deploying Palo Alto firewalls in operational technology (OT) environments, highlighting the key troubleshooting and application-aware capabilities these firewalls offer.</span></p>
<p><span style="font-weight:400;">Adam delves into his role at Palo Alto Networks, focusing on the critical task of identifying and mitigating threats in the OT landscape. He discusses the unique challenges of securing OT environments, including the convergence of various technologies and the necessity for proactive defense strategies.</span></p>
<p><span style="font-weight:400;">The conversation covers important topics such as the importance of team collaboration across IT and OT, the complexities of deploying firewalls in OT situations, and the ever-evolving threats facing the industry. </span></p>
<p><span style="font-weight:400;">Tune in for a comprehensive exploration of the intersection of cybersecurity and OT, and gain valuable insights from experts on the front lines of protecting critical infrastructure.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:00 Evolving Threat Analysis Focus</span></p>
<p><span style="font-weight:400;">08:38 IT vs OT Firewall Responses</span></p>
<p><span style="font-weight:400;">12:17 PLC Configuration and Remote Access Challenges</span></p>
<p><span style="font-weight:400;">18:43 "Career Progress Through Strategic Moves"</span></p>
<p><span style="font-weight:400;">23:05 Evolving OT Firewall Technologies</span></p>
<p><span style="font-weight:400;">31:08 Malware Analysis and Threat Detection</span></p>
<p><span style="font-weight:400;">35:34 Strategic Cybersecurity Using Game Theory</span></p>
<p><span style="font-weight:400;">40:39 Hidden Vulnerabilities in OT Environments</span></p>
<p><span style="font-weight:400;">44:44 Geographical Data Challenges in Analysis</span></p>
<p><span style="font-weight:400;">49:24 OT Cybersecurity Segmentation Challenges</span></p>
<p><span style="font-weight:400;">54:41 OT Systems: Challenges in Updates</span></p>
<p><span style="font-weight:400;">01:00:02 Augmented Reality for Remote Problem-Solving</span></p>
<p><strong>About the guest : </strong></p>
<p>Adam is the Head of OT Threat Research at Palo Alto Networks since 2022, with over 15 years of OT and IT experience. He's a publisher with SANS, IEEE, and other conferences, focusing on securing critical infrastructure, finding vulnerabilities, and developing best practices. He holds a Bachelor's and Master's in Electrical Engineering and advanced certifications like GICSP and GRID. Adam also teaches cybersecurity bootcamps at top universities and advises on curriculum development. Previously, as a Senior Cyber Security Consultant at Deloitte, he specialized in ICS/IoT penetration testing, threat hunting, and vulnerability research.</p>
<p><strong>Contact Adam at:</strong> <a href="https://www.linkedin.com/in/adamrobbie/"><span style="font-weight:400;">https://www.linkedin.com/in/adamrobbie/</span></a></p>
<div><strong>Download the white paper here:</strong> <a href="https://www.paloaltonetworks.com/resources/whitepapers/ot-security-insights" target="_blank" rel="noreferrer noopener">https://www.paloaltonetworks.com/resources/whitepapers/ot-security-insights</a></div>
<div> </div>
<div><strong>Here is the link for S4 Session :</strong></div>
<div> </div>
<div> <a href="https://whova.com/embedded/speaker_session_detail/Kt3AhyXBoJ93Z6sNSeXQmRFToZ0uOXAsK2j05rE6ByI%3D/4183617/" target="_blank" rel="noreferrer noopener">Calculating The Payoff For Attack And Defensive Strategies</a><strong>, </strong>February 11, 2025  11:30 AM – 12:00 PM</div>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Web...</span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron is joined by cybersecurity expert Adam Robbie, the head of OT threat research at Palo Alto Networks. The discussion begins with Aaron sharing his extensive experience deploying Palo Alto firewalls in operational technology (OT) environments, highlighting the key troubleshooting and application-aware capabilities these firewalls offer.
Adam delves into his role at Palo Alto Networks, focusing on the critical task of identifying and mitigating threats in the OT landscape. He discusses the unique challenges of securing OT environments, including the convergence of various technologies and the necessity for proactive defense strategies.
The conversation covers important topics such as the importance of team collaboration across IT and OT, the complexities of deploying firewalls in OT situations, and the ever-evolving threats facing the industry. 
Tune in for a comprehensive exploration of the intersection of cybersecurity and OT, and gain valuable insights from experts on the front lines of protecting critical infrastructure.
 
Key Moments: 
00:00 Evolving Threat Analysis Focus
08:38 IT vs OT Firewall Responses
12:17 PLC Configuration and Remote Access Challenges
18:43 "Career Progress Through Strategic Moves"
23:05 Evolving OT Firewall Technologies
31:08 Malware Analysis and Threat Detection
35:34 Strategic Cybersecurity Using Game Theory
40:39 Hidden Vulnerabilities in OT Environments
44:44 Geographical Data Challenges in Analysis
49:24 OT Cybersecurity Segmentation Challenges
54:41 OT Systems: Challenges in Updates
01:00:02 Augmented Reality for Remote Problem-Solving
About the guest : 
Adam is the Head of OT Threat Research at Palo Alto Networks since 2022, with over 15 years of OT and IT experience. He's a publisher with SANS, IEEE, and other conferences, focusing on securing critical infrastructure, finding vulnerabilities, and developing best practices. He holds a Bachelor's and Master's in Electrical Engineering and advanced certifications like GICSP and GRID. Adam also teaches cybersecurity bootcamps at top universities and advises on curriculum development. Previously, as a Senior Cyber Security Consultant at Deloitte, he specialized in ICS/IoT penetration testing, threat hunting, and vulnerability research.
Contact Adam at: https://www.linkedin.com/in/adamrobbie/
Download the white paper here: https://www.paloaltonetworks.com/resources/whitepapers/ot-security-insights
 
Here is the link for S4 Session :
 
 Calculating The Payoff For Attack And Defensive Strategies, February 11, 2025  11:30 AM – 12:00 PM
Connect With Aaron Crow:

Web...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Troubleshooting OT Environments with Next-Gen Firewalls with Adam Robbie]]>
                </itunes:title>
                                    <itunes:episode>42</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron is joined by cybersecurity expert Adam Robbie, the head of OT threat research at Palo Alto Networks. The discussion begins with Aaron sharing his extensive experience deploying Palo Alto firewalls in operational technology (OT) environments, highlighting the key troubleshooting and application-aware capabilities these firewalls offer.</span></p>
<p><span style="font-weight:400;">Adam delves into his role at Palo Alto Networks, focusing on the critical task of identifying and mitigating threats in the OT landscape. He discusses the unique challenges of securing OT environments, including the convergence of various technologies and the necessity for proactive defense strategies.</span></p>
<p><span style="font-weight:400;">The conversation covers important topics such as the importance of team collaboration across IT and OT, the complexities of deploying firewalls in OT situations, and the ever-evolving threats facing the industry. </span></p>
<p><span style="font-weight:400;">Tune in for a comprehensive exploration of the intersection of cybersecurity and OT, and gain valuable insights from experts on the front lines of protecting critical infrastructure.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:00 Evolving Threat Analysis Focus</span></p>
<p><span style="font-weight:400;">08:38 IT vs OT Firewall Responses</span></p>
<p><span style="font-weight:400;">12:17 PLC Configuration and Remote Access Challenges</span></p>
<p><span style="font-weight:400;">18:43 "Career Progress Through Strategic Moves"</span></p>
<p><span style="font-weight:400;">23:05 Evolving OT Firewall Technologies</span></p>
<p><span style="font-weight:400;">31:08 Malware Analysis and Threat Detection</span></p>
<p><span style="font-weight:400;">35:34 Strategic Cybersecurity Using Game Theory</span></p>
<p><span style="font-weight:400;">40:39 Hidden Vulnerabilities in OT Environments</span></p>
<p><span style="font-weight:400;">44:44 Geographical Data Challenges in Analysis</span></p>
<p><span style="font-weight:400;">49:24 OT Cybersecurity Segmentation Challenges</span></p>
<p><span style="font-weight:400;">54:41 OT Systems: Challenges in Updates</span></p>
<p><span style="font-weight:400;">01:00:02 Augmented Reality for Remote Problem-Solving</span></p>
<p><strong>About the guest : </strong></p>
<p>Adam is the Head of OT Threat Research at Palo Alto Networks since 2022, with over 15 years of OT and IT experience. He's a publisher with SANS, IEEE, and other conferences, focusing on securing critical infrastructure, finding vulnerabilities, and developing best practices. He holds a Bachelor's and Master's in Electrical Engineering and advanced certifications like GICSP and GRID. Adam also teaches cybersecurity bootcamps at top universities and advises on curriculum development. Previously, as a Senior Cyber Security Consultant at Deloitte, he specialized in ICS/IoT penetration testing, threat hunting, and vulnerability research.</p>
<p><strong>Contact Adam at:</strong> <a href="https://www.linkedin.com/in/adamrobbie/"><span style="font-weight:400;">https://www.linkedin.com/in/adamrobbie/</span></a></p>
<div><strong>Download the white paper here:</strong> <a href="https://www.paloaltonetworks.com/resources/whitepapers/ot-security-insights" target="_blank" rel="noreferrer noopener">https://www.paloaltonetworks.com/resources/whitepapers/ot-security-insights</a></div>
<div> </div>
<div><strong>Here is the link for S4 Session :</strong></div>
<div> </div>
<div> <a href="https://whova.com/embedded/speaker_session_detail/Kt3AhyXBoJ93Z6sNSeXQmRFToZ0uOXAsK2j05rE6ByI%3D/4183617/" target="_blank" rel="noreferrer noopener">Calculating The Payoff For Attack And Defensive Strategies</a><strong>, </strong>February 11, 2025  11:30 AM – 12:00 PM</div>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1948733/c1e-m257wun9rnnbxr0km-rkzporq7smx-rucvqp.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1948733&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=21107b2a8ed7a51fa7543c15a78d0ee2aa457aa89e1eefc15601ef0f366ff230" length="62575405"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron is joined by cybersecurity expert Adam Robbie, the head of OT threat research at Palo Alto Networks. The discussion begins with Aaron sharing his extensive experience deploying Palo Alto firewalls in operational technology (OT) environments, highlighting the key troubleshooting and application-aware capabilities these firewalls offer.
Adam delves into his role at Palo Alto Networks, focusing on the critical task of identifying and mitigating threats in the OT landscape. He discusses the unique challenges of securing OT environments, including the convergence of various technologies and the necessity for proactive defense strategies.
The conversation covers important topics such as the importance of team collaboration across IT and OT, the complexities of deploying firewalls in OT situations, and the ever-evolving threats facing the industry. 
Tune in for a comprehensive exploration of the intersection of cybersecurity and OT, and gain valuable insights from experts on the front lines of protecting critical infrastructure.
 
Key Moments: 
00:00 Evolving Threat Analysis Focus
08:38 IT vs OT Firewall Responses
12:17 PLC Configuration and Remote Access Challenges
18:43 "Career Progress Through Strategic Moves"
23:05 Evolving OT Firewall Technologies
31:08 Malware Analysis and Threat Detection
35:34 Strategic Cybersecurity Using Game Theory
40:39 Hidden Vulnerabilities in OT Environments
44:44 Geographical Data Challenges in Analysis
49:24 OT Cybersecurity Segmentation Challenges
54:41 OT Systems: Challenges in Updates
01:00:02 Augmented Reality for Remote Problem-Solving
About the guest : 
Adam is the Head of OT Threat Research at Palo Alto Networks since 2022, with over 15 years of OT and IT experience. He's a publisher with SANS, IEEE, and other conferences, focusing on securing critical infrastructure, finding vulnerabilities, and developing best practices. He holds a Bachelor's and Master's in Electrical Engineering and advanced certifications like GICSP and GRID. Adam also teaches cybersecurity bootcamps at top universities and advises on curriculum development. Previously, as a Senior Cyber Security Consultant at Deloitte, he specialized in ICS/IoT penetration testing, threat hunting, and vulnerability research.
Contact Adam at: https://www.linkedin.com/in/adamrobbie/
Download the white paper here: https://www.paloaltonetworks.com/resources/whitepapers/ot-security-insights
 
Here is the link for S4 Session :
 
 Calculating The Payoff For Attack And Defensive Strategies, February 11, 2025  11:30 AM – 12:00 PM
Connect With Aaron Crow:

Web...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1948733/c1a-w52rp-rkzporq7svq9-ljnjdl.jpg"></itunes:image>
                                                                            <itunes:duration>01:04:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Understanding Cybersecurity Challenges in Industrial Settings with Lesley Carhart]]>
                </title>
                <pubDate>Mon, 13 Jan 2025 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1939325</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow converses with Lesley Carhart, Technical Director at Dragos, who brings over 15 years of experience in incident response and forensics within critical infrastructure sectors.</span></p>
<p><span style="font-weight:400;">The episode dives deep into the standard practices in industrial settings, such as operators shutting down power plants for safety and the lack of forensic investigation into equipment failures. Lesley emphasizes the importance of integrating cybersecurity into these environments, pointing out that many failures are due to maintenance or human error, though a notable portion does involve cyber threats.</span></p>
<p><span style="font-weight:400;">Listeners will learn about the challenges and necessary collaborations between operational technology (OT) and information technology (IT) teams. The discussion addresses cultural and trust barriers that hinder effective cybersecurity measures and advises on how organizations can improve their defenses regardless of size and resources.</span></p>
<p><span style="font-weight:400;">Lesley also highlights the evolving landscape of cyber threats, including the increasing sophistication of adversaries and the vulnerabilities caused by standardizations in industrial systems. Real-world examples underscore the complexity of securing these environments, emphasizing the need for proactive and informed cybersecurity practices, such as "cyber-informed engineering."</span></p>
<p><span style="font-weight:400;">Tune in to better understand the critical intersections of cybersecurity and industrial operations, and learn practical strategies to safeguard essential services.</span></p>
<p><br /><br /></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">05:00 IT-OT miscommunication leads to cybersecurity risks.</span></p>
<p><span style="font-weight:400;">09:23 IT processes are too slow; bypassing is required for solutions.</span></p>
<p><span style="font-weight:400;">11:36 Leaving an outdated system may pose less risk.</span></p>
<p><span style="font-weight:400;">15:09 Slow changes in OT due to unforeseen impacts.</span></p>
<p><span style="font-weight:400;">19:17 Include cybersecurity in root cause analysis discussions.</span></p>
<p><span style="font-weight:400;">20:31 Nation-states analyze and bypass industrial control systems.</span></p>
<p><span style="font-weight:400;">25:40 Cybersecurity is essential to combat potential system threats.</span></p>
<p><span style="font-weight:400;">29:27 Communication, champions, and leadership crucial for cybersecurity.</span></p>
<p><span style="font-weight:400;">31:37 Cybersecurity struggle due to resources community helps.</span></p>
<p><span style="font-weight:400;">35:03 OT vs. IT language differences affect incident classification.</span></p>
<p><span style="font-weight:400;">38:08 Empowered safety culture prevents accidents and retribution.</span></p>
<p><span style="font-weight:400;">40:22 Few people have diverse cybersecurity skills and experience.</span></p>
<p><span style="font-weight:400;">45:05 Experience across all 17 critical infrastructure verticals.</span></p>
<p><span style="font-weight:400;">48:29 Evading detection in the nuclear enrichment process.</span></p>
<p><span style="font-weight:400;">51:25 Identify industrial devices, build security program.</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Lesley Carhart is a renowned cybersecurity expert specializing in industrial control systems (ICS) security. With a keen understanding of the convergence between traditional IT and operational technology (OT), Lesley has been at the forefront of safeguarding critical infrastructures. Her work emphasizes the vulnerabilities of human-machine interfaces (HMIs) and programming devices, which are increasingly resembling typical computers and thus becoming prime targe...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow converses with Lesley Carhart, Technical Director at Dragos, who brings over 15 years of experience in incident response and forensics within critical infrastructure sectors.
The episode dives deep into the standard practices in industrial settings, such as operators shutting down power plants for safety and the lack of forensic investigation into equipment failures. Lesley emphasizes the importance of integrating cybersecurity into these environments, pointing out that many failures are due to maintenance or human error, though a notable portion does involve cyber threats.
Listeners will learn about the challenges and necessary collaborations between operational technology (OT) and information technology (IT) teams. The discussion addresses cultural and trust barriers that hinder effective cybersecurity measures and advises on how organizations can improve their defenses regardless of size and resources.
Lesley also highlights the evolving landscape of cyber threats, including the increasing sophistication of adversaries and the vulnerabilities caused by standardizations in industrial systems. Real-world examples underscore the complexity of securing these environments, emphasizing the need for proactive and informed cybersecurity practices, such as "cyber-informed engineering."
Tune in to better understand the critical intersections of cybersecurity and industrial operations, and learn practical strategies to safeguard essential services.

Key Moments: 
05:00 IT-OT miscommunication leads to cybersecurity risks.
09:23 IT processes are too slow; bypassing is required for solutions.
11:36 Leaving an outdated system may pose less risk.
15:09 Slow changes in OT due to unforeseen impacts.
19:17 Include cybersecurity in root cause analysis discussions.
20:31 Nation-states analyze and bypass industrial control systems.
25:40 Cybersecurity is essential to combat potential system threats.
29:27 Communication, champions, and leadership crucial for cybersecurity.
31:37 Cybersecurity struggle due to resources community helps.
35:03 OT vs. IT language differences affect incident classification.
38:08 Empowered safety culture prevents accidents and retribution.
40:22 Few people have diverse cybersecurity skills and experience.
45:05 Experience across all 17 critical infrastructure verticals.
48:29 Evading detection in the nuclear enrichment process.
51:25 Identify industrial devices, build security program.
About the guest : 
Lesley Carhart is a renowned cybersecurity expert specializing in industrial control systems (ICS) security. With a keen understanding of the convergence between traditional IT and operational technology (OT), Lesley has been at the forefront of safeguarding critical infrastructures. Her work emphasizes the vulnerabilities of human-machine interfaces (HMIs) and programming devices, which are increasingly resembling typical computers and thus becoming prime targe...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Understanding Cybersecurity Challenges in Industrial Settings with Lesley Carhart]]>
                </itunes:title>
                                    <itunes:episode>41</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow converses with Lesley Carhart, Technical Director at Dragos, who brings over 15 years of experience in incident response and forensics within critical infrastructure sectors.</span></p>
<p><span style="font-weight:400;">The episode dives deep into the standard practices in industrial settings, such as operators shutting down power plants for safety and the lack of forensic investigation into equipment failures. Lesley emphasizes the importance of integrating cybersecurity into these environments, pointing out that many failures are due to maintenance or human error, though a notable portion does involve cyber threats.</span></p>
<p><span style="font-weight:400;">Listeners will learn about the challenges and necessary collaborations between operational technology (OT) and information technology (IT) teams. The discussion addresses cultural and trust barriers that hinder effective cybersecurity measures and advises on how organizations can improve their defenses regardless of size and resources.</span></p>
<p><span style="font-weight:400;">Lesley also highlights the evolving landscape of cyber threats, including the increasing sophistication of adversaries and the vulnerabilities caused by standardizations in industrial systems. Real-world examples underscore the complexity of securing these environments, emphasizing the need for proactive and informed cybersecurity practices, such as "cyber-informed engineering."</span></p>
<p><span style="font-weight:400;">Tune in to better understand the critical intersections of cybersecurity and industrial operations, and learn practical strategies to safeguard essential services.</span></p>
<p><br /><br /></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">05:00 IT-OT miscommunication leads to cybersecurity risks.</span></p>
<p><span style="font-weight:400;">09:23 IT processes are too slow; bypassing is required for solutions.</span></p>
<p><span style="font-weight:400;">11:36 Leaving an outdated system may pose less risk.</span></p>
<p><span style="font-weight:400;">15:09 Slow changes in OT due to unforeseen impacts.</span></p>
<p><span style="font-weight:400;">19:17 Include cybersecurity in root cause analysis discussions.</span></p>
<p><span style="font-weight:400;">20:31 Nation-states analyze and bypass industrial control systems.</span></p>
<p><span style="font-weight:400;">25:40 Cybersecurity is essential to combat potential system threats.</span></p>
<p><span style="font-weight:400;">29:27 Communication, champions, and leadership crucial for cybersecurity.</span></p>
<p><span style="font-weight:400;">31:37 Cybersecurity struggle due to resources community helps.</span></p>
<p><span style="font-weight:400;">35:03 OT vs. IT language differences affect incident classification.</span></p>
<p><span style="font-weight:400;">38:08 Empowered safety culture prevents accidents and retribution.</span></p>
<p><span style="font-weight:400;">40:22 Few people have diverse cybersecurity skills and experience.</span></p>
<p><span style="font-weight:400;">45:05 Experience across all 17 critical infrastructure verticals.</span></p>
<p><span style="font-weight:400;">48:29 Evading detection in the nuclear enrichment process.</span></p>
<p><span style="font-weight:400;">51:25 Identify industrial devices, build security program.</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Lesley Carhart is a renowned cybersecurity expert specializing in industrial control systems (ICS) security. With a keen understanding of the convergence between traditional IT and operational technology (OT), Lesley has been at the forefront of safeguarding critical infrastructures. Her work emphasizes the vulnerabilities of human-machine interfaces (HMIs) and programming devices, which are increasingly resembling typical computers and thus becoming prime targets for malware and ransomware attacks. Lesley's insights highlight the significant risks posed by these hybrid systems, underscoring the importance of robust cybersecurity measures in protecting essential processes. </span><span style="font-weight:400;">Lesley is honored to be retired from the United States Air Force Reserves, and to have received recognition such as “DEF CON Hacker of the Year”, “SANS Difference Maker”, and “Power Player” from SC Magazine.</span></p>
<p><span style="font-weight:400;">How to connect Lesley: </span></p>
<p><span style="font-weight:400;">Instagram : </span><a href="https://www.instagram.com/hacks4pancakes/"><span style="font-weight:400;">https://www.instagram.com/hacks4pancakes/</span></a></p>
<p><span style="font-weight:400;">Blog: </span><a href="https://tisiphone.ne"><span style="font-weight:400;">https://tisiphone.ne</span></a></p>
<p><span style="font-weight:400;">Mastodon : </span><a href="https://infosec.exchange/@hacks4pancakes"><span style="font-weight:400;">https://infosec.exchange/@hacks4pancakes</span></a></p>
<p><span style="font-weight:400;">Linkedin : </span><a href="https://www.linkedin.com/in/lcarhart/"><span style="font-weight:400;">https://www.linkedin.com/in/lcarhart/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1939325/c1e-8p1nos93o19tx8k4w-qdwwk3p8h8m7-72hsnn.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1939325&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=5cc183dae5a1d1a835a756876dce8a648d34e6f623316c0fc20fbf17b363571c" length="56929052"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow converses with Lesley Carhart, Technical Director at Dragos, who brings over 15 years of experience in incident response and forensics within critical infrastructure sectors.
The episode dives deep into the standard practices in industrial settings, such as operators shutting down power plants for safety and the lack of forensic investigation into equipment failures. Lesley emphasizes the importance of integrating cybersecurity into these environments, pointing out that many failures are due to maintenance or human error, though a notable portion does involve cyber threats.
Listeners will learn about the challenges and necessary collaborations between operational technology (OT) and information technology (IT) teams. The discussion addresses cultural and trust barriers that hinder effective cybersecurity measures and advises on how organizations can improve their defenses regardless of size and resources.
Lesley also highlights the evolving landscape of cyber threats, including the increasing sophistication of adversaries and the vulnerabilities caused by standardizations in industrial systems. Real-world examples underscore the complexity of securing these environments, emphasizing the need for proactive and informed cybersecurity practices, such as "cyber-informed engineering."
Tune in to better understand the critical intersections of cybersecurity and industrial operations, and learn practical strategies to safeguard essential services.

Key Moments: 
05:00 IT-OT miscommunication leads to cybersecurity risks.
09:23 IT processes are too slow; bypassing is required for solutions.
11:36 Leaving an outdated system may pose less risk.
15:09 Slow changes in OT due to unforeseen impacts.
19:17 Include cybersecurity in root cause analysis discussions.
20:31 Nation-states analyze and bypass industrial control systems.
25:40 Cybersecurity is essential to combat potential system threats.
29:27 Communication, champions, and leadership crucial for cybersecurity.
31:37 Cybersecurity struggle due to resources community helps.
35:03 OT vs. IT language differences affect incident classification.
38:08 Empowered safety culture prevents accidents and retribution.
40:22 Few people have diverse cybersecurity skills and experience.
45:05 Experience across all 17 critical infrastructure verticals.
48:29 Evading detection in the nuclear enrichment process.
51:25 Identify industrial devices, build security program.
About the guest : 
Lesley Carhart is a renowned cybersecurity expert specializing in industrial control systems (ICS) security. With a keen understanding of the convergence between traditional IT and operational technology (OT), Lesley has been at the forefront of safeguarding critical infrastructures. Her work emphasizes the vulnerabilities of human-machine interfaces (HMIs) and programming devices, which are increasingly resembling typical computers and thus becoming prime targe...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1939325/c1a-w52rp-2577r981u0n9-n8daew.png"></itunes:image>
                                                                            <itunes:duration>00:58:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Why Small Events Like Staccato Ranch Outshine Big Conferences in Cybersecurity]]>
                </title>
                <pubDate>Fri, 10 Jan 2025 18:42:19 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1938563</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, hosts Aaron Crow and Neal Conlon are joined by cybersecurity executive Ken Foster to discuss why smaller, focused events like the upcoming gathering at Staccaro Ranch outshine large conferences in the cybersecurity industry. They highlight the importance of genuine relationship-building, integrity in vendor interactions, and meaningful conversations that smaller events facilitate. Ken shares his experiences with data breaches, emphasizing the value of transparent, honest connections. Upcoming events and the benefits of intimate settings for networking and professional growth are also discussed, showcasing why, in cybersecurity, quality interactions trump quantity.</span></p>
<p><span style="font-weight:400;">Don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - </span><a href="https://corvosec.com/lonestar-cyber-shootout/"><span style="font-weight:400;">https://corvosec.com/lonestar-cyber-shootout/</span></a></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">01:32 The Cybersecurity industry operates differently from others.</span></p>
<p><span style="font-weight:400;">04:24 Invested in low-integrity people; disregards trustworthiness.</span></p>
<p><span style="font-weight:400;">07:20 Honesty and transparency in cloud transition discussions.</span></p>
<p><span style="font-weight:400;">13:20 Attack surface management dominated RSA; competitive market.</span></p>
<p><span style="font-weight:400;">14:18 Conversations expedite and enhance memorable connections.</span></p>
<p><span style="font-weight:400;">18:06 Smaller conversations prevent distractions and improve focus.</span></p>
<p><span style="font-weight:400;">23:48 Building real connections requires personal interaction time.</span></p>
<p><span style="font-weight:400;">25:43 A Diverse group led to unique conversations insights.</span></p>
<p><span style="font-weight:400;">28:36 Expert struggles due to lack of community relationships.</span></p>
<p><span style="font-weight:400;">32:06 Build relationships, sell yourself, understand and adapt.</span></p>
<p><span style="font-weight:400;">37:16 Building relationships helps find the right fit.</span></p>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<p> </p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, hosts Aaron Crow and Neal Conlon are joined by cybersecurity executive Ken Foster to discuss why smaller, focused events like the upcoming gathering at Staccaro Ranch outshine large conferences in the cybersecurity industry. They highlight the importance of genuine relationship-building, integrity in vendor interactions, and meaningful conversations that smaller events facilitate. Ken shares his experiences with data breaches, emphasizing the value of transparent, honest connections. Upcoming events and the benefits of intimate settings for networking and professional growth are also discussed, showcasing why, in cybersecurity, quality interactions trump quantity.
Don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - https://corvosec.com/lonestar-cyber-shootout/
 
Key Moments: 
01:32 The Cybersecurity industry operates differently from others.
04:24 Invested in low-integrity people; disregards trustworthiness.
07:20 Honesty and transparency in cloud transition discussions.
13:20 Attack surface management dominated RSA; competitive market.
14:18 Conversations expedite and enhance memorable connections.
18:06 Smaller conversations prevent distractions and improve focus.
23:48 Building real connections requires personal interaction time.
25:43 A Diverse group led to unique conversations insights.
28:36 Expert struggles due to lack of community relationships.
32:06 Build relationships, sell yourself, understand and adapt.
37:16 Building relationships helps find the right fit.
 
Learn more about PrOTect IT All:
 

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Why Small Events Like Staccato Ranch Outshine Big Conferences in Cybersecurity]]>
                </itunes:title>
                                    <itunes:episode>40</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, hosts Aaron Crow and Neal Conlon are joined by cybersecurity executive Ken Foster to discuss why smaller, focused events like the upcoming gathering at Staccaro Ranch outshine large conferences in the cybersecurity industry. They highlight the importance of genuine relationship-building, integrity in vendor interactions, and meaningful conversations that smaller events facilitate. Ken shares his experiences with data breaches, emphasizing the value of transparent, honest connections. Upcoming events and the benefits of intimate settings for networking and professional growth are also discussed, showcasing why, in cybersecurity, quality interactions trump quantity.</span></p>
<p><span style="font-weight:400;">Don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - </span><a href="https://corvosec.com/lonestar-cyber-shootout/"><span style="font-weight:400;">https://corvosec.com/lonestar-cyber-shootout/</span></a></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">01:32 The Cybersecurity industry operates differently from others.</span></p>
<p><span style="font-weight:400;">04:24 Invested in low-integrity people; disregards trustworthiness.</span></p>
<p><span style="font-weight:400;">07:20 Honesty and transparency in cloud transition discussions.</span></p>
<p><span style="font-weight:400;">13:20 Attack surface management dominated RSA; competitive market.</span></p>
<p><span style="font-weight:400;">14:18 Conversations expedite and enhance memorable connections.</span></p>
<p><span style="font-weight:400;">18:06 Smaller conversations prevent distractions and improve focus.</span></p>
<p><span style="font-weight:400;">23:48 Building real connections requires personal interaction time.</span></p>
<p><span style="font-weight:400;">25:43 A Diverse group led to unique conversations insights.</span></p>
<p><span style="font-weight:400;">28:36 Expert struggles due to lack of community relationships.</span></p>
<p><span style="font-weight:400;">32:06 Build relationships, sell yourself, understand and adapt.</span></p>
<p><span style="font-weight:400;">37:16 Building relationships helps find the right fit.</span></p>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<p> </p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1938563/c1e-2p9xms8g8dvcmpx40-mkxx1kwpi754-n1dqgb.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1938563&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=591468fd37b1ee218418183e2210b96f0b68a8d5bd609f7d82002af78e1a9852" length="39432808"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, hosts Aaron Crow and Neal Conlon are joined by cybersecurity executive Ken Foster to discuss why smaller, focused events like the upcoming gathering at Staccaro Ranch outshine large conferences in the cybersecurity industry. They highlight the importance of genuine relationship-building, integrity in vendor interactions, and meaningful conversations that smaller events facilitate. Ken shares his experiences with data breaches, emphasizing the value of transparent, honest connections. Upcoming events and the benefits of intimate settings for networking and professional growth are also discussed, showcasing why, in cybersecurity, quality interactions trump quantity.
Don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - https://corvosec.com/lonestar-cyber-shootout/
 
Key Moments: 
01:32 The Cybersecurity industry operates differently from others.
04:24 Invested in low-integrity people; disregards trustworthiness.
07:20 Honesty and transparency in cloud transition discussions.
13:20 Attack surface management dominated RSA; competitive market.
14:18 Conversations expedite and enhance memorable connections.
18:06 Smaller conversations prevent distractions and improve focus.
23:48 Building real connections requires personal interaction time.
25:43 A Diverse group led to unique conversations insights.
28:36 Expert struggles due to lack of community relationships.
32:06 Build relationships, sell yourself, understand and adapt.
37:16 Building relationships helps find the right fit.
 
Learn more about PrOTect IT All:
 

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1938563/c1a-w52rp-okww3kjxsw69-i1nmrb.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:48</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Key Conferences and Networking Opportunities for Cybersecurity Professionals in 2025]]>
                </title>
                <pubDate>Mon, 06 Jan 2025 10:56:26 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1935175</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Happy New Year 2025. In this episode, host Aaron Crow  guides you through the evolving cybersecurity landscape impacting everything from power utilities and transportation to manufacturing and healthcare. Aaron explores the importance of integrating people, processes, and technology to build resilient systems.</span></p>
<p><span style="font-weight:400;">He also outlines the major cybersecurity events and conferences you won't want to miss this year, including s4 in Tampa, RSA in San Francisco, and Black Hat and DEFCON in Vegas. And don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - </span><a href="https://corvosec.com/lonestar-cyber-shootout/"><span style="font-weight:400;">https://corvosec.com/lonestar-cyber-shootout/</span></a></p>
<p><span style="font-weight:400;">With a focus on community and networking, Aaron emphasizes how these connections can elevate your cybersecurity strategy. Stay tuned for actionable insights, expert interviews, and real-world case studies to kickstart your year. Let's make 2025 a year of impactful cybersecurity advancements together.</span></p>
<p><br /><br /></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:40 Resilience needs technology, people, and processes.</span></p>
<p><span style="font-weight:400;">05:03 Annual Vegas cybersecurity events: Black Hat, DEFCON.</span></p>
<p><span style="font-weight:400;">09:01 Networking is crucial for career and growth.</span></p>
<p><span style="font-weight:400;">11:42 Secure messaging suggests normal texting may be compromised.</span></p>
<p><span style="font-weight:400;">16:04 Balance technical skills with essential soft skills.</span></p>
<p><span style="font-weight:400;">17:11 Excellent professionals struggle in untrained management roles.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-...</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Happy New Year 2025. In this episode, host Aaron Crow  guides you through the evolving cybersecurity landscape impacting everything from power utilities and transportation to manufacturing and healthcare. Aaron explores the importance of integrating people, processes, and technology to build resilient systems.
He also outlines the major cybersecurity events and conferences you won't want to miss this year, including s4 in Tampa, RSA in San Francisco, and Black Hat and DEFCON in Vegas. And don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - https://corvosec.com/lonestar-cyber-shootout/
With a focus on community and networking, Aaron emphasizes how these connections can elevate your cybersecurity strategy. Stay tuned for actionable insights, expert interviews, and real-world case studies to kickstart your year. Let's make 2025 a year of impactful cybersecurity advancements together.

Key Moments: 
00:40 Resilience needs technology, people, and processes.
05:03 Annual Vegas cybersecurity events: Black Hat, DEFCON.
09:01 Networking is crucial for career and growth.
11:42 Secure messaging suggests normal texting may be compromised.
16:04 Balance technical skills with essential soft skills.
17:11 Excellent professionals struggle in untrained management roles.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Key Conferences and Networking Opportunities for Cybersecurity Professionals in 2025]]>
                </itunes:title>
                                    <itunes:episode>39</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Happy New Year 2025. In this episode, host Aaron Crow  guides you through the evolving cybersecurity landscape impacting everything from power utilities and transportation to manufacturing and healthcare. Aaron explores the importance of integrating people, processes, and technology to build resilient systems.</span></p>
<p><span style="font-weight:400;">He also outlines the major cybersecurity events and conferences you won't want to miss this year, including s4 in Tampa, RSA in San Francisco, and Black Hat and DEFCON in Vegas. And don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - </span><a href="https://corvosec.com/lonestar-cyber-shootout/"><span style="font-weight:400;">https://corvosec.com/lonestar-cyber-shootout/</span></a></p>
<p><span style="font-weight:400;">With a focus on community and networking, Aaron emphasizes how these connections can elevate your cybersecurity strategy. Stay tuned for actionable insights, expert interviews, and real-world case studies to kickstart your year. Let's make 2025 a year of impactful cybersecurity advancements together.</span></p>
<p><br /><br /></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:40 Resilience needs technology, people, and processes.</span></p>
<p><span style="font-weight:400;">05:03 Annual Vegas cybersecurity events: Black Hat, DEFCON.</span></p>
<p><span style="font-weight:400;">09:01 Networking is crucial for career and growth.</span></p>
<p><span style="font-weight:400;">11:42 Secure messaging suggests normal texting may be compromised.</span></p>
<p><span style="font-weight:400;">16:04 Balance technical skills with essential soft skills.</span></p>
<p><span style="font-weight:400;">17:11 Excellent professionals struggle in untrained management roles.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1935175/c1e-d308xc650xoi3706x-7z245z4mf39m-joxr9k.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1935175&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=75f4b79e1045dbdacc1f2bcc2461773073ffadd15998ae98e106c98b50a2ae5f" length="19742159"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Happy New Year 2025. In this episode, host Aaron Crow  guides you through the evolving cybersecurity landscape impacting everything from power utilities and transportation to manufacturing and healthcare. Aaron explores the importance of integrating people, processes, and technology to build resilient systems.
He also outlines the major cybersecurity events and conferences you won't want to miss this year, including s4 in Tampa, RSA in San Francisco, and Black Hat and DEFCON in Vegas. And don't miss the Lone Star Cyber Shootout happening in January. Click here to participate in this exclusive event - https://corvosec.com/lonestar-cyber-shootout/
With a focus on community and networking, Aaron emphasizes how these connections can elevate your cybersecurity strategy. Stay tuned for actionable insights, expert interviews, and real-world case studies to kickstart your year. Let's make 2025 a year of impactful cybersecurity advancements together.

Key Moments: 
00:40 Resilience needs technology, people, and processes.
05:03 Annual Vegas cybersecurity events: Black Hat, DEFCON.
09:01 Networking is crucial for career and growth.
11:42 Secure messaging suggests normal texting may be compromised.
16:04 Balance technical skills with essential soft skills.
17:11 Excellent professionals struggle in untrained management roles.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 
Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1935175/c1a-w52rp-8dw47d4gi0dp-wj1hta.jpg"></itunes:image>
                                                                            <itunes:duration>00:19:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Protect Yourself and Loved Ones from Cyber Scams]]>
                </title>
                <pubDate>Mon, 30 Dec 2024 11:09:54 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1931369</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow delves into the increasingly sophisticated world of cyber scams that aim to steal money and identity. Discussing real-life examples, including a personal encounter with a jury duty scam over the holiday season, Aaron explores various types of frauds such as investment scams and tech support deceptions.</span></p>
<p><span style="font-weight:400;">Listeners will gain actionable tips to safeguard themselves and their loved ones from these cyber threats. If staying ahead of cybercriminals and protecting personal information is a priority, this episode offers invaluable advice. Stay tuned for an essential discussion on cybersecurity.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">01:17 Nearly scammed; realized it was a hoax.</span></p>
<p><span style="font-weight:400;">04:09 Threatened by scammers; no harm, but scary.</span></p>
<p><span style="font-weight:400;">08:26 Verify the origin of the information; scams can be deceptive.</span></p>
<p><span style="font-weight:400;">10:53 Invest only what you can afford to lose.</span></p>
<p><span style="font-weight:400;">13:07 Verify uninvited officers via 911, file report.</span></p>
<p><span style="font-weight:400;">19:51 Use physical backups, regularly update and backup files.</span></p>
<p><span style="font-weight:400;">21:07 Use your router and a firewall.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow delves into the increasingly sophisticated world of cyber scams that aim to steal money and identity. Discussing real-life examples, including a personal encounter with a jury duty scam over the holiday season, Aaron explores various types of frauds such as investment scams and tech support deceptions.
Listeners will gain actionable tips to safeguard themselves and their loved ones from these cyber threats. If staying ahead of cybercriminals and protecting personal information is a priority, this episode offers invaluable advice. Stay tuned for an essential discussion on cybersecurity.
 
Key Moments: 
01:17 Nearly scammed; realized it was a hoax.
04:09 Threatened by scammers; no harm, but scary.
08:26 Verify the origin of the information; scams can be deceptive.
10:53 Invest only what you can afford to lose.
13:07 Verify uninvited officers via 911, file report.
19:51 Use physical backups, regularly update and backup files.
21:07 Use your router and a firewall.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[How to Protect Yourself and Loved Ones from Cyber Scams]]>
                </itunes:title>
                                    <itunes:episode>38</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow delves into the increasingly sophisticated world of cyber scams that aim to steal money and identity. Discussing real-life examples, including a personal encounter with a jury duty scam over the holiday season, Aaron explores various types of frauds such as investment scams and tech support deceptions.</span></p>
<p><span style="font-weight:400;">Listeners will gain actionable tips to safeguard themselves and their loved ones from these cyber threats. If staying ahead of cybercriminals and protecting personal information is a priority, this episode offers invaluable advice. Stay tuned for an essential discussion on cybersecurity.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">01:17 Nearly scammed; realized it was a hoax.</span></p>
<p><span style="font-weight:400;">04:09 Threatened by scammers; no harm, but scary.</span></p>
<p><span style="font-weight:400;">08:26 Verify the origin of the information; scams can be deceptive.</span></p>
<p><span style="font-weight:400;">10:53 Invest only what you can afford to lose.</span></p>
<p><span style="font-weight:400;">13:07 Verify uninvited officers via 911, file report.</span></p>
<p><span style="font-weight:400;">19:51 Use physical backups, regularly update and backup files.</span></p>
<p><span style="font-weight:400;">21:07 Use your router and a firewall.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1931369/c1e-w52rpbrmp4pcj2124-6zwk1g7oa8kg-z0tcgq.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1931369&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=f3e1df9d738066d3056d38d788615dca738e1a532cb6cb756447efc6ee90fa96" length="23374987"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow delves into the increasingly sophisticated world of cyber scams that aim to steal money and identity. Discussing real-life examples, including a personal encounter with a jury duty scam over the holiday season, Aaron explores various types of frauds such as investment scams and tech support deceptions.
Listeners will gain actionable tips to safeguard themselves and their loved ones from these cyber threats. If staying ahead of cybercriminals and protecting personal information is a priority, this episode offers invaluable advice. Stay tuned for an essential discussion on cybersecurity.
 
Key Moments: 
01:17 Nearly scammed; realized it was a hoax.
04:09 Threatened by scammers; no harm, but scary.
08:26 Verify the origin of the information; scams can be deceptive.
10:53 Invest only what you can afford to lose.
13:07 Verify uninvited officers via 911, file report.
19:51 Use physical backups, regularly update and backup files.
21:07 Use your router and a firewall.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co

Please leave us a review on Apple/Spotify Podcasts:
Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1931369/c1a-w52rp-mk18xvrjcmkd-tr82mw.jpg"></itunes:image>
                                                                            <itunes:duration>00:22:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 37 - Protecting Critical Infrastructure: A Roundtable on Industrial Cybersecurity Strategies]]>
                </title>
                <pubDate>Mon, 23 Dec 2024 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1925582</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow shines a light on the collaborative spirit that unites these professionals as they confront contemporary cybersecurity challenges. It features a roundtable discussion with industry veterans: Pascal Ackermann, Senior Threat Protection and Response Engineer; Brett Seals, expert in incident response and threat detection; and Gabriel Sanchez, head of the Advanced Threat Protection Center</span></p>
<p><span style="font-weight:400;">The discussion takes listeners on a journey through both nostalgic tech, with mentions of the Tandy TRS-80, and the pressing issues of today, such as ransomware threats. The guests delve into the delicate balance between old and new technologies, the intricacies of integrating IT and OT security, and the evolving skill sets needed in the field. From power plant vulnerabilities to global geopolitical ramifications, the episode underscores the critical importance of securing essential infrastructure.</span></p>
<p><span style="font-weight:400;">Listeners will hear shared histories, stories of past crises, and these experts' proactive solutions. Topics range from cloud and artificial intelligence trends to the crucial need for workforce development. This episode provides a detailed, engaging, and educational experience for anyone interested in cybersecurity.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">10:43 Incident detection parallels between the control room, SOC.</span></p>
<p><span style="font-weight:400;">13:58 Integrating safety programs into utility sector operations.</span></p>
<p><span style="font-weight:400;">19:24 Balancing risk vs. cost of device replacement.</span></p>
<p><span style="font-weight:400;">24:10 Immediate support is needed for 24/7 operations critical.</span></p>
<p><span style="font-weight:400;">32:21 OT and IT share the same protection goals.</span></p>
<p><span style="font-weight:400;">34:59 Focus: Enhancing asset management and system visibility.</span></p>
<p><span style="font-weight:400;">39:42 Early hacking: dialing, shared networks, pranking neighbors.</span></p>
<p><span style="font-weight:400;">44:32 Shift towards active technology use in OT.</span></p>
<p><span style="font-weight:400;">50:58 If it ain't broke, don't fix it.</span></p>
<p><span style="font-weight:400;">55:37 Defending infrastructure and impacting global mission together.</span></p>
<p><span style="font-weight:400;">59:52 Issues transcend borders; global cooperation is needed.</span></p>
<p> </p>
<p><strong>Guest Profiles: </strong></p>
<p> </p>
<p><span style="font-weight:400;">Brett Seals is an expert in instant response and threat detection engineering, currently working at the firm 1898. Before joining 1898, Brett garnered a decade of invaluable experience in the United States Navy, where he supported both expeditionary and cybersecurity operations. During his Navy tenure, he served at the Navy Cyber Defensive Operation Command, the Navy’s equivalent of a Security Operations Center (SOC), managing a fleet of sensors. Brett also spent considerable time around the Fort Meade area. As the COVID-19 pandemic began, he transitioned from his military role to his current position, continuing his commitment to cybersecurity in the private sector.</span></p>
<p><span style="font-weight:400;">Gabriel Sanchez embarked on his professional journey in the early 2000s, transitioning from college into what we now recognize as a burgeoning career in cybersecurity. Initially, Gabriel found himself working as a contractor for the Department of Defense, focused on missile simulations and charged with the responsibility of protecting their network—an early, hands-on introduction to cybersecurity before it even had a formal name. Following this formative experience, Gabriel spent the next decade in the electric utility sector, stepping into a groundbreaking role to establish an entirely new cybersecur...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow shines a light on the collaborative spirit that unites these professionals as they confront contemporary cybersecurity challenges. It features a roundtable discussion with industry veterans: Pascal Ackermann, Senior Threat Protection and Response Engineer; Brett Seals, expert in incident response and threat detection; and Gabriel Sanchez, head of the Advanced Threat Protection Center
The discussion takes listeners on a journey through both nostalgic tech, with mentions of the Tandy TRS-80, and the pressing issues of today, such as ransomware threats. The guests delve into the delicate balance between old and new technologies, the intricacies of integrating IT and OT security, and the evolving skill sets needed in the field. From power plant vulnerabilities to global geopolitical ramifications, the episode underscores the critical importance of securing essential infrastructure.
Listeners will hear shared histories, stories of past crises, and these experts' proactive solutions. Topics range from cloud and artificial intelligence trends to the crucial need for workforce development. This episode provides a detailed, engaging, and educational experience for anyone interested in cybersecurity.
 
Key Moments: 
 
10:43 Incident detection parallels between the control room, SOC.
13:58 Integrating safety programs into utility sector operations.
19:24 Balancing risk vs. cost of device replacement.
24:10 Immediate support is needed for 24/7 operations critical.
32:21 OT and IT share the same protection goals.
34:59 Focus: Enhancing asset management and system visibility.
39:42 Early hacking: dialing, shared networks, pranking neighbors.
44:32 Shift towards active technology use in OT.
50:58 If it ain't broke, don't fix it.
55:37 Defending infrastructure and impacting global mission together.
59:52 Issues transcend borders; global cooperation is needed.
 
Guest Profiles: 
 
Brett Seals is an expert in instant response and threat detection engineering, currently working at the firm 1898. Before joining 1898, Brett garnered a decade of invaluable experience in the United States Navy, where he supported both expeditionary and cybersecurity operations. During his Navy tenure, he served at the Navy Cyber Defensive Operation Command, the Navy’s equivalent of a Security Operations Center (SOC), managing a fleet of sensors. Brett also spent considerable time around the Fort Meade area. As the COVID-19 pandemic began, he transitioned from his military role to his current position, continuing his commitment to cybersecurity in the private sector.
Gabriel Sanchez embarked on his professional journey in the early 2000s, transitioning from college into what we now recognize as a burgeoning career in cybersecurity. Initially, Gabriel found himself working as a contractor for the Department of Defense, focused on missile simulations and charged with the responsibility of protecting their network—an early, hands-on introduction to cybersecurity before it even had a formal name. Following this formative experience, Gabriel spent the next decade in the electric utility sector, stepping into a groundbreaking role to establish an entirely new cybersecur...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 37 - Protecting Critical Infrastructure: A Roundtable on Industrial Cybersecurity Strategies]]>
                </itunes:title>
                                    <itunes:episode>37</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow shines a light on the collaborative spirit that unites these professionals as they confront contemporary cybersecurity challenges. It features a roundtable discussion with industry veterans: Pascal Ackermann, Senior Threat Protection and Response Engineer; Brett Seals, expert in incident response and threat detection; and Gabriel Sanchez, head of the Advanced Threat Protection Center</span></p>
<p><span style="font-weight:400;">The discussion takes listeners on a journey through both nostalgic tech, with mentions of the Tandy TRS-80, and the pressing issues of today, such as ransomware threats. The guests delve into the delicate balance between old and new technologies, the intricacies of integrating IT and OT security, and the evolving skill sets needed in the field. From power plant vulnerabilities to global geopolitical ramifications, the episode underscores the critical importance of securing essential infrastructure.</span></p>
<p><span style="font-weight:400;">Listeners will hear shared histories, stories of past crises, and these experts' proactive solutions. Topics range from cloud and artificial intelligence trends to the crucial need for workforce development. This episode provides a detailed, engaging, and educational experience for anyone interested in cybersecurity.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">10:43 Incident detection parallels between the control room, SOC.</span></p>
<p><span style="font-weight:400;">13:58 Integrating safety programs into utility sector operations.</span></p>
<p><span style="font-weight:400;">19:24 Balancing risk vs. cost of device replacement.</span></p>
<p><span style="font-weight:400;">24:10 Immediate support is needed for 24/7 operations critical.</span></p>
<p><span style="font-weight:400;">32:21 OT and IT share the same protection goals.</span></p>
<p><span style="font-weight:400;">34:59 Focus: Enhancing asset management and system visibility.</span></p>
<p><span style="font-weight:400;">39:42 Early hacking: dialing, shared networks, pranking neighbors.</span></p>
<p><span style="font-weight:400;">44:32 Shift towards active technology use in OT.</span></p>
<p><span style="font-weight:400;">50:58 If it ain't broke, don't fix it.</span></p>
<p><span style="font-weight:400;">55:37 Defending infrastructure and impacting global mission together.</span></p>
<p><span style="font-weight:400;">59:52 Issues transcend borders; global cooperation is needed.</span></p>
<p> </p>
<p><strong>Guest Profiles: </strong></p>
<p> </p>
<p><span style="font-weight:400;">Brett Seals is an expert in instant response and threat detection engineering, currently working at the firm 1898. Before joining 1898, Brett garnered a decade of invaluable experience in the United States Navy, where he supported both expeditionary and cybersecurity operations. During his Navy tenure, he served at the Navy Cyber Defensive Operation Command, the Navy’s equivalent of a Security Operations Center (SOC), managing a fleet of sensors. Brett also spent considerable time around the Fort Meade area. As the COVID-19 pandemic began, he transitioned from his military role to his current position, continuing his commitment to cybersecurity in the private sector.</span></p>
<p><span style="font-weight:400;">Gabriel Sanchez embarked on his professional journey in the early 2000s, transitioning from college into what we now recognize as a burgeoning career in cybersecurity. Initially, Gabriel found himself working as a contractor for the Department of Defense, focused on missile simulations and charged with the responsibility of protecting their network—an early, hands-on introduction to cybersecurity before it even had a formal name. Following this formative experience, Gabriel spent the next decade in the electric utility sector, stepping into a groundbreaking role to establish an entirely new cybersecurity program from scratch. His trailblazing efforts in this novel position underscored his capability and foresight in an evolving digital landscape.</span></p>
<p> </p>
<p><span style="font-weight:400;">Pascal Ackermann is a seasoned professional with over two decades of experience in controls engineering and operational technology (OT), having entered the field in 1999. Throughout his career, he has focused on building resilient and secure OT networks. For the past year, Ackermann has specialized in helping customers make sense of security events within their environments. He assists clients in discovering and interpreting security incidents, providing insights into their relevance and impact. Additionally, Ackermann and his team are equipped to respond to security breaches, offering on-site services to recover, remediate, and ensure systems are back up and running efficiently. His deep expertise makes him a trusted resource in cybersecurity for OT environments.</span></p>
<p> </p>
<p><strong>Connect Brett at</strong> <a href="https://www.linkedin.com/in/iambrettseals/"><span style="font-weight:400;">https://www.linkedin.com/in/iambrettseals/</span></a></p>
<p><strong>Connect Gabriel at  </strong><a href="https://www.linkedin.com/in/gabrielsanchez-1898andco/"><span style="font-weight:400;">https://www.linkedin.com/in/gabrielsanchez-1898andco/</span></a></p>
<p><strong>Connect Pascal at</strong> <a href="https://www.linkedin.com/in/pascal-ackerman-036a867b/"><span style="font-weight:400;">https://www.linkedin.com/in/pascal-ackerman-036a867b/</span></a></p>
<p><strong>Company Website at</strong><span style="font-weight:400;">  </span><a href="https://1898andco.burnsmcd.com/"><span style="font-weight:400;">https://1898andco.burnsmcd.com/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at</strong> <a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1925582/c1e-d308xc65ow2c37mx3-rkd823r9ukjo-emb6eu.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1925582&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=6b84388bf7d29d4fb1b3392fa4282c80219e479177e6a05daf70a74592b71934" length="59376603"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow shines a light on the collaborative spirit that unites these professionals as they confront contemporary cybersecurity challenges. It features a roundtable discussion with industry veterans: Pascal Ackermann, Senior Threat Protection and Response Engineer; Brett Seals, expert in incident response and threat detection; and Gabriel Sanchez, head of the Advanced Threat Protection Center
The discussion takes listeners on a journey through both nostalgic tech, with mentions of the Tandy TRS-80, and the pressing issues of today, such as ransomware threats. The guests delve into the delicate balance between old and new technologies, the intricacies of integrating IT and OT security, and the evolving skill sets needed in the field. From power plant vulnerabilities to global geopolitical ramifications, the episode underscores the critical importance of securing essential infrastructure.
Listeners will hear shared histories, stories of past crises, and these experts' proactive solutions. Topics range from cloud and artificial intelligence trends to the crucial need for workforce development. This episode provides a detailed, engaging, and educational experience for anyone interested in cybersecurity.
 
Key Moments: 
 
10:43 Incident detection parallels between the control room, SOC.
13:58 Integrating safety programs into utility sector operations.
19:24 Balancing risk vs. cost of device replacement.
24:10 Immediate support is needed for 24/7 operations critical.
32:21 OT and IT share the same protection goals.
34:59 Focus: Enhancing asset management and system visibility.
39:42 Early hacking: dialing, shared networks, pranking neighbors.
44:32 Shift towards active technology use in OT.
50:58 If it ain't broke, don't fix it.
55:37 Defending infrastructure and impacting global mission together.
59:52 Issues transcend borders; global cooperation is needed.
 
Guest Profiles: 
 
Brett Seals is an expert in instant response and threat detection engineering, currently working at the firm 1898. Before joining 1898, Brett garnered a decade of invaluable experience in the United States Navy, where he supported both expeditionary and cybersecurity operations. During his Navy tenure, he served at the Navy Cyber Defensive Operation Command, the Navy’s equivalent of a Security Operations Center (SOC), managing a fleet of sensors. Brett also spent considerable time around the Fort Meade area. As the COVID-19 pandemic began, he transitioned from his military role to his current position, continuing his commitment to cybersecurity in the private sector.
Gabriel Sanchez embarked on his professional journey in the early 2000s, transitioning from college into what we now recognize as a burgeoning career in cybersecurity. Initially, Gabriel found himself working as a contractor for the Department of Defense, focused on missile simulations and charged with the responsibility of protecting their network—an early, hands-on introduction to cybersecurity before it even had a formal name. Following this formative experience, Gabriel spent the next decade in the electric utility sector, stepping into a groundbreaking role to establish an entirely new cybersecur...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1925582/c1a-w52rp-5zkp3o7maxd0-iiwk2p.jpg"></itunes:image>
                                                                            <itunes:duration>01:01:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Exclusive Cybersecurity Event at STACCATO RANCH: Where Networking Meets Adventure]]>
                </title>
                <pubDate>Mon, 16 Dec 2024 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1921332</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Click here to participate in this exclusive event - </span><a href="https://corvosec.com/lonestar-cyber-shootout/"><span style="font-weight:400;">https://corvosec.com/lonestar-cyber-shootout/</span></a></p>
<p><span style="font-weight:400;">In this episode, Neal Conlon joins  Aaron Crow to dive into the details of an extraordinary event set to take place at the renowned STACCATO Ranch.</span></p>
<p><span style="font-weight:400;">Listen in as Neal and Aaron describe an exclusive high-energy experience scheduled for cybersecurity decision-makers. Taking advantage of the expansive 800 Acres to Counter Ranch, this event promises tactical and adventurous activities like shooting from helicopters and professional tactical shooting instruction. Beyond the thrill, attendees will enjoy top-tier amenities such as cigars, bourbon, and gourmet food, all within a high-class, safe environment tailored for networking and learning.</span></p>
<p><span style="font-weight:400;">Throughout the episode, listeners will hear how Neal Conlon transitioned from the Marine Corps mailroom to becoming a global leader in cybersecurity sales, offering a wealth of industry insights along the way. The hosts emphasize the importance of genuine relationship-building and soft skills in an industry often overshadowed by technical certifications. They critique traditional conferences for their superficial perks and excessive follow-up, promoting their unique event as a refreshing alternative designed to foster meaningful connections and strategic engagement.</span></p>
<p><span style="font-weight:400;">Listeners will also gain valuable advice on navigating the complexities of the cybersecurity industry, from managing vendor relationships to understanding procurement cycles, and the crucial role of proactive networking in career advancement.</span></p>
<p><span style="font-weight:400;">Tune in to this riveting episode for an inside look at an unparalleled cybersecurity event and invaluable career insights from Neal and Aaron. </span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 From hedge fund to data and marketing expert.</span></p>
<p><span style="font-weight:400;">04:02 Evolved from client work to sales expertise.</span></p>
<p><span style="font-weight:400;">09:23 Cybersecurity requires swift adaptation, networking, and leveraging skills.</span></p>
<p><span style="font-weight:400;">13:34 Leadership program improved my skills over time.</span></p>
<p><span style="font-weight:400;">17:30 AI evolution reduces need for abstract thinkers.</span></p>
<p><span style="font-weight:400;">21:12 Lemming information creates noisy conflict and confusion.</span></p>
<p><span style="font-weight:400;">23:53 People voluntarily attend for genuine networking opportunities.</span></p>
<p><span style="font-weight:400;">26:39 Two people enjoy baseball game nosebleed seats.</span></p>
<p><span style="font-weight:400;">31:06 Control initiatives, build relationships, secure deals.</span></p>
<p><span style="font-weight:400;">34:29 Event's unique value and ROI for leaders/vendors.</span></p>
<p><span style="font-weight:400;">35:20 Vendor leads often misclassified; true relationships matter.</span></p>
<p><span style="font-weight:400;">38:33 Networking and shared experiences build valuable connections.</span></p>
<p><span style="font-weight:400;">43:25 High-energy networking event with decision-makers.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Click here to participate in this exclusive event - https://corvosec.com/lonestar-cyber-shootout/
In this episode, Neal Conlon joins  Aaron Crow to dive into the details of an extraordinary event set to take place at the renowned STACCATO Ranch.
Listen in as Neal and Aaron describe an exclusive high-energy experience scheduled for cybersecurity decision-makers. Taking advantage of the expansive 800 Acres to Counter Ranch, this event promises tactical and adventurous activities like shooting from helicopters and professional tactical shooting instruction. Beyond the thrill, attendees will enjoy top-tier amenities such as cigars, bourbon, and gourmet food, all within a high-class, safe environment tailored for networking and learning.
Throughout the episode, listeners will hear how Neal Conlon transitioned from the Marine Corps mailroom to becoming a global leader in cybersecurity sales, offering a wealth of industry insights along the way. The hosts emphasize the importance of genuine relationship-building and soft skills in an industry often overshadowed by technical certifications. They critique traditional conferences for their superficial perks and excessive follow-up, promoting their unique event as a refreshing alternative designed to foster meaningful connections and strategic engagement.
Listeners will also gain valuable advice on navigating the complexities of the cybersecurity industry, from managing vendor relationships to understanding procurement cycles, and the crucial role of proactive networking in career advancement.
Tune in to this riveting episode for an inside look at an unparalleled cybersecurity event and invaluable career insights from Neal and Aaron. 
Key Moments: 
00:10 From hedge fund to data and marketing expert.
04:02 Evolved from client work to sales expertise.
09:23 Cybersecurity requires swift adaptation, networking, and leveraging skills.
13:34 Leadership program improved my skills over time.
17:30 AI evolution reduces need for abstract thinkers.
21:12 Lemming information creates noisy conflict and confusion.
23:53 People voluntarily attend for genuine networking opportunities.
26:39 Two people enjoy baseball game nosebleed seats.
31:06 Control initiatives, build relationships, secure deals.
34:29 Event's unique value and ROI for leaders/vendors.
35:20 Vendor leads often misclassified; true relationships matter.
38:33 Networking and shared experiences build valuable connections.
43:25 High-energy networking event with decision-makers.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Exclusive Cybersecurity Event at STACCATO RANCH: Where Networking Meets Adventure]]>
                </itunes:title>
                                    <itunes:episode>36</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Click here to participate in this exclusive event - </span><a href="https://corvosec.com/lonestar-cyber-shootout/"><span style="font-weight:400;">https://corvosec.com/lonestar-cyber-shootout/</span></a></p>
<p><span style="font-weight:400;">In this episode, Neal Conlon joins  Aaron Crow to dive into the details of an extraordinary event set to take place at the renowned STACCATO Ranch.</span></p>
<p><span style="font-weight:400;">Listen in as Neal and Aaron describe an exclusive high-energy experience scheduled for cybersecurity decision-makers. Taking advantage of the expansive 800 Acres to Counter Ranch, this event promises tactical and adventurous activities like shooting from helicopters and professional tactical shooting instruction. Beyond the thrill, attendees will enjoy top-tier amenities such as cigars, bourbon, and gourmet food, all within a high-class, safe environment tailored for networking and learning.</span></p>
<p><span style="font-weight:400;">Throughout the episode, listeners will hear how Neal Conlon transitioned from the Marine Corps mailroom to becoming a global leader in cybersecurity sales, offering a wealth of industry insights along the way. The hosts emphasize the importance of genuine relationship-building and soft skills in an industry often overshadowed by technical certifications. They critique traditional conferences for their superficial perks and excessive follow-up, promoting their unique event as a refreshing alternative designed to foster meaningful connections and strategic engagement.</span></p>
<p><span style="font-weight:400;">Listeners will also gain valuable advice on navigating the complexities of the cybersecurity industry, from managing vendor relationships to understanding procurement cycles, and the crucial role of proactive networking in career advancement.</span></p>
<p><span style="font-weight:400;">Tune in to this riveting episode for an inside look at an unparalleled cybersecurity event and invaluable career insights from Neal and Aaron. </span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 From hedge fund to data and marketing expert.</span></p>
<p><span style="font-weight:400;">04:02 Evolved from client work to sales expertise.</span></p>
<p><span style="font-weight:400;">09:23 Cybersecurity requires swift adaptation, networking, and leveraging skills.</span></p>
<p><span style="font-weight:400;">13:34 Leadership program improved my skills over time.</span></p>
<p><span style="font-weight:400;">17:30 AI evolution reduces need for abstract thinkers.</span></p>
<p><span style="font-weight:400;">21:12 Lemming information creates noisy conflict and confusion.</span></p>
<p><span style="font-weight:400;">23:53 People voluntarily attend for genuine networking opportunities.</span></p>
<p><span style="font-weight:400;">26:39 Two people enjoy baseball game nosebleed seats.</span></p>
<p><span style="font-weight:400;">31:06 Control initiatives, build relationships, secure deals.</span></p>
<p><span style="font-weight:400;">34:29 Event's unique value and ROI for leaders/vendors.</span></p>
<p><span style="font-weight:400;">35:20 Vendor leads often misclassified; true relationships matter.</span></p>
<p><span style="font-weight:400;">38:33 Networking and shared experiences build valuable connections.</span></p>
<p><span style="font-weight:400;">43:25 High-energy networking event with decision-makers.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p> </p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1921332/c1e-n57kvb5wkgqud57jx-pkjpwd1dcx9j-2rpx3l.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1921332&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=bf8af47b68b6e93e54ce3df88482dc1dfa44ddb55a655cd42daacf6f675ab53b" length="43368348"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Click here to participate in this exclusive event - https://corvosec.com/lonestar-cyber-shootout/
In this episode, Neal Conlon joins  Aaron Crow to dive into the details of an extraordinary event set to take place at the renowned STACCATO Ranch.
Listen in as Neal and Aaron describe an exclusive high-energy experience scheduled for cybersecurity decision-makers. Taking advantage of the expansive 800 Acres to Counter Ranch, this event promises tactical and adventurous activities like shooting from helicopters and professional tactical shooting instruction. Beyond the thrill, attendees will enjoy top-tier amenities such as cigars, bourbon, and gourmet food, all within a high-class, safe environment tailored for networking and learning.
Throughout the episode, listeners will hear how Neal Conlon transitioned from the Marine Corps mailroom to becoming a global leader in cybersecurity sales, offering a wealth of industry insights along the way. The hosts emphasize the importance of genuine relationship-building and soft skills in an industry often overshadowed by technical certifications. They critique traditional conferences for their superficial perks and excessive follow-up, promoting their unique event as a refreshing alternative designed to foster meaningful connections and strategic engagement.
Listeners will also gain valuable advice on navigating the complexities of the cybersecurity industry, from managing vendor relationships to understanding procurement cycles, and the crucial role of proactive networking in career advancement.
Tune in to this riveting episode for an inside look at an unparalleled cybersecurity event and invaluable career insights from Neal and Aaron. 
Key Moments: 
00:10 From hedge fund to data and marketing expert.
04:02 Evolved from client work to sales expertise.
09:23 Cybersecurity requires swift adaptation, networking, and leveraging skills.
13:34 Leadership program improved my skills over time.
17:30 AI evolution reduces need for abstract thinkers.
21:12 Lemming information creates noisy conflict and confusion.
23:53 People voluntarily attend for genuine networking opportunities.
26:39 Two people enjoy baseball game nosebleed seats.
31:06 Control initiatives, build relationships, secure deals.
34:29 Event's unique value and ROI for leaders/vendors.
35:20 Vendor leads often misclassified; true relationships matter.
38:33 Networking and shared experiences build valuable connections.
43:25 High-energy networking event with decision-makers.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1921332/c1a-w52rp-wwmo7gvzsx8o-0mdtgp.jpg"></itunes:image>
                                                                            <itunes:duration>00:45:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Understanding Cybersecurity Risks and Management: Insights from Harry Thomas]]>
                </title>
                <pubDate>Mon, 09 Dec 2024 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1917444</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives into cybersecurity and risk management with guest Harry Thomas, CTO and co-founder of Freanos. This episode tackles the complexities of managing security risks in large organizations, from outdated systems to inconsistent cybersecurity postures across various sites.</span></p>
<p><span style="font-weight:400;">Listeners will learn how companies leverage consultants and community support to bridge knowledge gaps and the importance of operationalizing cybersecurity tools. Harry Thomas shares his views on the evolving landscape of OT security tools, the role of AI in enhancing productivity, and innovative approaches to addressing vulnerabilities in critical infrastructure.</span></p>
<p><span style="font-weight:400;">The episode also explores the advantages of hybrid cloud models for improved resilience and ROI and offers practical advice on risk management and adaptability. Get Harry's book recommendations and learn about Freanos' platform, which is designed to efficiently prioritize and mitigate risks.</span></p>
<p><span style="font-weight:400;">Tune in for essential knowledge and strategies to "protect it all," whether you're an experienced cybersecurity professional or just starting out. This discussion is packed with actionable insights and innovative perspectives you won't want to miss.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">04:07 Understanding comprehensive risk environments requires collective expertise.</span></p>
<p><span style="font-weight:400;">11:43 Flexible onboarding for diverse technological infrastructures.</span></p>
<p><span style="font-weight:400;">14:21 Tools are costly; operational transfer challenges value.</span></p>
<p><span style="font-weight:400;">17:22 Replicated improves network security troubleshooting efficiency.</span></p>
<p><span style="font-weight:400;">21:07 OT must embrace new technologies for growth.</span></p>
<p><span style="font-weight:400;">25:17 Cloud's benefits outweigh outdated equipment's drawbacks.</span></p>
<p><span style="font-weight:400;">27:12 Fast internet enables remote power plant operation.</span></p>
<p><span style="font-weight:400;">30:46 Prioritize resources over patching 80,000 devices.</span></p>
<p><span style="font-weight:400;">35:13 Patching insufficient in OT, unlike IT systems.</span></p>
<p><span style="font-weight:400;">37:43 Different risk approaches for IT vs. OT scenarios.</span></p>
<p><span style="font-weight:400;">45:41 All business involves people, adaptability, and growth.</span></p>
<p><span style="font-weight:400;">47:42 Cybersecurity will shift focus to customer impact.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Harry Thomas, a cybersecurity veteran with over a decade of expertise, specializes in offensive penetration testing and securing industrial and healthcare infrastructure. As CTO of Frenos, Harry leads the company’s strategic innovation, focusing on advanced cybersecurity solutions to safeguard critical systems against evolving threats.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">An accomplished educator and speaker, Harry has taught “Hacking PLCs” at DefCon and BSIDES Orlando, spoken at BSIDES NH, and appeared on the Secure Insights podcast, sharing insights on cybersecurity challenges and advancements.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">Previously, he served as Director of Product R&amp;D at Dragos, where he strengthened security in industrial control systems, and at AWS, where he developed AI/ML-driven User Behavioral Analytics to enhance security. Known for his technical expertise and leadership, Harry is a prominent speaker at global cybersecurity conferences, offering strategic insights into threat mitigation.</span></p>
<p><span style="font-weight:400;"> </span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow dives into cybersecurity and risk management with guest Harry Thomas, CTO and co-founder of Freanos. This episode tackles the complexities of managing security risks in large organizations, from outdated systems to inconsistent cybersecurity postures across various sites.
Listeners will learn how companies leverage consultants and community support to bridge knowledge gaps and the importance of operationalizing cybersecurity tools. Harry Thomas shares his views on the evolving landscape of OT security tools, the role of AI in enhancing productivity, and innovative approaches to addressing vulnerabilities in critical infrastructure.
The episode also explores the advantages of hybrid cloud models for improved resilience and ROI and offers practical advice on risk management and adaptability. Get Harry's book recommendations and learn about Freanos' platform, which is designed to efficiently prioritize and mitigate risks.
Tune in for essential knowledge and strategies to "protect it all," whether you're an experienced cybersecurity professional or just starting out. This discussion is packed with actionable insights and innovative perspectives you won't want to miss.
 
Key Moments: 
04:07 Understanding comprehensive risk environments requires collective expertise.
11:43 Flexible onboarding for diverse technological infrastructures.
14:21 Tools are costly; operational transfer challenges value.
17:22 Replicated improves network security troubleshooting efficiency.
21:07 OT must embrace new technologies for growth.
25:17 Cloud's benefits outweigh outdated equipment's drawbacks.
27:12 Fast internet enables remote power plant operation.
30:46 Prioritize resources over patching 80,000 devices.
35:13 Patching insufficient in OT, unlike IT systems.
37:43 Different risk approaches for IT vs. OT scenarios.
45:41 All business involves people, adaptability, and growth.
47:42 Cybersecurity will shift focus to customer impact.
 
About the guest : 
Harry Thomas, a cybersecurity veteran with over a decade of expertise, specializes in offensive penetration testing and securing industrial and healthcare infrastructure. As CTO of Frenos, Harry leads the company’s strategic innovation, focusing on advanced cybersecurity solutions to safeguard critical systems against evolving threats.
 
An accomplished educator and speaker, Harry has taught “Hacking PLCs” at DefCon and BSIDES Orlando, spoken at BSIDES NH, and appeared on the Secure Insights podcast, sharing insights on cybersecurity challenges and advancements.
 
Previously, he served as Director of Product R&D at Dragos, where he strengthened security in industrial control systems, and at AWS, where he developed AI/ML-driven User Behavioral Analytics to enhance security. Known for his technical expertise and leadership, Harry is a prominent speaker at global cybersecurity conferences, offering strategic insights into threat mitigation.
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Understanding Cybersecurity Risks and Management: Insights from Harry Thomas]]>
                </itunes:title>
                                    <itunes:episode>35</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives into cybersecurity and risk management with guest Harry Thomas, CTO and co-founder of Freanos. This episode tackles the complexities of managing security risks in large organizations, from outdated systems to inconsistent cybersecurity postures across various sites.</span></p>
<p><span style="font-weight:400;">Listeners will learn how companies leverage consultants and community support to bridge knowledge gaps and the importance of operationalizing cybersecurity tools. Harry Thomas shares his views on the evolving landscape of OT security tools, the role of AI in enhancing productivity, and innovative approaches to addressing vulnerabilities in critical infrastructure.</span></p>
<p><span style="font-weight:400;">The episode also explores the advantages of hybrid cloud models for improved resilience and ROI and offers practical advice on risk management and adaptability. Get Harry's book recommendations and learn about Freanos' platform, which is designed to efficiently prioritize and mitigate risks.</span></p>
<p><span style="font-weight:400;">Tune in for essential knowledge and strategies to "protect it all," whether you're an experienced cybersecurity professional or just starting out. This discussion is packed with actionable insights and innovative perspectives you won't want to miss.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">04:07 Understanding comprehensive risk environments requires collective expertise.</span></p>
<p><span style="font-weight:400;">11:43 Flexible onboarding for diverse technological infrastructures.</span></p>
<p><span style="font-weight:400;">14:21 Tools are costly; operational transfer challenges value.</span></p>
<p><span style="font-weight:400;">17:22 Replicated improves network security troubleshooting efficiency.</span></p>
<p><span style="font-weight:400;">21:07 OT must embrace new technologies for growth.</span></p>
<p><span style="font-weight:400;">25:17 Cloud's benefits outweigh outdated equipment's drawbacks.</span></p>
<p><span style="font-weight:400;">27:12 Fast internet enables remote power plant operation.</span></p>
<p><span style="font-weight:400;">30:46 Prioritize resources over patching 80,000 devices.</span></p>
<p><span style="font-weight:400;">35:13 Patching insufficient in OT, unlike IT systems.</span></p>
<p><span style="font-weight:400;">37:43 Different risk approaches for IT vs. OT scenarios.</span></p>
<p><span style="font-weight:400;">45:41 All business involves people, adaptability, and growth.</span></p>
<p><span style="font-weight:400;">47:42 Cybersecurity will shift focus to customer impact.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Harry Thomas, a cybersecurity veteran with over a decade of expertise, specializes in offensive penetration testing and securing industrial and healthcare infrastructure. As CTO of Frenos, Harry leads the company’s strategic innovation, focusing on advanced cybersecurity solutions to safeguard critical systems against evolving threats.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">An accomplished educator and speaker, Harry has taught “Hacking PLCs” at DefCon and BSIDES Orlando, spoken at BSIDES NH, and appeared on the Secure Insights podcast, sharing insights on cybersecurity challenges and advancements.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">Previously, he served as Director of Product R&amp;D at Dragos, where he strengthened security in industrial control systems, and at AWS, where he developed AI/ML-driven User Behavioral Analytics to enhance security. Known for his technical expertise and leadership, Harry is a prominent speaker at global cybersecurity conferences, offering strategic insights into threat mitigation.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>Connect Harry:</strong></p>
<p><a href="https://frenos.io/"><span style="font-weight:400;">https://frenos.io/</span></a></p>
<p><a href="https://frenos.io/blog/atlas-advanced-threat-landscape-analysis-system"><span style="font-weight:400;">https://frenos.io/blog/atlas-advanced-threat-landscape-analysis-system</span></a></p>
<p><a href="https://frenos.io/blog/proactive-defense-zero-disruption-why-frenos-won-the-datatribe-challenge"><span style="font-weight:400;">https://frenos.io/blog/proactive-defense-zero-disruption-why-frenos-won-the-datatribe-challenge</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at </strong><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1917444/c1e-q237vu2mw0ju7jkmg-0v23jk94f6q2-uzeer0.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1917444&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=4c15605f3a8f126e8103e3157626f7dffa633b916ff32947d501a7b40698097e" length="51338031"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow dives into cybersecurity and risk management with guest Harry Thomas, CTO and co-founder of Freanos. This episode tackles the complexities of managing security risks in large organizations, from outdated systems to inconsistent cybersecurity postures across various sites.
Listeners will learn how companies leverage consultants and community support to bridge knowledge gaps and the importance of operationalizing cybersecurity tools. Harry Thomas shares his views on the evolving landscape of OT security tools, the role of AI in enhancing productivity, and innovative approaches to addressing vulnerabilities in critical infrastructure.
The episode also explores the advantages of hybrid cloud models for improved resilience and ROI and offers practical advice on risk management and adaptability. Get Harry's book recommendations and learn about Freanos' platform, which is designed to efficiently prioritize and mitigate risks.
Tune in for essential knowledge and strategies to "protect it all," whether you're an experienced cybersecurity professional or just starting out. This discussion is packed with actionable insights and innovative perspectives you won't want to miss.
 
Key Moments: 
04:07 Understanding comprehensive risk environments requires collective expertise.
11:43 Flexible onboarding for diverse technological infrastructures.
14:21 Tools are costly; operational transfer challenges value.
17:22 Replicated improves network security troubleshooting efficiency.
21:07 OT must embrace new technologies for growth.
25:17 Cloud's benefits outweigh outdated equipment's drawbacks.
27:12 Fast internet enables remote power plant operation.
30:46 Prioritize resources over patching 80,000 devices.
35:13 Patching insufficient in OT, unlike IT systems.
37:43 Different risk approaches for IT vs. OT scenarios.
45:41 All business involves people, adaptability, and growth.
47:42 Cybersecurity will shift focus to customer impact.
 
About the guest : 
Harry Thomas, a cybersecurity veteran with over a decade of expertise, specializes in offensive penetration testing and securing industrial and healthcare infrastructure. As CTO of Frenos, Harry leads the company’s strategic innovation, focusing on advanced cybersecurity solutions to safeguard critical systems against evolving threats.
 
An accomplished educator and speaker, Harry has taught “Hacking PLCs” at DefCon and BSIDES Orlando, spoken at BSIDES NH, and appeared on the Secure Insights podcast, sharing insights on cybersecurity challenges and advancements.
 
Previously, he served as Director of Product R&D at Dragos, where he strengthened security in industrial control systems, and at AWS, where he developed AI/ML-driven User Behavioral Analytics to enhance security. Known for his technical expertise and leadership, Harry is a prominent speaker at global cybersecurity conferences, offering strategic insights into threat mitigation.
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1917444/c1a-w52rp-rkdx642nbjjk-fn9y4j.jpg"></itunes:image>
                                                                            <itunes:duration>00:54:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[ICS/OT Cybersecurity: Events, Networking, and Industry Discussions with Mike Holcomb]]>
                </title>
                <pubDate>Mon, 02 Dec 2024 14:49:25 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1912311</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by special guest  Mike Holcomb to discuss the intricate realm of Industrial Control Systems and Operational Technology (ICS/OT) cybersecurity. The episode also spotlights the upcoming event B Sides ICS, an open and community-centric conference set to run alongside the prestigious S4 conference in Tampa.</span></p>
<p> </p>
<p><span style="font-weight:400;">Mike Holcomb provides insights into the much-anticipated ticket sales for the event and underscores the importance of submitting papers or presentations by the end of the year. The discussion emphasizes the significance of expertise in OT, cyber, and enterprise operations for top-level management and how events like B Sides ICS and S4 promote networking, learning, and professional development.</span></p>
<p> </p>
<p><span style="font-weight:400;">Listeners will gain a deeper understanding of the origins of B Sides events, the excitement surrounding B Sides ICS, and the impactful discussions and innovations poised to shape the future of ICS/OT cybersecurity. Whether the audience comprises newcomers or seasoned professionals, this episode offers valuable takeaways for everyone.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">00:00 Educating and supporting ICS &amp; OT cybersecurity communities.</span></p>
<p><span style="font-weight:400;">04:28 Passionate about learning and sharing cybersecurity knowledge.</span></p>
<p><span style="font-weight:400;">08:59 B Sides: Global community-focused conference events.</span></p>
<p><span style="font-weight:400;">10:43 Bringing B-Sides to Greenville increased attendance.</span></p>
<p><span style="font-weight:400;">16:29 Promote diverse perspectives in OT cybersecurity.</span></p>
<p><span style="font-weight:400;">19:01 Active Directory challenges in IT-OT integration.</span></p>
<p><span style="font-weight:400;">21:07 Active Directory simplifies system management, poses risks.</span></p>
<p><span style="font-weight:400;">28:57 Lean on IT for the correct Active Directory setup.</span></p>
<p><span style="font-weight:400;">31:52 Availability is crucial in an OT environment.</span></p>
<p><span style="font-weight:400;">34:14 Integrating IT and OT for enhanced cybersecurity collaboration.</span></p>
<p><span style="font-weight:400;">36:16 IT and OT integration needs improvement.</span></p>
<p><span style="font-weight:400;">40:54 Exploring cybersecurity in ICSOT across various sectors.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">Mike Holcomb is the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, one of the world’s largest engineering, procurement, and construction companies. His current role provides him with the opportunity to work in securing some of the world’s largest ICS/OT environments, from power plants and commuter rail to manufacturing facilities and refineries. He has his Masters degree in ICS/OT cybersecurity from the SANS Technology Institute. Additionally, he maintains cyber security and ICS/OT certifications such as the CISSP, GRID, GICSP, GCIP, GPEN, GCIH, ISA 62443, and more.</span></p>
<p><span style="font-weight:400;">He posts regularly on LinkedIn and YouTube to help others learn more about securing ICS/OT and critical infrastructure.</span></p>
<p> </p>
<p><strong>How to contact Mike: </strong></p>
<p><span style="font-weight:400;">Website : </span><a href="https://www.mikeholcomb.com/"><span style="font-weight:400;">https://www.mikeholcomb.com/</span></a></p>
<p><span style="font-weight:400;">Youtube :  </span><a href="https://www.youtube.com/@utilsec"><span style="font-weight:400;">https://www.youtube.com/@utilsec</span></a></p>
<p><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/mikeholcomb/"><span style="font-weight:400;">https://www.linkedin.com/in/mikeholcomb/</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow is joined by special guest  Mike Holcomb to discuss the intricate realm of Industrial Control Systems and Operational Technology (ICS/OT) cybersecurity. The episode also spotlights the upcoming event B Sides ICS, an open and community-centric conference set to run alongside the prestigious S4 conference in Tampa.
 
Mike Holcomb provides insights into the much-anticipated ticket sales for the event and underscores the importance of submitting papers or presentations by the end of the year. The discussion emphasizes the significance of expertise in OT, cyber, and enterprise operations for top-level management and how events like B Sides ICS and S4 promote networking, learning, and professional development.
 
Listeners will gain a deeper understanding of the origins of B Sides events, the excitement surrounding B Sides ICS, and the impactful discussions and innovations poised to shape the future of ICS/OT cybersecurity. Whether the audience comprises newcomers or seasoned professionals, this episode offers valuable takeaways for everyone.
 
Key Moments: 
 
00:00 Educating and supporting ICS & OT cybersecurity communities.
04:28 Passionate about learning and sharing cybersecurity knowledge.
08:59 B Sides: Global community-focused conference events.
10:43 Bringing B-Sides to Greenville increased attendance.
16:29 Promote diverse perspectives in OT cybersecurity.
19:01 Active Directory challenges in IT-OT integration.
21:07 Active Directory simplifies system management, poses risks.
28:57 Lean on IT for the correct Active Directory setup.
31:52 Availability is crucial in an OT environment.
34:14 Integrating IT and OT for enhanced cybersecurity collaboration.
36:16 IT and OT integration needs improvement.
40:54 Exploring cybersecurity in ICSOT across various sectors.
 
About the guest : 
 
Mike Holcomb is the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, one of the world’s largest engineering, procurement, and construction companies. His current role provides him with the opportunity to work in securing some of the world’s largest ICS/OT environments, from power plants and commuter rail to manufacturing facilities and refineries. He has his Masters degree in ICS/OT cybersecurity from the SANS Technology Institute. Additionally, he maintains cyber security and ICS/OT certifications such as the CISSP, GRID, GICSP, GCIP, GPEN, GCIH, ISA 62443, and more.
He posts regularly on LinkedIn and YouTube to help others learn more about securing ICS/OT and critical infrastructure.
 
How to contact Mike: 
Website : https://www.mikeholcomb.com/
Youtube :  https://www.youtube.com/@utilsec
LinkedIn: https://www.linkedin.com/in/mikeholcomb/]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[ICS/OT Cybersecurity: Events, Networking, and Industry Discussions with Mike Holcomb]]>
                </itunes:title>
                                    <itunes:episode>34</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by special guest  Mike Holcomb to discuss the intricate realm of Industrial Control Systems and Operational Technology (ICS/OT) cybersecurity. The episode also spotlights the upcoming event B Sides ICS, an open and community-centric conference set to run alongside the prestigious S4 conference in Tampa.</span></p>
<p> </p>
<p><span style="font-weight:400;">Mike Holcomb provides insights into the much-anticipated ticket sales for the event and underscores the importance of submitting papers or presentations by the end of the year. The discussion emphasizes the significance of expertise in OT, cyber, and enterprise operations for top-level management and how events like B Sides ICS and S4 promote networking, learning, and professional development.</span></p>
<p> </p>
<p><span style="font-weight:400;">Listeners will gain a deeper understanding of the origins of B Sides events, the excitement surrounding B Sides ICS, and the impactful discussions and innovations poised to shape the future of ICS/OT cybersecurity. Whether the audience comprises newcomers or seasoned professionals, this episode offers valuable takeaways for everyone.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">00:00 Educating and supporting ICS &amp; OT cybersecurity communities.</span></p>
<p><span style="font-weight:400;">04:28 Passionate about learning and sharing cybersecurity knowledge.</span></p>
<p><span style="font-weight:400;">08:59 B Sides: Global community-focused conference events.</span></p>
<p><span style="font-weight:400;">10:43 Bringing B-Sides to Greenville increased attendance.</span></p>
<p><span style="font-weight:400;">16:29 Promote diverse perspectives in OT cybersecurity.</span></p>
<p><span style="font-weight:400;">19:01 Active Directory challenges in IT-OT integration.</span></p>
<p><span style="font-weight:400;">21:07 Active Directory simplifies system management, poses risks.</span></p>
<p><span style="font-weight:400;">28:57 Lean on IT for the correct Active Directory setup.</span></p>
<p><span style="font-weight:400;">31:52 Availability is crucial in an OT environment.</span></p>
<p><span style="font-weight:400;">34:14 Integrating IT and OT for enhanced cybersecurity collaboration.</span></p>
<p><span style="font-weight:400;">36:16 IT and OT integration needs improvement.</span></p>
<p><span style="font-weight:400;">40:54 Exploring cybersecurity in ICSOT across various sectors.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">Mike Holcomb is the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, one of the world’s largest engineering, procurement, and construction companies. His current role provides him with the opportunity to work in securing some of the world’s largest ICS/OT environments, from power plants and commuter rail to manufacturing facilities and refineries. He has his Masters degree in ICS/OT cybersecurity from the SANS Technology Institute. Additionally, he maintains cyber security and ICS/OT certifications such as the CISSP, GRID, GICSP, GCIP, GPEN, GCIH, ISA 62443, and more.</span></p>
<p><span style="font-weight:400;">He posts regularly on LinkedIn and YouTube to help others learn more about securing ICS/OT and critical infrastructure.</span></p>
<p> </p>
<p><strong>How to contact Mike: </strong></p>
<p><span style="font-weight:400;">Website : </span><a href="https://www.mikeholcomb.com/"><span style="font-weight:400;">https://www.mikeholcomb.com/</span></a></p>
<p><span style="font-weight:400;">Youtube :  </span><a href="https://www.youtube.com/@utilsec"><span style="font-weight:400;">https://www.youtube.com/@utilsec</span></a></p>
<p><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/mikeholcomb/"><span style="font-weight:400;">https://www.linkedin.com/in/mikeholcomb/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p><br /><br /></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1912311/c1e-52n9dumj7w6brk1kp-8d9j53x8fw8r-rhpitg.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1912311&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=d822974621278f83303c330c66094b676523b224b8dbcc8b9ce0ed2d9680cf48" length="51113231"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow is joined by special guest  Mike Holcomb to discuss the intricate realm of Industrial Control Systems and Operational Technology (ICS/OT) cybersecurity. The episode also spotlights the upcoming event B Sides ICS, an open and community-centric conference set to run alongside the prestigious S4 conference in Tampa.
 
Mike Holcomb provides insights into the much-anticipated ticket sales for the event and underscores the importance of submitting papers or presentations by the end of the year. The discussion emphasizes the significance of expertise in OT, cyber, and enterprise operations for top-level management and how events like B Sides ICS and S4 promote networking, learning, and professional development.
 
Listeners will gain a deeper understanding of the origins of B Sides events, the excitement surrounding B Sides ICS, and the impactful discussions and innovations poised to shape the future of ICS/OT cybersecurity. Whether the audience comprises newcomers or seasoned professionals, this episode offers valuable takeaways for everyone.
 
Key Moments: 
 
00:00 Educating and supporting ICS & OT cybersecurity communities.
04:28 Passionate about learning and sharing cybersecurity knowledge.
08:59 B Sides: Global community-focused conference events.
10:43 Bringing B-Sides to Greenville increased attendance.
16:29 Promote diverse perspectives in OT cybersecurity.
19:01 Active Directory challenges in IT-OT integration.
21:07 Active Directory simplifies system management, poses risks.
28:57 Lean on IT for the correct Active Directory setup.
31:52 Availability is crucial in an OT environment.
34:14 Integrating IT and OT for enhanced cybersecurity collaboration.
36:16 IT and OT integration needs improvement.
40:54 Exploring cybersecurity in ICSOT across various sectors.
 
About the guest : 
 
Mike Holcomb is the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, one of the world’s largest engineering, procurement, and construction companies. His current role provides him with the opportunity to work in securing some of the world’s largest ICS/OT environments, from power plants and commuter rail to manufacturing facilities and refineries. He has his Masters degree in ICS/OT cybersecurity from the SANS Technology Institute. Additionally, he maintains cyber security and ICS/OT certifications such as the CISSP, GRID, GICSP, GCIP, GPEN, GCIH, ISA 62443, and more.
He posts regularly on LinkedIn and YouTube to help others learn more about securing ICS/OT and critical infrastructure.
 
How to contact Mike: 
Website : https://www.mikeholcomb.com/
Youtube :  https://www.youtube.com/@utilsec
LinkedIn: https://www.linkedin.com/in/mikeholcomb/]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1912311/c1a-w52rp-5zkj8w7ztk1m-jbyifo.jpg"></itunes:image>
                                                                            <itunes:duration>00:50:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[The Future of Automation and AI in Operational Technology with Shane Cox]]>
                </title>
                <pubDate>Mon, 25 Nov 2024 11:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1907467</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In Episode 33, Aaron Crow explores the transformative impact of automation and AI in the Operational Technology (OT) sector, joined by industry expert Shane Cox from Morgan Franklin Cyber. This episode deepens how AI and automation can enhance security operations when balanced with human oversight and strategic implementation.</span></p>
<p> </p>
<p><span style="font-weight:400;">Shane Cox shares insights on Morgan Franklin's flexible and expert-driven approach to Managed Detection and Response (MDR) services, emphasizing the importance of tailored client partnerships and continuous collaboration. The discussion highlights the potential of AI to revolutionize security while addressing the unique challenges and risks of integrating automated solutions.</span></p>
<p> </p>
<p><span style="font-weight:400;">Tune in to learn how the right blend of technology, expertise, and strategy can drive effective security solutions and foster long-term client relationships in today's evolving cybersecurity landscape.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">05:15 Flexible, evolving security service, partnership-focused approach.</span></p>
<p><span style="font-weight:400;">07:06 Diverse tools are essential for all organizations.</span></p>
<p><span style="font-weight:400;">12:58 Weekend setup complete; improved over subsequent months.</span></p>
<p><span style="font-weight:400;">15:30 MDR/XDR: Cloud-based threat detection and response.</span></p>
<p><span style="font-weight:400;">18:21 Flexible MDR service integrates client environments efficiently.</span></p>
<p><span style="font-weight:400;">21:38 Integration speeds up threat detection and response.</span></p>
<p><span style="font-weight:400;">24:52 Cautious automation best balances efficiency and control.</span></p>
<p><span style="font-weight:400;">29:50 AI assists coding by highlighting potential errors.</span></p>
<p><span style="font-weight:400;">32:12 People are crucial for effective security automation.</span></p>
<p><span style="font-weight:400;">35:51 Superior team preferred over superior product.</span></p>
<p><span style="font-weight:400;">39:06 AI integration risks due to untested promises.</span></p>
<p><span style="font-weight:400;">41:46 Adapting security training amidst AI automation challenges.</span></p>
<p> </p>
<p><strong>Guest Profile: </strong></p>
<p> </p>
<p><span style="font-weight:400;">Shane Cox leads the Cyber Fusion Center at MorganFranklin Cyber where he is responsible for the delivery of managed services such as Orion MDR, Advanced Detection and Response (ADR), Threat Hunting, Adversary Simulation, Cyber Threat Intelligence (CTI), and Incident Response and Management. </span></p>
<p> </p>
<p><span style="font-weight:400;">Shane has over 25 years of experience in IT and Cyber Security, leading the development and optimization of security programs within enterprise and managed services environments. He has deep experience and success providing customized, business-aligned security outcomes for a diverse range of client environments and industry verticals. </span></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>How to connect with Shane:</strong></p>
<p> </p>
<p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7264640034891337730"><span style="font-weight:400;">https://www.linkedin.com/feed/update/urn:li:activity:7264640034891337730</span></a></p>
<p><a href="https://www.sdxcentral.com/articles/stringerai-announcements/morganfranklin-consulting-launches-orion-mdr-service-with-stellar-cyber/2024/11/"><span style="font-weight:400;">https://www.sdxcentral.com/articles/stringerai-announcements/morganfranklin-consulting-launches-orion-mdr-service-with-stellar-cyber/2024/11/</span></a></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">...</span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In Episode 33, Aaron Crow explores the transformative impact of automation and AI in the Operational Technology (OT) sector, joined by industry expert Shane Cox from Morgan Franklin Cyber. This episode deepens how AI and automation can enhance security operations when balanced with human oversight and strategic implementation.
 
Shane Cox shares insights on Morgan Franklin's flexible and expert-driven approach to Managed Detection and Response (MDR) services, emphasizing the importance of tailored client partnerships and continuous collaboration. The discussion highlights the potential of AI to revolutionize security while addressing the unique challenges and risks of integrating automated solutions.
 
Tune in to learn how the right blend of technology, expertise, and strategy can drive effective security solutions and foster long-term client relationships in today's evolving cybersecurity landscape.
 
Key Moments: 
 
05:15 Flexible, evolving security service, partnership-focused approach.
07:06 Diverse tools are essential for all organizations.
12:58 Weekend setup complete; improved over subsequent months.
15:30 MDR/XDR: Cloud-based threat detection and response.
18:21 Flexible MDR service integrates client environments efficiently.
21:38 Integration speeds up threat detection and response.
24:52 Cautious automation best balances efficiency and control.
29:50 AI assists coding by highlighting potential errors.
32:12 People are crucial for effective security automation.
35:51 Superior team preferred over superior product.
39:06 AI integration risks due to untested promises.
41:46 Adapting security training amidst AI automation challenges.
 
Guest Profile: 
 
Shane Cox leads the Cyber Fusion Center at MorganFranklin Cyber where he is responsible for the delivery of managed services such as Orion MDR, Advanced Detection and Response (ADR), Threat Hunting, Adversary Simulation, Cyber Threat Intelligence (CTI), and Incident Response and Management. 
 
Shane has over 25 years of experience in IT and Cyber Security, leading the development and optimization of security programs within enterprise and managed services environments. He has deep experience and success providing customized, business-aligned security outcomes for a diverse range of client environments and industry verticals. 
 
How to connect with Shane:
 
https://www.linkedin.com/feed/update/urn:li:activity:7264640034891337730
https://www.sdxcentral.com/articles/stringerai-announcements/morganfranklin-consulting-launches-orion-mdr-service-with-stellar-cyber/2024/11/
 
Connect With Aaron Crow:

...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[The Future of Automation and AI in Operational Technology with Shane Cox]]>
                </itunes:title>
                                    <itunes:episode>33</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In Episode 33, Aaron Crow explores the transformative impact of automation and AI in the Operational Technology (OT) sector, joined by industry expert Shane Cox from Morgan Franklin Cyber. This episode deepens how AI and automation can enhance security operations when balanced with human oversight and strategic implementation.</span></p>
<p> </p>
<p><span style="font-weight:400;">Shane Cox shares insights on Morgan Franklin's flexible and expert-driven approach to Managed Detection and Response (MDR) services, emphasizing the importance of tailored client partnerships and continuous collaboration. The discussion highlights the potential of AI to revolutionize security while addressing the unique challenges and risks of integrating automated solutions.</span></p>
<p> </p>
<p><span style="font-weight:400;">Tune in to learn how the right blend of technology, expertise, and strategy can drive effective security solutions and foster long-term client relationships in today's evolving cybersecurity landscape.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">05:15 Flexible, evolving security service, partnership-focused approach.</span></p>
<p><span style="font-weight:400;">07:06 Diverse tools are essential for all organizations.</span></p>
<p><span style="font-weight:400;">12:58 Weekend setup complete; improved over subsequent months.</span></p>
<p><span style="font-weight:400;">15:30 MDR/XDR: Cloud-based threat detection and response.</span></p>
<p><span style="font-weight:400;">18:21 Flexible MDR service integrates client environments efficiently.</span></p>
<p><span style="font-weight:400;">21:38 Integration speeds up threat detection and response.</span></p>
<p><span style="font-weight:400;">24:52 Cautious automation best balances efficiency and control.</span></p>
<p><span style="font-weight:400;">29:50 AI assists coding by highlighting potential errors.</span></p>
<p><span style="font-weight:400;">32:12 People are crucial for effective security automation.</span></p>
<p><span style="font-weight:400;">35:51 Superior team preferred over superior product.</span></p>
<p><span style="font-weight:400;">39:06 AI integration risks due to untested promises.</span></p>
<p><span style="font-weight:400;">41:46 Adapting security training amidst AI automation challenges.</span></p>
<p> </p>
<p><strong>Guest Profile: </strong></p>
<p> </p>
<p><span style="font-weight:400;">Shane Cox leads the Cyber Fusion Center at MorganFranklin Cyber where he is responsible for the delivery of managed services such as Orion MDR, Advanced Detection and Response (ADR), Threat Hunting, Adversary Simulation, Cyber Threat Intelligence (CTI), and Incident Response and Management. </span></p>
<p> </p>
<p><span style="font-weight:400;">Shane has over 25 years of experience in IT and Cyber Security, leading the development and optimization of security programs within enterprise and managed services environments. He has deep experience and success providing customized, business-aligned security outcomes for a diverse range of client environments and industry verticals. </span></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>How to connect with Shane:</strong></p>
<p> </p>
<p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7264640034891337730"><span style="font-weight:400;">https://www.linkedin.com/feed/update/urn:li:activity:7264640034891337730</span></a></p>
<p><a href="https://www.sdxcentral.com/articles/stringerai-announcements/morganfranklin-consulting-launches-orion-mdr-service-with-stellar-cyber/2024/11/"><span style="font-weight:400;">https://www.sdxcentral.com/articles/stringerai-announcements/morganfranklin-consulting-launches-orion-mdr-service-with-stellar-cyber/2024/11/</span></a></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p><br /><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p><strong>Please leave us a review on Apple/Spotify Podcasts:</strong></p>
<p><span style="font-weight:400;">Apple   -</span> <a href="https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124"><span style="font-weight:400;">https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124</span></a></p>
<p><span style="font-weight:400;">Spotify - </span><a href="https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4"><span style="font-weight:400;">https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1907467/c1e-n57kvb5pk70adomo5-rkdjw17jarkx-cfg0pc.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1907467&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=7e8209292591ff51e379f917ae5cabec4d07304d0d4264901f3d07218d8ce6c9" length="41221331"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In Episode 33, Aaron Crow explores the transformative impact of automation and AI in the Operational Technology (OT) sector, joined by industry expert Shane Cox from Morgan Franklin Cyber. This episode deepens how AI and automation can enhance security operations when balanced with human oversight and strategic implementation.
 
Shane Cox shares insights on Morgan Franklin's flexible and expert-driven approach to Managed Detection and Response (MDR) services, emphasizing the importance of tailored client partnerships and continuous collaboration. The discussion highlights the potential of AI to revolutionize security while addressing the unique challenges and risks of integrating automated solutions.
 
Tune in to learn how the right blend of technology, expertise, and strategy can drive effective security solutions and foster long-term client relationships in today's evolving cybersecurity landscape.
 
Key Moments: 
 
05:15 Flexible, evolving security service, partnership-focused approach.
07:06 Diverse tools are essential for all organizations.
12:58 Weekend setup complete; improved over subsequent months.
15:30 MDR/XDR: Cloud-based threat detection and response.
18:21 Flexible MDR service integrates client environments efficiently.
21:38 Integration speeds up threat detection and response.
24:52 Cautious automation best balances efficiency and control.
29:50 AI assists coding by highlighting potential errors.
32:12 People are crucial for effective security automation.
35:51 Superior team preferred over superior product.
39:06 AI integration risks due to untested promises.
41:46 Adapting security training amidst AI automation challenges.
 
Guest Profile: 
 
Shane Cox leads the Cyber Fusion Center at MorganFranklin Cyber where he is responsible for the delivery of managed services such as Orion MDR, Advanced Detection and Response (ADR), Threat Hunting, Adversary Simulation, Cyber Threat Intelligence (CTI), and Incident Response and Management. 
 
Shane has over 25 years of experience in IT and Cyber Security, leading the development and optimization of security programs within enterprise and managed services environments. He has deep experience and success providing customized, business-aligned security outcomes for a diverse range of client environments and industry verticals. 
 
How to connect with Shane:
 
https://www.linkedin.com/feed/update/urn:li:activity:7264640034891337730
https://www.sdxcentral.com/articles/stringerai-announcements/morganfranklin-consulting-launches-orion-mdr-service-with-stellar-cyber/2024/11/
 
Connect With Aaron Crow:

...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1907467/c1a-w52rp-wwmrg9oqugmo-3lm9tq.jpg"></itunes:image>
                                                                            <itunes:duration>00:47:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Enhancing OT Cybersecurity: From Legacy Systems to Cloud Solutions with Paul Shaver]]>
                </title>
                <pubDate>Mon, 18 Nov 2024 11:26:05 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1896446</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, Aaron is joined by Paul Shaver, an experienced OT security consultant from Mandiant, part of Google Cloud. Together, they navigate the nuanced landscape of operational technology (OT) cybersecurity.</span></p>
<p> </p>
<p><span style="font-weight:400;">The episode begins with Aaron recalling a critical incident at a power plant that underscores the potential pitfalls in OT environments. This sets the stage for a rich discussion on the evolution of OT technology, with Aaron and Paul reminiscing about primary domain controllers and early NT workstations.</span></p>
<p> </p>
<p><span style="font-weight:400;">The conversation shifts to the future of OT in the cloud, where Paul highlights the benefits of cloud solutions, including enhanced resiliency, security, and data optimization through AI. A compelling customer case study illustrates modern technology adoption with web-based HMIs and Chromeboxes.</span></p>
<p> </p>
<p><span style="font-weight:400;">Paul offers a detailed analysis of the current OT cybersecurity landscape, addressing the persistent legacy system challenges and the need for a cohesive IT-OT security strategy. He discusses the evolving threat landscape influenced by global geopolitical tensions and the rise of zero-day vulnerabilities.</span></p>
<p> </p>
<p><span style="font-weight:400;">Listeners will gain practical insights into foundational cybersecurity measures, such as network segmentation, asset inventory management, and robust access control..</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">04:14 Connecting IT and OT optimizes processes securely.</span></p>
<p><span style="font-weight:400;">09:54 Lost production severely impacts manufacturing revenue recovery.</span></p>
<p><span style="font-weight:400;">14:06 Ensure network notifications; control access, separate credentials.</span></p>
<p><span style="font-weight:400;">17:10 Engineers need secure access to adjust parameters.</span></p>
<p><span style="font-weight:400;">21:55 Endpoint detection on older systems is critical.</span></p>
<p><span style="font-weight:400;">28:47 Resilience is crucial in CrowdStrike incident response effectiveness.</span></p>
<p><span style="font-weight:400;">32:11 Limited resources for global incident response efforts.=</span></p>
<p><span style="font-weight:400;">39:22 Rebuilt domain controller caused authentication issues.</span></p>
<p><span style="font-weight:400;">42:37 Focus on resiliency and cloud opportunities, leveraging multi-cloud.</span></p>
<p><span style="font-weight:400;">44:59 Improve grid operations using cloud and hyper-converged technology.</span></p>
<p><span style="font-weight:400;">48:38 Local cloud provides redundancy for remote sites.</span></p>
<p><span style="font-weight:400;">51:15 Critical for acquisition process and problem-solving.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Paul Shaver has dedicated more than two decades to various roles in Operational Technology (OT), primarily within the oil and gas industry. His expertise spans OT architecture, design, and build, along with run and maintaining responsibilities as an asset owner. </span></p>
<p><span style="font-weight:400;">Before transitioning into cybersecurity, Paul served as a Technology Director for an oil and gas company in California. Driven by a burgeoning interest in security, he joined Mandiant nearly five years ago. At Mandiant, now part of Google, Paul relishes the mission of enhancing security postures in OT and critical infrastructure, contributing to significant advancements in the field.</span></p>
<p><strong>How to connect Paul:</strong> <a href="https://www.linkedin.com/in/pbshaver/"><span style="font-weight:400;">https://www.linkedin.com/in/pbshaver/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span></span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Aaron is joined by Paul Shaver, an experienced OT security consultant from Mandiant, part of Google Cloud. Together, they navigate the nuanced landscape of operational technology (OT) cybersecurity.
 
The episode begins with Aaron recalling a critical incident at a power plant that underscores the potential pitfalls in OT environments. This sets the stage for a rich discussion on the evolution of OT technology, with Aaron and Paul reminiscing about primary domain controllers and early NT workstations.
 
The conversation shifts to the future of OT in the cloud, where Paul highlights the benefits of cloud solutions, including enhanced resiliency, security, and data optimization through AI. A compelling customer case study illustrates modern technology adoption with web-based HMIs and Chromeboxes.
 
Paul offers a detailed analysis of the current OT cybersecurity landscape, addressing the persistent legacy system challenges and the need for a cohesive IT-OT security strategy. He discusses the evolving threat landscape influenced by global geopolitical tensions and the rise of zero-day vulnerabilities.
 
Listeners will gain practical insights into foundational cybersecurity measures, such as network segmentation, asset inventory management, and robust access control..
 
Key Moments: 
 
04:14 Connecting IT and OT optimizes processes securely.
09:54 Lost production severely impacts manufacturing revenue recovery.
14:06 Ensure network notifications; control access, separate credentials.
17:10 Engineers need secure access to adjust parameters.
21:55 Endpoint detection on older systems is critical.
28:47 Resilience is crucial in CrowdStrike incident response effectiveness.
32:11 Limited resources for global incident response efforts.=
39:22 Rebuilt domain controller caused authentication issues.
42:37 Focus on resiliency and cloud opportunities, leveraging multi-cloud.
44:59 Improve grid operations using cloud and hyper-converged technology.
48:38 Local cloud provides redundancy for remote sites.
51:15 Critical for acquisition process and problem-solving.
 
About the guest : 
Paul Shaver has dedicated more than two decades to various roles in Operational Technology (OT), primarily within the oil and gas industry. His expertise spans OT architecture, design, and build, along with run and maintaining responsibilities as an asset owner. 
Before transitioning into cybersecurity, Paul served as a Technology Director for an oil and gas company in California. Driven by a burgeoning interest in security, he joined Mandiant nearly five years ago. At Mandiant, now part of Google, Paul relishes the mission of enhancing security postures in OT and critical infrastructure, contributing to significant advancements in the field.
How to connect Paul: https://www.linkedin.com/in/pbshaver/
Connect With Aaron Crow:

]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Enhancing OT Cybersecurity: From Legacy Systems to Cloud Solutions with Paul Shaver]]>
                </itunes:title>
                                    <itunes:episode>32</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, Aaron is joined by Paul Shaver, an experienced OT security consultant from Mandiant, part of Google Cloud. Together, they navigate the nuanced landscape of operational technology (OT) cybersecurity.</span></p>
<p> </p>
<p><span style="font-weight:400;">The episode begins with Aaron recalling a critical incident at a power plant that underscores the potential pitfalls in OT environments. This sets the stage for a rich discussion on the evolution of OT technology, with Aaron and Paul reminiscing about primary domain controllers and early NT workstations.</span></p>
<p> </p>
<p><span style="font-weight:400;">The conversation shifts to the future of OT in the cloud, where Paul highlights the benefits of cloud solutions, including enhanced resiliency, security, and data optimization through AI. A compelling customer case study illustrates modern technology adoption with web-based HMIs and Chromeboxes.</span></p>
<p> </p>
<p><span style="font-weight:400;">Paul offers a detailed analysis of the current OT cybersecurity landscape, addressing the persistent legacy system challenges and the need for a cohesive IT-OT security strategy. He discusses the evolving threat landscape influenced by global geopolitical tensions and the rise of zero-day vulnerabilities.</span></p>
<p> </p>
<p><span style="font-weight:400;">Listeners will gain practical insights into foundational cybersecurity measures, such as network segmentation, asset inventory management, and robust access control..</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">04:14 Connecting IT and OT optimizes processes securely.</span></p>
<p><span style="font-weight:400;">09:54 Lost production severely impacts manufacturing revenue recovery.</span></p>
<p><span style="font-weight:400;">14:06 Ensure network notifications; control access, separate credentials.</span></p>
<p><span style="font-weight:400;">17:10 Engineers need secure access to adjust parameters.</span></p>
<p><span style="font-weight:400;">21:55 Endpoint detection on older systems is critical.</span></p>
<p><span style="font-weight:400;">28:47 Resilience is crucial in CrowdStrike incident response effectiveness.</span></p>
<p><span style="font-weight:400;">32:11 Limited resources for global incident response efforts.=</span></p>
<p><span style="font-weight:400;">39:22 Rebuilt domain controller caused authentication issues.</span></p>
<p><span style="font-weight:400;">42:37 Focus on resiliency and cloud opportunities, leveraging multi-cloud.</span></p>
<p><span style="font-weight:400;">44:59 Improve grid operations using cloud and hyper-converged technology.</span></p>
<p><span style="font-weight:400;">48:38 Local cloud provides redundancy for remote sites.</span></p>
<p><span style="font-weight:400;">51:15 Critical for acquisition process and problem-solving.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Paul Shaver has dedicated more than two decades to various roles in Operational Technology (OT), primarily within the oil and gas industry. His expertise spans OT architecture, design, and build, along with run and maintaining responsibilities as an asset owner. </span></p>
<p><span style="font-weight:400;">Before transitioning into cybersecurity, Paul served as a Technology Director for an oil and gas company in California. Driven by a burgeoning interest in security, he joined Mandiant nearly five years ago. At Mandiant, now part of Google, Paul relishes the mission of enhancing security postures in OT and critical infrastructure, contributing to significant advancements in the field.</span></p>
<p><strong>How to connect Paul:</strong> <a href="https://www.linkedin.com/in/pbshaver/"><span style="font-weight:400;">https://www.linkedin.com/in/pbshaver/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p><br /><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1896446/c1e-x510gbm7p3qtrwp63-25kp4mr5uz9-mihah7.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1896446&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=970ae656d0b78954faddb8876788548f08264b1cbbd7d2032575a64a3c28a7f1" length="55908719"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Aaron is joined by Paul Shaver, an experienced OT security consultant from Mandiant, part of Google Cloud. Together, they navigate the nuanced landscape of operational technology (OT) cybersecurity.
 
The episode begins with Aaron recalling a critical incident at a power plant that underscores the potential pitfalls in OT environments. This sets the stage for a rich discussion on the evolution of OT technology, with Aaron and Paul reminiscing about primary domain controllers and early NT workstations.
 
The conversation shifts to the future of OT in the cloud, where Paul highlights the benefits of cloud solutions, including enhanced resiliency, security, and data optimization through AI. A compelling customer case study illustrates modern technology adoption with web-based HMIs and Chromeboxes.
 
Paul offers a detailed analysis of the current OT cybersecurity landscape, addressing the persistent legacy system challenges and the need for a cohesive IT-OT security strategy. He discusses the evolving threat landscape influenced by global geopolitical tensions and the rise of zero-day vulnerabilities.
 
Listeners will gain practical insights into foundational cybersecurity measures, such as network segmentation, asset inventory management, and robust access control..
 
Key Moments: 
 
04:14 Connecting IT and OT optimizes processes securely.
09:54 Lost production severely impacts manufacturing revenue recovery.
14:06 Ensure network notifications; control access, separate credentials.
17:10 Engineers need secure access to adjust parameters.
21:55 Endpoint detection on older systems is critical.
28:47 Resilience is crucial in CrowdStrike incident response effectiveness.
32:11 Limited resources for global incident response efforts.=
39:22 Rebuilt domain controller caused authentication issues.
42:37 Focus on resiliency and cloud opportunities, leveraging multi-cloud.
44:59 Improve grid operations using cloud and hyper-converged technology.
48:38 Local cloud provides redundancy for remote sites.
51:15 Critical for acquisition process and problem-solving.
 
About the guest : 
Paul Shaver has dedicated more than two decades to various roles in Operational Technology (OT), primarily within the oil and gas industry. His expertise spans OT architecture, design, and build, along with run and maintaining responsibilities as an asset owner. 
Before transitioning into cybersecurity, Paul served as a Technology Director for an oil and gas company in California. Driven by a burgeoning interest in security, he joined Mandiant nearly five years ago. At Mandiant, now part of Google, Paul relishes the mission of enhancing security postures in OT and critical infrastructure, contributing to significant advancements in the field.
How to connect Paul: https://www.linkedin.com/in/pbshaver/
Connect With Aaron Crow:

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1896446/c1a-w52rp-wwm58p09u4dq-3cldwe.jpg"></itunes:image>
                                                                            <itunes:duration>00:57:11</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Essential Cybersecurity Strategies for Small and Medium-Sized Enterprises]]>
                </title>
                <pubDate>Mon, 11 Nov 2024 13:40:31 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1882281</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow addresses the pressing issue of cybersecurity for small and medium-sized businesses. With their limited budgets and resources, these enterprises are often prime cyberattack targets.</span></p>
<p><span style="font-weight:400;">Aaron explains why these businesses are particularly vulnerable, the potentially devastating impacts of a cyber incident, and practical measures they can adopt to strengthen their cybersecurity without incurring significant costs.</span></p>
<p><span style="font-weight:400;">Listeners will uncover insights on establishing basic cybersecurity policies, the critical importance of monitoring, and strategies for preparing for potential breaches. </span></p>
<p><span style="font-weight:400;">This episode is filled with valuable tips that could ensure the survival and success of your business amid today's escalating cyber threats.</span></p>
<p><span style="font-weight:400;">Key Moments; </span></p>
<p><span style="font-weight:400;">00:00 Cybersecurity challenges and solutions for small businesses.</span></p>
<p><span style="font-weight:400;">03:24 Startups are vulnerable due to inadequate cybersecurity measures.</span></p>
<p><span style="font-weight:400;">06:30 Use secure passwords, educate employees, and use tools.</span></p>
<p><span style="font-weight:400;">11:26 Segregate networks to protect sensitive data.</span></p>
<p><span style="font-weight:400;">14:46 Effective monitoring requires time, effort, and setup.</span></p>
<p><span style="font-weight:400;">16:10 DNS filtering blocks malicious sites, prevents attacks.</span></p>
<p><span style="font-weight:400;">20:29 Plan proactively to manage events before crises.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow addresses the pressing issue of cybersecurity for small and medium-sized businesses. With their limited budgets and resources, these enterprises are often prime cyberattack targets.
Aaron explains why these businesses are particularly vulnerable, the potentially devastating impacts of a cyber incident, and practical measures they can adopt to strengthen their cybersecurity without incurring significant costs.
Listeners will uncover insights on establishing basic cybersecurity policies, the critical importance of monitoring, and strategies for preparing for potential breaches. 
This episode is filled with valuable tips that could ensure the survival and success of your business amid today's escalating cyber threats.
Key Moments; 
00:00 Cybersecurity challenges and solutions for small businesses.
03:24 Startups are vulnerable due to inadequate cybersecurity measures.
06:30 Use secure passwords, educate employees, and use tools.
11:26 Segregate networks to protect sensitive data.
14:46 Effective monitoring requires time, effort, and setup.
16:10 DNS filtering blocks malicious sites, prevents attacks.
20:29 Plan proactively to manage events before crises.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Essential Cybersecurity Strategies for Small and Medium-Sized Enterprises]]>
                </itunes:title>
                                    <itunes:episode>31</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow addresses the pressing issue of cybersecurity for small and medium-sized businesses. With their limited budgets and resources, these enterprises are often prime cyberattack targets.</span></p>
<p><span style="font-weight:400;">Aaron explains why these businesses are particularly vulnerable, the potentially devastating impacts of a cyber incident, and practical measures they can adopt to strengthen their cybersecurity without incurring significant costs.</span></p>
<p><span style="font-weight:400;">Listeners will uncover insights on establishing basic cybersecurity policies, the critical importance of monitoring, and strategies for preparing for potential breaches. </span></p>
<p><span style="font-weight:400;">This episode is filled with valuable tips that could ensure the survival and success of your business amid today's escalating cyber threats.</span></p>
<p><span style="font-weight:400;">Key Moments; </span></p>
<p><span style="font-weight:400;">00:00 Cybersecurity challenges and solutions for small businesses.</span></p>
<p><span style="font-weight:400;">03:24 Startups are vulnerable due to inadequate cybersecurity measures.</span></p>
<p><span style="font-weight:400;">06:30 Use secure passwords, educate employees, and use tools.</span></p>
<p><span style="font-weight:400;">11:26 Segregate networks to protect sensitive data.</span></p>
<p><span style="font-weight:400;">14:46 Effective monitoring requires time, effort, and setup.</span></p>
<p><span style="font-weight:400;">16:10 DNS filtering blocks malicious sites, prevents attacks.</span></p>
<p><span style="font-weight:400;">20:29 Plan proactively to manage events before crises.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1882281/c1e-64mrqa28w4nh591rg-v6zj6z73sx67-onhdy4.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1882281&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=d50a0f28a967b6c6f5ee644c3bfb4d59817a88b946f136e391e51edb9db44a4a" length="25707734"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow addresses the pressing issue of cybersecurity for small and medium-sized businesses. With their limited budgets and resources, these enterprises are often prime cyberattack targets.
Aaron explains why these businesses are particularly vulnerable, the potentially devastating impacts of a cyber incident, and practical measures they can adopt to strengthen their cybersecurity without incurring significant costs.
Listeners will uncover insights on establishing basic cybersecurity policies, the critical importance of monitoring, and strategies for preparing for potential breaches. 
This episode is filled with valuable tips that could ensure the survival and success of your business amid today's escalating cyber threats.
Key Moments; 
00:00 Cybersecurity challenges and solutions for small businesses.
03:24 Startups are vulnerable due to inadequate cybersecurity measures.
06:30 Use secure passwords, educate employees, and use tools.
11:26 Segregate networks to protect sensitive data.
14:46 Effective monitoring requires time, effort, and setup.
16:10 DNS filtering blocks malicious sites, prevents attacks.
20:29 Plan proactively to manage events before crises.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1882281/c1a-w52rp-z39w39jmt2w7-3cv9mb.jpg"></itunes:image>
                                                                            <itunes:duration>00:25:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Navigating Cybersecurity Challenges: AI, Tabletop Exercises, and Operational Technology]]>
                </title>
                <pubDate>Mon, 04 Nov 2024 11:00:28 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1873692</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by Clint Bodungen, Director of Cybersecurity Innovation at Morgan Franklin Cyber and founder of Threatgen, alongside Michael Welch, Managing Director at Morgan Franklin Cyber. Together, they delve into the ever-evolving world of cybersecurity in honor of Cybersecurity Awareness Month.</span></p>
<p><span style="font-weight:400;">Aaron kicks things off by discussing the importance of iterative processes and tabletop exercises in enhancing decision-making and preparedness. The conversation then shifts to the exciting yet complex role of AI in cybersecurity, particularly in operational technology (OT) and critical infrastructure. The experts emphasize the potential of generative AI for data analysis while underscoring the need for human oversight to avoid biases and misinformation.</span></p>
<p><span style="font-weight:400;">Clint introduces an “engineering informed cyber” approach to better integrate OT and IT in managing cybersecurity risks, while Aaron stresses the importance of collaboration between cybersecurity professionals and engineers. The episode also tackles balancing convenience and security, the intricacies of password management, and the critical role of communication and trust.</span></p>
<p><span style="font-weight:400;">Listeners will gain valuable insights into AI’s role in enhancing security operations, the consequences of system failures, and the debate between compliance and true security. This episode offers expert opinions, real-world examples, and practical advice for navigating today’s cybersecurity challenges. Join us for a comprehensive discussion on protecting our digital world.</span></p>
<p> </p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p> </p>
<p><span style="font-weight:400;">04:20 Generative AI aids efficient GRC and cybersecurity management.</span></p>
<p><span style="font-weight:400;">08:40 AI lacks context for verifying asset information.</span></p>
<p><span style="font-weight:400;">11:38 Generative AI creating and automating malware tools.</span></p>
<p><span style="font-weight:400;">15:58 Building data centers using decommissioned power plants.</span></p>
<p><span style="font-weight:400;">17:14 Regulation growing in infrastructure for compliance security.</span></p>
<p><span style="font-weight:400;">22:09 Compliance is binary; partial compliance isn't sufficient.</span></p>
<p><span style="font-weight:400;">24:33 Prioritize "engineering informed cyber" for OT resilience.</span></p>
<p><span style="font-weight:400;">28:14 Collaboration between IT and OT is essential.</span></p>
<p><span style="font-weight:400;">33:54 Frustration with excessive video game security measures.</span></p>
<p><span style="font-weight:400;">34:49 Cybersecurity fails due to over-engineering complexity.</span></p>
<p><span style="font-weight:400;">40:49 Make security easy with password managers, authenticators.</span></p>
<p><span style="font-weight:400;">42:31 AI improves tabletop exercises for comprehensive insights.</span></p>
<p><span style="font-weight:400;">45:31 Generative AI augments human capabilities and creativity.</span></p>
<p><span style="font-weight:400;">48:08 Automated injects streamline engagement and business continuity.</span></p>
<p><span style="font-weight:400;">53:46 Executives misunderstand risk, leading to false security.</span></p>
<p><span style="font-weight:400;">54:29 Strong IT security, but vulnerable weak points.</span></p>
<p><span style="font-weight:400;">About the Guests : </span></p>
<p> </p>
<p><strong>Clint Bodungen: </strong></p>
<p> </p>
<p><span style="font-weight:400;">Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 30 years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two best-selling books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow is joined by Clint Bodungen, Director of Cybersecurity Innovation at Morgan Franklin Cyber and founder of Threatgen, alongside Michael Welch, Managing Director at Morgan Franklin Cyber. Together, they delve into the ever-evolving world of cybersecurity in honor of Cybersecurity Awareness Month.
Aaron kicks things off by discussing the importance of iterative processes and tabletop exercises in enhancing decision-making and preparedness. The conversation then shifts to the exciting yet complex role of AI in cybersecurity, particularly in operational technology (OT) and critical infrastructure. The experts emphasize the potential of generative AI for data analysis while underscoring the need for human oversight to avoid biases and misinformation.
Clint introduces an “engineering informed cyber” approach to better integrate OT and IT in managing cybersecurity risks, while Aaron stresses the importance of collaboration between cybersecurity professionals and engineers. The episode also tackles balancing convenience and security, the intricacies of password management, and the critical role of communication and trust.
Listeners will gain valuable insights into AI’s role in enhancing security operations, the consequences of system failures, and the debate between compliance and true security. This episode offers expert opinions, real-world examples, and practical advice for navigating today’s cybersecurity challenges. Join us for a comprehensive discussion on protecting our digital world.
 
Key Moments: 
 
04:20 Generative AI aids efficient GRC and cybersecurity management.
08:40 AI lacks context for verifying asset information.
11:38 Generative AI creating and automating malware tools.
15:58 Building data centers using decommissioned power plants.
17:14 Regulation growing in infrastructure for compliance security.
22:09 Compliance is binary; partial compliance isn't sufficient.
24:33 Prioritize "engineering informed cyber" for OT resilience.
28:14 Collaboration between IT and OT is essential.
33:54 Frustration with excessive video game security measures.
34:49 Cybersecurity fails due to over-engineering complexity.
40:49 Make security easy with password managers, authenticators.
42:31 AI improves tabletop exercises for comprehensive insights.
45:31 Generative AI augments human capabilities and creativity.
48:08 Automated injects streamline engagement and business continuity.
53:46 Executives misunderstand risk, leading to false security.
54:29 Strong IT security, but vulnerable weak points.
About the Guests : 
 
Clint Bodungen: 
 
Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 30 years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two best-selling books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Navigating Cybersecurity Challenges: AI, Tabletop Exercises, and Operational Technology]]>
                </itunes:title>
                                    <itunes:episode>30</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow is joined by Clint Bodungen, Director of Cybersecurity Innovation at Morgan Franklin Cyber and founder of Threatgen, alongside Michael Welch, Managing Director at Morgan Franklin Cyber. Together, they delve into the ever-evolving world of cybersecurity in honor of Cybersecurity Awareness Month.</span></p>
<p><span style="font-weight:400;">Aaron kicks things off by discussing the importance of iterative processes and tabletop exercises in enhancing decision-making and preparedness. The conversation then shifts to the exciting yet complex role of AI in cybersecurity, particularly in operational technology (OT) and critical infrastructure. The experts emphasize the potential of generative AI for data analysis while underscoring the need for human oversight to avoid biases and misinformation.</span></p>
<p><span style="font-weight:400;">Clint introduces an “engineering informed cyber” approach to better integrate OT and IT in managing cybersecurity risks, while Aaron stresses the importance of collaboration between cybersecurity professionals and engineers. The episode also tackles balancing convenience and security, the intricacies of password management, and the critical role of communication and trust.</span></p>
<p><span style="font-weight:400;">Listeners will gain valuable insights into AI’s role in enhancing security operations, the consequences of system failures, and the debate between compliance and true security. This episode offers expert opinions, real-world examples, and practical advice for navigating today’s cybersecurity challenges. Join us for a comprehensive discussion on protecting our digital world.</span></p>
<p> </p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p> </p>
<p><span style="font-weight:400;">04:20 Generative AI aids efficient GRC and cybersecurity management.</span></p>
<p><span style="font-weight:400;">08:40 AI lacks context for verifying asset information.</span></p>
<p><span style="font-weight:400;">11:38 Generative AI creating and automating malware tools.</span></p>
<p><span style="font-weight:400;">15:58 Building data centers using decommissioned power plants.</span></p>
<p><span style="font-weight:400;">17:14 Regulation growing in infrastructure for compliance security.</span></p>
<p><span style="font-weight:400;">22:09 Compliance is binary; partial compliance isn't sufficient.</span></p>
<p><span style="font-weight:400;">24:33 Prioritize "engineering informed cyber" for OT resilience.</span></p>
<p><span style="font-weight:400;">28:14 Collaboration between IT and OT is essential.</span></p>
<p><span style="font-weight:400;">33:54 Frustration with excessive video game security measures.</span></p>
<p><span style="font-weight:400;">34:49 Cybersecurity fails due to over-engineering complexity.</span></p>
<p><span style="font-weight:400;">40:49 Make security easy with password managers, authenticators.</span></p>
<p><span style="font-weight:400;">42:31 AI improves tabletop exercises for comprehensive insights.</span></p>
<p><span style="font-weight:400;">45:31 Generative AI augments human capabilities and creativity.</span></p>
<p><span style="font-weight:400;">48:08 Automated injects streamline engagement and business continuity.</span></p>
<p><span style="font-weight:400;">53:46 Executives misunderstand risk, leading to false security.</span></p>
<p><span style="font-weight:400;">54:29 Strong IT security, but vulnerable weak points.</span></p>
<p><span style="font-weight:400;">About the Guests : </span></p>
<p> </p>
<p><strong>Clint Bodungen: </strong></p>
<p> </p>
<p><span style="font-weight:400;">Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 30 years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two best-selling books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook. Clint is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, and Kaspersky Lab, and is currently the founder of ThreatGEN and Director of Cybersecurity Innovation at Morgan Franklin Consulting. Renowned for his creative approach to cybersecurity education and training, he has been at the forefront of integrating gamification and AI applications into cybersecurity training; he created ThreatGEN® Red vs. Blue, the world's first online multiplayer computer designed to teach real-world cybersecurity. His latest innovation is AutoTableTop, which uses the latest generative AI technology to automate, simplify, and revolutionize IR tabletop exercises. As AI technology continues evolving, so does his pursuit of helping revolutionize the cybersecurity industry using gamification generative AI. Connect Clint at - </span><a href="https://www.linkedin.com/in/clintb/"><span style="font-weight:400;">https://www.linkedin.com/in/clintb/</span></a></p>
<p> </p>
<p><span style="font-weight:400;">Michael Welch : </span></p>
<p> </p>
<p><span style="font-weight:400;">Michael Welch has over twenty-five years of expertise in Governance, Risk Management, Compliance and Cybersecurity.  In his role as Sector Lead, Michael  will focus on the importance of cybersecurity in Utilities and Industrial Manufacturing.  Michael understands that robust cybersecurity measures are not just a regulatory requirement but are pivotal in safeguarding the resilience of organizations, safety of its people, and overall economic stability.  Michael has worked for organizations such as NextEra and Duke Energy as well as engineering firm Burns &amp; McDonnell.  In addition, he was the Global CISO for the food manufacturing firm OSI Industries.Some of the certifications he has obtained through his career are Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Security Auditor (CISA), Global Industrial Cyber Security Professional (GICSP), Certified Data Privacy Solutions Engineer (CDPSE) and CMMC - Registered Practitioner Advanced (RPA).  Connect Michael Welch at : </span><a href="https://www.linkedin.com/in/michael-welch-93375a4/"><span style="font-weight:400;">https://www.linkedin.com/in/michael-welch-93375a4/</span></a></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1873692/c1e-d308xc684p4a3mkv3-wwmn5qg7c4k3-6dp5lz.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1873692&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=e84b7c3369d6d0d64bae48737a20b80c0fab795e44d587c1def0a4229020ebcd" length="57115251"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow is joined by Clint Bodungen, Director of Cybersecurity Innovation at Morgan Franklin Cyber and founder of Threatgen, alongside Michael Welch, Managing Director at Morgan Franklin Cyber. Together, they delve into the ever-evolving world of cybersecurity in honor of Cybersecurity Awareness Month.
Aaron kicks things off by discussing the importance of iterative processes and tabletop exercises in enhancing decision-making and preparedness. The conversation then shifts to the exciting yet complex role of AI in cybersecurity, particularly in operational technology (OT) and critical infrastructure. The experts emphasize the potential of generative AI for data analysis while underscoring the need for human oversight to avoid biases and misinformation.
Clint introduces an “engineering informed cyber” approach to better integrate OT and IT in managing cybersecurity risks, while Aaron stresses the importance of collaboration between cybersecurity professionals and engineers. The episode also tackles balancing convenience and security, the intricacies of password management, and the critical role of communication and trust.
Listeners will gain valuable insights into AI’s role in enhancing security operations, the consequences of system failures, and the debate between compliance and true security. This episode offers expert opinions, real-world examples, and practical advice for navigating today’s cybersecurity challenges. Join us for a comprehensive discussion on protecting our digital world.
 
Key Moments: 
 
04:20 Generative AI aids efficient GRC and cybersecurity management.
08:40 AI lacks context for verifying asset information.
11:38 Generative AI creating and automating malware tools.
15:58 Building data centers using decommissioned power plants.
17:14 Regulation growing in infrastructure for compliance security.
22:09 Compliance is binary; partial compliance isn't sufficient.
24:33 Prioritize "engineering informed cyber" for OT resilience.
28:14 Collaboration between IT and OT is essential.
33:54 Frustration with excessive video game security measures.
34:49 Cybersecurity fails due to over-engineering complexity.
40:49 Make security easy with password managers, authenticators.
42:31 AI improves tabletop exercises for comprehensive insights.
45:31 Generative AI augments human capabilities and creativity.
48:08 Automated injects streamline engagement and business continuity.
53:46 Executives misunderstand risk, leading to false security.
54:29 Strong IT security, but vulnerable weak points.
About the Guests : 
 
Clint Bodungen: 
 
Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 30 years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two best-selling books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1873692/c1a-w52rp-9j02p94jtwj5-uks586.jpg"></itunes:image>
                                                                            <itunes:duration>00:58:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Bridging IT and OT in Cybersecurity for Power Plants with Jori VanAntwerp]]>
                </title>
                <pubDate>Mon, 28 Oct 2024 10:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1868177</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In Episode 29, host Aaron Crow is joined by cybersecurity expert Jori VanAntwerp to delve into Power Grid Security and Redundancy.</span></p>
<p><span style="font-weight:400;">This episode explores the segmented design of the US power grid, addressing the challenges and necessary upgrades to mitigate cyber vulnerabilities. Jori highlights security monitoring gaps, the impact of hardware updates, and the cost implications of modernizing infrastructure. The discussion also emphasizes the importance of asset inventory and collaborative efforts between IT and OT professionals.</span></p>
<p><span style="font-weight:400;">Real-world incidents, such as unexplained power plant reboots, illustrate the critical role of operator awareness and system maintenance. The potential of AI in cybersecurity, alongside the need for a collaborative, learning-focused approach, is also discussed.</span></p>
<p><span style="font-weight:400;">Tune in to gain expert insights on balancing modernization, cost, and operational efficiency to ensure the stability and security of our power infrastructure. Join us for a packed episode to learn how to "Protect It All."</span></p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">05:30 Restoring power grids involves complex, staged processes.</span></p>
<p><span style="font-weight:400;">11:01 Centralizing data improves efficiency, introduces vulnerabilities.</span></p>
<p><span style="font-weight:400;">17:47 Network segmentation essential for security, mitigates risks.</span></p>
<p><span style="font-weight:400;">26:12 Cybersecurity tools revealed crucial system issues.</span></p>
<p><span style="font-weight:400;">32:15 Understanding systems fully prevents unintended negative impacts.</span></p>
<p><span style="font-weight:400;">36:31 Understand OT environment before implementing IT solutions.</span></p>
<p><span style="font-weight:400;">41:24 Equip must survive extreme heat, unlike typical data centers.</span></p>
<p><span style="font-weight:400;">54:28 Strict access control in nuclear power plant.</span></p>
<p><span style="font-weight:400;">57:48 Assess likely risks for protecting plant operations.</span></p>
<p><span style="font-weight:400;">01:00:59 Rushed training weakens foundational cybersecurity skills.</span></p>
<p> </p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">For nearly two decades, Jori has enabled industrial and IT organizations to be successful in reducing risk, increasing compliance, and their overall security efforts. Jori has the ability to quickly evaluate situations and determine innovative solutions and possible pitfalls due to his diverse background in security, technology, partnering and client-facing experience. Approaching situations with intuitive insight and methodology, leveraging his deep understanding of business and technology, ranging from silicon to the cloud. He had the pleasure of working with such great companies as Gravwell, Dragos, CrowdStrike, FireEye, McAfee, and is now Founder and Chief Executive Officer at EmberOT, a cybersecurity startup focused on making security a reality.</span></p>
<p><strong>How to connect Jori : </strong></p>
<p><span style="font-weight:400;">Website : </span><a href="https://emberot.com/"><span style="font-weight:400;">https://emberot.com/</span></a></p>
<p><span style="font-weight:400;">Linkedin : </span><a href="https://www.linkedin.com/in/jvanantwerp/"><span style="font-weight:400;">https://www.linkedin.com/in/jvanantwerp/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/a..."></a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In Episode 29, host Aaron Crow is joined by cybersecurity expert Jori VanAntwerp to delve into Power Grid Security and Redundancy.
This episode explores the segmented design of the US power grid, addressing the challenges and necessary upgrades to mitigate cyber vulnerabilities. Jori highlights security monitoring gaps, the impact of hardware updates, and the cost implications of modernizing infrastructure. The discussion also emphasizes the importance of asset inventory and collaborative efforts between IT and OT professionals.
Real-world incidents, such as unexplained power plant reboots, illustrate the critical role of operator awareness and system maintenance. The potential of AI in cybersecurity, alongside the need for a collaborative, learning-focused approach, is also discussed.
Tune in to gain expert insights on balancing modernization, cost, and operational efficiency to ensure the stability and security of our power infrastructure. Join us for a packed episode to learn how to "Protect It All."
Key Moments: 
 
05:30 Restoring power grids involves complex, staged processes.
11:01 Centralizing data improves efficiency, introduces vulnerabilities.
17:47 Network segmentation essential for security, mitigates risks.
26:12 Cybersecurity tools revealed crucial system issues.
32:15 Understanding systems fully prevents unintended negative impacts.
36:31 Understand OT environment before implementing IT solutions.
41:24 Equip must survive extreme heat, unlike typical data centers.
54:28 Strict access control in nuclear power plant.
57:48 Assess likely risks for protecting plant operations.
01:00:59 Rushed training weakens foundational cybersecurity skills.
 
About the guest : 
For nearly two decades, Jori has enabled industrial and IT organizations to be successful in reducing risk, increasing compliance, and their overall security efforts. Jori has the ability to quickly evaluate situations and determine innovative solutions and possible pitfalls due to his diverse background in security, technology, partnering and client-facing experience. Approaching situations with intuitive insight and methodology, leveraging his deep understanding of business and technology, ranging from silicon to the cloud. He had the pleasure of working with such great companies as Gravwell, Dragos, CrowdStrike, FireEye, McAfee, and is now Founder and Chief Executive Officer at EmberOT, a cybersecurity startup focused on making security a reality.
How to connect Jori : 
Website : https://emberot.com/
Linkedin : https://www.linkedin.com/in/jvanantwerp/
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn:]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Bridging IT and OT in Cybersecurity for Power Plants with Jori VanAntwerp]]>
                </itunes:title>
                                    <itunes:episode>29</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In Episode 29, host Aaron Crow is joined by cybersecurity expert Jori VanAntwerp to delve into Power Grid Security and Redundancy.</span></p>
<p><span style="font-weight:400;">This episode explores the segmented design of the US power grid, addressing the challenges and necessary upgrades to mitigate cyber vulnerabilities. Jori highlights security monitoring gaps, the impact of hardware updates, and the cost implications of modernizing infrastructure. The discussion also emphasizes the importance of asset inventory and collaborative efforts between IT and OT professionals.</span></p>
<p><span style="font-weight:400;">Real-world incidents, such as unexplained power plant reboots, illustrate the critical role of operator awareness and system maintenance. The potential of AI in cybersecurity, alongside the need for a collaborative, learning-focused approach, is also discussed.</span></p>
<p><span style="font-weight:400;">Tune in to gain expert insights on balancing modernization, cost, and operational efficiency to ensure the stability and security of our power infrastructure. Join us for a packed episode to learn how to "Protect It All."</span></p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">05:30 Restoring power grids involves complex, staged processes.</span></p>
<p><span style="font-weight:400;">11:01 Centralizing data improves efficiency, introduces vulnerabilities.</span></p>
<p><span style="font-weight:400;">17:47 Network segmentation essential for security, mitigates risks.</span></p>
<p><span style="font-weight:400;">26:12 Cybersecurity tools revealed crucial system issues.</span></p>
<p><span style="font-weight:400;">32:15 Understanding systems fully prevents unintended negative impacts.</span></p>
<p><span style="font-weight:400;">36:31 Understand OT environment before implementing IT solutions.</span></p>
<p><span style="font-weight:400;">41:24 Equip must survive extreme heat, unlike typical data centers.</span></p>
<p><span style="font-weight:400;">54:28 Strict access control in nuclear power plant.</span></p>
<p><span style="font-weight:400;">57:48 Assess likely risks for protecting plant operations.</span></p>
<p><span style="font-weight:400;">01:00:59 Rushed training weakens foundational cybersecurity skills.</span></p>
<p> </p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">For nearly two decades, Jori has enabled industrial and IT organizations to be successful in reducing risk, increasing compliance, and their overall security efforts. Jori has the ability to quickly evaluate situations and determine innovative solutions and possible pitfalls due to his diverse background in security, technology, partnering and client-facing experience. Approaching situations with intuitive insight and methodology, leveraging his deep understanding of business and technology, ranging from silicon to the cloud. He had the pleasure of working with such great companies as Gravwell, Dragos, CrowdStrike, FireEye, McAfee, and is now Founder and Chief Executive Officer at EmberOT, a cybersecurity startup focused on making security a reality.</span></p>
<p><strong>How to connect Jori : </strong></p>
<p><span style="font-weight:400;">Website : </span><a href="https://emberot.com/"><span style="font-weight:400;">https://emberot.com/</span></a></p>
<p><span style="font-weight:400;">Linkedin : </span><a href="https://www.linkedin.com/in/jvanantwerp/"><span style="font-weight:400;">https://www.linkedin.com/in/jvanantwerp/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1868177/c1e-jg87nuqr18pcp5k9r-7zkrvvmmh8p1-yhmuvt.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1868177&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=57bea61d204d7ed35dc69fa7455e18b6fad37260db186a0f2c9a8918d62c4e98" length="66923605"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In Episode 29, host Aaron Crow is joined by cybersecurity expert Jori VanAntwerp to delve into Power Grid Security and Redundancy.
This episode explores the segmented design of the US power grid, addressing the challenges and necessary upgrades to mitigate cyber vulnerabilities. Jori highlights security monitoring gaps, the impact of hardware updates, and the cost implications of modernizing infrastructure. The discussion also emphasizes the importance of asset inventory and collaborative efforts between IT and OT professionals.
Real-world incidents, such as unexplained power plant reboots, illustrate the critical role of operator awareness and system maintenance. The potential of AI in cybersecurity, alongside the need for a collaborative, learning-focused approach, is also discussed.
Tune in to gain expert insights on balancing modernization, cost, and operational efficiency to ensure the stability and security of our power infrastructure. Join us for a packed episode to learn how to "Protect It All."
Key Moments: 
 
05:30 Restoring power grids involves complex, staged processes.
11:01 Centralizing data improves efficiency, introduces vulnerabilities.
17:47 Network segmentation essential for security, mitigates risks.
26:12 Cybersecurity tools revealed crucial system issues.
32:15 Understanding systems fully prevents unintended negative impacts.
36:31 Understand OT environment before implementing IT solutions.
41:24 Equip must survive extreme heat, unlike typical data centers.
54:28 Strict access control in nuclear power plant.
57:48 Assess likely risks for protecting plant operations.
01:00:59 Rushed training weakens foundational cybersecurity skills.
 
About the guest : 
For nearly two decades, Jori has enabled industrial and IT organizations to be successful in reducing risk, increasing compliance, and their overall security efforts. Jori has the ability to quickly evaluate situations and determine innovative solutions and possible pitfalls due to his diverse background in security, technology, partnering and client-facing experience. Approaching situations with intuitive insight and methodology, leveraging his deep understanding of business and technology, ranging from silicon to the cloud. He had the pleasure of working with such great companies as Gravwell, Dragos, CrowdStrike, FireEye, McAfee, and is now Founder and Chief Executive Officer at EmberOT, a cybersecurity startup focused on making security a reality.
How to connect Jori : 
Website : https://emberot.com/
Linkedin : https://www.linkedin.com/in/jvanantwerp/
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn:]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1868177/c1a-w52rp-wwm799j5sz8k-3ua8hv.jpg"></itunes:image>
                                                                            <itunes:duration>01:09:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Elevating Cybersecurity: Importance of Relationships, Mentorship, and Honest Feedback with Ken Foster]]>
                </title>
                <pubDate>Mon, 21 Oct 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1861782</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">This episode delves into the world of cybersecurity with the esteemed guest, Ken Foster. With over 30 years of experience and a career that began in the Navy, Ken has comprehensive expertise in managing firewalls and antivirus systems and addressing today’s complex cybersecurity challenges.</span></p>
<p><span style="font-weight:400;">This episode, hosted by Aaron Crow, explores the evolving cybersecurity industry, emphasizing the crucial roles of mentorship and networking. Ken and Aaron discuss the strategic importance of aligning security with business goals, the impact of leadership training and honest feedback on developing better leaders, and the necessity of balancing technical skills with effective communication.</span></p>
<p><span style="font-weight:400;">Ken shares his insights on the dangers of over-relying on AI, the essential need for disaster preparedness and business continuity, and the importance of continuously evaluating business investments to avoid unnecessary expenses. The episode highlights the value of informal networks and mentorship in overcoming industry challenges and fostering personal growth.</span></p>
<p><span style="font-weight:400;">Listeners will gain practical strategies and invaluable lessons to navigate the ever-changing cybersecurity landscape while ensuring their personal and professional development.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">06:59 Translate tech leadership into business risk communication.</span></p>
<p><span style="font-weight:400;">11:51 Integrating expertise, technical skills, and communication effectively.</span></p>
<p><span style="font-weight:400;">18:13 No disaster recovery plan; business disrupted by flood.</span></p>
<p><span style="font-weight:400;">25:36 Building relationships and listening are crucial successes.</span></p>
<p><span style="font-weight:400;">31:39 Simplify explanations for effective cross-team communication.</span></p>
<p><span style="font-weight:400;">33:53 Realized technical focus limited career growth.</span></p>
<p><span style="font-weight:400;">42:12 Networking is crucial for finding senior roles.</span></p>
<p><span style="font-weight:400;">44:06 Produced content led to advisory board roles.</span></p>
<p><span style="font-weight:400;">50:06 Who supports post-handover? Security can't do it alone.</span></p>
<p><span style="font-weight:400;">57:44 Translate work into clear business value requirements.</span></p>
<p><span style="font-weight:400;">01:04:11 Ensure clarity and continuity for cybersecurity's future.</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Ken Foster is a cybersecurity leader with over 25 years of experience in risk management, global team development, and IT infrastructure. As Head of Global Architecture at Adient, Ken oversees global teams to align technical initiatives with business goals, driving innovation while managing risks. His career includes key roles at Fleetcor and Fiserv, where he built large-scale cybersecurity programs and led risk governance and cloud security efforts. With a strong focus on client trust and board-level advisory, Ken brings deep expertise in navigating regulatory landscapes and developing risk-based, business-aligned strategies.</span></p>
<p><strong>Connect Ken Foster :</strong> <a href="https://www.linkedin.com/in/kennethfoster/"><span style="font-weight:400;">https://www.linkedin.com/in/kennethfoster/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span></span></a></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[This episode delves into the world of cybersecurity with the esteemed guest, Ken Foster. With over 30 years of experience and a career that began in the Navy, Ken has comprehensive expertise in managing firewalls and antivirus systems and addressing today’s complex cybersecurity challenges.
This episode, hosted by Aaron Crow, explores the evolving cybersecurity industry, emphasizing the crucial roles of mentorship and networking. Ken and Aaron discuss the strategic importance of aligning security with business goals, the impact of leadership training and honest feedback on developing better leaders, and the necessity of balancing technical skills with effective communication.
Ken shares his insights on the dangers of over-relying on AI, the essential need for disaster preparedness and business continuity, and the importance of continuously evaluating business investments to avoid unnecessary expenses. The episode highlights the value of informal networks and mentorship in overcoming industry challenges and fostering personal growth.
Listeners will gain practical strategies and invaluable lessons to navigate the ever-changing cybersecurity landscape while ensuring their personal and professional development.
 
Key Moments: 
 
06:59 Translate tech leadership into business risk communication.
11:51 Integrating expertise, technical skills, and communication effectively.
18:13 No disaster recovery plan; business disrupted by flood.
25:36 Building relationships and listening are crucial successes.
31:39 Simplify explanations for effective cross-team communication.
33:53 Realized technical focus limited career growth.
42:12 Networking is crucial for finding senior roles.
44:06 Produced content led to advisory board roles.
50:06 Who supports post-handover? Security can't do it alone.
57:44 Translate work into clear business value requirements.
01:04:11 Ensure clarity and continuity for cybersecurity's future.
About the guest : 
Ken Foster is a cybersecurity leader with over 25 years of experience in risk management, global team development, and IT infrastructure. As Head of Global Architecture at Adient, Ken oversees global teams to align technical initiatives with business goals, driving innovation while managing risks. His career includes key roles at Fleetcor and Fiserv, where he built large-scale cybersecurity programs and led risk governance and cloud security efforts. With a strong focus on client trust and board-level advisory, Ken brings deep expertise in navigating regulatory landscapes and developing risk-based, business-aligned strategies.
Connect Ken Foster : https://www.linkedin.com/in/kennethfoster/
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn:]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Elevating Cybersecurity: Importance of Relationships, Mentorship, and Honest Feedback with Ken Foster]]>
                </itunes:title>
                                    <itunes:episode>28</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">This episode delves into the world of cybersecurity with the esteemed guest, Ken Foster. With over 30 years of experience and a career that began in the Navy, Ken has comprehensive expertise in managing firewalls and antivirus systems and addressing today’s complex cybersecurity challenges.</span></p>
<p><span style="font-weight:400;">This episode, hosted by Aaron Crow, explores the evolving cybersecurity industry, emphasizing the crucial roles of mentorship and networking. Ken and Aaron discuss the strategic importance of aligning security with business goals, the impact of leadership training and honest feedback on developing better leaders, and the necessity of balancing technical skills with effective communication.</span></p>
<p><span style="font-weight:400;">Ken shares his insights on the dangers of over-relying on AI, the essential need for disaster preparedness and business continuity, and the importance of continuously evaluating business investments to avoid unnecessary expenses. The episode highlights the value of informal networks and mentorship in overcoming industry challenges and fostering personal growth.</span></p>
<p><span style="font-weight:400;">Listeners will gain practical strategies and invaluable lessons to navigate the ever-changing cybersecurity landscape while ensuring their personal and professional development.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">06:59 Translate tech leadership into business risk communication.</span></p>
<p><span style="font-weight:400;">11:51 Integrating expertise, technical skills, and communication effectively.</span></p>
<p><span style="font-weight:400;">18:13 No disaster recovery plan; business disrupted by flood.</span></p>
<p><span style="font-weight:400;">25:36 Building relationships and listening are crucial successes.</span></p>
<p><span style="font-weight:400;">31:39 Simplify explanations for effective cross-team communication.</span></p>
<p><span style="font-weight:400;">33:53 Realized technical focus limited career growth.</span></p>
<p><span style="font-weight:400;">42:12 Networking is crucial for finding senior roles.</span></p>
<p><span style="font-weight:400;">44:06 Produced content led to advisory board roles.</span></p>
<p><span style="font-weight:400;">50:06 Who supports post-handover? Security can't do it alone.</span></p>
<p><span style="font-weight:400;">57:44 Translate work into clear business value requirements.</span></p>
<p><span style="font-weight:400;">01:04:11 Ensure clarity and continuity for cybersecurity's future.</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Ken Foster is a cybersecurity leader with over 25 years of experience in risk management, global team development, and IT infrastructure. As Head of Global Architecture at Adient, Ken oversees global teams to align technical initiatives with business goals, driving innovation while managing risks. His career includes key roles at Fleetcor and Fiserv, where he built large-scale cybersecurity programs and led risk governance and cloud security efforts. With a strong focus on client trust and board-level advisory, Ken brings deep expertise in navigating regulatory landscapes and developing risk-based, business-aligned strategies.</span></p>
<p><strong>Connect Ken Foster :</strong> <a href="https://www.linkedin.com/in/kennethfoster/"><span style="font-weight:400;">https://www.linkedin.com/in/kennethfoster/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<p> </p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at</em></strong> <a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1861782/c1e-7wg0xh4kn99hq3pmm-6zw3j8jmh9v2-32rt6o.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1861782&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=0ef8e0c1b17a7391a116b06da19a3badc4ac99bd2b9589c8c1aeeba815031eb7" length="65420177"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[This episode delves into the world of cybersecurity with the esteemed guest, Ken Foster. With over 30 years of experience and a career that began in the Navy, Ken has comprehensive expertise in managing firewalls and antivirus systems and addressing today’s complex cybersecurity challenges.
This episode, hosted by Aaron Crow, explores the evolving cybersecurity industry, emphasizing the crucial roles of mentorship and networking. Ken and Aaron discuss the strategic importance of aligning security with business goals, the impact of leadership training and honest feedback on developing better leaders, and the necessity of balancing technical skills with effective communication.
Ken shares his insights on the dangers of over-relying on AI, the essential need for disaster preparedness and business continuity, and the importance of continuously evaluating business investments to avoid unnecessary expenses. The episode highlights the value of informal networks and mentorship in overcoming industry challenges and fostering personal growth.
Listeners will gain practical strategies and invaluable lessons to navigate the ever-changing cybersecurity landscape while ensuring their personal and professional development.
 
Key Moments: 
 
06:59 Translate tech leadership into business risk communication.
11:51 Integrating expertise, technical skills, and communication effectively.
18:13 No disaster recovery plan; business disrupted by flood.
25:36 Building relationships and listening are crucial successes.
31:39 Simplify explanations for effective cross-team communication.
33:53 Realized technical focus limited career growth.
42:12 Networking is crucial for finding senior roles.
44:06 Produced content led to advisory board roles.
50:06 Who supports post-handover? Security can't do it alone.
57:44 Translate work into clear business value requirements.
01:04:11 Ensure clarity and continuity for cybersecurity's future.
About the guest : 
Ken Foster is a cybersecurity leader with over 25 years of experience in risk management, global team development, and IT infrastructure. As Head of Global Architecture at Adient, Ken oversees global teams to align technical initiatives with business goals, driving innovation while managing risks. His career includes key roles at Fleetcor and Fiserv, where he built large-scale cybersecurity programs and led risk governance and cloud security efforts. With a strong focus on client trust and board-level advisory, Ken brings deep expertise in navigating regulatory landscapes and developing risk-based, business-aligned strategies.
Connect Ken Foster : https://www.linkedin.com/in/kennethfoster/
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn:]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1861782/c1a-w52rp-6zw3j8j2b1k5-2bygcq.jpg"></itunes:image>
                                                                            <itunes:duration>01:10:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Practical Cyber Hygiene Tips for Families and Individuals During Cybersecurity Awareness Month]]>
                </title>
                <pubDate>Mon, 14 Oct 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1857453</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow takes a deep dive into the essential aspects of cyber hygiene. </span></p>
<p><span style="font-weight:400;">As part of the Cybersecurity Awareness Month spotlight, Aaron discusses actionable steps to enhance your digital safety, whether at home or work. This episode covers everything from the significance of strong, unique passwords and multifactor authentication to keeping your software updated and recognizing phishing attacks. </span></p>
<p><span style="font-weight:400;">Aaron also provides expert advice on securing home networks and introduces useful tools like password managers and antivirus software. Designed for both cybersecurity novices and seasoned professionals, this episode is a must-listen for anyone looking to improve their cyber hygiene. </span></p>
<p><span style="font-weight:400;">Tune in to arm yourself and your family with the knowledge needed to stay safe in the digital age.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">06:06 Secure email with strong, unique password, multifactor authentication.</span></p>
<p><span style="font-weight:400;">07:10 Multifactor: Password plus physical authentication like YubiKey.</span></p>
<p><span style="font-weight:400;">10:42 Always update devices, avoid phishing attacks.</span></p>
<p><span style="font-weight:400;">16:14 Use VPNs and password managers for Wi-Fi security.</span></p>
<p><span style="font-weight:400;">19:00 Securely share credentials without sending clear text.</span></p>
<p><span style="font-weight:400;">20:56 Regularly backup devices to prevent data loss.</span></p>
<p><span style="font-weight:400;">25:18 Practice cyber hygiene and educate your family.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow takes a deep dive into the essential aspects of cyber hygiene. 
As part of the Cybersecurity Awareness Month spotlight, Aaron discusses actionable steps to enhance your digital safety, whether at home or work. This episode covers everything from the significance of strong, unique passwords and multifactor authentication to keeping your software updated and recognizing phishing attacks. 
Aaron also provides expert advice on securing home networks and introduces useful tools like password managers and antivirus software. Designed for both cybersecurity novices and seasoned professionals, this episode is a must-listen for anyone looking to improve their cyber hygiene. 
Tune in to arm yourself and your family with the knowledge needed to stay safe in the digital age.
 
Key Moments: 
06:06 Secure email with strong, unique password, multifactor authentication.
07:10 Multifactor: Password plus physical authentication like YubiKey.
10:42 Always update devices, avoid phishing attacks.
16:14 Use VPNs and password managers for Wi-Fi security.
19:00 Securely share credentials without sending clear text.
20:56 Regularly backup devices to prevent data loss.
25:18 Practice cyber hygiene and educate your family.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Practical Cyber Hygiene Tips for Families and Individuals During Cybersecurity Awareness Month]]>
                </itunes:title>
                                    <itunes:episode>27</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow takes a deep dive into the essential aspects of cyber hygiene. </span></p>
<p><span style="font-weight:400;">As part of the Cybersecurity Awareness Month spotlight, Aaron discusses actionable steps to enhance your digital safety, whether at home or work. This episode covers everything from the significance of strong, unique passwords and multifactor authentication to keeping your software updated and recognizing phishing attacks. </span></p>
<p><span style="font-weight:400;">Aaron also provides expert advice on securing home networks and introduces useful tools like password managers and antivirus software. Designed for both cybersecurity novices and seasoned professionals, this episode is a must-listen for anyone looking to improve their cyber hygiene. </span></p>
<p><span style="font-weight:400;">Tune in to arm yourself and your family with the knowledge needed to stay safe in the digital age.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">06:06 Secure email with strong, unique password, multifactor authentication.</span></p>
<p><span style="font-weight:400;">07:10 Multifactor: Password plus physical authentication like YubiKey.</span></p>
<p><span style="font-weight:400;">10:42 Always update devices, avoid phishing attacks.</span></p>
<p><span style="font-weight:400;">16:14 Use VPNs and password managers for Wi-Fi security.</span></p>
<p><span style="font-weight:400;">19:00 Securely share credentials without sending clear text.</span></p>
<p><span style="font-weight:400;">20:56 Regularly backup devices to prevent data loss.</span></p>
<p><span style="font-weight:400;">25:18 Practice cyber hygiene and educate your family.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1857453/c1e-3qromi58nmvhmp45v-dm54wkx9s54-q6kkcr.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1857453&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=9053b2cb0616e3223d3ff1530956a5663d3522062a02302c49206e41c8859f1d" length="28157390"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow takes a deep dive into the essential aspects of cyber hygiene. 
As part of the Cybersecurity Awareness Month spotlight, Aaron discusses actionable steps to enhance your digital safety, whether at home or work. This episode covers everything from the significance of strong, unique passwords and multifactor authentication to keeping your software updated and recognizing phishing attacks. 
Aaron also provides expert advice on securing home networks and introduces useful tools like password managers and antivirus software. Designed for both cybersecurity novices and seasoned professionals, this episode is a must-listen for anyone looking to improve their cyber hygiene. 
Tune in to arm yourself and your family with the knowledge needed to stay safe in the digital age.
 
Key Moments: 
06:06 Secure email with strong, unique password, multifactor authentication.
07:10 Multifactor: Password plus physical authentication like YubiKey.
10:42 Always update devices, avoid phishing attacks.
16:14 Use VPNs and password managers for Wi-Fi security.
19:00 Securely share credentials without sending clear text.
20:56 Regularly backup devices to prevent data loss.
25:18 Practice cyber hygiene and educate your family.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1857453/c1a-w52rp-mk1xm8wdin-w2ytyf.jpg"></itunes:image>
                                                                            <itunes:duration>00:27:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Building Resilient Tech Environments: Lessons from Dennis Maldonado]]>
                </title>
                <pubDate>Mon, 07 Oct 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1852684</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, Aaron Crow engages in an insightful conversation with Dennis Maldonado, Director of Technology for Harris, </span><span style="font-weight:400;">Fort Bend ESD 100</span><span style="font-weight:400;">. The discussion emphasizes the importance of resiliency in technology environments and how strategic planning can safeguard against unforeseen disasters without necessitating a complete technological overhaul.</span></p>
<p><span style="font-weight:400;">From his extensive experience, Dennis shares how effective communication and collaboration were critical during events like Hurricane Harvey. He also provides his perspective on future trends and concerns in cybersecurity, including the rise of ransomware and nation-state attacks targeting critical infrastructure.</span></p>
<p><span style="font-weight:400;">The episode illuminates the significance of networking, with Aaron and Dennis underscoring its value in career advancement and sharing personal stories to illustrate how being well-known and trusted can open doors to unexpected opportunities. </span></p>
<p><span style="font-weight:400;">Additionally, Dennis discusses the zero trust model and the intricate balance between maintaining cybersecurity and ensuring system availability in critical infrastructure.Listeners will gain practical insights into building resilient tech environments through real-world examples and expert advice. </span></p>
<p><span style="font-weight:400;">The episode is a treasure trove of learnings on keeping organizations secure, responsive, and prepared for any eventuality. Join as "Protect It All" dives deep into building resilient tech environments with Dennis Maldonado's invaluable lessons.</span></p>
<p> </p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">09:15 Networking is crucial for success in cybersecurity.</span></p>
<p><span style="font-weight:400;">13:46 Volunteer firefighter boosted dispatch center through IT.</span></p>
<p><span style="font-weight:400;">18:52 Transfers emergency calls to fire and EMS.</span></p>
<p><span style="font-weight:400;">22:06 Quick response with information saves lives effectively.</span></p>
<p><span style="font-weight:400;">26:22 Implemented lessons for resilient project development.</span></p>
<p><span style="font-weight:400;">42:14 Sharing lessons learned from threat modeling experiences.</span></p>
<p><span style="font-weight:400;">48:04 Zero trust model effectively mitigates cybersecurity incidents.</span></p>
<p><span style="font-weight:400;">57:32 Public safety adapts by reverting to manual methods.</span></p>
<p><span style="font-weight:400;">01:02:51 Cybersecurity's mainstream rise sparks widespread interest.</span></p>
<p> </p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Dennis serves as Director of Technology for Harris Fort Bend ESD 100 (WESTCOM) managing and maintaining the technology needs of 911 call taking and emergency dispatch services for multiple public safety agencies.</span></p>
<p><span style="font-weight:400;">With over 15 years of experience in information technology and over 12 years in cybersecurity enterprise environments and consulting, Dennis’s experience includes cyber resilience, network penetration testing, full-scope red team engagements, adversarial simulation, and physical security assessments.</span></p>
<p><span style="font-weight:400;">Dennis presented at multiple security industry conferences including DEF CON, InfoSec SouthWest, BSides conferences, Houston Security Conference, Houston OWASP, SANS HackFest, and several local meetups and organizations around the United States.</span></p>
<p><span style="font-weight:400;">As an active leader in the Houston cyber security community, Dennis is responsible for founding two cyber security meetups in the Houston area: Houston Locksport, founded in 2014 and Houston Area Hackers An...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Aaron Crow engages in an insightful conversation with Dennis Maldonado, Director of Technology for Harris, Fort Bend ESD 100. The discussion emphasizes the importance of resiliency in technology environments and how strategic planning can safeguard against unforeseen disasters without necessitating a complete technological overhaul.
From his extensive experience, Dennis shares how effective communication and collaboration were critical during events like Hurricane Harvey. He also provides his perspective on future trends and concerns in cybersecurity, including the rise of ransomware and nation-state attacks targeting critical infrastructure.
The episode illuminates the significance of networking, with Aaron and Dennis underscoring its value in career advancement and sharing personal stories to illustrate how being well-known and trusted can open doors to unexpected opportunities. 
Additionally, Dennis discusses the zero trust model and the intricate balance between maintaining cybersecurity and ensuring system availability in critical infrastructure.Listeners will gain practical insights into building resilient tech environments through real-world examples and expert advice. 
The episode is a treasure trove of learnings on keeping organizations secure, responsive, and prepared for any eventuality. Join as "Protect It All" dives deep into building resilient tech environments with Dennis Maldonado's invaluable lessons.
 
Key Moments: 
09:15 Networking is crucial for success in cybersecurity.
13:46 Volunteer firefighter boosted dispatch center through IT.
18:52 Transfers emergency calls to fire and EMS.
22:06 Quick response with information saves lives effectively.
26:22 Implemented lessons for resilient project development.
42:14 Sharing lessons learned from threat modeling experiences.
48:04 Zero trust model effectively mitigates cybersecurity incidents.
57:32 Public safety adapts by reverting to manual methods.
01:02:51 Cybersecurity's mainstream rise sparks widespread interest.
 
About the guest : 
Dennis serves as Director of Technology for Harris Fort Bend ESD 100 (WESTCOM) managing and maintaining the technology needs of 911 call taking and emergency dispatch services for multiple public safety agencies.
With over 15 years of experience in information technology and over 12 years in cybersecurity enterprise environments and consulting, Dennis’s experience includes cyber resilience, network penetration testing, full-scope red team engagements, adversarial simulation, and physical security assessments.
Dennis presented at multiple security industry conferences including DEF CON, InfoSec SouthWest, BSides conferences, Houston Security Conference, Houston OWASP, SANS HackFest, and several local meetups and organizations around the United States.
As an active leader in the Houston cyber security community, Dennis is responsible for founding two cyber security meetups in the Houston area: Houston Locksport, founded in 2014 and Houston Area Hackers An...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Building Resilient Tech Environments: Lessons from Dennis Maldonado]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, Aaron Crow engages in an insightful conversation with Dennis Maldonado, Director of Technology for Harris, </span><span style="font-weight:400;">Fort Bend ESD 100</span><span style="font-weight:400;">. The discussion emphasizes the importance of resiliency in technology environments and how strategic planning can safeguard against unforeseen disasters without necessitating a complete technological overhaul.</span></p>
<p><span style="font-weight:400;">From his extensive experience, Dennis shares how effective communication and collaboration were critical during events like Hurricane Harvey. He also provides his perspective on future trends and concerns in cybersecurity, including the rise of ransomware and nation-state attacks targeting critical infrastructure.</span></p>
<p><span style="font-weight:400;">The episode illuminates the significance of networking, with Aaron and Dennis underscoring its value in career advancement and sharing personal stories to illustrate how being well-known and trusted can open doors to unexpected opportunities. </span></p>
<p><span style="font-weight:400;">Additionally, Dennis discusses the zero trust model and the intricate balance between maintaining cybersecurity and ensuring system availability in critical infrastructure.Listeners will gain practical insights into building resilient tech environments through real-world examples and expert advice. </span></p>
<p><span style="font-weight:400;">The episode is a treasure trove of learnings on keeping organizations secure, responsive, and prepared for any eventuality. Join as "Protect It All" dives deep into building resilient tech environments with Dennis Maldonado's invaluable lessons.</span></p>
<p> </p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">09:15 Networking is crucial for success in cybersecurity.</span></p>
<p><span style="font-weight:400;">13:46 Volunteer firefighter boosted dispatch center through IT.</span></p>
<p><span style="font-weight:400;">18:52 Transfers emergency calls to fire and EMS.</span></p>
<p><span style="font-weight:400;">22:06 Quick response with information saves lives effectively.</span></p>
<p><span style="font-weight:400;">26:22 Implemented lessons for resilient project development.</span></p>
<p><span style="font-weight:400;">42:14 Sharing lessons learned from threat modeling experiences.</span></p>
<p><span style="font-weight:400;">48:04 Zero trust model effectively mitigates cybersecurity incidents.</span></p>
<p><span style="font-weight:400;">57:32 Public safety adapts by reverting to manual methods.</span></p>
<p><span style="font-weight:400;">01:02:51 Cybersecurity's mainstream rise sparks widespread interest.</span></p>
<p> </p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Dennis serves as Director of Technology for Harris Fort Bend ESD 100 (WESTCOM) managing and maintaining the technology needs of 911 call taking and emergency dispatch services for multiple public safety agencies.</span></p>
<p><span style="font-weight:400;">With over 15 years of experience in information technology and over 12 years in cybersecurity enterprise environments and consulting, Dennis’s experience includes cyber resilience, network penetration testing, full-scope red team engagements, adversarial simulation, and physical security assessments.</span></p>
<p><span style="font-weight:400;">Dennis presented at multiple security industry conferences including DEF CON, InfoSec SouthWest, BSides conferences, Houston Security Conference, Houston OWASP, SANS HackFest, and several local meetups and organizations around the United States.</span></p>
<p><span style="font-weight:400;">As an active leader in the Houston cyber security community, Dennis is responsible for founding two cyber security meetups in the Houston area: Houston Locksport, founded in 2014 and Houston Area Hackers Anonymous (HAHA), founded in 2016.</span></p>
<p><strong>How to connect Dennis: </strong></p>
<p><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/dennismald/"><span style="font-weight:400;">https://www.linkedin.com/in/dennismald/</span></a></p>
<p><span style="font-weight:400;">Twitter/X: </span><a href="https://twitter.com/dennismald"><span style="font-weight:400;">https://twitter.com/dennismald</span></a></p>
<p><span style="font-weight:400;">Houston Area Hackers Anonymous (HAHA): </span><a href="https://www.meetup.com/houston-area-hackers-association/"><span style="font-weight:400;">https://www.meetup.com/houston-area-hackers-association/=</span></a><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1852684/c1e-w52rpbr1jx9ajzow5-6zwwq05wbpk-qctalu.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1852684&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=3712ffa08559cf2326ff85df92c6cf68712e5a8b71ed22014984988b603bba15" length="68237743"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Aaron Crow engages in an insightful conversation with Dennis Maldonado, Director of Technology for Harris, Fort Bend ESD 100. The discussion emphasizes the importance of resiliency in technology environments and how strategic planning can safeguard against unforeseen disasters without necessitating a complete technological overhaul.
From his extensive experience, Dennis shares how effective communication and collaboration were critical during events like Hurricane Harvey. He also provides his perspective on future trends and concerns in cybersecurity, including the rise of ransomware and nation-state attacks targeting critical infrastructure.
The episode illuminates the significance of networking, with Aaron and Dennis underscoring its value in career advancement and sharing personal stories to illustrate how being well-known and trusted can open doors to unexpected opportunities. 
Additionally, Dennis discusses the zero trust model and the intricate balance between maintaining cybersecurity and ensuring system availability in critical infrastructure.Listeners will gain practical insights into building resilient tech environments through real-world examples and expert advice. 
The episode is a treasure trove of learnings on keeping organizations secure, responsive, and prepared for any eventuality. Join as "Protect It All" dives deep into building resilient tech environments with Dennis Maldonado's invaluable lessons.
 
Key Moments: 
09:15 Networking is crucial for success in cybersecurity.
13:46 Volunteer firefighter boosted dispatch center through IT.
18:52 Transfers emergency calls to fire and EMS.
22:06 Quick response with information saves lives effectively.
26:22 Implemented lessons for resilient project development.
42:14 Sharing lessons learned from threat modeling experiences.
48:04 Zero trust model effectively mitigates cybersecurity incidents.
57:32 Public safety adapts by reverting to manual methods.
01:02:51 Cybersecurity's mainstream rise sparks widespread interest.
 
About the guest : 
Dennis serves as Director of Technology for Harris Fort Bend ESD 100 (WESTCOM) managing and maintaining the technology needs of 911 call taking and emergency dispatch services for multiple public safety agencies.
With over 15 years of experience in information technology and over 12 years in cybersecurity enterprise environments and consulting, Dennis’s experience includes cyber resilience, network penetration testing, full-scope red team engagements, adversarial simulation, and physical security assessments.
Dennis presented at multiple security industry conferences including DEF CON, InfoSec SouthWest, BSides conferences, Houston Security Conference, Houston OWASP, SANS HackFest, and several local meetups and organizations around the United States.
As an active leader in the Houston cyber security community, Dennis is responsible for founding two cyber security meetups in the Houston area: Houston Locksport, founded in 2014 and Houston Area Hackers An...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1852684/c1a-w52rp-qd44vxzwinkx-rfw48a.jpg"></itunes:image>
                                                                            <itunes:duration>01:09:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Funding OT Cybersecurity: Priority Setting and Practical Approaches]]>
                </title>
                <pubDate>Mon, 23 Sep 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1840281</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Welcome to Episode 25 of the Protect It All podcast, titled "Funding OT Cybersecurity: Priority Setting and Practical Approaches." In this episode, host Aaron Crow tackles the pressing issue of securing Operational Technology (OT) systems in critical sectors like energy, manufacturing, and transportation. Although often overshadowed by IT security, the increasing number of OT system attacks makes it clear that underfunding is no longer an option.</span></p>
<p><span style="font-weight:400;">Aaron explores the unique challenges of OT cybersecurity, such as legacy thinking and budget constraints. He offers strategies to align cybersecurity with business goals, prioritize investments effectively, and implement risk-based funding approaches. The episode emphasizes the importance of understanding asset inventories and making incremental improvements to strengthen security.</span></p>
<p><span style="font-weight:400;">Listeners will also learn how to bridge the communication gap between OT teams and business executives and translate technical risks into business impacts. With real-world examples and actionable insights, this episode is essential for anyone tasked with protecting OT environments.</span></p>
<p><span style="font-weight:400;">Tune in to gain valuable knowledge and start effectively prioritizing and funding your OT cybersecurity initiatives.</span></p>
<p><br /><br /><br /></p>
<p><strong>Key Moments : </strong></p>
<p> </p>
<p><span style="font-weight:400;">00:10 Cybersecurity requires comprehensive, risk-aware approach beyond basic safety.</span></p>
<p><span style="font-weight:400;">05:18 Understanding OT risks is crucial for prioritization.</span></p>
<p><span style="font-weight:400;">09:11 We do business at the speed of trust.</span></p>
<p><span style="font-weight:400;">12:13 Communicate cybersecurity's financial impact to business leaders.</span></p>
<p><span style="font-weight:400;">13:58 Cost-benefit analysis of asset inventory in OT.</span></p>
<p><span style="font-weight:400;">18:15 Establish security basics before advanced AI implementation.</span></p>
<p><span style="font-weight:400;">23:21 Easier board conversations amid constant news events.</span></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mai..."></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Welcome to Episode 25 of the Protect It All podcast, titled "Funding OT Cybersecurity: Priority Setting and Practical Approaches." In this episode, host Aaron Crow tackles the pressing issue of securing Operational Technology (OT) systems in critical sectors like energy, manufacturing, and transportation. Although often overshadowed by IT security, the increasing number of OT system attacks makes it clear that underfunding is no longer an option.
Aaron explores the unique challenges of OT cybersecurity, such as legacy thinking and budget constraints. He offers strategies to align cybersecurity with business goals, prioritize investments effectively, and implement risk-based funding approaches. The episode emphasizes the importance of understanding asset inventories and making incremental improvements to strengthen security.
Listeners will also learn how to bridge the communication gap between OT teams and business executives and translate technical risks into business impacts. With real-world examples and actionable insights, this episode is essential for anyone tasked with protecting OT environments.
Tune in to gain valuable knowledge and start effectively prioritizing and funding your OT cybersecurity initiatives.

Key Moments : 
 
00:10 Cybersecurity requires comprehensive, risk-aware approach beyond basic safety.
05:18 Understanding OT risks is crucial for prioritization.
09:11 We do business at the speed of trust.
12:13 Communicate cybersecurity's financial impact to business leaders.
13:58 Cost-benefit analysis of asset inventory in OT.
18:15 Establish security basics before advanced AI implementation.
23:21 Easier board conversations amid constant news events.

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Funding OT Cybersecurity: Priority Setting and Practical Approaches]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Welcome to Episode 25 of the Protect It All podcast, titled "Funding OT Cybersecurity: Priority Setting and Practical Approaches." In this episode, host Aaron Crow tackles the pressing issue of securing Operational Technology (OT) systems in critical sectors like energy, manufacturing, and transportation. Although often overshadowed by IT security, the increasing number of OT system attacks makes it clear that underfunding is no longer an option.</span></p>
<p><span style="font-weight:400;">Aaron explores the unique challenges of OT cybersecurity, such as legacy thinking and budget constraints. He offers strategies to align cybersecurity with business goals, prioritize investments effectively, and implement risk-based funding approaches. The episode emphasizes the importance of understanding asset inventories and making incremental improvements to strengthen security.</span></p>
<p><span style="font-weight:400;">Listeners will also learn how to bridge the communication gap between OT teams and business executives and translate technical risks into business impacts. With real-world examples and actionable insights, this episode is essential for anyone tasked with protecting OT environments.</span></p>
<p><span style="font-weight:400;">Tune in to gain valuable knowledge and start effectively prioritizing and funding your OT cybersecurity initiatives.</span></p>
<p><br /><br /><br /></p>
<p><strong>Key Moments : </strong></p>
<p> </p>
<p><span style="font-weight:400;">00:10 Cybersecurity requires comprehensive, risk-aware approach beyond basic safety.</span></p>
<p><span style="font-weight:400;">05:18 Understanding OT risks is crucial for prioritization.</span></p>
<p><span style="font-weight:400;">09:11 We do business at the speed of trust.</span></p>
<p><span style="font-weight:400;">12:13 Communicate cybersecurity's financial impact to business leaders.</span></p>
<p><span style="font-weight:400;">13:58 Cost-benefit analysis of asset inventory in OT.</span></p>
<p><span style="font-weight:400;">18:15 Establish security basics before advanced AI implementation.</span></p>
<p><span style="font-weight:400;">23:21 Easier board conversations amid constant news events.</span></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1840281/c1e-z68mpsm1g0dtqzrx0-dm6qm6mvc1p0-ap61m1.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1840281&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=f8b29f1178bb3547ed602ddd084a443474fdb8acb246a4a4325bdb299780448b" length="25617510"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Welcome to Episode 25 of the Protect It All podcast, titled "Funding OT Cybersecurity: Priority Setting and Practical Approaches." In this episode, host Aaron Crow tackles the pressing issue of securing Operational Technology (OT) systems in critical sectors like energy, manufacturing, and transportation. Although often overshadowed by IT security, the increasing number of OT system attacks makes it clear that underfunding is no longer an option.
Aaron explores the unique challenges of OT cybersecurity, such as legacy thinking and budget constraints. He offers strategies to align cybersecurity with business goals, prioritize investments effectively, and implement risk-based funding approaches. The episode emphasizes the importance of understanding asset inventories and making incremental improvements to strengthen security.
Listeners will also learn how to bridge the communication gap between OT teams and business executives and translate technical risks into business impacts. With real-world examples and actionable insights, this episode is essential for anyone tasked with protecting OT environments.
Tune in to gain valuable knowledge and start effectively prioritizing and funding your OT cybersecurity initiatives.

Key Moments : 
 
00:10 Cybersecurity requires comprehensive, risk-aware approach beyond basic safety.
05:18 Understanding OT risks is crucial for prioritization.
09:11 We do business at the speed of trust.
12:13 Communicate cybersecurity's financial impact to business leaders.
13:58 Cost-benefit analysis of asset inventory in OT.
18:15 Establish security basics before advanced AI implementation.
23:21 Easier board conversations amid constant news events.

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1840281/c1a-w52rp-1p01p0pzuoor-8czjnp.jpg"></itunes:image>
                                                                            <itunes:duration>00:24:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Evolution of Maritime Safety: From Analog Beginnings to Digital Redundancies]]>
                </title>
                <pubDate>Mon, 16 Sep 2024 10:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1834734</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode of </span><em><span style="font-weight:400;">Protect It All</span></em><span style="font-weight:400;">, host Aaron Crow is joined by Christopher Stein from Royal Caribbean Group to delve into the fascinating evolution of maritime technology. This discussion explores the dramatic journey ships have taken from their analog origins to becoming digitally advanced behemoths of the seas, emphasizing the critical importance of safety and redundancy.</span></p>
<p><span style="font-weight:400;">Listeners will understand how automation has revolutionized ship operations, allowing for reduced crew workload and increased efficiency. The episode also highlights the intricate management behind running a fleet of 68 ships, each functioning as an autonomous mobile city with numerous interconnected systems.</span></p>
<p><span style="font-weight:400;">Christopher Stein provides an insider’s perspective on the maritime industry's latest cybersecurity challenges and compliance requirements. He discusses the careful processes of ensuring all onboard systems run smoothly and safely, from cybersecurity assessments to integrating digital sensors and control mechanisms.</span></p>
<p><span style="font-weight:400;">This episode offers a deep dive into the complexities of maritime operations, emphasizing the behind-the-scenes efforts that keep voyages safe and efficient. </span></p>
<p><span style="font-weight:400;">Through engaging storytelling and expert insights, </span><em><span style="font-weight:400;">Protect It All</span></em><span style="font-weight:400;"> takes listeners on a journey through the melding of technology and tradition in the maritime world. Tune in to discover how these advancements are shaping the future of safe sea travel!</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 OT systems require constant uptime; no outage windows.</span></p>
<p><span style="font-weight:400;">05:06 OT and IT convergence misunderstood; safety risk emphasized.</span></p>
<p><span style="font-weight:400;">08:18 Testing must ensure safety, operational integrity, and collaboration.</span></p>
<p><span style="font-weight:400;">10:25 Cybersecurity must integrate with overall system design.</span></p>
<p><span style="font-weight:400;">14:21 No pool, casino, water slides, roller coasters.</span></p>
<p><span style="font-weight:400;">17:29 Systems affect availability, reliability, safety, and billing.</span></p>
<p><span style="font-weight:400;">21:24 Managing vast logistics for seamless vacation experiences.</span></p>
<p><span style="font-weight:400;">25:14 Royal Caribbean's efficient logistics and management impress.</span></p>
<p><span style="font-weight:400;">27:28 Family surprised internet works during power outage.</span></p>
<p><span style="font-weight:400;">33:26 Apollo 13 movie: interconnected digital procedures, limited power.</span></p>
<p><span style="font-weight:400;">36:20 All systems have manual control for safety.</span></p>
<p><span style="font-weight:400;">37:55 Operator rounds involved manual inspection of equipment.</span></p>
<p><span style="font-weight:400;">41:27 Early immigrants faced harsh, uncertain voyages to America.</span></p>
<p><span style="font-weight:400;">45:32 Technology makes formerly unattainable achievements accessible today.</span></p>
<p><span style="font-weight:400;">49:08 Internet outage impacts due to maritime dependency.</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Christopher Stein is a proficient maritime systems specialist who ensures the operational safety of onboard systems. Recognizing the potential dangers of propulsion loss, Christopher meticulously coordinates maintenance tasks while vessels are docked. He emphasizes precise timing and a clear understanding of assessment objectives to execute system tests and shutdowns safely. His expertise ensures voyages proceed without inci...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of Protect It All, host Aaron Crow is joined by Christopher Stein from Royal Caribbean Group to delve into the fascinating evolution of maritime technology. This discussion explores the dramatic journey ships have taken from their analog origins to becoming digitally advanced behemoths of the seas, emphasizing the critical importance of safety and redundancy.
Listeners will understand how automation has revolutionized ship operations, allowing for reduced crew workload and increased efficiency. The episode also highlights the intricate management behind running a fleet of 68 ships, each functioning as an autonomous mobile city with numerous interconnected systems.
Christopher Stein provides an insider’s perspective on the maritime industry's latest cybersecurity challenges and compliance requirements. He discusses the careful processes of ensuring all onboard systems run smoothly and safely, from cybersecurity assessments to integrating digital sensors and control mechanisms.
This episode offers a deep dive into the complexities of maritime operations, emphasizing the behind-the-scenes efforts that keep voyages safe and efficient. 
Through engaging storytelling and expert insights, Protect It All takes listeners on a journey through the melding of technology and tradition in the maritime world. Tune in to discover how these advancements are shaping the future of safe sea travel!
Key Moments: 
00:10 OT systems require constant uptime; no outage windows.
05:06 OT and IT convergence misunderstood; safety risk emphasized.
08:18 Testing must ensure safety, operational integrity, and collaboration.
10:25 Cybersecurity must integrate with overall system design.
14:21 No pool, casino, water slides, roller coasters.
17:29 Systems affect availability, reliability, safety, and billing.
21:24 Managing vast logistics for seamless vacation experiences.
25:14 Royal Caribbean's efficient logistics and management impress.
27:28 Family surprised internet works during power outage.
33:26 Apollo 13 movie: interconnected digital procedures, limited power.
36:20 All systems have manual control for safety.
37:55 Operator rounds involved manual inspection of equipment.
41:27 Early immigrants faced harsh, uncertain voyages to America.
45:32 Technology makes formerly unattainable achievements accessible today.
49:08 Internet outage impacts due to maritime dependency.
About the guest : 
Christopher Stein is a proficient maritime systems specialist who ensures the operational safety of onboard systems. Recognizing the potential dangers of propulsion loss, Christopher meticulously coordinates maintenance tasks while vessels are docked. He emphasizes precise timing and a clear understanding of assessment objectives to execute system tests and shutdowns safely. His expertise ensures voyages proceed without inci...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Evolution of Maritime Safety: From Analog Beginnings to Digital Redundancies]]>
                </itunes:title>
                                    <itunes:episode>24</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode of </span><em><span style="font-weight:400;">Protect It All</span></em><span style="font-weight:400;">, host Aaron Crow is joined by Christopher Stein from Royal Caribbean Group to delve into the fascinating evolution of maritime technology. This discussion explores the dramatic journey ships have taken from their analog origins to becoming digitally advanced behemoths of the seas, emphasizing the critical importance of safety and redundancy.</span></p>
<p><span style="font-weight:400;">Listeners will understand how automation has revolutionized ship operations, allowing for reduced crew workload and increased efficiency. The episode also highlights the intricate management behind running a fleet of 68 ships, each functioning as an autonomous mobile city with numerous interconnected systems.</span></p>
<p><span style="font-weight:400;">Christopher Stein provides an insider’s perspective on the maritime industry's latest cybersecurity challenges and compliance requirements. He discusses the careful processes of ensuring all onboard systems run smoothly and safely, from cybersecurity assessments to integrating digital sensors and control mechanisms.</span></p>
<p><span style="font-weight:400;">This episode offers a deep dive into the complexities of maritime operations, emphasizing the behind-the-scenes efforts that keep voyages safe and efficient. </span></p>
<p><span style="font-weight:400;">Through engaging storytelling and expert insights, </span><em><span style="font-weight:400;">Protect It All</span></em><span style="font-weight:400;"> takes listeners on a journey through the melding of technology and tradition in the maritime world. Tune in to discover how these advancements are shaping the future of safe sea travel!</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 OT systems require constant uptime; no outage windows.</span></p>
<p><span style="font-weight:400;">05:06 OT and IT convergence misunderstood; safety risk emphasized.</span></p>
<p><span style="font-weight:400;">08:18 Testing must ensure safety, operational integrity, and collaboration.</span></p>
<p><span style="font-weight:400;">10:25 Cybersecurity must integrate with overall system design.</span></p>
<p><span style="font-weight:400;">14:21 No pool, casino, water slides, roller coasters.</span></p>
<p><span style="font-weight:400;">17:29 Systems affect availability, reliability, safety, and billing.</span></p>
<p><span style="font-weight:400;">21:24 Managing vast logistics for seamless vacation experiences.</span></p>
<p><span style="font-weight:400;">25:14 Royal Caribbean's efficient logistics and management impress.</span></p>
<p><span style="font-weight:400;">27:28 Family surprised internet works during power outage.</span></p>
<p><span style="font-weight:400;">33:26 Apollo 13 movie: interconnected digital procedures, limited power.</span></p>
<p><span style="font-weight:400;">36:20 All systems have manual control for safety.</span></p>
<p><span style="font-weight:400;">37:55 Operator rounds involved manual inspection of equipment.</span></p>
<p><span style="font-weight:400;">41:27 Early immigrants faced harsh, uncertain voyages to America.</span></p>
<p><span style="font-weight:400;">45:32 Technology makes formerly unattainable achievements accessible today.</span></p>
<p><span style="font-weight:400;">49:08 Internet outage impacts due to maritime dependency.</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Christopher Stein is a proficient maritime systems specialist who ensures the operational safety of onboard systems. Recognizing the potential dangers of propulsion loss, Christopher meticulously coordinates maintenance tasks while vessels are docked. He emphasizes precise timing and a clear understanding of assessment objectives to execute system tests and shutdowns safely. His expertise ensures voyages proceed without incidents, reflecting his commitment to maritime safety and system reliability.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1834734/c1e-odx2juv5qj2ujrgqg-25d6m1z6c97g-papieq.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1834734&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=e816c67adfce49b4ca0b9234de7b74c5d018c4521d68f8ffa39974336779777b" length="60379057"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of Protect It All, host Aaron Crow is joined by Christopher Stein from Royal Caribbean Group to delve into the fascinating evolution of maritime technology. This discussion explores the dramatic journey ships have taken from their analog origins to becoming digitally advanced behemoths of the seas, emphasizing the critical importance of safety and redundancy.
Listeners will understand how automation has revolutionized ship operations, allowing for reduced crew workload and increased efficiency. The episode also highlights the intricate management behind running a fleet of 68 ships, each functioning as an autonomous mobile city with numerous interconnected systems.
Christopher Stein provides an insider’s perspective on the maritime industry's latest cybersecurity challenges and compliance requirements. He discusses the careful processes of ensuring all onboard systems run smoothly and safely, from cybersecurity assessments to integrating digital sensors and control mechanisms.
This episode offers a deep dive into the complexities of maritime operations, emphasizing the behind-the-scenes efforts that keep voyages safe and efficient. 
Through engaging storytelling and expert insights, Protect It All takes listeners on a journey through the melding of technology and tradition in the maritime world. Tune in to discover how these advancements are shaping the future of safe sea travel!
Key Moments: 
00:10 OT systems require constant uptime; no outage windows.
05:06 OT and IT convergence misunderstood; safety risk emphasized.
08:18 Testing must ensure safety, operational integrity, and collaboration.
10:25 Cybersecurity must integrate with overall system design.
14:21 No pool, casino, water slides, roller coasters.
17:29 Systems affect availability, reliability, safety, and billing.
21:24 Managing vast logistics for seamless vacation experiences.
25:14 Royal Caribbean's efficient logistics and management impress.
27:28 Family surprised internet works during power outage.
33:26 Apollo 13 movie: interconnected digital procedures, limited power.
36:20 All systems have manual control for safety.
37:55 Operator rounds involved manual inspection of equipment.
41:27 Early immigrants faced harsh, uncertain voyages to America.
45:32 Technology makes formerly unattainable achievements accessible today.
49:08 Internet outage impacts due to maritime dependency.
About the guest : 
Christopher Stein is a proficient maritime systems specialist who ensures the operational safety of onboard systems. Recognizing the potential dangers of propulsion loss, Christopher meticulously coordinates maintenance tasks while vessels are docked. He emphasizes precise timing and a clear understanding of assessment objectives to execute system tests and shutdowns safely. His expertise ensures voyages proceed without inci...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1834734/c1a-w52rp-mk0zw3nnan8g-havztj.jpg"></itunes:image>
                                                                            <itunes:duration>00:52:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Why Cybersecurity Matters: Protecting Our Food Supply from Digital Threats with Kristin Demoranville]]>
                </title>
                <pubDate>Mon, 26 Aug 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1821547</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this insightful episode of Protect It All, titled "Why Cybersecurity Matters: Protecting Our Food Supply from Digital Threats with Kristin Demoranville," host Aaron Crow and guest Kristin Demoranville tackle the critical yet often overlooked role of cybersecurity in the food and agriculture industry.</span></p>
<p><span style="font-weight:400;">Kristin stresses the need to shift from reactive to proactive cybersecurity measures to protect our complex food supply chains and ensure resilience. The discussion covers real-world cyber incidents like the ransomware attack on JBS meat company, emphasizing the human factors, financial misconceptions, and the necessity for robust incident response and business continuity plans.</span></p>
<p><span style="font-weight:400;">Listeners will also learn about the dangers of excessive reliance on technology and automation, the significance of water conservation, and the importance of integrating OT security in data centers. Through professional insights and personal anecdotes, Kristin highlights the crucial need for community support within the OT landscape.</span></p>
<p><span style="font-weight:400;">This episode offers a comprehensive look at the cultural and societal implications of cyber threats to our food supply, making it essential listening for anyone interested in the safety and security of the food industry.</span></p>
<p><br /><br /><br /></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p> </p>
<p><span style="font-weight:400;">00:10 Training and spreading awareness about operational technology.</span></p>
<p><span style="font-weight:400;">10:21 Agriculture lacks attention; needs OT cybersecurity focus.</span></p>
<p><span style="font-weight:400;">15:26 Security professionals foresee major food safety risk.</span></p>
<p><span style="font-weight:400;">18:04 Supply chain issues during COVID highlight concerns. Regenerative farming and feeding the population.</span></p>
<p><span style="font-weight:400;">24:04 ICS OT industry united in game proposal.</span></p>
<p><span style="font-weight:400;">27:35 Designing systems must consider cyber risk implications.</span></p>
<p><span style="font-weight:400;">34:11 Cybersecurity often an afterthought in many companies.</span></p>
<p><span style="font-weight:400;">41:47 Respectful, supportive, and geeky cyber community advocate.</span></p>
<p><span style="font-weight:400;">42:58 Texan upbringing shaped love for celebratory food.</span></p>
<p><span style="font-weight:400;">51:10 Concern over CrowdStrike blaming and finger pointing.</span></p>
<p><span style="font-weight:400;">57:16 Operator scans RFID tags from break room.</span></p>
<p><span style="font-weight:400;">59:24 Resisting a wasteful task, leading to change.</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p> </p>
<p><span style="font-weight:400;">Kristin Demoranville is the visionary founder and CEO of AnzenSage, a cybersecurity firm specializing in the food and agricultural industry.  She also leads as the CEO and co-founder of AnzenOT, a groundbreaking SaaS OT Cybersecurity Risk Intelligence solution.  With 26 years in the tech industry, Kristin seamlessly blends cybersecurity with food protection culture, always emphasizing the vital role of people and processes.  Her extensive background—ranging from collaborating with Fortune 500 companies and various manufacturing sectors to studying gorilla behavior as part of her Environmental Management degree—gives her a unique and well-rounded perspective on cybersecurity and critical infrastructure.  A published expert and in-demand speaker, Kristin is known for bridging the worlds of food protection and cybersecurity.  She’s also the host of the Bites &amp; Bytes Podcast, where she drives meaningful conversations between professionals across food, cybersecurity, and technology.</span></p>
<p> </p>
<p><span style="font-weight:400;">Anzensage Website : </span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this insightful episode of Protect It All, titled "Why Cybersecurity Matters: Protecting Our Food Supply from Digital Threats with Kristin Demoranville," host Aaron Crow and guest Kristin Demoranville tackle the critical yet often overlooked role of cybersecurity in the food and agriculture industry.
Kristin stresses the need to shift from reactive to proactive cybersecurity measures to protect our complex food supply chains and ensure resilience. The discussion covers real-world cyber incidents like the ransomware attack on JBS meat company, emphasizing the human factors, financial misconceptions, and the necessity for robust incident response and business continuity plans.
Listeners will also learn about the dangers of excessive reliance on technology and automation, the significance of water conservation, and the importance of integrating OT security in data centers. Through professional insights and personal anecdotes, Kristin highlights the crucial need for community support within the OT landscape.
This episode offers a comprehensive look at the cultural and societal implications of cyber threats to our food supply, making it essential listening for anyone interested in the safety and security of the food industry.

Key Moments: 
 
00:10 Training and spreading awareness about operational technology.
10:21 Agriculture lacks attention; needs OT cybersecurity focus.
15:26 Security professionals foresee major food safety risk.
18:04 Supply chain issues during COVID highlight concerns. Regenerative farming and feeding the population.
24:04 ICS OT industry united in game proposal.
27:35 Designing systems must consider cyber risk implications.
34:11 Cybersecurity often an afterthought in many companies.
41:47 Respectful, supportive, and geeky cyber community advocate.
42:58 Texan upbringing shaped love for celebratory food.
51:10 Concern over CrowdStrike blaming and finger pointing.
57:16 Operator scans RFID tags from break room.
59:24 Resisting a wasteful task, leading to change.
About the guest : 
 
Kristin Demoranville is the visionary founder and CEO of AnzenSage, a cybersecurity firm specializing in the food and agricultural industry.  She also leads as the CEO and co-founder of AnzenOT, a groundbreaking SaaS OT Cybersecurity Risk Intelligence solution.  With 26 years in the tech industry, Kristin seamlessly blends cybersecurity with food protection culture, always emphasizing the vital role of people and processes.  Her extensive background—ranging from collaborating with Fortune 500 companies and various manufacturing sectors to studying gorilla behavior as part of her Environmental Management degree—gives her a unique and well-rounded perspective on cybersecurity and critical infrastructure.  A published expert and in-demand speaker, Kristin is known for bridging the worlds of food protection and cybersecurity.  She’s also the host of the Bites & Bytes Podcast, where she drives meaningful conversations between professionals across food, cybersecurity, and technology.
 
Anzensage Website : ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Why Cybersecurity Matters: Protecting Our Food Supply from Digital Threats with Kristin Demoranville]]>
                </itunes:title>
                                    <itunes:episode>23</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this insightful episode of Protect It All, titled "Why Cybersecurity Matters: Protecting Our Food Supply from Digital Threats with Kristin Demoranville," host Aaron Crow and guest Kristin Demoranville tackle the critical yet often overlooked role of cybersecurity in the food and agriculture industry.</span></p>
<p><span style="font-weight:400;">Kristin stresses the need to shift from reactive to proactive cybersecurity measures to protect our complex food supply chains and ensure resilience. The discussion covers real-world cyber incidents like the ransomware attack on JBS meat company, emphasizing the human factors, financial misconceptions, and the necessity for robust incident response and business continuity plans.</span></p>
<p><span style="font-weight:400;">Listeners will also learn about the dangers of excessive reliance on technology and automation, the significance of water conservation, and the importance of integrating OT security in data centers. Through professional insights and personal anecdotes, Kristin highlights the crucial need for community support within the OT landscape.</span></p>
<p><span style="font-weight:400;">This episode offers a comprehensive look at the cultural and societal implications of cyber threats to our food supply, making it essential listening for anyone interested in the safety and security of the food industry.</span></p>
<p><br /><br /><br /></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p> </p>
<p><span style="font-weight:400;">00:10 Training and spreading awareness about operational technology.</span></p>
<p><span style="font-weight:400;">10:21 Agriculture lacks attention; needs OT cybersecurity focus.</span></p>
<p><span style="font-weight:400;">15:26 Security professionals foresee major food safety risk.</span></p>
<p><span style="font-weight:400;">18:04 Supply chain issues during COVID highlight concerns. Regenerative farming and feeding the population.</span></p>
<p><span style="font-weight:400;">24:04 ICS OT industry united in game proposal.</span></p>
<p><span style="font-weight:400;">27:35 Designing systems must consider cyber risk implications.</span></p>
<p><span style="font-weight:400;">34:11 Cybersecurity often an afterthought in many companies.</span></p>
<p><span style="font-weight:400;">41:47 Respectful, supportive, and geeky cyber community advocate.</span></p>
<p><span style="font-weight:400;">42:58 Texan upbringing shaped love for celebratory food.</span></p>
<p><span style="font-weight:400;">51:10 Concern over CrowdStrike blaming and finger pointing.</span></p>
<p><span style="font-weight:400;">57:16 Operator scans RFID tags from break room.</span></p>
<p><span style="font-weight:400;">59:24 Resisting a wasteful task, leading to change.</span></p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p> </p>
<p><span style="font-weight:400;">Kristin Demoranville is the visionary founder and CEO of AnzenSage, a cybersecurity firm specializing in the food and agricultural industry.  She also leads as the CEO and co-founder of AnzenOT, a groundbreaking SaaS OT Cybersecurity Risk Intelligence solution.  With 26 years in the tech industry, Kristin seamlessly blends cybersecurity with food protection culture, always emphasizing the vital role of people and processes.  Her extensive background—ranging from collaborating with Fortune 500 companies and various manufacturing sectors to studying gorilla behavior as part of her Environmental Management degree—gives her a unique and well-rounded perspective on cybersecurity and critical infrastructure.  A published expert and in-demand speaker, Kristin is known for bridging the worlds of food protection and cybersecurity.  She’s also the host of the Bites &amp; Bytes Podcast, where she drives meaningful conversations between professionals across food, cybersecurity, and technology.</span></p>
<p> </p>
<p><span style="font-weight:400;">Anzensage Website : </span><a href="https://www.anzensage.com/"><span style="font-weight:400;">https://www.anzensage.com/</span></a></p>
<p><span style="font-weight:400;">AnzenOT Website : </span><a href="https://www.anzenot.com/"><span style="font-weight:400;">https://www.anzenot.com/</span></a></p>
<p><span style="font-weight:400;">Bites and Bytes Podcast: </span><a href="https://www.bitesandbytespodcast.com/"><span style="font-weight:400;">https://www.bitesandbytespodcast.com/</span></a></p>
<p><br /><br /><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p><br /><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1821547/c1e-0qo87ijvxqnc2jdmg-z3zqpkgoc48-tbjpeo.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1821547&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=80ca3c25d75375c74e0a1703a51be00b16c023cede5ffe21c5ed0a2627eb4528" length="65005298"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this insightful episode of Protect It All, titled "Why Cybersecurity Matters: Protecting Our Food Supply from Digital Threats with Kristin Demoranville," host Aaron Crow and guest Kristin Demoranville tackle the critical yet often overlooked role of cybersecurity in the food and agriculture industry.
Kristin stresses the need to shift from reactive to proactive cybersecurity measures to protect our complex food supply chains and ensure resilience. The discussion covers real-world cyber incidents like the ransomware attack on JBS meat company, emphasizing the human factors, financial misconceptions, and the necessity for robust incident response and business continuity plans.
Listeners will also learn about the dangers of excessive reliance on technology and automation, the significance of water conservation, and the importance of integrating OT security in data centers. Through professional insights and personal anecdotes, Kristin highlights the crucial need for community support within the OT landscape.
This episode offers a comprehensive look at the cultural and societal implications of cyber threats to our food supply, making it essential listening for anyone interested in the safety and security of the food industry.

Key Moments: 
 
00:10 Training and spreading awareness about operational technology.
10:21 Agriculture lacks attention; needs OT cybersecurity focus.
15:26 Security professionals foresee major food safety risk.
18:04 Supply chain issues during COVID highlight concerns. Regenerative farming and feeding the population.
24:04 ICS OT industry united in game proposal.
27:35 Designing systems must consider cyber risk implications.
34:11 Cybersecurity often an afterthought in many companies.
41:47 Respectful, supportive, and geeky cyber community advocate.
42:58 Texan upbringing shaped love for celebratory food.
51:10 Concern over CrowdStrike blaming and finger pointing.
57:16 Operator scans RFID tags from break room.
59:24 Resisting a wasteful task, leading to change.
About the guest : 
 
Kristin Demoranville is the visionary founder and CEO of AnzenSage, a cybersecurity firm specializing in the food and agricultural industry.  She also leads as the CEO and co-founder of AnzenOT, a groundbreaking SaaS OT Cybersecurity Risk Intelligence solution.  With 26 years in the tech industry, Kristin seamlessly blends cybersecurity with food protection culture, always emphasizing the vital role of people and processes.  Her extensive background—ranging from collaborating with Fortune 500 companies and various manufacturing sectors to studying gorilla behavior as part of her Environmental Management degree—gives her a unique and well-rounded perspective on cybersecurity and critical infrastructure.  A published expert and in-demand speaker, Kristin is known for bridging the worlds of food protection and cybersecurity.  She’s also the host of the Bites & Bytes Podcast, where she drives meaningful conversations between professionals across food, cybersecurity, and technology.
 
Anzensage Website : ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1821547/c1a-w52rp-34kwm704fw0m-ujecvj.jpg"></itunes:image>
                                                                            <itunes:duration>01:06:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Tackling Tech Troubles: Inside the DFW Airport Cyber Incident and Wider Industry Challenges with Evan Morgan]]>
                </title>
                <pubDate>Mon, 19 Aug 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1813992</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode of Protect It All, titled "Tackling Tech Troubles: Inside the DFW Airport Cyber Incident and Wider Industry Challenges with Evan Morgan," host Aaron Crow explore the complexities of widespread tech issues, focusing on a recent cybersecurity incident at DFW Airport that affected over 1,000 machines. Guest Evan Morgan, founder of Cyber Defense Army, discusses the challenges of resolving such large-scale incidents and the importance of standardization and AI in cybersecurity.</span></p>
<p> </p>
<p><span style="font-weight:400;">Evan shares his journey from an Air Force aircraft mechanic to a cybersecurity expert, highlighting the benefits and challenges of running a small consultancy versus a large firm. The episode also covers recent cybersecurity incidents involving CrowdStrike and Microsoft 365, emphasizing the need for preventive measures and trust in business and technology. </span></p>
<p> </p>
<p><span style="font-weight:400;">Practical tips for everyday cybersecurity and insights into industry-wide challenges make this episode a valuable resource for listeners across all sectors.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 Entrepreneurship brings freedom and awesome transformations.</span></p>
<p><span style="font-weight:400;">03:54 Recent tech outages are gaining mainstream media attention.</span></p>
<p><span style="font-weight:400;">07:52 Adapting existing tech for enhanced security measures.</span></p>
<p><span style="font-weight:400;">10:48 Over-the-air car updates are complex and uncertain.</span></p>
<p><span style="font-weight:400;">14:01 DFW airport machines, recovery time, and problem.</span></p>
<p><span style="font-weight:400;">18:39 How do we improve efficiency and learning?</span></p>
<p><span style="font-weight:400;">21:26 Customers validate goods, test, streamline, feedback.</span></p>
<p><span style="font-weight:400;">25:10 Cyber enables business growth and protection.</span></p>
<p><span style="font-weight:400;">28:52 Cyberattack halted gas sales, risking pipeline operations.</span></p>
<p><span style="font-weight:400;">32:55 Challenges in the multi-faceted role, regulatory changes.</span></p>
<p><span style="font-weight:400;">35:35 Commonalities in cybersecurity, despite differences in industry.</span></p>
<p><span style="font-weight:400;">39:33 Robotics and AI revolutionize future human roles.</span></p>
<p><span style="font-weight:400;">40:42 AI would bring trust, speed, and efficiency.</span></p>
<p><span style="font-weight:400;">44:38 Defense technology, both funny and scary.</span></p>
<p><span style="font-weight:400;">47:59 Distance tech carries risk, needs personal vigilance.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">Evan Morgan is the Founder of Cyber Defense Army, a cybersecurity consultancy and services firm that incorporates geopolitical risk in their cybersecurity practices.  He is a service-disabled Veteran of the United States Air Force and served in the post-9/11 campaigns, as well as remote tours to the Republic of Korea.  He holds a Master's degree in Information Systems (Computer Security Management specialization) and a Master of Business Administration (Information Systems Management specialization), both with honors from Strayer University. Post his military service, he has led cybersecurity functions for Fortune 100 organizations, was a global leader for a worldwide consultancy, and has been honored with multiple cybersecurity awards for his efforts in protecting the organization he was a part of previously.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>Connect with Evan via LinkedIn:</strong><span style="font-weight:400;">  </span><a href="https://www.linkedin.com/in/evanmorgan/"><span style="font-weight:400;">https://www.linkedin.com/in/evanmorgan/</span></a></p>
<p><strong>Cyber Defense Ar...</strong></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of Protect It All, titled "Tackling Tech Troubles: Inside the DFW Airport Cyber Incident and Wider Industry Challenges with Evan Morgan," host Aaron Crow explore the complexities of widespread tech issues, focusing on a recent cybersecurity incident at DFW Airport that affected over 1,000 machines. Guest Evan Morgan, founder of Cyber Defense Army, discusses the challenges of resolving such large-scale incidents and the importance of standardization and AI in cybersecurity.
 
Evan shares his journey from an Air Force aircraft mechanic to a cybersecurity expert, highlighting the benefits and challenges of running a small consultancy versus a large firm. The episode also covers recent cybersecurity incidents involving CrowdStrike and Microsoft 365, emphasizing the need for preventive measures and trust in business and technology. 
 
Practical tips for everyday cybersecurity and insights into industry-wide challenges make this episode a valuable resource for listeners across all sectors.
 
Key Moments: 
00:10 Entrepreneurship brings freedom and awesome transformations.
03:54 Recent tech outages are gaining mainstream media attention.
07:52 Adapting existing tech for enhanced security measures.
10:48 Over-the-air car updates are complex and uncertain.
14:01 DFW airport machines, recovery time, and problem.
18:39 How do we improve efficiency and learning?
21:26 Customers validate goods, test, streamline, feedback.
25:10 Cyber enables business growth and protection.
28:52 Cyberattack halted gas sales, risking pipeline operations.
32:55 Challenges in the multi-faceted role, regulatory changes.
35:35 Commonalities in cybersecurity, despite differences in industry.
39:33 Robotics and AI revolutionize future human roles.
40:42 AI would bring trust, speed, and efficiency.
44:38 Defense technology, both funny and scary.
47:59 Distance tech carries risk, needs personal vigilance.
 
About the guest : 
 
Evan Morgan is the Founder of Cyber Defense Army, a cybersecurity consultancy and services firm that incorporates geopolitical risk in their cybersecurity practices.  He is a service-disabled Veteran of the United States Air Force and served in the post-9/11 campaigns, as well as remote tours to the Republic of Korea.  He holds a Master's degree in Information Systems (Computer Security Management specialization) and a Master of Business Administration (Information Systems Management specialization), both with honors from Strayer University. Post his military service, he has led cybersecurity functions for Fortune 100 organizations, was a global leader for a worldwide consultancy, and has been honored with multiple cybersecurity awards for his efforts in protecting the organization he was a part of previously.
 
Connect with Evan via LinkedIn:  https://www.linkedin.com/in/evanmorgan/
Cyber Defense Ar...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Tackling Tech Troubles: Inside the DFW Airport Cyber Incident and Wider Industry Challenges with Evan Morgan]]>
                </itunes:title>
                                    <itunes:episode>22</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode of Protect It All, titled "Tackling Tech Troubles: Inside the DFW Airport Cyber Incident and Wider Industry Challenges with Evan Morgan," host Aaron Crow explore the complexities of widespread tech issues, focusing on a recent cybersecurity incident at DFW Airport that affected over 1,000 machines. Guest Evan Morgan, founder of Cyber Defense Army, discusses the challenges of resolving such large-scale incidents and the importance of standardization and AI in cybersecurity.</span></p>
<p> </p>
<p><span style="font-weight:400;">Evan shares his journey from an Air Force aircraft mechanic to a cybersecurity expert, highlighting the benefits and challenges of running a small consultancy versus a large firm. The episode also covers recent cybersecurity incidents involving CrowdStrike and Microsoft 365, emphasizing the need for preventive measures and trust in business and technology. </span></p>
<p> </p>
<p><span style="font-weight:400;">Practical tips for everyday cybersecurity and insights into industry-wide challenges make this episode a valuable resource for listeners across all sectors.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 Entrepreneurship brings freedom and awesome transformations.</span></p>
<p><span style="font-weight:400;">03:54 Recent tech outages are gaining mainstream media attention.</span></p>
<p><span style="font-weight:400;">07:52 Adapting existing tech for enhanced security measures.</span></p>
<p><span style="font-weight:400;">10:48 Over-the-air car updates are complex and uncertain.</span></p>
<p><span style="font-weight:400;">14:01 DFW airport machines, recovery time, and problem.</span></p>
<p><span style="font-weight:400;">18:39 How do we improve efficiency and learning?</span></p>
<p><span style="font-weight:400;">21:26 Customers validate goods, test, streamline, feedback.</span></p>
<p><span style="font-weight:400;">25:10 Cyber enables business growth and protection.</span></p>
<p><span style="font-weight:400;">28:52 Cyberattack halted gas sales, risking pipeline operations.</span></p>
<p><span style="font-weight:400;">32:55 Challenges in the multi-faceted role, regulatory changes.</span></p>
<p><span style="font-weight:400;">35:35 Commonalities in cybersecurity, despite differences in industry.</span></p>
<p><span style="font-weight:400;">39:33 Robotics and AI revolutionize future human roles.</span></p>
<p><span style="font-weight:400;">40:42 AI would bring trust, speed, and efficiency.</span></p>
<p><span style="font-weight:400;">44:38 Defense technology, both funny and scary.</span></p>
<p><span style="font-weight:400;">47:59 Distance tech carries risk, needs personal vigilance.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">Evan Morgan is the Founder of Cyber Defense Army, a cybersecurity consultancy and services firm that incorporates geopolitical risk in their cybersecurity practices.  He is a service-disabled Veteran of the United States Air Force and served in the post-9/11 campaigns, as well as remote tours to the Republic of Korea.  He holds a Master's degree in Information Systems (Computer Security Management specialization) and a Master of Business Administration (Information Systems Management specialization), both with honors from Strayer University. Post his military service, he has led cybersecurity functions for Fortune 100 organizations, was a global leader for a worldwide consultancy, and has been honored with multiple cybersecurity awards for his efforts in protecting the organization he was a part of previously.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>Connect with Evan via LinkedIn:</strong><span style="font-weight:400;">  </span><a href="https://www.linkedin.com/in/evanmorgan/"><span style="font-weight:400;">https://www.linkedin.com/in/evanmorgan/</span></a></p>
<p><strong>Cyber Defense Army's website:</strong><span style="font-weight:400;">  </span><a href="https://www.cyberdefensearmy.com/"><span style="font-weight:400;">https://www.cyberdefensearmy.com/</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong><em>To be a guest or suggest a guest/episode, please email us at </em></strong><a href="mailto:info@protectitall.co"><strong><em>info@protectitall.co</em></strong></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1813992/c1e-w52rpbrxrvjaj5x5m-ndw5rz8gbd3p-qlym6e.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1813992&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=0ea7405f93bd01f884c9a665984590bdede9f206ada8ef8c6eb5c9eb4d6c8fcd" length="50332138"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of Protect It All, titled "Tackling Tech Troubles: Inside the DFW Airport Cyber Incident and Wider Industry Challenges with Evan Morgan," host Aaron Crow explore the complexities of widespread tech issues, focusing on a recent cybersecurity incident at DFW Airport that affected over 1,000 machines. Guest Evan Morgan, founder of Cyber Defense Army, discusses the challenges of resolving such large-scale incidents and the importance of standardization and AI in cybersecurity.
 
Evan shares his journey from an Air Force aircraft mechanic to a cybersecurity expert, highlighting the benefits and challenges of running a small consultancy versus a large firm. The episode also covers recent cybersecurity incidents involving CrowdStrike and Microsoft 365, emphasizing the need for preventive measures and trust in business and technology. 
 
Practical tips for everyday cybersecurity and insights into industry-wide challenges make this episode a valuable resource for listeners across all sectors.
 
Key Moments: 
00:10 Entrepreneurship brings freedom and awesome transformations.
03:54 Recent tech outages are gaining mainstream media attention.
07:52 Adapting existing tech for enhanced security measures.
10:48 Over-the-air car updates are complex and uncertain.
14:01 DFW airport machines, recovery time, and problem.
18:39 How do we improve efficiency and learning?
21:26 Customers validate goods, test, streamline, feedback.
25:10 Cyber enables business growth and protection.
28:52 Cyberattack halted gas sales, risking pipeline operations.
32:55 Challenges in the multi-faceted role, regulatory changes.
35:35 Commonalities in cybersecurity, despite differences in industry.
39:33 Robotics and AI revolutionize future human roles.
40:42 AI would bring trust, speed, and efficiency.
44:38 Defense technology, both funny and scary.
47:59 Distance tech carries risk, needs personal vigilance.
 
About the guest : 
 
Evan Morgan is the Founder of Cyber Defense Army, a cybersecurity consultancy and services firm that incorporates geopolitical risk in their cybersecurity practices.  He is a service-disabled Veteran of the United States Air Force and served in the post-9/11 campaigns, as well as remote tours to the Republic of Korea.  He holds a Master's degree in Information Systems (Computer Security Management specialization) and a Master of Business Administration (Information Systems Management specialization), both with honors from Strayer University. Post his military service, he has led cybersecurity functions for Fortune 100 organizations, was a global leader for a worldwide consultancy, and has been honored with multiple cybersecurity awards for his efforts in protecting the organization he was a part of previously.
 
Connect with Evan via LinkedIn:  https://www.linkedin.com/in/evanmorgan/
Cyber Defense Ar...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1813992/c1a-w52rp-pk95nxp1hmdj-lqxp08.jpg"></itunes:image>
                                                                            <itunes:duration>00:51:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cybersecurity in Critical Industries: Lessons from Medical Devices to Automotive]]>
                </title>
                <pubDate>Mon, 12 Aug 2024 10:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1806383</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In Episode 21 of "Protect It All," titled "Cybersecurity in Critical Industries: Lessons from Medical Devices to Automotive," host Aaron Crow is joined by experts David Leichner and Shlomi Ashkenazy to explore the multifaceted world of cybersecurity across various critical industries. </span></p>
<p> </p>
<p><span style="font-weight:400;">The conversation starts with Shlomi sharing a transformative personal experience in London, emphasizing the importance of pursuing one's passions. David follows with a moment of realization about the critical nature of cybersecurity during an eye surgery, underscoring the necessity of protecting people through robust cyber measures.</span></p>
<p> </p>
<p><span style="font-weight:400;">The episode delves deep into how cybersecurity practices are implemented in medical devices, automotive, and industrial manufacturing sectors. David, Shlomi, and Aaron discuss generative AI and its dual potential to enable and defend against cyber threats, drawing parallels to cyber weapons like Stuxnet. The importance of secure design, continuous monitoring, and compliance with ever-evolving regulations are highlighted, particularly in upgrading legacy systems in critical infrastructure.</span></p>
<p> </p>
<p><span style="font-weight:400;">With comprehensive insights into integrating IT and OT cybersecurity measures, the episode provides a compelling call to action for increased awareness and collaborative efforts to bolster defenses. Aaron also extends an invitation for engagement through conferences like Black Hat and Defcon, where practical solutions and innovative strategies are showcased.</span></p>
<p> </p>
<p><span style="font-weight:400;">Tune in to gain a deeper understanding of the critical intersection of cybersecurity in various industries and learn valuable lessons from the experts on safeguarding our digital and physical world.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">00:10 Security threats have expanded to 15-year-olds.</span></p>
<p><span style="font-weight:400;">08:35 Privacy breaches occur through overlooked device vulnerabilities.</span></p>
<p><span style="font-weight:400;">12:14 Power utility leading in cybersecurity due to regulation.</span></p>
<p><span style="font-weight:400;">17:06 Smaller companies need to prioritize cybersecurity measures.</span></p>
<p><span style="font-weight:400;">26:42 Security strategy requires adapting to different environments.</span></p>
<p><span style="font-weight:400;">28:30 FDA emphasizes cybersecurity importance at the H-ISAC conference.</span></p>
<p><span style="font-weight:400;">37:43 MIT study simulates cyber attack, uses AI.</span></p>
<p><span style="font-weight:400;">40:24 AI can eliminate manual product development processes.</span></p>
<p><span style="font-weight:400;">46:16 Cybersecurity brings unknown threats: deterrence or powerful AI.</span></p>
<p><span style="font-weight:400;">50:26 Black start plants generate and transmit power.</span></p>
<p><span style="font-weight:400;">59:00 Soft skills are crucial for effective communication and trust.</span></p>
<p><span style="font-weight:400;">01:00:09 Sent demos to heroes, got a minimal response.</span></p>
<p><span style="font-weight:400;">01:06:47 Promoting face-to-face meetings and events globally.</span></p>
<p><span style="font-weight:400;">01:10:19 Agreement on conclusion of project.</span></p>
<p><br /><br /></p>
<p><strong>About the Guests : </strong></p>
<p> </p>
<p><em><span style="font-weight:400;">David Leichner</span></em></p>
<p> </p>
<p><span style="font-weight:400;">David has over 25 years of marketing and sales executive management experience garnered from leading tech companies including Cynet, Information Builders, Magic Software, Gilat Satellite Networks, BluePhoenix Solutions, and SQream. At Cybellum, a provider of integrated cybersecurity solutions for leading device manufacturers,...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In Episode 21 of "Protect It All," titled "Cybersecurity in Critical Industries: Lessons from Medical Devices to Automotive," host Aaron Crow is joined by experts David Leichner and Shlomi Ashkenazy to explore the multifaceted world of cybersecurity across various critical industries. 
 
The conversation starts with Shlomi sharing a transformative personal experience in London, emphasizing the importance of pursuing one's passions. David follows with a moment of realization about the critical nature of cybersecurity during an eye surgery, underscoring the necessity of protecting people through robust cyber measures.
 
The episode delves deep into how cybersecurity practices are implemented in medical devices, automotive, and industrial manufacturing sectors. David, Shlomi, and Aaron discuss generative AI and its dual potential to enable and defend against cyber threats, drawing parallels to cyber weapons like Stuxnet. The importance of secure design, continuous monitoring, and compliance with ever-evolving regulations are highlighted, particularly in upgrading legacy systems in critical infrastructure.
 
With comprehensive insights into integrating IT and OT cybersecurity measures, the episode provides a compelling call to action for increased awareness and collaborative efforts to bolster defenses. Aaron also extends an invitation for engagement through conferences like Black Hat and Defcon, where practical solutions and innovative strategies are showcased.
 
Tune in to gain a deeper understanding of the critical intersection of cybersecurity in various industries and learn valuable lessons from the experts on safeguarding our digital and physical world.
 
Key Moments: 
 
00:10 Security threats have expanded to 15-year-olds.
08:35 Privacy breaches occur through overlooked device vulnerabilities.
12:14 Power utility leading in cybersecurity due to regulation.
17:06 Smaller companies need to prioritize cybersecurity measures.
26:42 Security strategy requires adapting to different environments.
28:30 FDA emphasizes cybersecurity importance at the H-ISAC conference.
37:43 MIT study simulates cyber attack, uses AI.
40:24 AI can eliminate manual product development processes.
46:16 Cybersecurity brings unknown threats: deterrence or powerful AI.
50:26 Black start plants generate and transmit power.
59:00 Soft skills are crucial for effective communication and trust.
01:00:09 Sent demos to heroes, got a minimal response.
01:06:47 Promoting face-to-face meetings and events globally.
01:10:19 Agreement on conclusion of project.

About the Guests : 
 
David Leichner
 
David has over 25 years of marketing and sales executive management experience garnered from leading tech companies including Cynet, Information Builders, Magic Software, Gilat Satellite Networks, BluePhoenix Solutions, and SQream. At Cybellum, a provider of integrated cybersecurity solutions for leading device manufacturers,...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Cybersecurity in Critical Industries: Lessons from Medical Devices to Automotive]]>
                </itunes:title>
                                    <itunes:episode>21</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In Episode 21 of "Protect It All," titled "Cybersecurity in Critical Industries: Lessons from Medical Devices to Automotive," host Aaron Crow is joined by experts David Leichner and Shlomi Ashkenazy to explore the multifaceted world of cybersecurity across various critical industries. </span></p>
<p> </p>
<p><span style="font-weight:400;">The conversation starts with Shlomi sharing a transformative personal experience in London, emphasizing the importance of pursuing one's passions. David follows with a moment of realization about the critical nature of cybersecurity during an eye surgery, underscoring the necessity of protecting people through robust cyber measures.</span></p>
<p> </p>
<p><span style="font-weight:400;">The episode delves deep into how cybersecurity practices are implemented in medical devices, automotive, and industrial manufacturing sectors. David, Shlomi, and Aaron discuss generative AI and its dual potential to enable and defend against cyber threats, drawing parallels to cyber weapons like Stuxnet. The importance of secure design, continuous monitoring, and compliance with ever-evolving regulations are highlighted, particularly in upgrading legacy systems in critical infrastructure.</span></p>
<p> </p>
<p><span style="font-weight:400;">With comprehensive insights into integrating IT and OT cybersecurity measures, the episode provides a compelling call to action for increased awareness and collaborative efforts to bolster defenses. Aaron also extends an invitation for engagement through conferences like Black Hat and Defcon, where practical solutions and innovative strategies are showcased.</span></p>
<p> </p>
<p><span style="font-weight:400;">Tune in to gain a deeper understanding of the critical intersection of cybersecurity in various industries and learn valuable lessons from the experts on safeguarding our digital and physical world.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">00:10 Security threats have expanded to 15-year-olds.</span></p>
<p><span style="font-weight:400;">08:35 Privacy breaches occur through overlooked device vulnerabilities.</span></p>
<p><span style="font-weight:400;">12:14 Power utility leading in cybersecurity due to regulation.</span></p>
<p><span style="font-weight:400;">17:06 Smaller companies need to prioritize cybersecurity measures.</span></p>
<p><span style="font-weight:400;">26:42 Security strategy requires adapting to different environments.</span></p>
<p><span style="font-weight:400;">28:30 FDA emphasizes cybersecurity importance at the H-ISAC conference.</span></p>
<p><span style="font-weight:400;">37:43 MIT study simulates cyber attack, uses AI.</span></p>
<p><span style="font-weight:400;">40:24 AI can eliminate manual product development processes.</span></p>
<p><span style="font-weight:400;">46:16 Cybersecurity brings unknown threats: deterrence or powerful AI.</span></p>
<p><span style="font-weight:400;">50:26 Black start plants generate and transmit power.</span></p>
<p><span style="font-weight:400;">59:00 Soft skills are crucial for effective communication and trust.</span></p>
<p><span style="font-weight:400;">01:00:09 Sent demos to heroes, got a minimal response.</span></p>
<p><span style="font-weight:400;">01:06:47 Promoting face-to-face meetings and events globally.</span></p>
<p><span style="font-weight:400;">01:10:19 Agreement on conclusion of project.</span></p>
<p><br /><br /></p>
<p><strong>About the Guests : </strong></p>
<p> </p>
<p><em><span style="font-weight:400;">David Leichner</span></em></p>
<p> </p>
<p><span style="font-weight:400;">David has over 25 years of marketing and sales executive management experience garnered from leading tech companies including Cynet, Information Builders, Magic Software, Gilat Satellite Networks, BluePhoenix Solutions, and SQream. At Cybellum, a provider of integrated cybersecurity solutions for leading device manufacturers, David is responsible for creating and executing the marketing strategy and managing the global marketing team that forms the foundation for Cybellum’s market penetration.</span></p>
<p> </p>
<p><em><span style="font-weight:400;">Shlomi Ashkenazy</span></em></p>
<p> </p>
<p><span style="font-weight:400;">Shlomi is the Head of Brand and Strategy at Cybellum, overseeing product security thought leadership, positioning, and brand activities. A physicist-turned-cybersecurity brand builder, Shlomi spent the years before joining Cybellum as a consultant, working with dozens of founders in the cybersecurity, AI, DevOps, Quantum, and Health Tech industries on building their brand, product marketing, positioning, and messaging. Shlomi also produces and co-hosts "Left to Our Own Devices: The Product Security Podcast" and spearheads multiple business strategy and GTM initiatives at Cybellum.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><span style="font-weight:400;">To be a guest or suggest a guest/episode, please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1806383/c1e-0qo87ijd2rpi235x6-z3zw0z3wtpvx-fkyohf.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1806383&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=ff871d39b62d0e474cfb0e50857cd3db2401a2a3efb52fa3e022d11437fefff9" length="68343269"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In Episode 21 of "Protect It All," titled "Cybersecurity in Critical Industries: Lessons from Medical Devices to Automotive," host Aaron Crow is joined by experts David Leichner and Shlomi Ashkenazy to explore the multifaceted world of cybersecurity across various critical industries. 
 
The conversation starts with Shlomi sharing a transformative personal experience in London, emphasizing the importance of pursuing one's passions. David follows with a moment of realization about the critical nature of cybersecurity during an eye surgery, underscoring the necessity of protecting people through robust cyber measures.
 
The episode delves deep into how cybersecurity practices are implemented in medical devices, automotive, and industrial manufacturing sectors. David, Shlomi, and Aaron discuss generative AI and its dual potential to enable and defend against cyber threats, drawing parallels to cyber weapons like Stuxnet. The importance of secure design, continuous monitoring, and compliance with ever-evolving regulations are highlighted, particularly in upgrading legacy systems in critical infrastructure.
 
With comprehensive insights into integrating IT and OT cybersecurity measures, the episode provides a compelling call to action for increased awareness and collaborative efforts to bolster defenses. Aaron also extends an invitation for engagement through conferences like Black Hat and Defcon, where practical solutions and innovative strategies are showcased.
 
Tune in to gain a deeper understanding of the critical intersection of cybersecurity in various industries and learn valuable lessons from the experts on safeguarding our digital and physical world.
 
Key Moments: 
 
00:10 Security threats have expanded to 15-year-olds.
08:35 Privacy breaches occur through overlooked device vulnerabilities.
12:14 Power utility leading in cybersecurity due to regulation.
17:06 Smaller companies need to prioritize cybersecurity measures.
26:42 Security strategy requires adapting to different environments.
28:30 FDA emphasizes cybersecurity importance at the H-ISAC conference.
37:43 MIT study simulates cyber attack, uses AI.
40:24 AI can eliminate manual product development processes.
46:16 Cybersecurity brings unknown threats: deterrence or powerful AI.
50:26 Black start plants generate and transmit power.
59:00 Soft skills are crucial for effective communication and trust.
01:00:09 Sent demos to heroes, got a minimal response.
01:06:47 Promoting face-to-face meetings and events globally.
01:10:19 Agreement on conclusion of project.

About the Guests : 
 
David Leichner
 
David has over 25 years of marketing and sales executive management experience garnered from leading tech companies including Cynet, Information Builders, Magic Software, Gilat Satellite Networks, BluePhoenix Solutions, and SQream. At Cybellum, a provider of integrated cybersecurity solutions for leading device manufacturers,...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1806383/c1a-w52rp-34k9jk4qu3w5-zyhrqy.jpg"></itunes:image>
                                                                            <itunes:duration>01:10:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[The Intersection of Cybersecurity and Personal Development: A Deep Dive with Aaron Crow and Neal Conlon  at the Lone Star Cyber Shootout]]>
                </title>
                <pubDate>Mon, 05 Aug 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1799089</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode of "Protect It All," hosts Aaron Crow and Neal Conlon discuss the upcoming Lone Star Cyber Shootout. Set to take place on September 6, 2024, at the prestigious Staccato Ranch in Florence, TX, this episode highlights the unique blend of cybersecurity expertise and personal development that participants can anticipate.</span></p>
<p> </p>
<p><span style="font-weight:400;">Neal and Aaron share their captivating professional journeys and discuss how their diverse backgrounds converge at the crossroads of trust, cybersecurity, and personal growth. They recount their own experiences, noting the importance of trust in both personal and professional spheres. Moreover, the hosts vividly describe what attendees can anticipate from the Lone Star Cyber Shootout, detailing the state-of-the-art facilities, value-driven activities, and the exciting networking opportunities that await.</span></p>
<p> </p>
<p><span style="font-weight:400;">Listeners will discover the exceptional nature of Staccato Ranch, its veteran-focused initiatives, and how the event is structured to provide unparalleled insights and hands-on experiences in both cyber and physical security. Neal and Aaron underscore the importance of such events in fostering community connections and highlight the three pillars of an amazing event—epic location, outstanding content, and a strong community.</span></p>
<p> </p>
<p><span style="font-weight:400;">Join Aaron and Neal as they gear up for a day full of learning, camaraderie, and growth at the Lone Star Cyber Shootout, one of the cybersecurity world's most innovative and dynamic events. Secure your spot and prepare for an experience that promises to be as enlightening as it is adventurous!</span></p>
<p><br /><br /><br /></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">03:49 Diverse career in real estate and sales.</span></p>
<p><span style="font-weight:400;">09:47 Public impact from events necessitates political unity.</span></p>
<p><span style="font-weight:400;">12:07 New cybersecurity event bridges cyber and physical.</span></p>
<p><span style="font-weight:400;">16:14 Transformational event in cybersecurity and technology consolidation.</span></p>
<p><span style="font-weight:400;">17:32 Event fosters trusted partnerships in evolving cybersecurity.</span></p>
<p><span style="font-weight:400;">22:46 Improving daily, manufacturing and professional development topics.</span></p>
<p><span style="font-weight:400;">25:18 "Amazing content, valuable relationships, and community."</span></p>
<p><span style="font-weight:400;">27:02 Cyber events filling up quickly, next in 2025.</span></p>
<p><span style="font-weight:400;">To register, click</span> <span style="font-weight:400;"> </span><a href="https://corvosec.com/lonestar-cyber-shootout/"><span style="font-weight:400;">https://corvosec.com/lonestar-cyber-shootout/</span></a></p>
<p><span style="font-weight:400;">To sponsor the event, check out </span><a href="https://corvosec.com/lone-star-cyber-shootout-sponsorships/"><span style="font-weight:400;">https://corvosec.com/lone-star-cyber-shootout-sponsorships/</span></a><span style="font-weight:400;"> or email sponsors@corvosec.com.</span></p>
<p><span style="font-weight:400;">For further details, contact Aaron at <a href="mailto:aaron@corvosec.com">aaron@corvosec.com</a> or Neal at </span><a href="mailto:neal@corvosec.com"><span style="font-weight:400;">neal@corvosec.com</span></a><span style="font-weight:400;">.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of "Protect It All," hosts Aaron Crow and Neal Conlon discuss the upcoming Lone Star Cyber Shootout. Set to take place on September 6, 2024, at the prestigious Staccato Ranch in Florence, TX, this episode highlights the unique blend of cybersecurity expertise and personal development that participants can anticipate.
 
Neal and Aaron share their captivating professional journeys and discuss how their diverse backgrounds converge at the crossroads of trust, cybersecurity, and personal growth. They recount their own experiences, noting the importance of trust in both personal and professional spheres. Moreover, the hosts vividly describe what attendees can anticipate from the Lone Star Cyber Shootout, detailing the state-of-the-art facilities, value-driven activities, and the exciting networking opportunities that await.
 
Listeners will discover the exceptional nature of Staccato Ranch, its veteran-focused initiatives, and how the event is structured to provide unparalleled insights and hands-on experiences in both cyber and physical security. Neal and Aaron underscore the importance of such events in fostering community connections and highlight the three pillars of an amazing event—epic location, outstanding content, and a strong community.
 
Join Aaron and Neal as they gear up for a day full of learning, camaraderie, and growth at the Lone Star Cyber Shootout, one of the cybersecurity world's most innovative and dynamic events. Secure your spot and prepare for an experience that promises to be as enlightening as it is adventurous!

Key Moments: 
03:49 Diverse career in real estate and sales.
09:47 Public impact from events necessitates political unity.
12:07 New cybersecurity event bridges cyber and physical.
16:14 Transformational event in cybersecurity and technology consolidation.
17:32 Event fosters trusted partnerships in evolving cybersecurity.
22:46 Improving daily, manufacturing and professional development topics.
25:18 "Amazing content, valuable relationships, and community."
27:02 Cyber events filling up quickly, next in 2025.
To register, click  https://corvosec.com/lonestar-cyber-shootout/
To sponsor the event, check out https://corvosec.com/lone-star-cyber-shootout-sponsorships/ or email sponsors@corvosec.com.
For further details, contact Aaron at aaron@corvosec.com or Neal at neal@corvosec.com.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[The Intersection of Cybersecurity and Personal Development: A Deep Dive with Aaron Crow and Neal Conlon  at the Lone Star Cyber Shootout]]>
                </itunes:title>
                                    <itunes:episode>20</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode of "Protect It All," hosts Aaron Crow and Neal Conlon discuss the upcoming Lone Star Cyber Shootout. Set to take place on September 6, 2024, at the prestigious Staccato Ranch in Florence, TX, this episode highlights the unique blend of cybersecurity expertise and personal development that participants can anticipate.</span></p>
<p> </p>
<p><span style="font-weight:400;">Neal and Aaron share their captivating professional journeys and discuss how their diverse backgrounds converge at the crossroads of trust, cybersecurity, and personal growth. They recount their own experiences, noting the importance of trust in both personal and professional spheres. Moreover, the hosts vividly describe what attendees can anticipate from the Lone Star Cyber Shootout, detailing the state-of-the-art facilities, value-driven activities, and the exciting networking opportunities that await.</span></p>
<p> </p>
<p><span style="font-weight:400;">Listeners will discover the exceptional nature of Staccato Ranch, its veteran-focused initiatives, and how the event is structured to provide unparalleled insights and hands-on experiences in both cyber and physical security. Neal and Aaron underscore the importance of such events in fostering community connections and highlight the three pillars of an amazing event—epic location, outstanding content, and a strong community.</span></p>
<p> </p>
<p><span style="font-weight:400;">Join Aaron and Neal as they gear up for a day full of learning, camaraderie, and growth at the Lone Star Cyber Shootout, one of the cybersecurity world's most innovative and dynamic events. Secure your spot and prepare for an experience that promises to be as enlightening as it is adventurous!</span></p>
<p><br /><br /><br /></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">03:49 Diverse career in real estate and sales.</span></p>
<p><span style="font-weight:400;">09:47 Public impact from events necessitates political unity.</span></p>
<p><span style="font-weight:400;">12:07 New cybersecurity event bridges cyber and physical.</span></p>
<p><span style="font-weight:400;">16:14 Transformational event in cybersecurity and technology consolidation.</span></p>
<p><span style="font-weight:400;">17:32 Event fosters trusted partnerships in evolving cybersecurity.</span></p>
<p><span style="font-weight:400;">22:46 Improving daily, manufacturing and professional development topics.</span></p>
<p><span style="font-weight:400;">25:18 "Amazing content, valuable relationships, and community."</span></p>
<p><span style="font-weight:400;">27:02 Cyber events filling up quickly, next in 2025.</span></p>
<p><span style="font-weight:400;">To register, click</span> <span style="font-weight:400;"> </span><a href="https://corvosec.com/lonestar-cyber-shootout/"><span style="font-weight:400;">https://corvosec.com/lonestar-cyber-shootout/</span></a></p>
<p><span style="font-weight:400;">To sponsor the event, check out </span><a href="https://corvosec.com/lone-star-cyber-shootout-sponsorships/"><span style="font-weight:400;">https://corvosec.com/lone-star-cyber-shootout-sponsorships/</span></a><span style="font-weight:400;"> or email sponsors@corvosec.com.</span></p>
<p><span style="font-weight:400;">For further details, contact Aaron at <a href="mailto:aaron@corvosec.com">aaron@corvosec.com</a> or Neal at </span><a href="mailto:neal@corvosec.com"><span style="font-weight:400;">neal@corvosec.com</span></a><span style="font-weight:400;">.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1799089/c1e-w52rpbrozo4sj3zw9-5zgrj24janr4-ji8rxv.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1799089&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=f3385a74f77d03c3d8d4833678082fc991267c7ae7baec5b7caab387ca37f454" length="29148997"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of "Protect It All," hosts Aaron Crow and Neal Conlon discuss the upcoming Lone Star Cyber Shootout. Set to take place on September 6, 2024, at the prestigious Staccato Ranch in Florence, TX, this episode highlights the unique blend of cybersecurity expertise and personal development that participants can anticipate.
 
Neal and Aaron share their captivating professional journeys and discuss how their diverse backgrounds converge at the crossroads of trust, cybersecurity, and personal growth. They recount their own experiences, noting the importance of trust in both personal and professional spheres. Moreover, the hosts vividly describe what attendees can anticipate from the Lone Star Cyber Shootout, detailing the state-of-the-art facilities, value-driven activities, and the exciting networking opportunities that await.
 
Listeners will discover the exceptional nature of Staccato Ranch, its veteran-focused initiatives, and how the event is structured to provide unparalleled insights and hands-on experiences in both cyber and physical security. Neal and Aaron underscore the importance of such events in fostering community connections and highlight the three pillars of an amazing event—epic location, outstanding content, and a strong community.
 
Join Aaron and Neal as they gear up for a day full of learning, camaraderie, and growth at the Lone Star Cyber Shootout, one of the cybersecurity world's most innovative and dynamic events. Secure your spot and prepare for an experience that promises to be as enlightening as it is adventurous!

Key Moments: 
03:49 Diverse career in real estate and sales.
09:47 Public impact from events necessitates political unity.
12:07 New cybersecurity event bridges cyber and physical.
16:14 Transformational event in cybersecurity and technology consolidation.
17:32 Event fosters trusted partnerships in evolving cybersecurity.
22:46 Improving daily, manufacturing and professional development topics.
25:18 "Amazing content, valuable relationships, and community."
27:02 Cyber events filling up quickly, next in 2025.
To register, click  https://corvosec.com/lonestar-cyber-shootout/
To sponsor the event, check out https://corvosec.com/lone-star-cyber-shootout-sponsorships/ or email sponsors@corvosec.com.
For further details, contact Aaron at aaron@corvosec.com or Neal at neal@corvosec.com.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1799089/c1a-w52rp-25dojpq9aq0v-te9as1.jpg"></itunes:image>
                                                                            <itunes:duration>00:28:31</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Lessons from CrowdStrike: Managing Risks in IT and OT Environments]]>
                </title>
                <pubDate>Mon, 29 Jul 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1793426</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In Episode 19 of "Protect It All," titled "Lessons from CrowdStrike: Managing Risks in IT and OT Environments," Host Aaron Crow gets into the recent CrowdStrike Falcon platform incident that caused widespread system crashes and blue screens of death on Windows machines. Drawing from his extensive IT and OT experience, Aaron explains that the issue stemmed from a routine update error, not a cybersecurity attack. He explores why it had such a significant impact on major entities like airlines and airports.</span></p>
<p> </p>
<p><span style="font-weight:400;">Aaron highlights the critical differences between IT and OT risk management, emphasizing the importance of automated updates, real-time threat detection, and thorough update testing. He discusses the need for comprehensive risk assessment and the implementation of cyberinformed engineering practices to prevent similar issues in the future.</span></p>
<p> </p>
<p><span style="font-weight:400;">Listeners will gain key insights into balancing cybersecurity measures with system reliability and availability and actionable recommendations for strengthening their IT and OT environments.</span></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><span style="font-weight:400;">To be a guest or suggest a guest/episode, please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In Episode 19 of "Protect It All," titled "Lessons from CrowdStrike: Managing Risks in IT and OT Environments," Host Aaron Crow gets into the recent CrowdStrike Falcon platform incident that caused widespread system crashes and blue screens of death on Windows machines. Drawing from his extensive IT and OT experience, Aaron explains that the issue stemmed from a routine update error, not a cybersecurity attack. He explores why it had such a significant impact on major entities like airlines and airports.
 
Aaron highlights the critical differences between IT and OT risk management, emphasizing the importance of automated updates, real-time threat detection, and thorough update testing. He discusses the need for comprehensive risk assessment and the implementation of cyberinformed engineering practices to prevent similar issues in the future.
 
Listeners will gain key insights into balancing cybersecurity measures with system reliability and availability and actionable recommendations for strengthening their IT and OT environments.

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Lessons from CrowdStrike: Managing Risks in IT and OT Environments]]>
                </itunes:title>
                                    <itunes:episode>19</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In Episode 19 of "Protect It All," titled "Lessons from CrowdStrike: Managing Risks in IT and OT Environments," Host Aaron Crow gets into the recent CrowdStrike Falcon platform incident that caused widespread system crashes and blue screens of death on Windows machines. Drawing from his extensive IT and OT experience, Aaron explains that the issue stemmed from a routine update error, not a cybersecurity attack. He explores why it had such a significant impact on major entities like airlines and airports.</span></p>
<p> </p>
<p><span style="font-weight:400;">Aaron highlights the critical differences between IT and OT risk management, emphasizing the importance of automated updates, real-time threat detection, and thorough update testing. He discusses the need for comprehensive risk assessment and the implementation of cyberinformed engineering practices to prevent similar issues in the future.</span></p>
<p> </p>
<p><span style="font-weight:400;">Listeners will gain key insights into balancing cybersecurity measures with system reliability and availability and actionable recommendations for strengthening their IT and OT environments.</span></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><span style="font-weight:400;">To be a guest or suggest a guest/episode, please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1793426/c1e-d308xc6jz27c3kod6-xxv73316sxvw-ia3v9b.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1793426&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=1d0597999a4b8593b1ea7846060f23c2401d6fe3943db009833340affff32e53" length="16938328"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In Episode 19 of "Protect It All," titled "Lessons from CrowdStrike: Managing Risks in IT and OT Environments," Host Aaron Crow gets into the recent CrowdStrike Falcon platform incident that caused widespread system crashes and blue screens of death on Windows machines. Drawing from his extensive IT and OT experience, Aaron explains that the issue stemmed from a routine update error, not a cybersecurity attack. He explores why it had such a significant impact on major entities like airlines and airports.
 
Aaron highlights the critical differences between IT and OT risk management, emphasizing the importance of automated updates, real-time threat detection, and thorough update testing. He discusses the need for comprehensive risk assessment and the implementation of cyberinformed engineering practices to prevent similar issues in the future.
 
Listeners will gain key insights into balancing cybersecurity measures with system reliability and availability and actionable recommendations for strengthening their IT and OT environments.

Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1793426/c1a-w52rp-wwz7oo23a734-svxkcd.jpg"></itunes:image>
                                                                            <itunes:duration>00:15:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Concept to Reality: ResetCon and the Future of ICS Security Conferences]]>
                </title>
                <pubDate>Wed, 24 Jul 2024 18:48:07 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1791820</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives into critical infrastructure and industrial control systems with special guests Matthew Miller and James Warne. Together, they introduce ResetCon—an upcoming conference to close the gap between technical research and practical applications in cybersecurity.</span></p>
<p><span style="font-weight:400;"><br /></span><span style="font-weight:400;">Our listeners get an exclusive discount for attending ResetCon this year! Visit</span><a href="https://rstcon.org/2024/"> <span style="font-weight:400;">https://rstcon.org/2024/</span></a><span style="font-weight:400;"> and use the code </span><strong>PrOTect</strong><span style="font-weight:400;"> to receive a 10% discount on your tickets.</span></p>
<p> </p>
<p><span style="font-weight:400;">The discussion highlights the importance of including cybersecurity in infrastructure design, tackling supply chain attacks, and fostering collaboration among industry experts. With the call for papers closing soon, listeners are encouraged to submit abstracts and join this revolutionary initiative.</span></p>
<p><span style="font-weight:400;">Episode 18 promises valuable insights into the intersection of IT, OT, and critical infrastructure cybersecurity. It emphasizes the need for more skilled professionals and community-driven solutions. </span></p>
<p><span style="font-weight:400;">Don’t miss this chance to learn, get inspired, and prepare for ResetCon!</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">03:32 ResetCon aims to deliver cutting-edge tech talks.</span></p>
<p><span style="font-weight:400;">08:47 Debating cause, but the outcome is unchanged.</span></p>
<p><span style="font-weight:400;">11:49 Conference seeks to address critical infrastructure issues.</span></p>
<p><span style="font-weight:400;">16:06 ICS Village presence at key cybersecurity events vital.</span></p>
<p><span style="font-weight:400;">18:34 Sharing industry knowledge and protecting brand integrity.</span></p>
<p><span style="font-weight:400;">20:51 Colin O'Flynn presents cutting-edge hardware innovations.</span></p>
<p><span style="font-weight:400;">26:05 Diverse audiences at the ponderous conference.</span></p>
<p><span style="font-weight:400;">28:34 Understanding same team, goals, critical infrastructure, not experts.</span></p>
<p><span style="font-weight:400;">30:37 Submitted on 3rd, some issues, resubmitted 6th.</span></p>
<p><span style="font-weight:400;">35:52 High-tech talks, networking, and exploring Savannah.</span></p>
<p><span style="font-weight:400;">38:39 Discussing boat transportation as part of long-term goal.</span></p>
<p><span style="font-weight:400;">40:38 Collaboration can lead to innovative infrastructure solutions.</span></p>
<p><span style="font-weight:400;">44:10 Discussing relevance of Wi-Fi and security measures.</span></p>
<p> </p>
<p><strong>About the guests : </strong></p>
<p> </p>
<p><strong>James Warne</strong></p>
<p> </p>
<p><span style="font-weight:400;">Jay's work in research has affirmed his commitment to technology, security, and computation. His time on and leading high-performing teams codified his desire to enable and support his scientists and engineers. Jay constantly seeks ways to contribute to his field; one may find him testing his theories, reading and sharing papers, problem-solving with industry, arming investors with technical knowledge, coordinating RSTCON, developing instructive/ research presentations, mentoring new industry hopefuls, advising the Cornell Cyber Club, or outdoors.</span></p>
<p> </p>
<p><strong>Matthew Miller</strong></p>
<p> </p>
<p><span style="font-weight:400;">Matthew spent eight years in the United States Navy and Special Operations as a CNO Operator. After the military, he shifted his career toward security research and software engineering. Recently, Matthew co-founded ResetCon to address growing cybersecurity concerns in...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow dives into critical infrastructure and industrial control systems with special guests Matthew Miller and James Warne. Together, they introduce ResetCon—an upcoming conference to close the gap between technical research and practical applications in cybersecurity.
Our listeners get an exclusive discount for attending ResetCon this year! Visit https://rstcon.org/2024/ and use the code PrOTect to receive a 10% discount on your tickets.
 
The discussion highlights the importance of including cybersecurity in infrastructure design, tackling supply chain attacks, and fostering collaboration among industry experts. With the call for papers closing soon, listeners are encouraged to submit abstracts and join this revolutionary initiative.
Episode 18 promises valuable insights into the intersection of IT, OT, and critical infrastructure cybersecurity. It emphasizes the need for more skilled professionals and community-driven solutions. 
Don’t miss this chance to learn, get inspired, and prepare for ResetCon!
 
Key Moments: 
 
03:32 ResetCon aims to deliver cutting-edge tech talks.
08:47 Debating cause, but the outcome is unchanged.
11:49 Conference seeks to address critical infrastructure issues.
16:06 ICS Village presence at key cybersecurity events vital.
18:34 Sharing industry knowledge and protecting brand integrity.
20:51 Colin O'Flynn presents cutting-edge hardware innovations.
26:05 Diverse audiences at the ponderous conference.
28:34 Understanding same team, goals, critical infrastructure, not experts.
30:37 Submitted on 3rd, some issues, resubmitted 6th.
35:52 High-tech talks, networking, and exploring Savannah.
38:39 Discussing boat transportation as part of long-term goal.
40:38 Collaboration can lead to innovative infrastructure solutions.
44:10 Discussing relevance of Wi-Fi and security measures.
 
About the guests : 
 
James Warne
 
Jay's work in research has affirmed his commitment to technology, security, and computation. His time on and leading high-performing teams codified his desire to enable and support his scientists and engineers. Jay constantly seeks ways to contribute to his field; one may find him testing his theories, reading and sharing papers, problem-solving with industry, arming investors with technical knowledge, coordinating RSTCON, developing instructive/ research presentations, mentoring new industry hopefuls, advising the Cornell Cyber Club, or outdoors.
 
Matthew Miller
 
Matthew spent eight years in the United States Navy and Special Operations as a CNO Operator. After the military, he shifted his career toward security research and software engineering. Recently, Matthew co-founded ResetCon to address growing cybersecurity concerns in...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[From Concept to Reality: ResetCon and the Future of ICS Security Conferences]]>
                </itunes:title>
                                    <itunes:episode>18</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow dives into critical infrastructure and industrial control systems with special guests Matthew Miller and James Warne. Together, they introduce ResetCon—an upcoming conference to close the gap between technical research and practical applications in cybersecurity.</span></p>
<p><span style="font-weight:400;"><br /></span><span style="font-weight:400;">Our listeners get an exclusive discount for attending ResetCon this year! Visit</span><a href="https://rstcon.org/2024/"> <span style="font-weight:400;">https://rstcon.org/2024/</span></a><span style="font-weight:400;"> and use the code </span><strong>PrOTect</strong><span style="font-weight:400;"> to receive a 10% discount on your tickets.</span></p>
<p> </p>
<p><span style="font-weight:400;">The discussion highlights the importance of including cybersecurity in infrastructure design, tackling supply chain attacks, and fostering collaboration among industry experts. With the call for papers closing soon, listeners are encouraged to submit abstracts and join this revolutionary initiative.</span></p>
<p><span style="font-weight:400;">Episode 18 promises valuable insights into the intersection of IT, OT, and critical infrastructure cybersecurity. It emphasizes the need for more skilled professionals and community-driven solutions. </span></p>
<p><span style="font-weight:400;">Don’t miss this chance to learn, get inspired, and prepare for ResetCon!</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">03:32 ResetCon aims to deliver cutting-edge tech talks.</span></p>
<p><span style="font-weight:400;">08:47 Debating cause, but the outcome is unchanged.</span></p>
<p><span style="font-weight:400;">11:49 Conference seeks to address critical infrastructure issues.</span></p>
<p><span style="font-weight:400;">16:06 ICS Village presence at key cybersecurity events vital.</span></p>
<p><span style="font-weight:400;">18:34 Sharing industry knowledge and protecting brand integrity.</span></p>
<p><span style="font-weight:400;">20:51 Colin O'Flynn presents cutting-edge hardware innovations.</span></p>
<p><span style="font-weight:400;">26:05 Diverse audiences at the ponderous conference.</span></p>
<p><span style="font-weight:400;">28:34 Understanding same team, goals, critical infrastructure, not experts.</span></p>
<p><span style="font-weight:400;">30:37 Submitted on 3rd, some issues, resubmitted 6th.</span></p>
<p><span style="font-weight:400;">35:52 High-tech talks, networking, and exploring Savannah.</span></p>
<p><span style="font-weight:400;">38:39 Discussing boat transportation as part of long-term goal.</span></p>
<p><span style="font-weight:400;">40:38 Collaboration can lead to innovative infrastructure solutions.</span></p>
<p><span style="font-weight:400;">44:10 Discussing relevance of Wi-Fi and security measures.</span></p>
<p> </p>
<p><strong>About the guests : </strong></p>
<p> </p>
<p><strong>James Warne</strong></p>
<p> </p>
<p><span style="font-weight:400;">Jay's work in research has affirmed his commitment to technology, security, and computation. His time on and leading high-performing teams codified his desire to enable and support his scientists and engineers. Jay constantly seeks ways to contribute to his field; one may find him testing his theories, reading and sharing papers, problem-solving with industry, arming investors with technical knowledge, coordinating RSTCON, developing instructive/ research presentations, mentoring new industry hopefuls, advising the Cornell Cyber Club, or outdoors.</span></p>
<p> </p>
<p><strong>Matthew Miller</strong></p>
<p> </p>
<p><span style="font-weight:400;">Matthew spent eight years in the United States Navy and Special Operations as a CNO Operator. After the military, he shifted his career toward security research and software engineering. Recently, Matthew co-founded ResetCon to address growing cybersecurity concerns in critical infrastructure. He's passionate about his family, work, and about giving back to the community</span></p>
<p> </p>
<p><span style="font-weight:400;">Know more about Reset Conference - </span><a href="https://rstcon.org/"><span style="font-weight:400;">https://rstcon.org/</span></a></p>
<p><strong>Attend ResetCon this year! </strong></p>
<p><span style="font-weight:400;">Visit</span><a href="https://rstcon.org/2024/"> <span style="font-weight:400;">https://rstcon.org/2024/</span></a><span style="font-weight:400;"> and use the code </span><strong>PrOTect</strong><span style="font-weight:400;"> to receive a 10% discount on your tickets.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p><br /><strong>To be a guest or suggest a guest/episode, please email us at</strong> <a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1791820/c1e-x510gbmvqwpurqr2d-47gm5250ikk7-jq40qx.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1791820&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=e3556bc7eadf86dfc6199325547fe74f92e429e681d4fc474261f73851a296f5" length="49446691"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow dives into critical infrastructure and industrial control systems with special guests Matthew Miller and James Warne. Together, they introduce ResetCon—an upcoming conference to close the gap between technical research and practical applications in cybersecurity.
Our listeners get an exclusive discount for attending ResetCon this year! Visit https://rstcon.org/2024/ and use the code PrOTect to receive a 10% discount on your tickets.
 
The discussion highlights the importance of including cybersecurity in infrastructure design, tackling supply chain attacks, and fostering collaboration among industry experts. With the call for papers closing soon, listeners are encouraged to submit abstracts and join this revolutionary initiative.
Episode 18 promises valuable insights into the intersection of IT, OT, and critical infrastructure cybersecurity. It emphasizes the need for more skilled professionals and community-driven solutions. 
Don’t miss this chance to learn, get inspired, and prepare for ResetCon!
 
Key Moments: 
 
03:32 ResetCon aims to deliver cutting-edge tech talks.
08:47 Debating cause, but the outcome is unchanged.
11:49 Conference seeks to address critical infrastructure issues.
16:06 ICS Village presence at key cybersecurity events vital.
18:34 Sharing industry knowledge and protecting brand integrity.
20:51 Colin O'Flynn presents cutting-edge hardware innovations.
26:05 Diverse audiences at the ponderous conference.
28:34 Understanding same team, goals, critical infrastructure, not experts.
30:37 Submitted on 3rd, some issues, resubmitted 6th.
35:52 High-tech talks, networking, and exploring Savannah.
38:39 Discussing boat transportation as part of long-term goal.
40:38 Collaboration can lead to innovative infrastructure solutions.
44:10 Discussing relevance of Wi-Fi and security measures.
 
About the guests : 
 
James Warne
 
Jay's work in research has affirmed his commitment to technology, security, and computation. His time on and leading high-performing teams codified his desire to enable and support his scientists and engineers. Jay constantly seeks ways to contribute to his field; one may find him testing his theories, reading and sharing papers, problem-solving with industry, arming investors with technical knowledge, coordinating RSTCON, developing instructive/ research presentations, mentoring new industry hopefuls, advising the Cornell Cyber Club, or outdoors.
 
Matthew Miller
 
Matthew spent eight years in the United States Navy and Special Operations as a CNO Operator. After the military, he shifted his career toward security research and software engineering. Recently, Matthew co-founded ResetCon to address growing cybersecurity concerns in...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1791820/c1a-w52rp-wwzp1k11ck8-ev8je0.jpg"></itunes:image>
                                                                            <itunes:duration>00:49:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew Ginter]]>
                </title>
                <pubDate>Mon, 22 Jul 2024 10:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1789704</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Welcome back to *Protect It All*! In Episode 17, host Aaron Crow is joined by Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, to dive deep into secure remote access for Operational Technology (OT) systems. They explore the cutting-edge HERA (Hardware Enforced Remote Access) technology, which offers a revolutionary approach to remote control via TPM hardware, unidirectional gateways, and stringent encryption protocols. </span></p>
<p><span style="font-weight:400;">This episode covers everything from the critical need for robust security in high-stakes environments like wind farms and manufacturing to the dangers of supply chain vulnerabilities to the broader implications for industries dependent on remote operations.</span></p>
<p><span style="font-weight:400;">Ginter sheds light on the limitations of software-based solutions and the strategic advantages of hardware-enforced security, while also discussing his book "Engineering Great OT Security" and the latest initiatives in cyber-informed engineering. </span></p>
<p><span style="font-weight:400;">Tune in to learn how organizations can remain competitive, reduce costs, and stay secure in an increasingly interconnected industrial world. This enlightening discussion could change the way you think about remote access!</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">05:53 Spectrum of consequence in remote access explained.</span></p>
<p><span style="font-weight:400;">07:55 Security flaws in remote access systems.</span></p>
<p><span style="font-weight:400;">10:23 Remote access is often overlooked by many.</span></p>
<p><span style="font-weight:400;">15:11 Supply chain vulnerability due to cloud connectivity.</span></p>
<p><span style="font-weight:400;">17:33 Hardware-enforced remote access, HERA, fills the security spectrum.</span></p>
<p><span style="font-weight:400;">20:52 Custom ASIC with 1M transistors for encryption.</span></p>
<p><span style="font-weight:400;">25:55 Ways to exploit network security vulnerabilities discussed.</span></p>
<p><span style="font-weight:400;">26:35 Exploiting technology to send unauthorized messages.</span></p>
<p><span style="font-weight:400;">32:50 Benefits of centralizing engineering teams in businesses.</span></p>
<p><span style="font-weight:400;">34:18 Competing in the international market with unique services.</span></p>
<p><span style="font-weight:400;">39:31 Understanding the implications before implementing technology is crucial.</span></p>
<p><span style="font-weight:400;">40:30 Uncertainty about large number, risk opportunity tap.</span></p>
<p><span style="font-weight:400;">43:50 Firewall controls data flow and is potentially misconfigurable.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">At Waterfall Security, Andrew leads a team of experts working with the world's most secure industrial sites. He is the author of three books on industrial security, co-author of the IIoT SF and the UITP Guide to CyberSecurity in Tendering, and co-host of the Industrial Security Podcast.</span></p>
<p><strong>Links:</strong></p>
<p><a href="https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/"><span style="font-weight:400;">https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/</span></a></p>
<p><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/andrewginter/"><span style="font-weight:400;">https://www.linkedin.com/in/andrewginter/</span></a></p>
<p><span style="font-weight:400;">Email Andrew: </span><span style="font-weight:400;">andrew.ginter@waterfall-security.com</span><span style="font-weight:400;"> </span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Welcome back to *Protect It All*! In Episode 17, host Aaron Crow is joined by Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, to dive deep into secure remote access for Operational Technology (OT) systems. They explore the cutting-edge HERA (Hardware Enforced Remote Access) technology, which offers a revolutionary approach to remote control via TPM hardware, unidirectional gateways, and stringent encryption protocols. 
This episode covers everything from the critical need for robust security in high-stakes environments like wind farms and manufacturing to the dangers of supply chain vulnerabilities to the broader implications for industries dependent on remote operations.
Ginter sheds light on the limitations of software-based solutions and the strategic advantages of hardware-enforced security, while also discussing his book "Engineering Great OT Security" and the latest initiatives in cyber-informed engineering. 
Tune in to learn how organizations can remain competitive, reduce costs, and stay secure in an increasingly interconnected industrial world. This enlightening discussion could change the way you think about remote access!
 
Key Moments: 
 
05:53 Spectrum of consequence in remote access explained.
07:55 Security flaws in remote access systems.
10:23 Remote access is often overlooked by many.
15:11 Supply chain vulnerability due to cloud connectivity.
17:33 Hardware-enforced remote access, HERA, fills the security spectrum.
20:52 Custom ASIC with 1M transistors for encryption.
25:55 Ways to exploit network security vulnerabilities discussed.
26:35 Exploiting technology to send unauthorized messages.
32:50 Benefits of centralizing engineering teams in businesses.
34:18 Competing in the international market with unique services.
39:31 Understanding the implications before implementing technology is crucial.
40:30 Uncertainty about large number, risk opportunity tap.
43:50 Firewall controls data flow and is potentially misconfigurable.
 
About the guest : 
 
At Waterfall Security, Andrew leads a team of experts working with the world's most secure industrial sites. He is the author of three books on industrial security, co-author of the IIoT SF and the UITP Guide to CyberSecurity in Tendering, and co-host of the Industrial Security Podcast.
Links:
https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/
LinkedIn: https://www.linkedin.com/in/andrewginter/
Email Andrew: andrew.ginter@waterfall-security.com 
 
Connect With Aaron Crow:

]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew Ginter]]>
                </itunes:title>
                                    <itunes:episode>17</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Welcome back to *Protect It All*! In Episode 17, host Aaron Crow is joined by Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, to dive deep into secure remote access for Operational Technology (OT) systems. They explore the cutting-edge HERA (Hardware Enforced Remote Access) technology, which offers a revolutionary approach to remote control via TPM hardware, unidirectional gateways, and stringent encryption protocols. </span></p>
<p><span style="font-weight:400;">This episode covers everything from the critical need for robust security in high-stakes environments like wind farms and manufacturing to the dangers of supply chain vulnerabilities to the broader implications for industries dependent on remote operations.</span></p>
<p><span style="font-weight:400;">Ginter sheds light on the limitations of software-based solutions and the strategic advantages of hardware-enforced security, while also discussing his book "Engineering Great OT Security" and the latest initiatives in cyber-informed engineering. </span></p>
<p><span style="font-weight:400;">Tune in to learn how organizations can remain competitive, reduce costs, and stay secure in an increasingly interconnected industrial world. This enlightening discussion could change the way you think about remote access!</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">05:53 Spectrum of consequence in remote access explained.</span></p>
<p><span style="font-weight:400;">07:55 Security flaws in remote access systems.</span></p>
<p><span style="font-weight:400;">10:23 Remote access is often overlooked by many.</span></p>
<p><span style="font-weight:400;">15:11 Supply chain vulnerability due to cloud connectivity.</span></p>
<p><span style="font-weight:400;">17:33 Hardware-enforced remote access, HERA, fills the security spectrum.</span></p>
<p><span style="font-weight:400;">20:52 Custom ASIC with 1M transistors for encryption.</span></p>
<p><span style="font-weight:400;">25:55 Ways to exploit network security vulnerabilities discussed.</span></p>
<p><span style="font-weight:400;">26:35 Exploiting technology to send unauthorized messages.</span></p>
<p><span style="font-weight:400;">32:50 Benefits of centralizing engineering teams in businesses.</span></p>
<p><span style="font-weight:400;">34:18 Competing in the international market with unique services.</span></p>
<p><span style="font-weight:400;">39:31 Understanding the implications before implementing technology is crucial.</span></p>
<p><span style="font-weight:400;">40:30 Uncertainty about large number, risk opportunity tap.</span></p>
<p><span style="font-weight:400;">43:50 Firewall controls data flow and is potentially misconfigurable.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">At Waterfall Security, Andrew leads a team of experts working with the world's most secure industrial sites. He is the author of three books on industrial security, co-author of the IIoT SF and the UITP Guide to CyberSecurity in Tendering, and co-host of the Industrial Security Podcast.</span></p>
<p><strong>Links:</strong></p>
<p><a href="https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/"><span style="font-weight:400;">https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/</span></a></p>
<p><span style="font-weight:400;">LinkedIn: </span><a href="https://www.linkedin.com/in/andrewginter/"><span style="font-weight:400;">https://www.linkedin.com/in/andrewginter/</span></a></p>
<p><span style="font-weight:400;">Email Andrew: </span><span style="font-weight:400;">andrew.ginter@waterfall-security.com</span><span style="font-weight:400;"> </span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><span style="font-weight:400;">To be a guest or suggest a guest/episode, please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1789704/c1e-x510gbmv485fr56k1-mk0w0vxmf3rg-dshh7d.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1789704&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=bffee629647ca70a3ff388ffd5e22d1995a33484d06358a6c23bc0c61b6b7823" length="45863576"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Welcome back to *Protect It All*! In Episode 17, host Aaron Crow is joined by Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, to dive deep into secure remote access for Operational Technology (OT) systems. They explore the cutting-edge HERA (Hardware Enforced Remote Access) technology, which offers a revolutionary approach to remote control via TPM hardware, unidirectional gateways, and stringent encryption protocols. 
This episode covers everything from the critical need for robust security in high-stakes environments like wind farms and manufacturing to the dangers of supply chain vulnerabilities to the broader implications for industries dependent on remote operations.
Ginter sheds light on the limitations of software-based solutions and the strategic advantages of hardware-enforced security, while also discussing his book "Engineering Great OT Security" and the latest initiatives in cyber-informed engineering. 
Tune in to learn how organizations can remain competitive, reduce costs, and stay secure in an increasingly interconnected industrial world. This enlightening discussion could change the way you think about remote access!
 
Key Moments: 
 
05:53 Spectrum of consequence in remote access explained.
07:55 Security flaws in remote access systems.
10:23 Remote access is often overlooked by many.
15:11 Supply chain vulnerability due to cloud connectivity.
17:33 Hardware-enforced remote access, HERA, fills the security spectrum.
20:52 Custom ASIC with 1M transistors for encryption.
25:55 Ways to exploit network security vulnerabilities discussed.
26:35 Exploiting technology to send unauthorized messages.
32:50 Benefits of centralizing engineering teams in businesses.
34:18 Competing in the international market with unique services.
39:31 Understanding the implications before implementing technology is crucial.
40:30 Uncertainty about large number, risk opportunity tap.
43:50 Firewall controls data flow and is potentially misconfigurable.
 
About the guest : 
 
At Waterfall Security, Andrew leads a team of experts working with the world's most secure industrial sites. He is the author of three books on industrial security, co-author of the IIoT SF and the UITP Guide to CyberSecurity in Tendering, and co-host of the Industrial Security Podcast.
Links:
https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/
LinkedIn: https://www.linkedin.com/in/andrewginter/
Email Andrew: andrew.ginter@waterfall-security.com 
 
Connect With Aaron Crow:

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1789704/c1a-w52rp-v61p1r27h7g8-dyooda.jpg"></itunes:image>
                                                                            <itunes:duration>00:46:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Understanding IT OT Convergence: Dealing with Challenges and Building Trust]]>
                </title>
                <pubDate>Mon, 15 Jul 2024 10:00:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1785889</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow delves into IT OT convergence, a crucial yet often misunderstood topic. Listeners will gain insights into the distinct differences between IT and OT, the challenges of integrating these fields, and the reasons behind the historical mistrust between IT and OT teams.</span></p>
<p><span style="font-weight:400;">Aaron discusses how technology might be similar, but the roles and impacts are starkly different—with IT focusing on corporate environments and OT handling mission-critical operations like power plants and manufacturing lines. He also shares real-world stories and strategies for building trust and fostering collaboration between these often siloed teams.</span></p>
<p><span style="font-weight:400;">Tune in to learn how to overcome these hurdles to create a more secure and efficient organization. Whether you're an IT professional or an OT specialist, this episode offers valuable perspectives on navigating the complexities of IT OT convergence.</span></p>
<p><br /><br /></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">00:10 Technology similarities, lack of understanding, a trust issue.</span></p>
<p><span style="font-weight:400;">03:49 Corporate distrust causes technology outages and inefficiency.</span></p>
<p><span style="font-weight:400;">07:21 Building trust and collaboration for buy-in.</span></p>
<p><span style="font-weight:400;">11:20 Different games, but similar athletic requirements.</span></p>
<p><span style="font-weight:400;">15:38 Team successful in providing technical support in Texas.</span></p>
<p><span style="font-weight:400;">17:09 Connect with us at Black Hat, DEF CON.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at</strong> <a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow delves into IT OT convergence, a crucial yet often misunderstood topic. Listeners will gain insights into the distinct differences between IT and OT, the challenges of integrating these fields, and the reasons behind the historical mistrust between IT and OT teams.
Aaron discusses how technology might be similar, but the roles and impacts are starkly different—with IT focusing on corporate environments and OT handling mission-critical operations like power plants and manufacturing lines. He also shares real-world stories and strategies for building trust and fostering collaboration between these often siloed teams.
Tune in to learn how to overcome these hurdles to create a more secure and efficient organization. Whether you're an IT professional or an OT specialist, this episode offers valuable perspectives on navigating the complexities of IT OT convergence.

Key Moments: 
00:10 Technology similarities, lack of understanding, a trust issue.
03:49 Corporate distrust causes technology outages and inefficiency.
07:21 Building trust and collaboration for buy-in.
11:20 Different games, but similar athletic requirements.
15:38 Team successful in providing technical support in Texas.
17:09 Connect with us at Black Hat, DEF CON.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Understanding IT OT Convergence: Dealing with Challenges and Building Trust]]>
                </itunes:title>
                                    <itunes:episode>16</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow delves into IT OT convergence, a crucial yet often misunderstood topic. Listeners will gain insights into the distinct differences between IT and OT, the challenges of integrating these fields, and the reasons behind the historical mistrust between IT and OT teams.</span></p>
<p><span style="font-weight:400;">Aaron discusses how technology might be similar, but the roles and impacts are starkly different—with IT focusing on corporate environments and OT handling mission-critical operations like power plants and manufacturing lines. He also shares real-world stories and strategies for building trust and fostering collaboration between these often siloed teams.</span></p>
<p><span style="font-weight:400;">Tune in to learn how to overcome these hurdles to create a more secure and efficient organization. Whether you're an IT professional or an OT specialist, this episode offers valuable perspectives on navigating the complexities of IT OT convergence.</span></p>
<p><br /><br /></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">00:10 Technology similarities, lack of understanding, a trust issue.</span></p>
<p><span style="font-weight:400;">03:49 Corporate distrust causes technology outages and inefficiency.</span></p>
<p><span style="font-weight:400;">07:21 Building trust and collaboration for buy-in.</span></p>
<p><span style="font-weight:400;">11:20 Different games, but similar athletic requirements.</span></p>
<p><span style="font-weight:400;">15:38 Team successful in providing technical support in Texas.</span></p>
<p><span style="font-weight:400;">17:09 Connect with us at Black Hat, DEF CON.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at</strong> <a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1785889/c1e-52n9dum0k5nurmdd5-ok4mzmg4upnq-dcl5sb.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1785889&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=e377ee9ddf9655b94560cd0382b24173ca42a1321ea0800c07f85171a71e88ad" length="18529366"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow delves into IT OT convergence, a crucial yet often misunderstood topic. Listeners will gain insights into the distinct differences between IT and OT, the challenges of integrating these fields, and the reasons behind the historical mistrust between IT and OT teams.
Aaron discusses how technology might be similar, but the roles and impacts are starkly different—with IT focusing on corporate environments and OT handling mission-critical operations like power plants and manufacturing lines. He also shares real-world stories and strategies for building trust and fostering collaboration between these often siloed teams.
Tune in to learn how to overcome these hurdles to create a more secure and efficient organization. Whether you're an IT professional or an OT specialist, this episode offers valuable perspectives on navigating the complexities of IT OT convergence.

Key Moments: 
00:10 Technology similarities, lack of understanding, a trust issue.
03:49 Corporate distrust causes technology outages and inefficiency.
07:21 Building trust and collaboration for buy-in.
11:20 Different games, but similar athletic requirements.
15:38 Team successful in providing technical support in Texas.
17:09 Connect with us at Black Hat, DEF CON.
 
Connect With Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1785889/c1a-w52rp-0vdkpkg2iq3o-4d8yxp.jpg"></itunes:image>
                                                                            <itunes:duration>00:18:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Navigating Cybersecurity in OT: Challenges, Tools, and AI Integration with Joseph Perry]]>
                </title>
                <pubDate>Mon, 08 Jul 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1781378</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, Aaron Crow and special guest Joseph Perry dive deeply into the evolving landscape of cybersecurity. The episode explores the integration of commercial off-the-shelf systems into OT environments, highlighting how this transition brings similar security challenges from the IT sector into play. Throughout their discussion, Aaron and Joseph tackle the complex vulnerabilities, the resistance to adopting new technologies, and the critical necessity of tailored security measures. They also examine the pervasive buzzwords like "AI" in modern cybersecurity products.</span></p>
<p><span style="font-weight:400;">Listeners will gain insights into the growing regulatory scrutiny from the SEC, the heightened responsibility of Chief Security Officers, and the anticipated evolution of cybersecurity professions into more rigorous, skilled trades. The conversation further touches on the chaotic state of threat intelligence, the impact of technological advancements such as AI on cyber-attacks, and the increasing industrialization of fraud. From understanding the hype cycles of AI to the practical challenges of explaining complex security solutions to non-technical stakeholders, this episode is packed with valuable information.</span></p>
<p><span style="font-weight:400;">Aaron and Joseph also discuss the importance of learning from past IT mistakes when adopting new technologies and the unique challenges of protecting both cutting-edge and legacy systems within OT environments. As they address topics like social engineering attacks, ransomware, and the use of AI tools in cybersecurity, listeners will come away better equipped to navigate the intricate cybersecurity landscape. Tune in for a comprehensive exploration of these critical issues.</span></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">05:36 Library catalog conversion led to career in cybersecurity.</span></p>
<p><span style="font-weight:400;">15:02 AI useful in cybersecurity for structured data.</span></p>
<p><span style="font-weight:400;">18:07 Questions remain about AI, and human intervention need.</span></p>
<p><span style="font-weight:400;">25:39 Advanced fraud detection surpasses current AI capabilities.</span></p>
<p><span style="font-weight:400;">28:37 AI contributes significantly to medicine, finance, and cybersecurity.</span></p>
<p><span style="font-weight:400;">34:57 Powerful means test and audience testing revolutionized fraud.</span></p>
<p><span style="font-weight:400;">37:58 Attacks getting shorter, focused on initial access.</span></p>
<p><span style="font-weight:400;">47:52 Focus shifts to CPE, vulnerability, and attack.</span></p>
<p><span style="font-weight:400;">48:53 Russian threat actors reassert, causing chaos. No rules.</span></p>
<p><span style="font-weight:400;">54:43 IT challenges in dealing with construction clients.</span></p>
<p><span style="font-weight:400;">59:56 Evolution of cyber security concerns and measures.</span></p>
<p> </p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Joseph Perry is a seasoned cybersecurity expert currently leading incident response, threat intelligence, and purple teaming at MorganFranklin Cyber. With a background spanning the US Navy and the National Security Agency, Perry has built a robust expertise in emerging technology and cybersecurity. He specializes in critical infrastructure protection, threat intelligence, and the adoption of new technologies.</span></p>
<p><span style="font-weight:400;">Perry is a prominent figure in the cybersecurity community, contributing his insights at major conferences like Black Hat and Defcon. He focuses on the practical applications of AI in cybersecurity, fraud detection, and the evolving threat landscape. Committed to advancing the field, Perry emphasizes continuous learning and domain expertise to help organizations combat cyber threat...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Aaron Crow and special guest Joseph Perry dive deeply into the evolving landscape of cybersecurity. The episode explores the integration of commercial off-the-shelf systems into OT environments, highlighting how this transition brings similar security challenges from the IT sector into play. Throughout their discussion, Aaron and Joseph tackle the complex vulnerabilities, the resistance to adopting new technologies, and the critical necessity of tailored security measures. They also examine the pervasive buzzwords like "AI" in modern cybersecurity products.
Listeners will gain insights into the growing regulatory scrutiny from the SEC, the heightened responsibility of Chief Security Officers, and the anticipated evolution of cybersecurity professions into more rigorous, skilled trades. The conversation further touches on the chaotic state of threat intelligence, the impact of technological advancements such as AI on cyber-attacks, and the increasing industrialization of fraud. From understanding the hype cycles of AI to the practical challenges of explaining complex security solutions to non-technical stakeholders, this episode is packed with valuable information.
Aaron and Joseph also discuss the importance of learning from past IT mistakes when adopting new technologies and the unique challenges of protecting both cutting-edge and legacy systems within OT environments. As they address topics like social engineering attacks, ransomware, and the use of AI tools in cybersecurity, listeners will come away better equipped to navigate the intricate cybersecurity landscape. Tune in for a comprehensive exploration of these critical issues.
Key Moments: 
05:36 Library catalog conversion led to career in cybersecurity.
15:02 AI useful in cybersecurity for structured data.
18:07 Questions remain about AI, and human intervention need.
25:39 Advanced fraud detection surpasses current AI capabilities.
28:37 AI contributes significantly to medicine, finance, and cybersecurity.
34:57 Powerful means test and audience testing revolutionized fraud.
37:58 Attacks getting shorter, focused on initial access.
47:52 Focus shifts to CPE, vulnerability, and attack.
48:53 Russian threat actors reassert, causing chaos. No rules.
54:43 IT challenges in dealing with construction clients.
59:56 Evolution of cyber security concerns and measures.
 
About the guest : 
Joseph Perry is a seasoned cybersecurity expert currently leading incident response, threat intelligence, and purple teaming at MorganFranklin Cyber. With a background spanning the US Navy and the National Security Agency, Perry has built a robust expertise in emerging technology and cybersecurity. He specializes in critical infrastructure protection, threat intelligence, and the adoption of new technologies.
Perry is a prominent figure in the cybersecurity community, contributing his insights at major conferences like Black Hat and Defcon. He focuses on the practical applications of AI in cybersecurity, fraud detection, and the evolving threat landscape. Committed to advancing the field, Perry emphasizes continuous learning and domain expertise to help organizations combat cyber threat...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Navigating Cybersecurity in OT: Challenges, Tools, and AI Integration with Joseph Perry]]>
                </itunes:title>
                                    <itunes:episode>15</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, Aaron Crow and special guest Joseph Perry dive deeply into the evolving landscape of cybersecurity. The episode explores the integration of commercial off-the-shelf systems into OT environments, highlighting how this transition brings similar security challenges from the IT sector into play. Throughout their discussion, Aaron and Joseph tackle the complex vulnerabilities, the resistance to adopting new technologies, and the critical necessity of tailored security measures. They also examine the pervasive buzzwords like "AI" in modern cybersecurity products.</span></p>
<p><span style="font-weight:400;">Listeners will gain insights into the growing regulatory scrutiny from the SEC, the heightened responsibility of Chief Security Officers, and the anticipated evolution of cybersecurity professions into more rigorous, skilled trades. The conversation further touches on the chaotic state of threat intelligence, the impact of technological advancements such as AI on cyber-attacks, and the increasing industrialization of fraud. From understanding the hype cycles of AI to the practical challenges of explaining complex security solutions to non-technical stakeholders, this episode is packed with valuable information.</span></p>
<p><span style="font-weight:400;">Aaron and Joseph also discuss the importance of learning from past IT mistakes when adopting new technologies and the unique challenges of protecting both cutting-edge and legacy systems within OT environments. As they address topics like social engineering attacks, ransomware, and the use of AI tools in cybersecurity, listeners will come away better equipped to navigate the intricate cybersecurity landscape. Tune in for a comprehensive exploration of these critical issues.</span></p>
<p><span style="font-weight:400;">Key Moments: </span></p>
<p><span style="font-weight:400;">05:36 Library catalog conversion led to career in cybersecurity.</span></p>
<p><span style="font-weight:400;">15:02 AI useful in cybersecurity for structured data.</span></p>
<p><span style="font-weight:400;">18:07 Questions remain about AI, and human intervention need.</span></p>
<p><span style="font-weight:400;">25:39 Advanced fraud detection surpasses current AI capabilities.</span></p>
<p><span style="font-weight:400;">28:37 AI contributes significantly to medicine, finance, and cybersecurity.</span></p>
<p><span style="font-weight:400;">34:57 Powerful means test and audience testing revolutionized fraud.</span></p>
<p><span style="font-weight:400;">37:58 Attacks getting shorter, focused on initial access.</span></p>
<p><span style="font-weight:400;">47:52 Focus shifts to CPE, vulnerability, and attack.</span></p>
<p><span style="font-weight:400;">48:53 Russian threat actors reassert, causing chaos. No rules.</span></p>
<p><span style="font-weight:400;">54:43 IT challenges in dealing with construction clients.</span></p>
<p><span style="font-weight:400;">59:56 Evolution of cyber security concerns and measures.</span></p>
<p> </p>
<p><span style="font-weight:400;">About the guest : </span></p>
<p><span style="font-weight:400;">Joseph Perry is a seasoned cybersecurity expert currently leading incident response, threat intelligence, and purple teaming at MorganFranklin Cyber. With a background spanning the US Navy and the National Security Agency, Perry has built a robust expertise in emerging technology and cybersecurity. He specializes in critical infrastructure protection, threat intelligence, and the adoption of new technologies.</span></p>
<p><span style="font-weight:400;">Perry is a prominent figure in the cybersecurity community, contributing his insights at major conferences like Black Hat and Defcon. He focuses on the practical applications of AI in cybersecurity, fraud detection, and the evolving threat landscape. Committed to advancing the field, Perry emphasizes continuous learning and domain expertise to help organizations combat cyber threats effectively</span></p>
<p><span style="font-weight:400;">How to connect Joseph : </span><a href="https://www.linkedin.com/in/lousyhacker/"><span style="font-weight:400;">https://www.linkedin.com/in/lousyhacker/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p><br /><span style="font-weight:400;">To be a guest or suggest a guest/episode, please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1781378/c1e-1q3v7ij024gh114w8-0vd242qntm7z-qsuhdj.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1781378&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=5d6cd30f48c3b0c86d2b8f0941b1aee1ce26a0eafea87c2e8bf108fc1f0352fd" length="77396906"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Aaron Crow and special guest Joseph Perry dive deeply into the evolving landscape of cybersecurity. The episode explores the integration of commercial off-the-shelf systems into OT environments, highlighting how this transition brings similar security challenges from the IT sector into play. Throughout their discussion, Aaron and Joseph tackle the complex vulnerabilities, the resistance to adopting new technologies, and the critical necessity of tailored security measures. They also examine the pervasive buzzwords like "AI" in modern cybersecurity products.
Listeners will gain insights into the growing regulatory scrutiny from the SEC, the heightened responsibility of Chief Security Officers, and the anticipated evolution of cybersecurity professions into more rigorous, skilled trades. The conversation further touches on the chaotic state of threat intelligence, the impact of technological advancements such as AI on cyber-attacks, and the increasing industrialization of fraud. From understanding the hype cycles of AI to the practical challenges of explaining complex security solutions to non-technical stakeholders, this episode is packed with valuable information.
Aaron and Joseph also discuss the importance of learning from past IT mistakes when adopting new technologies and the unique challenges of protecting both cutting-edge and legacy systems within OT environments. As they address topics like social engineering attacks, ransomware, and the use of AI tools in cybersecurity, listeners will come away better equipped to navigate the intricate cybersecurity landscape. Tune in for a comprehensive exploration of these critical issues.
Key Moments: 
05:36 Library catalog conversion led to career in cybersecurity.
15:02 AI useful in cybersecurity for structured data.
18:07 Questions remain about AI, and human intervention need.
25:39 Advanced fraud detection surpasses current AI capabilities.
28:37 AI contributes significantly to medicine, finance, and cybersecurity.
34:57 Powerful means test and audience testing revolutionized fraud.
37:58 Attacks getting shorter, focused on initial access.
47:52 Focus shifts to CPE, vulnerability, and attack.
48:53 Russian threat actors reassert, causing chaos. No rules.
54:43 IT challenges in dealing with construction clients.
59:56 Evolution of cyber security concerns and measures.
 
About the guest : 
Joseph Perry is a seasoned cybersecurity expert currently leading incident response, threat intelligence, and purple teaming at MorganFranklin Cyber. With a background spanning the US Navy and the National Security Agency, Perry has built a robust expertise in emerging technology and cybersecurity. He specializes in critical infrastructure protection, threat intelligence, and the adoption of new technologies.
Perry is a prominent figure in the cybersecurity community, contributing his insights at major conferences like Black Hat and Defcon. He focuses on the practical applications of AI in cybersecurity, fraud detection, and the evolving threat landscape. Committed to advancing the field, Perry emphasizes continuous learning and domain expertise to help organizations combat cyber threat...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1781378/c1a-w52rp-1p0dxdqgcv36-ltayjk.jpg"></itunes:image>
                                                                            <itunes:duration>01:03:13</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 14 - Practical Approaches to OT Cybersecurity in Critical Infrastructure]]>
                </title>
                <pubDate>Mon, 01 Jul 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1775728</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, our host, Aaron Crow, explores the intriguing world of OT cybersecurity products.</span></p>
<p> </p>
<p><span style="font-weight:400;">This episode explores the key differences between IT and OT, the challenges faced in OT environments, and how some IT products can actually be adapted for OT use.</span></p>
<p> </p>
<p><span style="font-weight:400;">Aaron explains why availability and safety take precedence in OT settings, from power plants to manufacturing lines, and how traditional IT cybersecurity measures need to be tailored for these unique environments. He also discusses the importance of understanding protocols, implementing multi-layered defenses, and leveraging advancements in cybersecurity tools.</span></p>
<p> </p>
<p><span style="font-weight:400;">Tune in as we unravel the distinct intricacies of protecting our critical infrastructures and discover how IT and OT worlds continue to converge.</span></p>
<p><br /><br /></p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">00:10 Adapting IT products for OT cybersecurity challenges.</span></p>
<p><span style="font-weight:400;">06:33 IT products integrating OT capabilities, impacting uptime.</span></p>
<p><span style="font-weight:400;">10:33 Windows XP boxes in production pose risk.</span></p>
<p><span style="font-weight:400;">14:00 Access device remotely to avoid travel time.</span></p>
<p><span style="font-weight:400;">17:45 Complex network setup required for risk reduction.</span></p>
<p><span style="font-weight:400;">20:06 Multiple vendors complicate technology and support solutions.</span></p>
<p><span style="font-weight:400;">24:14 Plan for OT challenges by engaging IT.</span></p>
<p><span style="font-weight:400;">26:21 OT and IT overlap, and industry devices evolve.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<p> </p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<p> </p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at</strong> <a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, our host, Aaron Crow, explores the intriguing world of OT cybersecurity products.
 
This episode explores the key differences between IT and OT, the challenges faced in OT environments, and how some IT products can actually be adapted for OT use.
 
Aaron explains why availability and safety take precedence in OT settings, from power plants to manufacturing lines, and how traditional IT cybersecurity measures need to be tailored for these unique environments. He also discusses the importance of understanding protocols, implementing multi-layered defenses, and leveraging advancements in cybersecurity tools.
 
Tune in as we unravel the distinct intricacies of protecting our critical infrastructures and discover how IT and OT worlds continue to converge.

Key Moments: 
 
00:10 Adapting IT products for OT cybersecurity challenges.
06:33 IT products integrating OT capabilities, impacting uptime.
10:33 Windows XP boxes in production pose risk.
14:00 Access device remotely to avoid travel time.
17:45 Complex network setup required for risk reduction.
20:06 Multiple vendors complicate technology and support solutions.
24:14 Plan for OT challenges by engaging IT.
26:21 OT and IT overlap, and industry devices evolve.
 
Connect With Aaron Crow:
 

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:
 

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 14 - Practical Approaches to OT Cybersecurity in Critical Infrastructure]]>
                </itunes:title>
                                    <itunes:episode>14</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, our host, Aaron Crow, explores the intriguing world of OT cybersecurity products.</span></p>
<p> </p>
<p><span style="font-weight:400;">This episode explores the key differences between IT and OT, the challenges faced in OT environments, and how some IT products can actually be adapted for OT use.</span></p>
<p> </p>
<p><span style="font-weight:400;">Aaron explains why availability and safety take precedence in OT settings, from power plants to manufacturing lines, and how traditional IT cybersecurity measures need to be tailored for these unique environments. He also discusses the importance of understanding protocols, implementing multi-layered defenses, and leveraging advancements in cybersecurity tools.</span></p>
<p> </p>
<p><span style="font-weight:400;">Tune in as we unravel the distinct intricacies of protecting our critical infrastructures and discover how IT and OT worlds continue to converge.</span></p>
<p><br /><br /></p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">00:10 Adapting IT products for OT cybersecurity challenges.</span></p>
<p><span style="font-weight:400;">06:33 IT products integrating OT capabilities, impacting uptime.</span></p>
<p><span style="font-weight:400;">10:33 Windows XP boxes in production pose risk.</span></p>
<p><span style="font-weight:400;">14:00 Access device remotely to avoid travel time.</span></p>
<p><span style="font-weight:400;">17:45 Complex network setup required for risk reduction.</span></p>
<p><span style="font-weight:400;">20:06 Multiple vendors complicate technology and support solutions.</span></p>
<p><span style="font-weight:400;">24:14 Plan for OT challenges by engaging IT.</span></p>
<p><span style="font-weight:400;">26:21 OT and IT overlap, and industry devices evolve.</span></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<p> </p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<p> </p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><strong>To be a guest or suggest a guest/episode, please email us at</strong> <a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1775728/c1e-3qromi5nd47t68kvg-xmzzr2ojfrr8-eyxzyl.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1775728&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=c3d4705340efb6cffa1d7d76995bddbdc06db3d4550189b132633456183934af" length="35935738"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, our host, Aaron Crow, explores the intriguing world of OT cybersecurity products.
 
This episode explores the key differences between IT and OT, the challenges faced in OT environments, and how some IT products can actually be adapted for OT use.
 
Aaron explains why availability and safety take precedence in OT settings, from power plants to manufacturing lines, and how traditional IT cybersecurity measures need to be tailored for these unique environments. He also discusses the importance of understanding protocols, implementing multi-layered defenses, and leveraging advancements in cybersecurity tools.
 
Tune in as we unravel the distinct intricacies of protecting our critical infrastructures and discover how IT and OT worlds continue to converge.

Key Moments: 
 
00:10 Adapting IT products for OT cybersecurity challenges.
06:33 IT products integrating OT capabilities, impacting uptime.
10:33 Windows XP boxes in production pose risk.
14:00 Access device remotely to avoid travel time.
17:45 Complex network setup required for risk reduction.
20:06 Multiple vendors complicate technology and support solutions.
24:14 Plan for OT challenges by engaging IT.
26:21 OT and IT overlap, and industry devices evolve.
 
Connect With Aaron Crow:
 

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

 
Learn more about PrOTect IT All:
 

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

 
To be a guest or suggest a guest/episode, please email us at info@protectitall.co]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1775728/c1a-w52rp-7nqqvd3vh2pg-nnifij.jpg"></itunes:image>
                                                                            <itunes:duration>00:27:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Unlocking the Future: Hands-On Learning and AI's Role in Cybersecurity Education with Philip Huff]]>
                </title>
                <pubDate>Mon, 24 Jun 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1770215</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Welcome to Episode 13 of Protect It All! This episode features Philip Huff, a professor at UA Little Rock and a cybersecurity expert. He explores the promise of AI in education, especially for robotics and automation, while cautioning against the erosion of educational rigor.</span></p>
<p><span style="font-weight:400;">Philip and host Aaron Crow discuss the importance of hands-on learning and real-world experience in aligning educational standards with industry needs. They delve into the role of industry partnerships, the necessity of embedding cybersecurity education at the community college level, and the growing skills gap in technology due to retiring experts.</span></p>
<p><span style="font-weight:400;">The conversation also covers the advantages of competency-based education and flexible training programs in enhancing social mobility. Throughout, they stress the critical role of human involvement in AI and cybersecurity and the need for innovative, resilient systems.</span></p>
<p><span style="font-weight:400;">Tune in for an engaging discussion on the future of education and workforce development in the tech and cybersecurity sectors.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 Early career challenges prepare for real-world demands.</span></p>
<p><span style="font-weight:400;">04:35 Degree's purpose is knowledge and skill acquisition.</span></p>
<p><span style="font-weight:400;">08:17 Promoting cyber-informed engineering principles in community colleges.</span></p>
<p><span style="font-weight:400;">11:32 Small private school in Texas prioritizes practical engineering.</span></p>
<p><span style="font-weight:400;">14:48 Trade skills in high demand, apprenticeships offered.</span></p>
<p><span style="font-weight:400;">17:33 Community colleges offer efficient curriculum changes for workforce.</span></p>
<p><span style="font-weight:400;">23:12 Team's success attributed to aligning schedules with peers.</span></p>
<p><span style="font-weight:400;">26:57 Company and employee benefit from long-term commitment.</span></p>
<p><span style="font-weight:400;">28:46 Aligning learning outcomes with career competencies is crucial.</span></p>
<p><span style="font-weight:400;">31:44 Retooling professionals for new careers and skills.</span></p>
<p><span style="font-weight:400;">36:13 Value education based on future job prospects.</span></p>
<p><span style="font-weight:400;">37:35 Integration of AI in education needs balancing.</span></p>
<p><span style="font-weight:400;">42:52 Transforming education to align with real learning.</span></p>
<p><span style="font-weight:400;">46:28 Transforming classroom for positive shared learning experiences.</span></p>
<p><span style="font-weight:400;">49:57 Unused industrial equipment turned into educational tools.</span></p>
<p><span style="font-weight:400;">52:10 Learn troubleshooting, not just following instructions.</span></p>
<p><span style="font-weight:400;">56:07 Excitement and fear about accessible AI advancements.</span></p>
<p><span style="font-weight:400;">59:12 Developing cyber engineering education standards at Idaho National Labs.</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Philip Huff is an Associate Professor of Cybersecurity at the University of Arkansas in Little Rock and serves as the Director of Cybersecurity Research in the Emerging Analytics Center. Dr. Huff is also chief scientist and co-founder of Bastazo, a company specializing in cybersecurity solutions for industrial technology. He leads the National Cyber Teaching Academy, the Department of Energy’s Emerging Threat Information Sharing and Analysis Center, and the Cybersecurity Consortium for Innovation which all focus on driving work-force development and innovation for cybersecurity in the region. He is also a CISSP.</span></p>
<p><strong>How to connect with Philip:</strong> <a></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Welcome to Episode 13 of Protect It All! This episode features Philip Huff, a professor at UA Little Rock and a cybersecurity expert. He explores the promise of AI in education, especially for robotics and automation, while cautioning against the erosion of educational rigor.
Philip and host Aaron Crow discuss the importance of hands-on learning and real-world experience in aligning educational standards with industry needs. They delve into the role of industry partnerships, the necessity of embedding cybersecurity education at the community college level, and the growing skills gap in technology due to retiring experts.
The conversation also covers the advantages of competency-based education and flexible training programs in enhancing social mobility. Throughout, they stress the critical role of human involvement in AI and cybersecurity and the need for innovative, resilient systems.
Tune in for an engaging discussion on the future of education and workforce development in the tech and cybersecurity sectors.
 
Key Moments: 
00:10 Early career challenges prepare for real-world demands.
04:35 Degree's purpose is knowledge and skill acquisition.
08:17 Promoting cyber-informed engineering principles in community colleges.
11:32 Small private school in Texas prioritizes practical engineering.
14:48 Trade skills in high demand, apprenticeships offered.
17:33 Community colleges offer efficient curriculum changes for workforce.
23:12 Team's success attributed to aligning schedules with peers.
26:57 Company and employee benefit from long-term commitment.
28:46 Aligning learning outcomes with career competencies is crucial.
31:44 Retooling professionals for new careers and skills.
36:13 Value education based on future job prospects.
37:35 Integration of AI in education needs balancing.
42:52 Transforming education to align with real learning.
46:28 Transforming classroom for positive shared learning experiences.
49:57 Unused industrial equipment turned into educational tools.
52:10 Learn troubleshooting, not just following instructions.
56:07 Excitement and fear about accessible AI advancements.
59:12 Developing cyber engineering education standards at Idaho National Labs.
About the guest : 
Philip Huff is an Associate Professor of Cybersecurity at the University of Arkansas in Little Rock and serves as the Director of Cybersecurity Research in the Emerging Analytics Center. Dr. Huff is also chief scientist and co-founder of Bastazo, a company specializing in cybersecurity solutions for industrial technology. He leads the National Cyber Teaching Academy, the Department of Energy’s Emerging Threat Information Sharing and Analysis Center, and the Cybersecurity Consortium for Innovation which all focus on driving work-force development and innovation for cybersecurity in the region. He is also a CISSP.
How to connect with Philip: ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Unlocking the Future: Hands-On Learning and AI's Role in Cybersecurity Education with Philip Huff]]>
                </itunes:title>
                                    <itunes:episode>13</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Welcome to Episode 13 of Protect It All! This episode features Philip Huff, a professor at UA Little Rock and a cybersecurity expert. He explores the promise of AI in education, especially for robotics and automation, while cautioning against the erosion of educational rigor.</span></p>
<p><span style="font-weight:400;">Philip and host Aaron Crow discuss the importance of hands-on learning and real-world experience in aligning educational standards with industry needs. They delve into the role of industry partnerships, the necessity of embedding cybersecurity education at the community college level, and the growing skills gap in technology due to retiring experts.</span></p>
<p><span style="font-weight:400;">The conversation also covers the advantages of competency-based education and flexible training programs in enhancing social mobility. Throughout, they stress the critical role of human involvement in AI and cybersecurity and the need for innovative, resilient systems.</span></p>
<p><span style="font-weight:400;">Tune in for an engaging discussion on the future of education and workforce development in the tech and cybersecurity sectors.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 Early career challenges prepare for real-world demands.</span></p>
<p><span style="font-weight:400;">04:35 Degree's purpose is knowledge and skill acquisition.</span></p>
<p><span style="font-weight:400;">08:17 Promoting cyber-informed engineering principles in community colleges.</span></p>
<p><span style="font-weight:400;">11:32 Small private school in Texas prioritizes practical engineering.</span></p>
<p><span style="font-weight:400;">14:48 Trade skills in high demand, apprenticeships offered.</span></p>
<p><span style="font-weight:400;">17:33 Community colleges offer efficient curriculum changes for workforce.</span></p>
<p><span style="font-weight:400;">23:12 Team's success attributed to aligning schedules with peers.</span></p>
<p><span style="font-weight:400;">26:57 Company and employee benefit from long-term commitment.</span></p>
<p><span style="font-weight:400;">28:46 Aligning learning outcomes with career competencies is crucial.</span></p>
<p><span style="font-weight:400;">31:44 Retooling professionals for new careers and skills.</span></p>
<p><span style="font-weight:400;">36:13 Value education based on future job prospects.</span></p>
<p><span style="font-weight:400;">37:35 Integration of AI in education needs balancing.</span></p>
<p><span style="font-weight:400;">42:52 Transforming education to align with real learning.</span></p>
<p><span style="font-weight:400;">46:28 Transforming classroom for positive shared learning experiences.</span></p>
<p><span style="font-weight:400;">49:57 Unused industrial equipment turned into educational tools.</span></p>
<p><span style="font-weight:400;">52:10 Learn troubleshooting, not just following instructions.</span></p>
<p><span style="font-weight:400;">56:07 Excitement and fear about accessible AI advancements.</span></p>
<p><span style="font-weight:400;">59:12 Developing cyber engineering education standards at Idaho National Labs.</span></p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Philip Huff is an Associate Professor of Cybersecurity at the University of Arkansas in Little Rock and serves as the Director of Cybersecurity Research in the Emerging Analytics Center. Dr. Huff is also chief scientist and co-founder of Bastazo, a company specializing in cybersecurity solutions for industrial technology. He leads the National Cyber Teaching Academy, the Department of Energy’s Emerging Threat Information Sharing and Analysis Center, and the Cybersecurity Consortium for Innovation which all focus on driving work-force development and innovation for cybersecurity in the region. He is also a CISSP.</span></p>
<p><strong>How to connect with Philip:</strong> <a href="https://www.linkedin.com/in/philip-huff-65012621/"><span style="font-weight:400;">https://www.linkedin.com/in/philip-huff-65012621/</span></a></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><span style="font-weight:400;">To be a guest or suggest a guest/episode, please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1770215/c1e-odx2juvnw26imj9m1-o87gqqoniw1d-j4iaed.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1770215&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=0a0314dc37c2b36d15952b779439a068f2b7cf30618993f131d4d445dd15cb35" length="75081223"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Welcome to Episode 13 of Protect It All! This episode features Philip Huff, a professor at UA Little Rock and a cybersecurity expert. He explores the promise of AI in education, especially for robotics and automation, while cautioning against the erosion of educational rigor.
Philip and host Aaron Crow discuss the importance of hands-on learning and real-world experience in aligning educational standards with industry needs. They delve into the role of industry partnerships, the necessity of embedding cybersecurity education at the community college level, and the growing skills gap in technology due to retiring experts.
The conversation also covers the advantages of competency-based education and flexible training programs in enhancing social mobility. Throughout, they stress the critical role of human involvement in AI and cybersecurity and the need for innovative, resilient systems.
Tune in for an engaging discussion on the future of education and workforce development in the tech and cybersecurity sectors.
 
Key Moments: 
00:10 Early career challenges prepare for real-world demands.
04:35 Degree's purpose is knowledge and skill acquisition.
08:17 Promoting cyber-informed engineering principles in community colleges.
11:32 Small private school in Texas prioritizes practical engineering.
14:48 Trade skills in high demand, apprenticeships offered.
17:33 Community colleges offer efficient curriculum changes for workforce.
23:12 Team's success attributed to aligning schedules with peers.
26:57 Company and employee benefit from long-term commitment.
28:46 Aligning learning outcomes with career competencies is crucial.
31:44 Retooling professionals for new careers and skills.
36:13 Value education based on future job prospects.
37:35 Integration of AI in education needs balancing.
42:52 Transforming education to align with real learning.
46:28 Transforming classroom for positive shared learning experiences.
49:57 Unused industrial equipment turned into educational tools.
52:10 Learn troubleshooting, not just following instructions.
56:07 Excitement and fear about accessible AI advancements.
59:12 Developing cyber engineering education standards at Idaho National Labs.
About the guest : 
Philip Huff is an Associate Professor of Cybersecurity at the University of Arkansas in Little Rock and serves as the Director of Cybersecurity Research in the Emerging Analytics Center. Dr. Huff is also chief scientist and co-founder of Bastazo, a company specializing in cybersecurity solutions for industrial technology. He leads the National Cyber Teaching Academy, the Department of Energy’s Emerging Threat Information Sharing and Analysis Center, and the Cybersecurity Consortium for Innovation which all focus on driving work-force development and innovation for cybersecurity in the region. He is also a CISSP.
How to connect with Philip: ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1770215/c1a-w52rp-924d99opi43v-2wqmgr.jpg"></itunes:image>
                                                                            <itunes:duration>01:00:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Exploring the Impact of AI and 5G on Future Technologies with Dr. Anmol Agarwal]]>
                </title>
                <pubDate>Mon, 17 Jun 2024 10:30:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1763829</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, our host Aaron Crow, sits down with Dr. Anmol Agarwal, a distinguished security professional at Nokia and adjunct professor specializing in machine learning. Together, they dive deep into machine learning, AI, and cutting-edge telecommunications technologies.</span></p>
<p><span style="font-weight:400;">They uncover how vast amounts of data are crucial for training machine learning models to detect anomalies and prevent cyber threats, particularly in the telecommunications industry. Dr. Agarwal also sheds light on the transformative impacts of 5G and future 6G networks, from enhancing communication speed to revolutionizing smart manufacturing and industrial networks.</span></p>
<p><span style="font-weight:400;">Explore the fascinating world of digital twins, AI-powered anomaly detection, and the complexities of transitioning from 4G to 5G. Aaron and Dr. Agarwal also discuss the global efforts required to standardize these technologies and emphasize the importance of diversity and passion in the tech industry.</span></p>
<p><span style="font-weight:400;">Tune in as they tackle the current challenges and future possibilities in AI and telecommunications, and discover how these innovations are shaping the security landscape. Plus, take advantage of Dr. Agarwal's valuable insights and upcoming research on AI-based solutions to prevent DDoS attacks. Let's dive in!</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 Old technology, like dial-up, latency is important.</span></p>
<p><span style="font-weight:400;">04:08 Latency in IT and OT processes. Excitement for 5G.</span></p>
<p><span style="font-weight:400;">08:40 Machine learning for anomaly detection, digital twins, network sensing for 6G.</span></p>
<p><span style="font-weight:400;">12:54 5G as secure media pipe for communication.</span></p>
<p><span style="font-weight:400;">15:43 Training machine learning models requires ample data.</span></p>
<p><span style="font-weight:400;">18:14 AI benefits outweigh fear of job loss.</span></p>
<p><span style="font-weight:400;">22:06 AI creates and replaces jobs, imperfect but beneficial.</span></p>
<p><span style="font-weight:400;">25:34 AI adapts dynamically, opens limitless possibilities.</span></p>
<p><span style="font-weight:400;">27:31 Live stream with CEO playing themed tabletop.</span></p>
<p><span style="font-weight:400;">32:06 5G signal has shorter coverage than 4G.</span></p>
<p><span style="font-weight:400;">36:42 Diversity in cyber is crucial for innovation.</span></p>
<p><span style="font-weight:400;">40:37 Diverse backgrounds bring fresh perspectives to cybersecurity.</span></p>
<p><span style="font-weight:400;">43:04 AI creating deepfakes raises concerns about misinformation.</span></p>
<p><span style="font-weight:400;">45:01 Concerned about deep fake potential and solutions.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Dr. Anmol Agarwal is a security expert at Nokia, dedicated to securing advanced communication technologies such as 5G and upcoming 6G networks. Her critical work ensures that the data transmitted through your cell phone calls and text messages remains confidential and protected from hacking. Additionally, Dr. Agarwal imparts her extensive artificial intelligence knowledge as a part-time adjunct professor teaching machine learning. Her expertise not only safeguards our digital communications but also enhances their speed and efficiency through the innovative application of AI.</span></p>
<p><strong>How to connect with Dr. Anmol : </strong></p>
<p><span style="font-weight:400;">LinkedIn: </span><span style="font-weight:400;"> </span><a href="https://www.linkedin.com/in/anmolsagarwal/"><span style="font-weight:400;">https://www.linkedin.com/in/anmolsagarwal/</span></a></p>
<p><span style="font-weight:400;">X: </span><a href="https://twitter.com/anmolspeaker"><span></span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, our host Aaron Crow, sits down with Dr. Anmol Agarwal, a distinguished security professional at Nokia and adjunct professor specializing in machine learning. Together, they dive deep into machine learning, AI, and cutting-edge telecommunications technologies.
They uncover how vast amounts of data are crucial for training machine learning models to detect anomalies and prevent cyber threats, particularly in the telecommunications industry. Dr. Agarwal also sheds light on the transformative impacts of 5G and future 6G networks, from enhancing communication speed to revolutionizing smart manufacturing and industrial networks.
Explore the fascinating world of digital twins, AI-powered anomaly detection, and the complexities of transitioning from 4G to 5G. Aaron and Dr. Agarwal also discuss the global efforts required to standardize these technologies and emphasize the importance of diversity and passion in the tech industry.
Tune in as they tackle the current challenges and future possibilities in AI and telecommunications, and discover how these innovations are shaping the security landscape. Plus, take advantage of Dr. Agarwal's valuable insights and upcoming research on AI-based solutions to prevent DDoS attacks. Let's dive in!
Key Moments: 
00:10 Old technology, like dial-up, latency is important.
04:08 Latency in IT and OT processes. Excitement for 5G.
08:40 Machine learning for anomaly detection, digital twins, network sensing for 6G.
12:54 5G as secure media pipe for communication.
15:43 Training machine learning models requires ample data.
18:14 AI benefits outweigh fear of job loss.
22:06 AI creates and replaces jobs, imperfect but beneficial.
25:34 AI adapts dynamically, opens limitless possibilities.
27:31 Live stream with CEO playing themed tabletop.
32:06 5G signal has shorter coverage than 4G.
36:42 Diversity in cyber is crucial for innovation.
40:37 Diverse backgrounds bring fresh perspectives to cybersecurity.
43:04 AI creating deepfakes raises concerns about misinformation.
45:01 Concerned about deep fake potential and solutions.
 
About the guest : 
Dr. Anmol Agarwal is a security expert at Nokia, dedicated to securing advanced communication technologies such as 5G and upcoming 6G networks. Her critical work ensures that the data transmitted through your cell phone calls and text messages remains confidential and protected from hacking. Additionally, Dr. Agarwal imparts her extensive artificial intelligence knowledge as a part-time adjunct professor teaching machine learning. Her expertise not only safeguards our digital communications but also enhances their speed and efficiency through the innovative application of AI.
How to connect with Dr. Anmol : 
LinkedIn:  https://www.linkedin.com/in/anmolsagarwal/
X: ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Exploring the Impact of AI and 5G on Future Technologies with Dr. Anmol Agarwal]]>
                </itunes:title>
                                    <itunes:episode>12</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, our host Aaron Crow, sits down with Dr. Anmol Agarwal, a distinguished security professional at Nokia and adjunct professor specializing in machine learning. Together, they dive deep into machine learning, AI, and cutting-edge telecommunications technologies.</span></p>
<p><span style="font-weight:400;">They uncover how vast amounts of data are crucial for training machine learning models to detect anomalies and prevent cyber threats, particularly in the telecommunications industry. Dr. Agarwal also sheds light on the transformative impacts of 5G and future 6G networks, from enhancing communication speed to revolutionizing smart manufacturing and industrial networks.</span></p>
<p><span style="font-weight:400;">Explore the fascinating world of digital twins, AI-powered anomaly detection, and the complexities of transitioning from 4G to 5G. Aaron and Dr. Agarwal also discuss the global efforts required to standardize these technologies and emphasize the importance of diversity and passion in the tech industry.</span></p>
<p><span style="font-weight:400;">Tune in as they tackle the current challenges and future possibilities in AI and telecommunications, and discover how these innovations are shaping the security landscape. Plus, take advantage of Dr. Agarwal's valuable insights and upcoming research on AI-based solutions to prevent DDoS attacks. Let's dive in!</span></p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 Old technology, like dial-up, latency is important.</span></p>
<p><span style="font-weight:400;">04:08 Latency in IT and OT processes. Excitement for 5G.</span></p>
<p><span style="font-weight:400;">08:40 Machine learning for anomaly detection, digital twins, network sensing for 6G.</span></p>
<p><span style="font-weight:400;">12:54 5G as secure media pipe for communication.</span></p>
<p><span style="font-weight:400;">15:43 Training machine learning models requires ample data.</span></p>
<p><span style="font-weight:400;">18:14 AI benefits outweigh fear of job loss.</span></p>
<p><span style="font-weight:400;">22:06 AI creates and replaces jobs, imperfect but beneficial.</span></p>
<p><span style="font-weight:400;">25:34 AI adapts dynamically, opens limitless possibilities.</span></p>
<p><span style="font-weight:400;">27:31 Live stream with CEO playing themed tabletop.</span></p>
<p><span style="font-weight:400;">32:06 5G signal has shorter coverage than 4G.</span></p>
<p><span style="font-weight:400;">36:42 Diversity in cyber is crucial for innovation.</span></p>
<p><span style="font-weight:400;">40:37 Diverse backgrounds bring fresh perspectives to cybersecurity.</span></p>
<p><span style="font-weight:400;">43:04 AI creating deepfakes raises concerns about misinformation.</span></p>
<p><span style="font-weight:400;">45:01 Concerned about deep fake potential and solutions.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p><span style="font-weight:400;">Dr. Anmol Agarwal is a security expert at Nokia, dedicated to securing advanced communication technologies such as 5G and upcoming 6G networks. Her critical work ensures that the data transmitted through your cell phone calls and text messages remains confidential and protected from hacking. Additionally, Dr. Agarwal imparts her extensive artificial intelligence knowledge as a part-time adjunct professor teaching machine learning. Her expertise not only safeguards our digital communications but also enhances their speed and efficiency through the innovative application of AI.</span></p>
<p><strong>How to connect with Dr. Anmol : </strong></p>
<p><span style="font-weight:400;">LinkedIn: </span><span style="font-weight:400;"> </span><a href="https://www.linkedin.com/in/anmolsagarwal/"><span style="font-weight:400;">https://www.linkedin.com/in/anmolsagarwal/</span></a></p>
<p><span style="font-weight:400;">X: </span><a href="https://twitter.com/anmolspeaker"><span style="font-weight:400;">https://twitter.com/anmolspeaker</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><span style="font-weight:400;">To be a guest or suggest a guest/episode, please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1763829/c1e-z68mpsm3v8rbn07od-mq8m1wd0hzgq-rbhumf.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1763829&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=b5116d3acfcf12be06b4bd4d1132aac18c0cad7aad9eb4885d0a307b7a7c6651" length="58887563"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, our host Aaron Crow, sits down with Dr. Anmol Agarwal, a distinguished security professional at Nokia and adjunct professor specializing in machine learning. Together, they dive deep into machine learning, AI, and cutting-edge telecommunications technologies.
They uncover how vast amounts of data are crucial for training machine learning models to detect anomalies and prevent cyber threats, particularly in the telecommunications industry. Dr. Agarwal also sheds light on the transformative impacts of 5G and future 6G networks, from enhancing communication speed to revolutionizing smart manufacturing and industrial networks.
Explore the fascinating world of digital twins, AI-powered anomaly detection, and the complexities of transitioning from 4G to 5G. Aaron and Dr. Agarwal also discuss the global efforts required to standardize these technologies and emphasize the importance of diversity and passion in the tech industry.
Tune in as they tackle the current challenges and future possibilities in AI and telecommunications, and discover how these innovations are shaping the security landscape. Plus, take advantage of Dr. Agarwal's valuable insights and upcoming research on AI-based solutions to prevent DDoS attacks. Let's dive in!
Key Moments: 
00:10 Old technology, like dial-up, latency is important.
04:08 Latency in IT and OT processes. Excitement for 5G.
08:40 Machine learning for anomaly detection, digital twins, network sensing for 6G.
12:54 5G as secure media pipe for communication.
15:43 Training machine learning models requires ample data.
18:14 AI benefits outweigh fear of job loss.
22:06 AI creates and replaces jobs, imperfect but beneficial.
25:34 AI adapts dynamically, opens limitless possibilities.
27:31 Live stream with CEO playing themed tabletop.
32:06 5G signal has shorter coverage than 4G.
36:42 Diversity in cyber is crucial for innovation.
40:37 Diverse backgrounds bring fresh perspectives to cybersecurity.
43:04 AI creating deepfakes raises concerns about misinformation.
45:01 Concerned about deep fake potential and solutions.
 
About the guest : 
Dr. Anmol Agarwal is a security expert at Nokia, dedicated to securing advanced communication technologies such as 5G and upcoming 6G networks. Her critical work ensures that the data transmitted through your cell phone calls and text messages remains confidential and protected from hacking. Additionally, Dr. Agarwal imparts her extensive artificial intelligence knowledge as a part-time adjunct professor teaching machine learning. Her expertise not only safeguards our digital communications but also enhances their speed and efficiency through the innovative application of AI.
How to connect with Dr. Anmol : 
LinkedIn:  https://www.linkedin.com/in/anmolsagarwal/
X: ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1763829/c1a-w52rp-jk0rjn5jb741-b4jtns.jpg"></itunes:image>
                                                                            <itunes:duration>00:47:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cybersecurity and Safety Risks of Modern Vehicles: Understanding Vulnerabilities and Solutions with Kevin Walter]]>
                </title>
                <pubDate>Mon, 10 Jun 2024 10:33:12 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1759537</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow interviews Kevin Walter, an expert in vehicle security, about the growing cybersecurity and safety risks in modern vehicles. Kevin, with a master’s degree in cybersecurity and extensive experience in vehicle systems like the CAN bus, shares his insights into the hidden vulnerabilities within today's cars.</span></p>
<p><span style="font-weight:400;">The discussion covers key topics such as the challenges automakers face in updating vehicle software, the real-world implications of vehicle hacking—including the notorious 2014 Jeep hack—and the emerging threats from autonomous vehicles and AI systems. Kevin and Aaron explore how hackers can exploit architectural weaknesses and what measures can be taken to protect against these threats, from simple solutions like Faraday bags to advanced strategies like kill switches.</span></p>
<p><span style="font-weight:400;">Whether you’re a cybersecurity enthusiast, a vehicle owner, or just intrigued by the intersection of technology and safety, this episode offers valuable insights into keeping modern vehicles secure. Join Aaron and Kevin for an engaging dive into automotive cybersecurity. Let’s get started!</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 Vehicle network, OBD 2 standard, vehicle diagnostics.</span></p>
<p><span style="font-weight:400;">07:22 Incident leads to upgrading car engine.</span></p>
<p><span style="font-weight:400;">08:06 Programmed car transmission to work with engine.</span></p>
<p><span style="font-weight:400;">13:34 Cars now require computer skills for repair.</span></p>
<p><span style="font-weight:400;">14:25 Shop had to enable new battery in car.</span></p>
<p><span style="font-weight:400;">18:50 Tire sensor vulnerabilities lead to serious risks.</span></p>
<p><span style="font-weight:400;">20:55 Relying on sensors, lacking basic driving skills.</span></p>
<p><span style="font-weight:400;">26:05 Greenberg upset about engine shutdown on highway. The jeep's brakes disabled in parking lot. Demonstrated vehicle vulnerability in 2014.</span></p>
<p><span style="font-weight:400;">27:40 Potential security risk shutting down connected vehicles.</span></p>
<p><span style="font-weight:400;">32:16 Harley dealership charged $100 to enable Spotify.</span></p>
<p><span style="font-weight:400;">36:12 OBD2 standard needed for vehicle safety.</span></p>
<p><span style="font-weight:400;">39:32 Tesla's automated driver assist misinterprets speed limit.</span></p>
<p><span style="font-weight:400;">41:43 Keyless cars vulnerable to theft via tech.</span></p>
<p><span style="font-weight:400;">46:13 Interconnected systems may lead to car hacking.</span></p>
<p><span style="font-weight:400;">49:19 Balancing innovation with cybersecurity is crucial.</span></p>
<p><br /><br /><br /></p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">Kevin Walter is an experienced professional in the field of vehicle network and computer systems. He possesses a deep understanding of the more than 50 electronic control units typically found in these networks. Kevin is well-versed in the use of onboard diagnostics tools, specifically the OBD 2 standard, which has been a universal feature in vehicles since 1996. This standard is crucial for mechanics to diagnose and troubleshoot vehicle issues effectively. Kevin’s extensive background includes work as an independent transportation contractor, further solidifying his expertise in the automotive industry.</span></p>
<p> </p>
<p><strong>How to connect Kevin : </strong></p>
<p> </p>
<p><a href="https://www.linkedin.com/in/kevin-w-942416211/"><span style="font-weight:400;">https://www.linkedin.com/in/kevin-w-942416211/</span></a></p>
<p> </p>
<p><span style="font-weight:400;">Watch a  key fob replay attack video Kevin made with his vehicle.: </span></p>
<p><a href="https://drive.proton.me/urls/3FJXK72NVG#lr..."></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, host Aaron Crow interviews Kevin Walter, an expert in vehicle security, about the growing cybersecurity and safety risks in modern vehicles. Kevin, with a master’s degree in cybersecurity and extensive experience in vehicle systems like the CAN bus, shares his insights into the hidden vulnerabilities within today's cars.
The discussion covers key topics such as the challenges automakers face in updating vehicle software, the real-world implications of vehicle hacking—including the notorious 2014 Jeep hack—and the emerging threats from autonomous vehicles and AI systems. Kevin and Aaron explore how hackers can exploit architectural weaknesses and what measures can be taken to protect against these threats, from simple solutions like Faraday bags to advanced strategies like kill switches.
Whether you’re a cybersecurity enthusiast, a vehicle owner, or just intrigued by the intersection of technology and safety, this episode offers valuable insights into keeping modern vehicles secure. Join Aaron and Kevin for an engaging dive into automotive cybersecurity. Let’s get started!
 
Key Moments: 
00:10 Vehicle network, OBD 2 standard, vehicle diagnostics.
07:22 Incident leads to upgrading car engine.
08:06 Programmed car transmission to work with engine.
13:34 Cars now require computer skills for repair.
14:25 Shop had to enable new battery in car.
18:50 Tire sensor vulnerabilities lead to serious risks.
20:55 Relying on sensors, lacking basic driving skills.
26:05 Greenberg upset about engine shutdown on highway. The jeep's brakes disabled in parking lot. Demonstrated vehicle vulnerability in 2014.
27:40 Potential security risk shutting down connected vehicles.
32:16 Harley dealership charged $100 to enable Spotify.
36:12 OBD2 standard needed for vehicle safety.
39:32 Tesla's automated driver assist misinterprets speed limit.
41:43 Keyless cars vulnerable to theft via tech.
46:13 Interconnected systems may lead to car hacking.
49:19 Balancing innovation with cybersecurity is crucial.

About the guest : 
 
Kevin Walter is an experienced professional in the field of vehicle network and computer systems. He possesses a deep understanding of the more than 50 electronic control units typically found in these networks. Kevin is well-versed in the use of onboard diagnostics tools, specifically the OBD 2 standard, which has been a universal feature in vehicles since 1996. This standard is crucial for mechanics to diagnose and troubleshoot vehicle issues effectively. Kevin’s extensive background includes work as an independent transportation contractor, further solidifying his expertise in the automotive industry.
 
How to connect Kevin : 
 
https://www.linkedin.com/in/kevin-w-942416211/
 
Watch a  key fob replay attack video Kevin made with his vehicle.: 
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Cybersecurity and Safety Risks of Modern Vehicles: Understanding Vulnerabilities and Solutions with Kevin Walter]]>
                </itunes:title>
                                    <itunes:episode>11</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In this episode, host Aaron Crow interviews Kevin Walter, an expert in vehicle security, about the growing cybersecurity and safety risks in modern vehicles. Kevin, with a master’s degree in cybersecurity and extensive experience in vehicle systems like the CAN bus, shares his insights into the hidden vulnerabilities within today's cars.</span></p>
<p><span style="font-weight:400;">The discussion covers key topics such as the challenges automakers face in updating vehicle software, the real-world implications of vehicle hacking—including the notorious 2014 Jeep hack—and the emerging threats from autonomous vehicles and AI systems. Kevin and Aaron explore how hackers can exploit architectural weaknesses and what measures can be taken to protect against these threats, from simple solutions like Faraday bags to advanced strategies like kill switches.</span></p>
<p><span style="font-weight:400;">Whether you’re a cybersecurity enthusiast, a vehicle owner, or just intrigued by the intersection of technology and safety, this episode offers valuable insights into keeping modern vehicles secure. Join Aaron and Kevin for an engaging dive into automotive cybersecurity. Let’s get started!</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p><span style="font-weight:400;">00:10 Vehicle network, OBD 2 standard, vehicle diagnostics.</span></p>
<p><span style="font-weight:400;">07:22 Incident leads to upgrading car engine.</span></p>
<p><span style="font-weight:400;">08:06 Programmed car transmission to work with engine.</span></p>
<p><span style="font-weight:400;">13:34 Cars now require computer skills for repair.</span></p>
<p><span style="font-weight:400;">14:25 Shop had to enable new battery in car.</span></p>
<p><span style="font-weight:400;">18:50 Tire sensor vulnerabilities lead to serious risks.</span></p>
<p><span style="font-weight:400;">20:55 Relying on sensors, lacking basic driving skills.</span></p>
<p><span style="font-weight:400;">26:05 Greenberg upset about engine shutdown on highway. The jeep's brakes disabled in parking lot. Demonstrated vehicle vulnerability in 2014.</span></p>
<p><span style="font-weight:400;">27:40 Potential security risk shutting down connected vehicles.</span></p>
<p><span style="font-weight:400;">32:16 Harley dealership charged $100 to enable Spotify.</span></p>
<p><span style="font-weight:400;">36:12 OBD2 standard needed for vehicle safety.</span></p>
<p><span style="font-weight:400;">39:32 Tesla's automated driver assist misinterprets speed limit.</span></p>
<p><span style="font-weight:400;">41:43 Keyless cars vulnerable to theft via tech.</span></p>
<p><span style="font-weight:400;">46:13 Interconnected systems may lead to car hacking.</span></p>
<p><span style="font-weight:400;">49:19 Balancing innovation with cybersecurity is crucial.</span></p>
<p><br /><br /><br /></p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">Kevin Walter is an experienced professional in the field of vehicle network and computer systems. He possesses a deep understanding of the more than 50 electronic control units typically found in these networks. Kevin is well-versed in the use of onboard diagnostics tools, specifically the OBD 2 standard, which has been a universal feature in vehicles since 1996. This standard is crucial for mechanics to diagnose and troubleshoot vehicle issues effectively. Kevin’s extensive background includes work as an independent transportation contractor, further solidifying his expertise in the automotive industry.</span></p>
<p> </p>
<p><strong>How to connect Kevin : </strong></p>
<p> </p>
<p><a href="https://www.linkedin.com/in/kevin-w-942416211/"><span style="font-weight:400;">https://www.linkedin.com/in/kevin-w-942416211/</span></a></p>
<p> </p>
<p><span style="font-weight:400;">Watch a  key fob replay attack video Kevin made with his vehicle.: </span></p>
<p><a href="https://drive.proton.me/urls/3FJXK72NVG#lr_dL45TIogs"><span style="font-weight:400;">https://drive.proton.me/urls/3FJXK72NVG#lr_dL45TIogs</span></a></p>
<p><br /><br /></p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: info@protectitall.co </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><span style="font-weight:400;">To be a guest or suggest a guest/episode, please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1759537/c1e-v5m9pb9570jf3426n-gd4898zxhg6o-36r8kc.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1759537&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=e844a66922d75eba442fbd1e2b2b0e7a4f6c9c53f900d345b8baf2c501041f07" length="60553539"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, host Aaron Crow interviews Kevin Walter, an expert in vehicle security, about the growing cybersecurity and safety risks in modern vehicles. Kevin, with a master’s degree in cybersecurity and extensive experience in vehicle systems like the CAN bus, shares his insights into the hidden vulnerabilities within today's cars.
The discussion covers key topics such as the challenges automakers face in updating vehicle software, the real-world implications of vehicle hacking—including the notorious 2014 Jeep hack—and the emerging threats from autonomous vehicles and AI systems. Kevin and Aaron explore how hackers can exploit architectural weaknesses and what measures can be taken to protect against these threats, from simple solutions like Faraday bags to advanced strategies like kill switches.
Whether you’re a cybersecurity enthusiast, a vehicle owner, or just intrigued by the intersection of technology and safety, this episode offers valuable insights into keeping modern vehicles secure. Join Aaron and Kevin for an engaging dive into automotive cybersecurity. Let’s get started!
 
Key Moments: 
00:10 Vehicle network, OBD 2 standard, vehicle diagnostics.
07:22 Incident leads to upgrading car engine.
08:06 Programmed car transmission to work with engine.
13:34 Cars now require computer skills for repair.
14:25 Shop had to enable new battery in car.
18:50 Tire sensor vulnerabilities lead to serious risks.
20:55 Relying on sensors, lacking basic driving skills.
26:05 Greenberg upset about engine shutdown on highway. The jeep's brakes disabled in parking lot. Demonstrated vehicle vulnerability in 2014.
27:40 Potential security risk shutting down connected vehicles.
32:16 Harley dealership charged $100 to enable Spotify.
36:12 OBD2 standard needed for vehicle safety.
39:32 Tesla's automated driver assist misinterprets speed limit.
41:43 Keyless cars vulnerable to theft via tech.
46:13 Interconnected systems may lead to car hacking.
49:19 Balancing innovation with cybersecurity is crucial.

About the guest : 
 
Kevin Walter is an experienced professional in the field of vehicle network and computer systems. He possesses a deep understanding of the more than 50 electronic control units typically found in these networks. Kevin is well-versed in the use of onboard diagnostics tools, specifically the OBD 2 standard, which has been a universal feature in vehicles since 1996. This standard is crucial for mechanics to diagnose and troubleshoot vehicle issues effectively. Kevin’s extensive background includes work as an independent transportation contractor, further solidifying his expertise in the automotive industry.
 
How to connect Kevin : 
 
https://www.linkedin.com/in/kevin-w-942416211/
 
Watch a  key fob replay attack video Kevin made with his vehicle.: 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1759537/c1a-w52rp-v0ngpg4ncjn5-iurz9e.jpg"></itunes:image>
                                                                            <itunes:duration>00:52:31</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Tools and Techniques for Better Network Visibility and Vulnerability Management with Kylie McClanahan]]>
                </title>
                <pubDate>Mon, 03 Jun 2024 09:41:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1755182</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">In Episode 10 of Protect It All, titled "Tools and Techniques for Better Network Visibility and Vulnerability Management with Kylie McClanahan," host Aaron Crow and guest Kylie McClanahan dive into the critical elements of enhancing cybersecurity through advanced tools and strategies. Kylie, CTO of a company specializing in this field, shares her insights on overcoming the challenges of consistent naming conventions, accurate vendor data, and breaking down silos for effective communication across teams.</span></p>
<p> </p>
<p><span style="font-weight:400;">They explore the utility of tools like Spartan and Network Perception in visualizing network vulnerabilities, mapping asset inventories, and planning effective patch management. They emphasize the importance of correlating vulnerabilities with business priorities rather than just CVSS scores and the need for a layered security approach.</span></p>
<p> </p>
<p><span style="font-weight:400;">The episode also discusses cybersecurity risks to non-technical stakeholders, highlighting the business implications. The duo discusses the evolving landscape in the power utility sector, the dual nature of physical and cyber threats, and the ever-present need for continuous adaptation.</span></p>
<p> </p>
<p><span style="font-weight:400;">Kylie shares her excitement about machine learning and graph neural networks for grid state estimation while expressing caution about AI tools' accuracy. Aaron and Kylie stress the importance of reliable data, automated processes, and vendor security advisories in maintaining effective asset management.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">03:47 Discussion focused on improving cybersecurity classifications and communication.</span></p>
<p><span style="font-weight:400;">08:48 Compliance sometimes leads to minimum effort for benefit.</span></p>
<p><span style="font-weight:400;">11:17 Vendor security advisories prioritize patch tracking.</span></p>
<p><span style="font-weight:400;">14:46 Testing for security vulnerabilities and potential exploits.</span></p>
<p><span style="font-weight:400;">17:20 Understanding and communicating cybersecurity risk to non-professionals.</span></p>
<p><span style="font-weight:400;">20:50 Disagreement on consistent product naming causes confusion.</span></p>
<p><span style="font-weight:400;">25:46 NVD website publishes overwhelming recent vulnerabilities.</span></p>
<p><span style="font-weight:400;">27:07 Understanding the importance of asset management.</span></p>
<p><span style="font-weight:400;">32:13 Challenges of tracking change management in organizations.</span></p>
<p><span style="font-weight:400;">33:33 People, process, and technology are crucial investments.</span></p>
<p><span style="font-weight:400;">37:34 Spartan takes any scan, offers change management.</span></p>
<p><span style="font-weight:400;">39:55 Vision of the future: a dynamic ecosystem.</span></p>
<p><span style="font-weight:400;">43:19 Vendors acknowledge changes in control systems effectiveness.</span></p>
<p><span style="font-weight:400;">48:09 Equations useful, AI for optimization, caution with models.</span></p>
<p><span style="font-weight:400;">49:28 Questioning truthfulness of AI in HR replacement.</span></p>
<p><span style="font-weight:400;">53:01 Toyota and Lexus prioritize reliable, tested technology.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">Kylie McClanahan is the Chief Technology Officer of Bastazo, Inc and a doctoral candidate in Computer Science at the University of Arkansas. She has nearly a decade of experience with cybersecurity in the electric industry, including both professional experience and frequent collaborations with industry as a graduate researcher. Her research explores the automation of vulnerability analysis and remediation using natural language processing and ma...</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In Episode 10 of Protect It All, titled "Tools and Techniques for Better Network Visibility and Vulnerability Management with Kylie McClanahan," host Aaron Crow and guest Kylie McClanahan dive into the critical elements of enhancing cybersecurity through advanced tools and strategies. Kylie, CTO of a company specializing in this field, shares her insights on overcoming the challenges of consistent naming conventions, accurate vendor data, and breaking down silos for effective communication across teams.
 
They explore the utility of tools like Spartan and Network Perception in visualizing network vulnerabilities, mapping asset inventories, and planning effective patch management. They emphasize the importance of correlating vulnerabilities with business priorities rather than just CVSS scores and the need for a layered security approach.
 
The episode also discusses cybersecurity risks to non-technical stakeholders, highlighting the business implications. The duo discusses the evolving landscape in the power utility sector, the dual nature of physical and cyber threats, and the ever-present need for continuous adaptation.
 
Kylie shares her excitement about machine learning and graph neural networks for grid state estimation while expressing caution about AI tools' accuracy. Aaron and Kylie stress the importance of reliable data, automated processes, and vendor security advisories in maintaining effective asset management.
 
Key Moments: 
 
03:47 Discussion focused on improving cybersecurity classifications and communication.
08:48 Compliance sometimes leads to minimum effort for benefit.
11:17 Vendor security advisories prioritize patch tracking.
14:46 Testing for security vulnerabilities and potential exploits.
17:20 Understanding and communicating cybersecurity risk to non-professionals.
20:50 Disagreement on consistent product naming causes confusion.
25:46 NVD website publishes overwhelming recent vulnerabilities.
27:07 Understanding the importance of asset management.
32:13 Challenges of tracking change management in organizations.
33:33 People, process, and technology are crucial investments.
37:34 Spartan takes any scan, offers change management.
39:55 Vision of the future: a dynamic ecosystem.
43:19 Vendors acknowledge changes in control systems effectiveness.
48:09 Equations useful, AI for optimization, caution with models.
49:28 Questioning truthfulness of AI in HR replacement.
53:01 Toyota and Lexus prioritize reliable, tested technology.
 
About the guest : 
 
Kylie McClanahan is the Chief Technology Officer of Bastazo, Inc and a doctoral candidate in Computer Science at the University of Arkansas. She has nearly a decade of experience with cybersecurity in the electric industry, including both professional experience and frequent collaborations with industry as a graduate researcher. Her research explores the automation of vulnerability analysis and remediation using natural language processing and ma...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Tools and Techniques for Better Network Visibility and Vulnerability Management with Kylie McClanahan]]>
                </itunes:title>
                                    <itunes:episode>10</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">In Episode 10 of Protect It All, titled "Tools and Techniques for Better Network Visibility and Vulnerability Management with Kylie McClanahan," host Aaron Crow and guest Kylie McClanahan dive into the critical elements of enhancing cybersecurity through advanced tools and strategies. Kylie, CTO of a company specializing in this field, shares her insights on overcoming the challenges of consistent naming conventions, accurate vendor data, and breaking down silos for effective communication across teams.</span></p>
<p> </p>
<p><span style="font-weight:400;">They explore the utility of tools like Spartan and Network Perception in visualizing network vulnerabilities, mapping asset inventories, and planning effective patch management. They emphasize the importance of correlating vulnerabilities with business priorities rather than just CVSS scores and the need for a layered security approach.</span></p>
<p> </p>
<p><span style="font-weight:400;">The episode also discusses cybersecurity risks to non-technical stakeholders, highlighting the business implications. The duo discusses the evolving landscape in the power utility sector, the dual nature of physical and cyber threats, and the ever-present need for continuous adaptation.</span></p>
<p> </p>
<p><span style="font-weight:400;">Kylie shares her excitement about machine learning and graph neural networks for grid state estimation while expressing caution about AI tools' accuracy. Aaron and Kylie stress the importance of reliable data, automated processes, and vendor security advisories in maintaining effective asset management.</span></p>
<p> </p>
<p><strong>Key Moments: </strong></p>
<p> </p>
<p><span style="font-weight:400;">03:47 Discussion focused on improving cybersecurity classifications and communication.</span></p>
<p><span style="font-weight:400;">08:48 Compliance sometimes leads to minimum effort for benefit.</span></p>
<p><span style="font-weight:400;">11:17 Vendor security advisories prioritize patch tracking.</span></p>
<p><span style="font-weight:400;">14:46 Testing for security vulnerabilities and potential exploits.</span></p>
<p><span style="font-weight:400;">17:20 Understanding and communicating cybersecurity risk to non-professionals.</span></p>
<p><span style="font-weight:400;">20:50 Disagreement on consistent product naming causes confusion.</span></p>
<p><span style="font-weight:400;">25:46 NVD website publishes overwhelming recent vulnerabilities.</span></p>
<p><span style="font-weight:400;">27:07 Understanding the importance of asset management.</span></p>
<p><span style="font-weight:400;">32:13 Challenges of tracking change management in organizations.</span></p>
<p><span style="font-weight:400;">33:33 People, process, and technology are crucial investments.</span></p>
<p><span style="font-weight:400;">37:34 Spartan takes any scan, offers change management.</span></p>
<p><span style="font-weight:400;">39:55 Vision of the future: a dynamic ecosystem.</span></p>
<p><span style="font-weight:400;">43:19 Vendors acknowledge changes in control systems effectiveness.</span></p>
<p><span style="font-weight:400;">48:09 Equations useful, AI for optimization, caution with models.</span></p>
<p><span style="font-weight:400;">49:28 Questioning truthfulness of AI in HR replacement.</span></p>
<p><span style="font-weight:400;">53:01 Toyota and Lexus prioritize reliable, tested technology.</span></p>
<p> </p>
<p><strong>About the guest : </strong></p>
<p> </p>
<p><span style="font-weight:400;">Kylie McClanahan is the Chief Technology Officer of Bastazo, Inc and a doctoral candidate in Computer Science at the University of Arkansas. She has nearly a decade of experience with cybersecurity in the electric industry, including both professional experience and frequent collaborations with industry as a graduate researcher. Her research explores the automation of vulnerability analysis and remediation using natural language processing and machine learning. She holds a GCIP certification from GIAC and speaks frequently about cybersecurity in industrial control systems.</span></p>
<p> </p>
<p><strong>How to connect Kylie:</strong><span style="font-weight:400;"> </span></p>
<p><a href="https://www.linkedin.com/in/kyliemcclanahan/"><span style="font-weight:400;">https://www.linkedin.com/in/kyliemcclanahan/</span></a></p>
<p><a href="https://www.bastazo.com/"><span style="font-weight:400;">https://www.bastazo.com</span></a></p>
<p><a href="https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc"><span style="font-weight:400;">https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc</span></a></p>
<p> </p>
<p><strong>Connect With Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="http://www.corvosec.com"><span style="font-weight:400;"> www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"><span style="font-weight:400;"> https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p> </p>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: <a href="mailto:info@protectitall.co">info@protectitall.co</a></span><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website:</span><a href="https://protectitall.co/"><span style="font-weight:400;"> https://protectitall.co/</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X:</span><a href="https://twitter.com/protectitall"><span style="font-weight:400;"> https://twitter.com/protectitall</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube:</span><a href="https://www.youtube.com/@PrOTectITAll"><span style="font-weight:400;"> https://www.youtube.com/@PrOTectITAll</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook: </span><a href="https://facebook.com/protectitallpodcast"><span style="font-weight:400;"> https://facebook.com/protectitallpodcast</span></a><span style="font-weight:400;"> </span></li>
</ul>
<p> </p>
<p><span style="font-weight:400;">To be a guest or suggest a guest/episode, please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1755182/c1e-p5o2vb51793s41018-k5mvp707i1q0-e5wxgg.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1755182&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=4156fa3da02432f15aeb8da52e7f3cfcfc67d7c7095ce849f878f705dd3ace02" length="69169907"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In Episode 10 of Protect It All, titled "Tools and Techniques for Better Network Visibility and Vulnerability Management with Kylie McClanahan," host Aaron Crow and guest Kylie McClanahan dive into the critical elements of enhancing cybersecurity through advanced tools and strategies. Kylie, CTO of a company specializing in this field, shares her insights on overcoming the challenges of consistent naming conventions, accurate vendor data, and breaking down silos for effective communication across teams.
 
They explore the utility of tools like Spartan and Network Perception in visualizing network vulnerabilities, mapping asset inventories, and planning effective patch management. They emphasize the importance of correlating vulnerabilities with business priorities rather than just CVSS scores and the need for a layered security approach.
 
The episode also discusses cybersecurity risks to non-technical stakeholders, highlighting the business implications. The duo discusses the evolving landscape in the power utility sector, the dual nature of physical and cyber threats, and the ever-present need for continuous adaptation.
 
Kylie shares her excitement about machine learning and graph neural networks for grid state estimation while expressing caution about AI tools' accuracy. Aaron and Kylie stress the importance of reliable data, automated processes, and vendor security advisories in maintaining effective asset management.
 
Key Moments: 
 
03:47 Discussion focused on improving cybersecurity classifications and communication.
08:48 Compliance sometimes leads to minimum effort for benefit.
11:17 Vendor security advisories prioritize patch tracking.
14:46 Testing for security vulnerabilities and potential exploits.
17:20 Understanding and communicating cybersecurity risk to non-professionals.
20:50 Disagreement on consistent product naming causes confusion.
25:46 NVD website publishes overwhelming recent vulnerabilities.
27:07 Understanding the importance of asset management.
32:13 Challenges of tracking change management in organizations.
33:33 People, process, and technology are crucial investments.
37:34 Spartan takes any scan, offers change management.
39:55 Vision of the future: a dynamic ecosystem.
43:19 Vendors acknowledge changes in control systems effectiveness.
48:09 Equations useful, AI for optimization, caution with models.
49:28 Questioning truthfulness of AI in HR replacement.
53:01 Toyota and Lexus prioritize reliable, tested technology.
 
About the guest : 
 
Kylie McClanahan is the Chief Technology Officer of Bastazo, Inc and a doctoral candidate in Computer Science at the University of Arkansas. She has nearly a decade of experience with cybersecurity in the electric industry, including both professional experience and frequent collaborations with industry as a graduate researcher. Her research explores the automation of vulnerability analysis and remediation using natural language processing and ma...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1755182/c1a-w52rp-v0nm6gkksxm3-vb08lu.jpg"></itunes:image>
                                                                            <itunes:duration>00:56:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Basics to Quantum: A Comprehensive Dive into Cybersecurity Trends]]>
                </title>
                <pubDate>Fri, 19 Apr 2024 15:39:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1712596</guid>
                                <description>
                                            <![CDATA[<h2>Summary</h2>
<p>The conversation covers various topics related to cybersecurity, including offensive security, IoT devices, hidden threats in cables, advanced hacking devices, privacy concerns with smart devices, cyber hygiene, securing personal data, risks of social media platforms, importance of cybersecurity education, government regulations, and trends in cybersecurity for 2024. The conversation explores the prevalence of social engineering attacks and the effectiveness of generative AI in social engineering. It discusses the challenges of detecting phishing emails generated by AI and the difficulty of defending against AI-powered attacks. The role of password managers and firewalls in defense is highlighted, as well as the importance of recognizing the limitations of human perception. The conversation emphasizes the need for cyber defense measures in organizations and the vulnerability of the weakest link in the chain. It also addresses the risks associated with third-party vendors and the impact of cyber attacks on critical infrastructure. The importance of cyber-informed engineering and designing with security in mind is discussed, along with the challenges of securing outdated OT systems. This conversation covers various topics related to securing OT networks, including the challenges of upgrading OT systems, the complexity of OT networks, and the use of OT firewalls. The discussion also explores the importance of understanding OT protocols and the security risks of unencrypted OT protocols. Additionally, the conversation delves into the impact of Active Directory issues and the role of AI in cybersecurity. The future of AI and quantum computing in cybersecurity is also discussed.</p>
<p> </p>
<h2><span style="font-weight:400;">More About The Episode</span></h2>
<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Duane Laflotte</span></p>
<p> </p>
<h2><span style="font-weight:400;">Connect with Duane Laflotte:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://www.pulsarsecurity.com/" target="_blank" rel="noreferrer noopener">www.pulsarsecurity.com/</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: https://www.linkedin.com/in/duanelaflotte/</span></li>
</ul>
<h2><span style="font-weight:400;">Connect with Aaron Crow:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<h2><span style="font-weight:400;">Learn more about PrOTect IT All:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://protectitall.co/">https://protectitall.co/</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: <a href="https://twitter.com/protectitall">https://twitter.com/protectitall</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: <a href="https://www.youtube.com/@PrOTectITAll">https://www.youtube.com/@PrOTectITAll</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  <a href="https://facebook.com/protectitallpodcast">https://facebook.com/protectitallpodcast</a> </span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co">...</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Summary
The conversation covers various topics related to cybersecurity, including offensive security, IoT devices, hidden threats in cables, advanced hacking devices, privacy concerns with smart devices, cyber hygiene, securing personal data, risks of social media platforms, importance of cybersecurity education, government regulations, and trends in cybersecurity for 2024. The conversation explores the prevalence of social engineering attacks and the effectiveness of generative AI in social engineering. It discusses the challenges of detecting phishing emails generated by AI and the difficulty of defending against AI-powered attacks. The role of password managers and firewalls in defense is highlighted, as well as the importance of recognizing the limitations of human perception. The conversation emphasizes the need for cyber defense measures in organizations and the vulnerability of the weakest link in the chain. It also addresses the risks associated with third-party vendors and the impact of cyber attacks on critical infrastructure. The importance of cyber-informed engineering and designing with security in mind is discussed, along with the challenges of securing outdated OT systems. This conversation covers various topics related to securing OT networks, including the challenges of upgrading OT systems, the complexity of OT networks, and the use of OT firewalls. The discussion also explores the importance of understanding OT protocols and the security risks of unencrypted OT protocols. Additionally, the conversation delves into the impact of Active Directory issues and the role of AI in cybersecurity. The future of AI and quantum computing in cybersecurity is also discussed.
 
More About The Episode
Hosted by: Aaron Crow
Guest: Duane Laflotte
 
Connect with Duane Laflotte:

Website: www.pulsarsecurity.com/
LinkedIn: https://www.linkedin.com/in/duanelaflotte/

Connect with Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

To be a guest, or suggest a guest/episode please email us at ...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[From Basics to Quantum: A Comprehensive Dive into Cybersecurity Trends]]>
                </itunes:title>
                                    <itunes:episode>9</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<h2>Summary</h2>
<p>The conversation covers various topics related to cybersecurity, including offensive security, IoT devices, hidden threats in cables, advanced hacking devices, privacy concerns with smart devices, cyber hygiene, securing personal data, risks of social media platforms, importance of cybersecurity education, government regulations, and trends in cybersecurity for 2024. The conversation explores the prevalence of social engineering attacks and the effectiveness of generative AI in social engineering. It discusses the challenges of detecting phishing emails generated by AI and the difficulty of defending against AI-powered attacks. The role of password managers and firewalls in defense is highlighted, as well as the importance of recognizing the limitations of human perception. The conversation emphasizes the need for cyber defense measures in organizations and the vulnerability of the weakest link in the chain. It also addresses the risks associated with third-party vendors and the impact of cyber attacks on critical infrastructure. The importance of cyber-informed engineering and designing with security in mind is discussed, along with the challenges of securing outdated OT systems. This conversation covers various topics related to securing OT networks, including the challenges of upgrading OT systems, the complexity of OT networks, and the use of OT firewalls. The discussion also explores the importance of understanding OT protocols and the security risks of unencrypted OT protocols. Additionally, the conversation delves into the impact of Active Directory issues and the role of AI in cybersecurity. The future of AI and quantum computing in cybersecurity is also discussed.</p>
<p> </p>
<h2><span style="font-weight:400;">More About The Episode</span></h2>
<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Duane Laflotte</span></p>
<p> </p>
<h2><span style="font-weight:400;">Connect with Duane Laflotte:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://www.pulsarsecurity.com/" target="_blank" rel="noreferrer noopener">www.pulsarsecurity.com/</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: https://www.linkedin.com/in/duanelaflotte/</span></li>
</ul>
<h2><span style="font-weight:400;">Connect with Aaron Crow:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<h2><span style="font-weight:400;">Learn more about PrOTect IT All:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://protectitall.co/">https://protectitall.co/</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: <a href="https://twitter.com/protectitall">https://twitter.com/protectitall</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: <a href="https://www.youtube.com/@PrOTectITAll">https://www.youtube.com/@PrOTectITAll</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  <a href="https://facebook.com/protectitallpodcast">https://facebook.com/protectitallpodcast</a> </span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1712596/c1e-k1vqntjx9g4ax3po7-v0n4gzkzt9zw-m4awc4.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1712596&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=7c237dda0b5f6f8b2321fcc9cf90a8a085ff4ba955e2c9a36cf9c05d5a76f328" length="99610697"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Summary
The conversation covers various topics related to cybersecurity, including offensive security, IoT devices, hidden threats in cables, advanced hacking devices, privacy concerns with smart devices, cyber hygiene, securing personal data, risks of social media platforms, importance of cybersecurity education, government regulations, and trends in cybersecurity for 2024. The conversation explores the prevalence of social engineering attacks and the effectiveness of generative AI in social engineering. It discusses the challenges of detecting phishing emails generated by AI and the difficulty of defending against AI-powered attacks. The role of password managers and firewalls in defense is highlighted, as well as the importance of recognizing the limitations of human perception. The conversation emphasizes the need for cyber defense measures in organizations and the vulnerability of the weakest link in the chain. It also addresses the risks associated with third-party vendors and the impact of cyber attacks on critical infrastructure. The importance of cyber-informed engineering and designing with security in mind is discussed, along with the challenges of securing outdated OT systems. This conversation covers various topics related to securing OT networks, including the challenges of upgrading OT systems, the complexity of OT networks, and the use of OT firewalls. The discussion also explores the importance of understanding OT protocols and the security risks of unencrypted OT protocols. Additionally, the conversation delves into the impact of Active Directory issues and the role of AI in cybersecurity. The future of AI and quantum computing in cybersecurity is also discussed.
 
More About The Episode
Hosted by: Aaron Crow
Guest: Duane Laflotte
 
Connect with Duane Laflotte:

Website: www.pulsarsecurity.com/
LinkedIn: https://www.linkedin.com/in/duanelaflotte/

Connect with Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://protectitall.co/ 
X: https://twitter.com/protectitall 
YouTube: https://www.youtube.com/@PrOTectITAll 
FaceBook:  https://facebook.com/protectitallpodcast 

To be a guest, or suggest a guest/episode please email us at ...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1712596/c1a-w52rp-60k32wvou9xj-p1nmli.png"></itunes:image>
                                                                            <itunes:duration>01:09:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Securing Our Future: The Cyber Challenge in Aging Infrastructure]]>
                </title>
                <pubDate>Thu, 04 Apr 2024 20:53:08 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1712594</guid>
                                <description>
                                            <![CDATA[<h2>Summary</h2>
<div class="notesWrapper MuiBox-root css-1hgpvub e1de0imv0"><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">The conversation covers the challenges and risks associated with aging infrastructure, particularly in critical sectors such as power generation and water treatment. The lack of maintenance and neglect of infrastructure pose significant threats to public safety and national security. The integration of IT and OT systems in these sectors creates vulnerabilities that can be exploited by cyber attackers. The conversation emphasizes the need for a comprehensive strategy and funding to address these issues. Additionally, the importance of vocational education and job creation in the infrastructure sector is highlighted. The conversation covers various aspects of infrastructure, including the government bidding process, the slow process of infrastructure projects, the need for streamlining government processes, the importance of continuous maintenance and upgrades, the need for oversight and compliance, the importance of a proactive approach to infrastructure, the consequences of neglecting infrastructure, the impact of cyber attacks on infrastructure, personal journeys into cybersecurity, opportunities in OT cybersecurity, and a call to action to get involved in OT cybersecurity.</span></div>
<div class="notesWrapper MuiBox-root css-1hgpvub e1de0imv0"> </div>
<h2 class="notesWrapper MuiBox-root css-1hgpvub e1de0imv0"><span class="MuiTypography-root MuiTypography-headingXSmall css-1mp1p0p e1de0imv0">Takeaways</span></h2>
<div class="notesWrapper MuiBox-root css-1hgpvub e1de0imv0">
<ul class="css-h4c1sf">
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Aging infrastructure in critical sectors poses significant risks to public safety and national security.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">The integration of IT and OT systems in critical infrastructure creates vulnerabilities that can be exploited by cyber attackers.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Comprehensive strategies and funding are needed to address the challenges and risks associated with aging infrastructure.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Vocational education and job creation in the infrastructure sector are crucial for addressing the maintenance and upgrade needs. Infrastructure projects involve a slow and complex government bidding process.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Infrastructure projects can take several years to complete and require continuous maintenance and upgrades.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Streamlining government processes and consolidating oversight can help expedite infrastructure projects.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Continuous maintenance and upgrades are essential to ensure the reliability and security of infrastructure systems.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Proactive measures are necessary to prevent infrastructure failures and mitigate the impact of cyber attacks.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">There are job opportunities in the field of OT cybersecurity, and vocational education and training are available.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Engaging with experts and organizations in the field can provide valuable insights and guidance.</span></li>
</ul>
</div>
<p> </p>
<h2><span style="font-weight:400;">More About The Episode</span></h2>
<p><span style="font-weight:400;"><strong>Hosted b...</strong></span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Summary
The conversation covers the challenges and risks associated with aging infrastructure, particularly in critical sectors such as power generation and water treatment. The lack of maintenance and neglect of infrastructure pose significant threats to public safety and national security. The integration of IT and OT systems in these sectors creates vulnerabilities that can be exploited by cyber attackers. The conversation emphasizes the need for a comprehensive strategy and funding to address these issues. Additionally, the importance of vocational education and job creation in the infrastructure sector is highlighted. The conversation covers various aspects of infrastructure, including the government bidding process, the slow process of infrastructure projects, the need for streamlining government processes, the importance of continuous maintenance and upgrades, the need for oversight and compliance, the importance of a proactive approach to infrastructure, the consequences of neglecting infrastructure, the impact of cyber attacks on infrastructure, personal journeys into cybersecurity, opportunities in OT cybersecurity, and a call to action to get involved in OT cybersecurity.
 
Takeaways


Aging infrastructure in critical sectors poses significant risks to public safety and national security.
The integration of IT and OT systems in critical infrastructure creates vulnerabilities that can be exploited by cyber attackers.
Comprehensive strategies and funding are needed to address the challenges and risks associated with aging infrastructure.
Vocational education and job creation in the infrastructure sector are crucial for addressing the maintenance and upgrade needs. Infrastructure projects involve a slow and complex government bidding process.
Infrastructure projects can take several years to complete and require continuous maintenance and upgrades.
Streamlining government processes and consolidating oversight can help expedite infrastructure projects.
Continuous maintenance and upgrades are essential to ensure the reliability and security of infrastructure systems.
Proactive measures are necessary to prevent infrastructure failures and mitigate the impact of cyber attacks.
There are job opportunities in the field of OT cybersecurity, and vocational education and training are available.
Engaging with experts and organizations in the field can provide valuable insights and guidance.


 
More About The Episode
Hosted b...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Securing Our Future: The Cyber Challenge in Aging Infrastructure]]>
                </itunes:title>
                                    <itunes:episode>8</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<h2>Summary</h2>
<div class="notesWrapper MuiBox-root css-1hgpvub e1de0imv0"><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">The conversation covers the challenges and risks associated with aging infrastructure, particularly in critical sectors such as power generation and water treatment. The lack of maintenance and neglect of infrastructure pose significant threats to public safety and national security. The integration of IT and OT systems in these sectors creates vulnerabilities that can be exploited by cyber attackers. The conversation emphasizes the need for a comprehensive strategy and funding to address these issues. Additionally, the importance of vocational education and job creation in the infrastructure sector is highlighted. The conversation covers various aspects of infrastructure, including the government bidding process, the slow process of infrastructure projects, the need for streamlining government processes, the importance of continuous maintenance and upgrades, the need for oversight and compliance, the importance of a proactive approach to infrastructure, the consequences of neglecting infrastructure, the impact of cyber attacks on infrastructure, personal journeys into cybersecurity, opportunities in OT cybersecurity, and a call to action to get involved in OT cybersecurity.</span></div>
<div class="notesWrapper MuiBox-root css-1hgpvub e1de0imv0"> </div>
<h2 class="notesWrapper MuiBox-root css-1hgpvub e1de0imv0"><span class="MuiTypography-root MuiTypography-headingXSmall css-1mp1p0p e1de0imv0">Takeaways</span></h2>
<div class="notesWrapper MuiBox-root css-1hgpvub e1de0imv0">
<ul class="css-h4c1sf">
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Aging infrastructure in critical sectors poses significant risks to public safety and national security.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">The integration of IT and OT systems in critical infrastructure creates vulnerabilities that can be exploited by cyber attackers.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Comprehensive strategies and funding are needed to address the challenges and risks associated with aging infrastructure.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Vocational education and job creation in the infrastructure sector are crucial for addressing the maintenance and upgrade needs. Infrastructure projects involve a slow and complex government bidding process.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Infrastructure projects can take several years to complete and require continuous maintenance and upgrades.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Streamlining government processes and consolidating oversight can help expedite infrastructure projects.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Continuous maintenance and upgrades are essential to ensure the reliability and security of infrastructure systems.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Proactive measures are necessary to prevent infrastructure failures and mitigate the impact of cyber attacks.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">There are job opportunities in the field of OT cybersecurity, and vocational education and training are available.</span></li>
<li><span class="MuiTypography-root MuiTypography-bodyMedium css-1lit4es e1de0imv0">Engaging with experts and organizations in the field can provide valuable insights and guidance.</span></li>
</ul>
</div>
<p> </p>
<h2><span style="font-weight:400;">More About The Episode</span></h2>
<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Luther 'Chip' Harris</span></p>
<p> </p>
<h2><span style="font-weight:400;">Connect with Luther 'Chip' Harris:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: <a href="https://www.linkedin.com/in/luther-chip-harris-49872035/" target="_blank" rel="noreferrer noopener">https://www.linkedin.com/in/luther-chip-harris-49872035/</a></span></li>
</ul>
<h2><span style="font-weight:400;">Connect with Aaron Crow:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<h2><span style="font-weight:400;">Learn more about PrOTect IT All:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://protectitall.co/">https://protectitall.co/</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: <a href="https://twitter.com/protectitall">https://twitter.com/protectitall</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: <a href="https://www.youtube.com/@PrOTectITAll">https://www.youtube.com/@PrOTectITAll</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  <a href="https://facebook.com/protectitallpodcast">https://facebook.com/protectitallpodcast</a> </span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>
<p> </p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1712594/c1e-g0g79s3w2mxb05nx6-gd42xgq1t9w8-lussqx.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1712594&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=22398bab6c446e3276c3179c4cd08bf66ae690c7f0582528d970d7af24daa401" length="97587281"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Summary
The conversation covers the challenges and risks associated with aging infrastructure, particularly in critical sectors such as power generation and water treatment. The lack of maintenance and neglect of infrastructure pose significant threats to public safety and national security. The integration of IT and OT systems in these sectors creates vulnerabilities that can be exploited by cyber attackers. The conversation emphasizes the need for a comprehensive strategy and funding to address these issues. Additionally, the importance of vocational education and job creation in the infrastructure sector is highlighted. The conversation covers various aspects of infrastructure, including the government bidding process, the slow process of infrastructure projects, the need for streamlining government processes, the importance of continuous maintenance and upgrades, the need for oversight and compliance, the importance of a proactive approach to infrastructure, the consequences of neglecting infrastructure, the impact of cyber attacks on infrastructure, personal journeys into cybersecurity, opportunities in OT cybersecurity, and a call to action to get involved in OT cybersecurity.
 
Takeaways


Aging infrastructure in critical sectors poses significant risks to public safety and national security.
The integration of IT and OT systems in critical infrastructure creates vulnerabilities that can be exploited by cyber attackers.
Comprehensive strategies and funding are needed to address the challenges and risks associated with aging infrastructure.
Vocational education and job creation in the infrastructure sector are crucial for addressing the maintenance and upgrade needs. Infrastructure projects involve a slow and complex government bidding process.
Infrastructure projects can take several years to complete and require continuous maintenance and upgrades.
Streamlining government processes and consolidating oversight can help expedite infrastructure projects.
Continuous maintenance and upgrades are essential to ensure the reliability and security of infrastructure systems.
Proactive measures are necessary to prevent infrastructure failures and mitigate the impact of cyber attacks.
There are job opportunities in the field of OT cybersecurity, and vocational education and training are available.
Engaging with experts and organizations in the field can provide valuable insights and guidance.


 
More About The Episode
Hosted b...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1712594/c1a-w52rp-8m64k17narw-c8x1tf.png"></itunes:image>
                                                                            <itunes:duration>01:07:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Securing OT: Strategies for Prioritizing Vulnerabilities]]>
                </title>
                <pubDate>Thu, 14 Mar 2024 15:36:59 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1688484</guid>
                                <description>
                                            <![CDATA[<p>In this conversation, Bryson Bort discusses his background and the creation of Scythe, an offensive security platform. He also talks about the ICS Village and the Vulnerability Management Pavilion, as well as his collaboration with the Department of Energy on a vulnerability management research project. Bryson emphasizes the importance of prioritizing vulnerabilities in operational technology (OT) and understanding the risks in power plants. He also highlights the need to build trust with asset owners and gain leadership buy-in for cybersecurity initiatives. Finally, he discusses the importance of connecting technical expertise to business priorities. The conversation explores the importance of building trust and collaboration in the field of cybersecurity, particularly in the context of power utilities. It emphasizes the need for security professionals to be partners rather than adversaries, and highlights the role of organizations like the ICS Village in fostering collaboration and education. The conversation also delves into the concept of purple team exercises and the importance of starting small and growing in cybersecurity initiatives. Additionally, it discusses the significance of conversations with policymakers and the need for more cybersecurity professionals in the industry.</p>
<p> </p>
<h2><span style="font-weight:400;">More About The Episode</span></h2>
<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Sevak Avakians</span></p>
<p> </p>
<h2><span style="font-weight:400;">Connect with Bryson Bort:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://scythe.io" target="_blank" rel="noreferrer noopener">scythe.io</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: <a href="https://www.linkedin.com/in/brysonbort/" target="_blank" rel="noreferrer noopener">https://www.linkedin.com/in/brysonbort/</a></span></li>
</ul>
<h2><span style="font-weight:400;">Connect with Aaron Crow:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<h2><span style="font-weight:400;">Learn more about PrOTect IT All:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: https://www.protectitall.co</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: https://twitter.com/protectitall</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: https://www.youtube.com/@PrOTectITAll</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  https://facebook.com/protectitallpodcast</span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Show notes by NMP.</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this conversation, Bryson Bort discusses his background and the creation of Scythe, an offensive security platform. He also talks about the ICS Village and the Vulnerability Management Pavilion, as well as his collaboration with the Department of Energy on a vulnerability management research project. Bryson emphasizes the importance of prioritizing vulnerabilities in operational technology (OT) and understanding the risks in power plants. He also highlights the need to build trust with asset owners and gain leadership buy-in for cybersecurity initiatives. Finally, he discusses the importance of connecting technical expertise to business priorities. The conversation explores the importance of building trust and collaboration in the field of cybersecurity, particularly in the context of power utilities. It emphasizes the need for security professionals to be partners rather than adversaries, and highlights the role of organizations like the ICS Village in fostering collaboration and education. The conversation also delves into the concept of purple team exercises and the importance of starting small and growing in cybersecurity initiatives. Additionally, it discusses the significance of conversations with policymakers and the need for more cybersecurity professionals in the industry.
 
More About The Episode
Hosted by: Aaron Crow
Guest: Sevak Avakians
 
Connect with Bryson Bort:

Website: scythe.io
LinkedIn: https://www.linkedin.com/in/brysonbort/

Connect with Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://www.protectitall.co
X: https://twitter.com/protectitall
YouTube: https://www.youtube.com/@PrOTectITAll
FaceBook:  https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at info@protectitall.co
—
Show notes by NMP.
Audio production by NMP. We hear you loud and clear.
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Securing OT: Strategies for Prioritizing Vulnerabilities]]>
                </itunes:title>
                                    <itunes:episode>7</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this conversation, Bryson Bort discusses his background and the creation of Scythe, an offensive security platform. He also talks about the ICS Village and the Vulnerability Management Pavilion, as well as his collaboration with the Department of Energy on a vulnerability management research project. Bryson emphasizes the importance of prioritizing vulnerabilities in operational technology (OT) and understanding the risks in power plants. He also highlights the need to build trust with asset owners and gain leadership buy-in for cybersecurity initiatives. Finally, he discusses the importance of connecting technical expertise to business priorities. The conversation explores the importance of building trust and collaboration in the field of cybersecurity, particularly in the context of power utilities. It emphasizes the need for security professionals to be partners rather than adversaries, and highlights the role of organizations like the ICS Village in fostering collaboration and education. The conversation also delves into the concept of purple team exercises and the importance of starting small and growing in cybersecurity initiatives. Additionally, it discusses the significance of conversations with policymakers and the need for more cybersecurity professionals in the industry.</p>
<p> </p>
<h2><span style="font-weight:400;">More About The Episode</span></h2>
<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Sevak Avakians</span></p>
<p> </p>
<h2><span style="font-weight:400;">Connect with Bryson Bort:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://scythe.io" target="_blank" rel="noreferrer noopener">scythe.io</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: <a href="https://www.linkedin.com/in/brysonbort/" target="_blank" rel="noreferrer noopener">https://www.linkedin.com/in/brysonbort/</a></span></li>
</ul>
<h2><span style="font-weight:400;">Connect with Aaron Crow:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<h2><span style="font-weight:400;">Learn more about PrOTect IT All:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: https://www.protectitall.co</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: https://twitter.com/protectitall</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: https://www.youtube.com/@PrOTectITAll</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  https://facebook.com/protectitallpodcast</span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Show notes by NMP.</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1688484/c1e-q237vu2zpkjinoz4o-jkwmpjw5bkqg-6lgyox.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1688484&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=1983cc19ae794908dcbbdca66bf8497a937c5737ab91f152804ef34bed3cdd03" length="61120648"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this conversation, Bryson Bort discusses his background and the creation of Scythe, an offensive security platform. He also talks about the ICS Village and the Vulnerability Management Pavilion, as well as his collaboration with the Department of Energy on a vulnerability management research project. Bryson emphasizes the importance of prioritizing vulnerabilities in operational technology (OT) and understanding the risks in power plants. He also highlights the need to build trust with asset owners and gain leadership buy-in for cybersecurity initiatives. Finally, he discusses the importance of connecting technical expertise to business priorities. The conversation explores the importance of building trust and collaboration in the field of cybersecurity, particularly in the context of power utilities. It emphasizes the need for security professionals to be partners rather than adversaries, and highlights the role of organizations like the ICS Village in fostering collaboration and education. The conversation also delves into the concept of purple team exercises and the importance of starting small and growing in cybersecurity initiatives. Additionally, it discusses the significance of conversations with policymakers and the need for more cybersecurity professionals in the industry.
 
More About The Episode
Hosted by: Aaron Crow
Guest: Sevak Avakians
 
Connect with Bryson Bort:

Website: scythe.io
LinkedIn: https://www.linkedin.com/in/brysonbort/

Connect with Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: https://www.protectitall.co
X: https://twitter.com/protectitall
YouTube: https://www.youtube.com/@PrOTectITAll
FaceBook:  https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at info@protectitall.co
—
Show notes by NMP.
Audio production by NMP. We hear you loud and clear.
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1688484/c1a-w52rp-92k6j0k7sw0j-oarzkk.png"></itunes:image>
                                                                            <itunes:duration>00:42:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[The Future of AI: Determinism, Security, and Beyond]]>
                </title>
                <pubDate>Tue, 05 Mar 2024 21:49:50 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1681083</guid>
                                <description>
                                            <![CDATA[<p>Sevak Avakians, CEO of Intelligent Artifacts, discusses the limitations of neural networks and the need for a new approach to artificial intelligence. He introduces Gaius, a platform that replaces underlying neural networks with a transparent and explainable technology. Avakians highlights the challenges of regulating AI and emphasizes the importance of deterministic systems in critical industries. He also discusses the potential applications of AI in cybersecurity and the need for human involvement in AI decision-making. Looking ahead, Avakians is excited about the possibilities of AI but also acknowledges the concerns and risks associated with its implementation. The conversation explores the concerns and potential risks associated with autonomous aircraft and the use of AI and ML in safety-critical systems. Adversarial attacks are discussed as a potential threat, highlighting the need for robust safety regulations. The application of safety standards, such as the DO178C standard, to AI and ML technologies is proposed as a solution. On the positive side, AI is seen as a tool to enhance human capabilities and improve efficiency. The importance of training and wargaming exercises using AI is emphasized. The conversation concludes by discussing the balance between the risks and benefits of AI and providing information on how to learn more about AI.</p>
<h2>About <span style="font-weight:400;">Sevak Avakians</span></h2>
<p>As the founder and CEO of Intelligent Artifacts, Inc., Sevak Avakians has been leading<br />the development and commercialization of a groundbreaking information processing and<br />AI/ML/R framework, GAIuS, since 2008. GAIuS is a deterministic, fully explainable, and<br />use-case agnostic symbolic connectionist AI solution that can be applied to mission and<br />safety-critical domains, such as defense, aerospace, healthcare, and law enforcement.</p>
<p><br />With a background in physics, telecommunications, information theory, cybersecurity,<br />and artificial intelligence, Sevak has a unique and comprehensive understanding of the<br />challenges and opportunities in the field of cognitive computing. He is passionate about<br />creating AI solutions that can act, interact, and adapt as information, goals, and<br />requirements evolve while providing full transparency and accountability for their<br />decisions and actions. Sevak's vision is to empower developers, customers, and end-<br />users with the ability to create, deploy, and maintain machine intelligence with ease,<br />efficiency, and confidence.</p>
<p><br />In 2010, Sevak founded Intelligent Artifacts initially as an R&amp;D and consulting service for<br />cognitive computing. Over the years, he built the GAIuS Cognitive Computing Platform<br />as a commercial product launched in 2016. GAIuS Cognitive Computing Platform, allows<br />developers to rapidly create, test, deploy, and maintain machine intelligence, learning,<br />classification, predictions, analytics, etc. into their products.</p>
<p><br />In 2020, the team at Intelligent Artifacts built a reasoning engine into GAIuS, creating the<br />very first modular, repeatable, use-case agnostic, complete, Artificial Intelligence /<br />Machine Learning / Reasoning (AI/ML/R) platform that adheres to ExCITE AI principles.</p>
<p><br />GAIuS handles all the complexity of machine intelligence in 4 API calls. GAIuS agents<br />can be made and deployed in less than 3 minutes. Developers copy-and-paste a GAIuS<br />agent’s API URL into their application. GAIuS agents have DNA and evolve within their<br />environment, eliminating many of the hurdles to achieving true machine intelligence.</p>
<p> </p>
<h2><span style="font-weight:400;">More About The Episode</span></h2>
<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Sevak Avakians</span></p>
<p> </p>
<h2><span style="font-weight:400;">Connect with Sevak...</span></h2>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sevak Avakians, CEO of Intelligent Artifacts, discusses the limitations of neural networks and the need for a new approach to artificial intelligence. He introduces Gaius, a platform that replaces underlying neural networks with a transparent and explainable technology. Avakians highlights the challenges of regulating AI and emphasizes the importance of deterministic systems in critical industries. He also discusses the potential applications of AI in cybersecurity and the need for human involvement in AI decision-making. Looking ahead, Avakians is excited about the possibilities of AI but also acknowledges the concerns and risks associated with its implementation. The conversation explores the concerns and potential risks associated with autonomous aircraft and the use of AI and ML in safety-critical systems. Adversarial attacks are discussed as a potential threat, highlighting the need for robust safety regulations. The application of safety standards, such as the DO178C standard, to AI and ML technologies is proposed as a solution. On the positive side, AI is seen as a tool to enhance human capabilities and improve efficiency. The importance of training and wargaming exercises using AI is emphasized. The conversation concludes by discussing the balance between the risks and benefits of AI and providing information on how to learn more about AI.
About Sevak Avakians
As the founder and CEO of Intelligent Artifacts, Inc., Sevak Avakians has been leadingthe development and commercialization of a groundbreaking information processing andAI/ML/R framework, GAIuS, since 2008. GAIuS is a deterministic, fully explainable, anduse-case agnostic symbolic connectionist AI solution that can be applied to mission andsafety-critical domains, such as defense, aerospace, healthcare, and law enforcement.
With a background in physics, telecommunications, information theory, cybersecurity,and artificial intelligence, Sevak has a unique and comprehensive understanding of thechallenges and opportunities in the field of cognitive computing. He is passionate aboutcreating AI solutions that can act, interact, and adapt as information, goals, andrequirements evolve while providing full transparency and accountability for theirdecisions and actions. Sevak's vision is to empower developers, customers, and end-users with the ability to create, deploy, and maintain machine intelligence with ease,efficiency, and confidence.
In 2010, Sevak founded Intelligent Artifacts initially as an R&D and consulting service forcognitive computing. Over the years, he built the GAIuS Cognitive Computing Platformas a commercial product launched in 2016. GAIuS Cognitive Computing Platform, allowsdevelopers to rapidly create, test, deploy, and maintain machine intelligence, learning,classification, predictions, analytics, etc. into their products.
In 2020, the team at Intelligent Artifacts built a reasoning engine into GAIuS, creating thevery first modular, repeatable, use-case agnostic, complete, Artificial Intelligence /Machine Learning / Reasoning (AI/ML/R) platform that adheres to ExCITE AI principles.
GAIuS handles all the complexity of machine intelligence in 4 API calls. GAIuS agentscan be made and deployed in less than 3 minutes. Developers copy-and-paste a GAIuSagent’s API URL into their application. GAIuS agents have DNA and evolve within theirenvironment, eliminating many of the hurdles to achieving true machine intelligence.
 
More About The Episode
Hosted by: Aaron Crow
Guest: Sevak Avakians
 
Connect with Sevak...]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[The Future of AI: Determinism, Security, and Beyond]]>
                </itunes:title>
                                    <itunes:episode>6</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Sevak Avakians, CEO of Intelligent Artifacts, discusses the limitations of neural networks and the need for a new approach to artificial intelligence. He introduces Gaius, a platform that replaces underlying neural networks with a transparent and explainable technology. Avakians highlights the challenges of regulating AI and emphasizes the importance of deterministic systems in critical industries. He also discusses the potential applications of AI in cybersecurity and the need for human involvement in AI decision-making. Looking ahead, Avakians is excited about the possibilities of AI but also acknowledges the concerns and risks associated with its implementation. The conversation explores the concerns and potential risks associated with autonomous aircraft and the use of AI and ML in safety-critical systems. Adversarial attacks are discussed as a potential threat, highlighting the need for robust safety regulations. The application of safety standards, such as the DO178C standard, to AI and ML technologies is proposed as a solution. On the positive side, AI is seen as a tool to enhance human capabilities and improve efficiency. The importance of training and wargaming exercises using AI is emphasized. The conversation concludes by discussing the balance between the risks and benefits of AI and providing information on how to learn more about AI.</p>
<h2>About <span style="font-weight:400;">Sevak Avakians</span></h2>
<p>As the founder and CEO of Intelligent Artifacts, Inc., Sevak Avakians has been leading<br />the development and commercialization of a groundbreaking information processing and<br />AI/ML/R framework, GAIuS, since 2008. GAIuS is a deterministic, fully explainable, and<br />use-case agnostic symbolic connectionist AI solution that can be applied to mission and<br />safety-critical domains, such as defense, aerospace, healthcare, and law enforcement.</p>
<p><br />With a background in physics, telecommunications, information theory, cybersecurity,<br />and artificial intelligence, Sevak has a unique and comprehensive understanding of the<br />challenges and opportunities in the field of cognitive computing. He is passionate about<br />creating AI solutions that can act, interact, and adapt as information, goals, and<br />requirements evolve while providing full transparency and accountability for their<br />decisions and actions. Sevak's vision is to empower developers, customers, and end-<br />users with the ability to create, deploy, and maintain machine intelligence with ease,<br />efficiency, and confidence.</p>
<p><br />In 2010, Sevak founded Intelligent Artifacts initially as an R&amp;D and consulting service for<br />cognitive computing. Over the years, he built the GAIuS Cognitive Computing Platform<br />as a commercial product launched in 2016. GAIuS Cognitive Computing Platform, allows<br />developers to rapidly create, test, deploy, and maintain machine intelligence, learning,<br />classification, predictions, analytics, etc. into their products.</p>
<p><br />In 2020, the team at Intelligent Artifacts built a reasoning engine into GAIuS, creating the<br />very first modular, repeatable, use-case agnostic, complete, Artificial Intelligence /<br />Machine Learning / Reasoning (AI/ML/R) platform that adheres to ExCITE AI principles.</p>
<p><br />GAIuS handles all the complexity of machine intelligence in 4 API calls. GAIuS agents<br />can be made and deployed in less than 3 minutes. Developers copy-and-paste a GAIuS<br />agent’s API URL into their application. GAIuS agents have DNA and evolve within their<br />environment, eliminating many of the hurdles to achieving true machine intelligence.</p>
<p> </p>
<h2><span style="font-weight:400;">More About The Episode</span></h2>
<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Sevak Avakians</span></p>
<p> </p>
<h2><span style="font-weight:400;">Connect with Sevak Avakians:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://intelligent-artifacts.com" target="_blank" rel="noreferrer noopener">https://intelligent-artifacts.com</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: <a href="https://www.linkedin.com/in/avakians/" target="_blank" rel="noreferrer noopener">https://www.linkedin.com/in/avakians/</a></span></li>
</ul>
<h2><span style="font-weight:400;">Connect with Aaron Crow:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<h2><span style="font-weight:400;">Learn more about PrOTect IT All:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: https://www.protectitall.co</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: https://twitter.com/protectitall</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: https://www.youtube.com/@PrOTectITAll</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  https://facebook.com/protectitallpodcast</span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Show notes by NMP.</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1681083/c1e-52n9dumnpxgink1ok-qxnkwgpnf4g7-sy6wa3.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1681083&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=31ada7de04170829ef02e56dc83231e24d103e9e884eb039437b0219a26ca34d" length="74618632"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sevak Avakians, CEO of Intelligent Artifacts, discusses the limitations of neural networks and the need for a new approach to artificial intelligence. He introduces Gaius, a platform that replaces underlying neural networks with a transparent and explainable technology. Avakians highlights the challenges of regulating AI and emphasizes the importance of deterministic systems in critical industries. He also discusses the potential applications of AI in cybersecurity and the need for human involvement in AI decision-making. Looking ahead, Avakians is excited about the possibilities of AI but also acknowledges the concerns and risks associated with its implementation. The conversation explores the concerns and potential risks associated with autonomous aircraft and the use of AI and ML in safety-critical systems. Adversarial attacks are discussed as a potential threat, highlighting the need for robust safety regulations. The application of safety standards, such as the DO178C standard, to AI and ML technologies is proposed as a solution. On the positive side, AI is seen as a tool to enhance human capabilities and improve efficiency. The importance of training and wargaming exercises using AI is emphasized. The conversation concludes by discussing the balance between the risks and benefits of AI and providing information on how to learn more about AI.
About Sevak Avakians
As the founder and CEO of Intelligent Artifacts, Inc., Sevak Avakians has been leadingthe development and commercialization of a groundbreaking information processing andAI/ML/R framework, GAIuS, since 2008. GAIuS is a deterministic, fully explainable, anduse-case agnostic symbolic connectionist AI solution that can be applied to mission andsafety-critical domains, such as defense, aerospace, healthcare, and law enforcement.
With a background in physics, telecommunications, information theory, cybersecurity,and artificial intelligence, Sevak has a unique and comprehensive understanding of thechallenges and opportunities in the field of cognitive computing. He is passionate aboutcreating AI solutions that can act, interact, and adapt as information, goals, andrequirements evolve while providing full transparency and accountability for theirdecisions and actions. Sevak's vision is to empower developers, customers, and end-users with the ability to create, deploy, and maintain machine intelligence with ease,efficiency, and confidence.
In 2010, Sevak founded Intelligent Artifacts initially as an R&D and consulting service forcognitive computing. Over the years, he built the GAIuS Cognitive Computing Platformas a commercial product launched in 2016. GAIuS Cognitive Computing Platform, allowsdevelopers to rapidly create, test, deploy, and maintain machine intelligence, learning,classification, predictions, analytics, etc. into their products.
In 2020, the team at Intelligent Artifacts built a reasoning engine into GAIuS, creating thevery first modular, repeatable, use-case agnostic, complete, Artificial Intelligence /Machine Learning / Reasoning (AI/ML/R) platform that adheres to ExCITE AI principles.
GAIuS handles all the complexity of machine intelligence in 4 API calls. GAIuS agentscan be made and deployed in less than 3 minutes. Developers copy-and-paste a GAIuSagent’s API URL into their application. GAIuS agents have DNA and evolve within theirenvironment, eliminating many of the hurdles to achieving true machine intelligence.
 
More About The Episode
Hosted by: Aaron Crow
Guest: Sevak Avakians
 
Connect with Sevak...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1681083/c1a-w52rp-2o1r7qokamm9-odvkph.png"></itunes:image>
                                                                            <itunes:duration>00:51:48</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Navigating Cybersecurity Challenges: A Conversation with Ted Gutierrez on Bridging OT and IT]]>
                </title>
                <pubDate>Tue, 27 Feb 2024 18:14:44 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1673096</guid>
                                <description>
                                            <![CDATA[<p>In this conversation, Ted Gutierrez, the leader of Security Gate, discusses the challenges and strategies in implementing cybersecurity solutions in the critical infrastructure sector. He emphasizes the importance of common language and frameworks to bridge the gap between IT and OT. Ted also highlights the need for asset owners to start slow and focus on key controls, rather than aiming for maturity level 5 in all control frameworks. He discusses the challenges of scaling OT compared to IT and the need for consolidation in the market. Ted concludes by emphasizing the power of saying no and focusing on specific goals. In this conversation, Ted Gutierrez discusses his concerns and excitement for the future of cybersecurity. He expresses concern about the global state of conflict and its impact on cybersecurity. He also discusses the balance between order and freedom in the cyber industry. On the positive side, Gutierrez is excited about the increasing focus on the business side of cybersecurity and the growing understanding of cyber as a business problem. He emphasizes the importance of non-technical leaders understanding cybersecurity. Overall, Gutierrez is confident in the people working to protect the globe.</p>
<h2>About Ted Gutierrez</h2>
<p>Ted Gutierrez is the CEO and Co-Founder of SecurityGate, the provider of the leading SaaS Platform for OT cyber improvement. He is dedicated to protecting what matters across operational sectors and aligning industrial cyber teams on their cyber improvement journey. With an extensive background as a compliance and risk auditor for critical infrastructure, he understands the pain associated with effectively maturing organizational resilience in a decentralized ecosystem. A United States Military Academy graduate at West Point and a veteran of the US Army as a reconnaissance and surveillance expert. </p>
<h2>Takeaways</h2>
<ul>
<li>Common language and frameworks are crucial for bridging the gap between IT and OT in implementing cybersecurity solutions.</li>
<li>Asset owners should start slow and focus on key controls rather than aiming for maturity level 5 in all control frameworks.</li>
<li>The challenges of scaling OT compared to IT require a shift in perspective and planning.</li>
<li>Consolidation in the market is needed to address the challenges and inflated expectations in the cybersecurity industry.</li>
<li>The power of saying no and focusing on specific goals is essential for success in implementing cybersecurity solutions. Global conflict can have an impact on cybersecurity, but it is important to consider the balance between order and freedom in the industry.</li>
<li>The focus on the business side of cybersecurity is increasing, and non-technical leaders are starting to understand its importance.</li>
<li>Cybersecurity is now seen as a business problem and is being discussed in boardrooms.</li>
<li>The cybersecurity community is filled with dedicated and passionate individuals who are working to protect the globe.</li>
</ul>
<h2> </h2>
<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Ted Gutierrez</span></p>
<p> </p>
<h2><span style="font-weight:400;">Connect with Ted Gutierrez:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://securitygate.io">https://securitygate.io</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: <a href="https://www.linkedin.com/in/tedgutierrez/">https://www.linkedin.com/in/tedgutierrez/</a></span></li>
</ul>
<h2><span style="font-weight:400;">Connect with Aaron Crow:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this conversation, Ted Gutierrez, the leader of Security Gate, discusses the challenges and strategies in implementing cybersecurity solutions in the critical infrastructure sector. He emphasizes the importance of common language and frameworks to bridge the gap between IT and OT. Ted also highlights the need for asset owners to start slow and focus on key controls, rather than aiming for maturity level 5 in all control frameworks. He discusses the challenges of scaling OT compared to IT and the need for consolidation in the market. Ted concludes by emphasizing the power of saying no and focusing on specific goals. In this conversation, Ted Gutierrez discusses his concerns and excitement for the future of cybersecurity. He expresses concern about the global state of conflict and its impact on cybersecurity. He also discusses the balance between order and freedom in the cyber industry. On the positive side, Gutierrez is excited about the increasing focus on the business side of cybersecurity and the growing understanding of cyber as a business problem. He emphasizes the importance of non-technical leaders understanding cybersecurity. Overall, Gutierrez is confident in the people working to protect the globe.
About Ted Gutierrez
Ted Gutierrez is the CEO and Co-Founder of SecurityGate, the provider of the leading SaaS Platform for OT cyber improvement. He is dedicated to protecting what matters across operational sectors and aligning industrial cyber teams on their cyber improvement journey. With an extensive background as a compliance and risk auditor for critical infrastructure, he understands the pain associated with effectively maturing organizational resilience in a decentralized ecosystem. A United States Military Academy graduate at West Point and a veteran of the US Army as a reconnaissance and surveillance expert. 
Takeaways

Common language and frameworks are crucial for bridging the gap between IT and OT in implementing cybersecurity solutions.
Asset owners should start slow and focus on key controls rather than aiming for maturity level 5 in all control frameworks.
The challenges of scaling OT compared to IT require a shift in perspective and planning.
Consolidation in the market is needed to address the challenges and inflated expectations in the cybersecurity industry.
The power of saying no and focusing on specific goals is essential for success in implementing cybersecurity solutions. Global conflict can have an impact on cybersecurity, but it is important to consider the balance between order and freedom in the industry.
The focus on the business side of cybersecurity is increasing, and non-technical leaders are starting to understand its importance.
Cybersecurity is now seen as a business problem and is being discussed in boardrooms.
The cybersecurity community is filled with dedicated and passionate individuals who are working to protect the globe.

 
Hosted by: Aaron Crow
Guest: Ted Gutierrez
 
Connect with Ted Gutierrez:

Website: https://securitygate.io
LinkedIn: https://www.linkedin.com/in/tedgutierrez/

Connect with Aaron Crow:

Website: www.corvosec.com 
LinkedIn:]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Navigating Cybersecurity Challenges: A Conversation with Ted Gutierrez on Bridging OT and IT]]>
                </itunes:title>
                                    <itunes:episode>5</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this conversation, Ted Gutierrez, the leader of Security Gate, discusses the challenges and strategies in implementing cybersecurity solutions in the critical infrastructure sector. He emphasizes the importance of common language and frameworks to bridge the gap between IT and OT. Ted also highlights the need for asset owners to start slow and focus on key controls, rather than aiming for maturity level 5 in all control frameworks. He discusses the challenges of scaling OT compared to IT and the need for consolidation in the market. Ted concludes by emphasizing the power of saying no and focusing on specific goals. In this conversation, Ted Gutierrez discusses his concerns and excitement for the future of cybersecurity. He expresses concern about the global state of conflict and its impact on cybersecurity. He also discusses the balance between order and freedom in the cyber industry. On the positive side, Gutierrez is excited about the increasing focus on the business side of cybersecurity and the growing understanding of cyber as a business problem. He emphasizes the importance of non-technical leaders understanding cybersecurity. Overall, Gutierrez is confident in the people working to protect the globe.</p>
<h2>About Ted Gutierrez</h2>
<p>Ted Gutierrez is the CEO and Co-Founder of SecurityGate, the provider of the leading SaaS Platform for OT cyber improvement. He is dedicated to protecting what matters across operational sectors and aligning industrial cyber teams on their cyber improvement journey. With an extensive background as a compliance and risk auditor for critical infrastructure, he understands the pain associated with effectively maturing organizational resilience in a decentralized ecosystem. A United States Military Academy graduate at West Point and a veteran of the US Army as a reconnaissance and surveillance expert. </p>
<h2>Takeaways</h2>
<ul>
<li>Common language and frameworks are crucial for bridging the gap between IT and OT in implementing cybersecurity solutions.</li>
<li>Asset owners should start slow and focus on key controls rather than aiming for maturity level 5 in all control frameworks.</li>
<li>The challenges of scaling OT compared to IT require a shift in perspective and planning.</li>
<li>Consolidation in the market is needed to address the challenges and inflated expectations in the cybersecurity industry.</li>
<li>The power of saying no and focusing on specific goals is essential for success in implementing cybersecurity solutions. Global conflict can have an impact on cybersecurity, but it is important to consider the balance between order and freedom in the industry.</li>
<li>The focus on the business side of cybersecurity is increasing, and non-technical leaders are starting to understand its importance.</li>
<li>Cybersecurity is now seen as a business problem and is being discussed in boardrooms.</li>
<li>The cybersecurity community is filled with dedicated and passionate individuals who are working to protect the globe.</li>
</ul>
<h2> </h2>
<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Ted Gutierrez</span></p>
<p> </p>
<h2><span style="font-weight:400;">Connect with Ted Gutierrez:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://securitygate.io">https://securitygate.io</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: <a href="https://www.linkedin.com/in/tedgutierrez/">https://www.linkedin.com/in/tedgutierrez/</a></span></li>
</ul>
<h2><span style="font-weight:400;">Connect with Aaron Crow:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<h2><span style="font-weight:400;">Learn more about PrOTect IT All:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: https://www.protectitall.co</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: https://twitter.com/protectitall</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: https://www.youtube.com/@PrOTectITAll</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  https://facebook.com/protectitallpodcast</span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Show notes by NMP.</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1673096/c1e-x510gbmr5xka01vr1-1xgj7846t8g5-otzgxo.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1673096&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=40b85b51f0330351b3e6e1c0f9f4b6d46905a1b77c2f15a62306aeba615053f3" length="74265616"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this conversation, Ted Gutierrez, the leader of Security Gate, discusses the challenges and strategies in implementing cybersecurity solutions in the critical infrastructure sector. He emphasizes the importance of common language and frameworks to bridge the gap between IT and OT. Ted also highlights the need for asset owners to start slow and focus on key controls, rather than aiming for maturity level 5 in all control frameworks. He discusses the challenges of scaling OT compared to IT and the need for consolidation in the market. Ted concludes by emphasizing the power of saying no and focusing on specific goals. In this conversation, Ted Gutierrez discusses his concerns and excitement for the future of cybersecurity. He expresses concern about the global state of conflict and its impact on cybersecurity. He also discusses the balance between order and freedom in the cyber industry. On the positive side, Gutierrez is excited about the increasing focus on the business side of cybersecurity and the growing understanding of cyber as a business problem. He emphasizes the importance of non-technical leaders understanding cybersecurity. Overall, Gutierrez is confident in the people working to protect the globe.
About Ted Gutierrez
Ted Gutierrez is the CEO and Co-Founder of SecurityGate, the provider of the leading SaaS Platform for OT cyber improvement. He is dedicated to protecting what matters across operational sectors and aligning industrial cyber teams on their cyber improvement journey. With an extensive background as a compliance and risk auditor for critical infrastructure, he understands the pain associated with effectively maturing organizational resilience in a decentralized ecosystem. A United States Military Academy graduate at West Point and a veteran of the US Army as a reconnaissance and surveillance expert. 
Takeaways

Common language and frameworks are crucial for bridging the gap between IT and OT in implementing cybersecurity solutions.
Asset owners should start slow and focus on key controls rather than aiming for maturity level 5 in all control frameworks.
The challenges of scaling OT compared to IT require a shift in perspective and planning.
Consolidation in the market is needed to address the challenges and inflated expectations in the cybersecurity industry.
The power of saying no and focusing on specific goals is essential for success in implementing cybersecurity solutions. Global conflict can have an impact on cybersecurity, but it is important to consider the balance between order and freedom in the industry.
The focus on the business side of cybersecurity is increasing, and non-technical leaders are starting to understand its importance.
Cybersecurity is now seen as a business problem and is being discussed in boardrooms.
The cybersecurity community is filled with dedicated and passionate individuals who are working to protect the globe.

 
Hosted by: Aaron Crow
Guest: Ted Gutierrez
 
Connect with Ted Gutierrez:

Website: https://securitygate.io
LinkedIn: https://www.linkedin.com/in/tedgutierrez/

Connect with Aaron Crow:

Website: www.corvosec.com 
LinkedIn:]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1673096/c1a-w52rp-8m7joxwkirp4-xghpvp.png"></itunes:image>
                                                                            <itunes:duration>00:51:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Harnessing AI in Cybersecurity: Revolutionizing OT Protection]]>
                </title>
                <pubDate>Tue, 20 Feb 2024 01:19:06 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1665517</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Clint Bodungen</span></p>
<p><span style="font-weight:400;">Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 25+ years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook. Clint is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, and Kaspersky Lab, and is currently the co-founder and CEO of a cybersecurity training startup, ThreatGEN. Renowned for his creative approach to cybersecurity education and training, he has been at the forefront of integrating gamification and AI applications into cybersecurity training, creating his flagship product, “ThreatGEN® Red vs. Blue”, the world's first online multiplayer computer designed to teach real-world cybersecurity. His latest innovation is AutoTableTop, which uses the latest generative AI technology to automate, simplify, and revolution IR tabletop exercises. As AI technology continues to evolve, so too does his pursuit to help revolutionize the cybersecurity industry using generative AI and large language models (LLM).</span></p>
<h2><span style="font-weight:400;">Summary</span></h2>
<p><span style="font-weight:400;">In this conversation, Clint and Aaron discuss the value of tabletop exercises in cybersecurity and the development of auto tabletop, an AI-based tool for facilitating incident response tabletop exercises. They highlight the limitations of traditional tabletops and the benefits of using AI to enhance engagement and flexibility. They address concerns about AI in cybersecurity, such as data privacy and security, and emphasize the use of local language models to mitigate risks. They also discuss the future of AI in the industry and the workforce, emphasizing the importance of learning generative AI and prompt engineering for future job prospects. In this conversation, Clint discusses the automation of tasks using AI and the benefits of using AI as a tool to enhance human creativity. He also explores the future of AI and its potential for accelerating technological advancement. Clint acknowledges the concerns about the potential misuse of AI but emphasizes the importance of using it for good. He highlights the role of AI in reducing barriers to innovation and its significance in cybersecurity. Overall, the conversation highlights the transformative power of AI and its impact on various industries.</span></p>
<h2><span style="font-weight:400;">Takeaways</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Tabletop exercises are important for testing incident response plans and should be conducted regularly for maximum effectiveness.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">AI-based tabletop exercises, such as auto tabletop, offer increased engagement and flexibility compared to traditional tabletops.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Concerns about data privacy and security can be addressed by using local language models and fine-tuning models for specific tasks.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">AI has the potential to enhance productivity and efficiency in the industry, but proper understanding and implementation are crucial.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Learning generative AI and prompt engineering can increase job prospects in the future. AI can automate menial tasks, allowing humans to focus on more valuable work.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">AI has the potential to enhance human creativity and accelerate technological advancement.</span></li>
<li></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Hosted by: Aaron Crow
Guest: Clint Bodungen
Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 25+ years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook. Clint is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, and Kaspersky Lab, and is currently the co-founder and CEO of a cybersecurity training startup, ThreatGEN. Renowned for his creative approach to cybersecurity education and training, he has been at the forefront of integrating gamification and AI applications into cybersecurity training, creating his flagship product, “ThreatGEN® Red vs. Blue”, the world's first online multiplayer computer designed to teach real-world cybersecurity. His latest innovation is AutoTableTop, which uses the latest generative AI technology to automate, simplify, and revolution IR tabletop exercises. As AI technology continues to evolve, so too does his pursuit to help revolutionize the cybersecurity industry using generative AI and large language models (LLM).
Summary
In this conversation, Clint and Aaron discuss the value of tabletop exercises in cybersecurity and the development of auto tabletop, an AI-based tool for facilitating incident response tabletop exercises. They highlight the limitations of traditional tabletops and the benefits of using AI to enhance engagement and flexibility. They address concerns about AI in cybersecurity, such as data privacy and security, and emphasize the use of local language models to mitigate risks. They also discuss the future of AI in the industry and the workforce, emphasizing the importance of learning generative AI and prompt engineering for future job prospects. In this conversation, Clint discusses the automation of tasks using AI and the benefits of using AI as a tool to enhance human creativity. He also explores the future of AI and its potential for accelerating technological advancement. Clint acknowledges the concerns about the potential misuse of AI but emphasizes the importance of using it for good. He highlights the role of AI in reducing barriers to innovation and its significance in cybersecurity. Overall, the conversation highlights the transformative power of AI and its impact on various industries.
Takeaways

Tabletop exercises are important for testing incident response plans and should be conducted regularly for maximum effectiveness.
AI-based tabletop exercises, such as auto tabletop, offer increased engagement and flexibility compared to traditional tabletops.
Concerns about data privacy and security can be addressed by using local language models and fine-tuning models for specific tasks.
AI has the potential to enhance productivity and efficiency in the industry, but proper understanding and implementation are crucial.
Learning generative AI and prompt engineering can increase job prospects in the future. AI can automate menial tasks, allowing humans to focus on more valuable work.
AI has the potential to enhance human creativity and accelerate technological advancement.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Harnessing AI in Cybersecurity: Revolutionizing OT Protection]]>
                </itunes:title>
                                    <itunes:episode>4</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;"><strong>Hosted by:</strong> Aaron Crow</span></p>
<p><span style="font-weight:400;"><strong>Guest</strong>: Clint Bodungen</span></p>
<p><span style="font-weight:400;">Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 25+ years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook. Clint is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, and Kaspersky Lab, and is currently the co-founder and CEO of a cybersecurity training startup, ThreatGEN. Renowned for his creative approach to cybersecurity education and training, he has been at the forefront of integrating gamification and AI applications into cybersecurity training, creating his flagship product, “ThreatGEN® Red vs. Blue”, the world's first online multiplayer computer designed to teach real-world cybersecurity. His latest innovation is AutoTableTop, which uses the latest generative AI technology to automate, simplify, and revolution IR tabletop exercises. As AI technology continues to evolve, so too does his pursuit to help revolutionize the cybersecurity industry using generative AI and large language models (LLM).</span></p>
<h2><span style="font-weight:400;">Summary</span></h2>
<p><span style="font-weight:400;">In this conversation, Clint and Aaron discuss the value of tabletop exercises in cybersecurity and the development of auto tabletop, an AI-based tool for facilitating incident response tabletop exercises. They highlight the limitations of traditional tabletops and the benefits of using AI to enhance engagement and flexibility. They address concerns about AI in cybersecurity, such as data privacy and security, and emphasize the use of local language models to mitigate risks. They also discuss the future of AI in the industry and the workforce, emphasizing the importance of learning generative AI and prompt engineering for future job prospects. In this conversation, Clint discusses the automation of tasks using AI and the benefits of using AI as a tool to enhance human creativity. He also explores the future of AI and its potential for accelerating technological advancement. Clint acknowledges the concerns about the potential misuse of AI but emphasizes the importance of using it for good. He highlights the role of AI in reducing barriers to innovation and its significance in cybersecurity. Overall, the conversation highlights the transformative power of AI and its impact on various industries.</span></p>
<h2><span style="font-weight:400;">Takeaways</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Tabletop exercises are important for testing incident response plans and should be conducted regularly for maximum effectiveness.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">AI-based tabletop exercises, such as auto tabletop, offer increased engagement and flexibility compared to traditional tabletops.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Concerns about data privacy and security can be addressed by using local language models and fine-tuning models for specific tasks.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">AI has the potential to enhance productivity and efficiency in the industry, but proper understanding and implementation are crucial.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Learning generative AI and prompt engineering can increase job prospects in the future. AI can automate menial tasks, allowing humans to focus on more valuable work.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">AI has the potential to enhance human creativity and accelerate technological advancement.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The responsible use of AI is crucial to prevent misuse and ensure positive outcomes.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">AI can reduce barriers to innovation and empower individuals to bring their ideas to life.</span></li>
</ul>
<h2><span style="font-weight:400;">Connect with Clint Bodungen:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://threatgen.com/" target="_blank" rel="noreferrer noopener">https://threatgen.com/</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: <a href="https://www.linkedin.com/in/clintb/">https://www.linkedin.com/in/clintb/</a></span></li>
</ul>
<p> </p>
<h2><span style="font-weight:400;">Connect with Aaron Crow:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<h2><span style="font-weight:400;">Learn more about PrOTect IT All:</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: https://www.protectitall.co</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: https://twitter.com/protectitall</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: https://www.youtube.com/@PrOTectITAll</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  https://facebook.com/protectitallpodcast</span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Show notes by NMP.</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1665517/c1e-3qromi5rqpgf6xj7x-romj684ntxn5-mdbrjo.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1665517&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=f63dc857476ae490830f4b1edf935e53197adba7e7eeec56e9e51f6fa20d45d7" length="82595656"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Hosted by: Aaron Crow
Guest: Clint Bodungen
Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 25+ years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook. Clint is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, and Kaspersky Lab, and is currently the co-founder and CEO of a cybersecurity training startup, ThreatGEN. Renowned for his creative approach to cybersecurity education and training, he has been at the forefront of integrating gamification and AI applications into cybersecurity training, creating his flagship product, “ThreatGEN® Red vs. Blue”, the world's first online multiplayer computer designed to teach real-world cybersecurity. His latest innovation is AutoTableTop, which uses the latest generative AI technology to automate, simplify, and revolution IR tabletop exercises. As AI technology continues to evolve, so too does his pursuit to help revolutionize the cybersecurity industry using generative AI and large language models (LLM).
Summary
In this conversation, Clint and Aaron discuss the value of tabletop exercises in cybersecurity and the development of auto tabletop, an AI-based tool for facilitating incident response tabletop exercises. They highlight the limitations of traditional tabletops and the benefits of using AI to enhance engagement and flexibility. They address concerns about AI in cybersecurity, such as data privacy and security, and emphasize the use of local language models to mitigate risks. They also discuss the future of AI in the industry and the workforce, emphasizing the importance of learning generative AI and prompt engineering for future job prospects. In this conversation, Clint discusses the automation of tasks using AI and the benefits of using AI as a tool to enhance human creativity. He also explores the future of AI and its potential for accelerating technological advancement. Clint acknowledges the concerns about the potential misuse of AI but emphasizes the importance of using it for good. He highlights the role of AI in reducing barriers to innovation and its significance in cybersecurity. Overall, the conversation highlights the transformative power of AI and its impact on various industries.
Takeaways

Tabletop exercises are important for testing incident response plans and should be conducted regularly for maximum effectiveness.
AI-based tabletop exercises, such as auto tabletop, offer increased engagement and flexibility compared to traditional tabletops.
Concerns about data privacy and security can be addressed by using local language models and fine-tuning models for specific tasks.
AI has the potential to enhance productivity and efficiency in the industry, but proper understanding and implementation are crucial.
Learning generative AI and prompt engineering can increase job prospects in the future. AI can automate menial tasks, allowing humans to focus on more valuable work.
AI has the potential to enhance human creativity and accelerate technological advancement.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1665517/c1a-w52rp-k5xqnv9pfw0k-qv4z9b.png"></itunes:image>
                                                                            <itunes:duration>00:57:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Exploring the OT Landscape: Insights from Building Management with Kyle Peters]]>
                </title>
                <pubDate>Mon, 12 Feb 2024 19:18:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1659827</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Kyle Peters is a recovering building automation and HVAC technician and programmer who was drawn to the dark side of cybersecurity and never looked back.  Today he is the senior consultant for OT Cybersecurity, focusing on building automation systems at Intelligent Buildings.  If you’d like to geek out on such things, reach out to Kyle via LinkedIn or email blackhole@secretdomain.xyz.</span></p>
<p><span style="font-weight:400;">In this conversation, Kyle discusses the world of building management systems and the importance of cybersecurity in this field. He highlights the diversity of building systems and the interconnectedness of various components. The conversation emphasizes the need for a risk-based approach to security and the importance of policies and standards. Kyle also emphasizes the value of understanding the system and planning ahead to mitigate risks. The conversation concludes with a discussion on securing remote access and implementing segmentation. The conversation explores the lack of cybersecurity preparedness in organizations, the need to translate cybersecurity risks to business risks, the likelihood of attacks and targeting, the challenge of selling likely risks, exciting technological advances in cybersecurity, concerns about AI and rapid technological changes, and closing thoughts and a call to action.</span></p>
<p> </p>
<h2><span style="font-weight:400;">Takeaways</span></h2>
<p><span style="font-weight:400;">Building management systems encompass a wide range of components, including HVAC systems, fire alarms, and lighting.</span></p>
<p><span style="font-weight:400;">A risk-based approach to security is crucial in building management, considering the diverse systems and potential vulnerabilities.</span></p>
<p><span style="font-weight:400;">Policies and standards play a significant role in ensuring the security and reliability of building management systems.</span></p>
<p><span style="font-weight:400;">Simple solutions, such as proper cable management and backup plans, can greatly enhance the security and availability of building systems.</span></p>
<p><span style="font-weight:400;">Understanding the system and planning ahead are essential for effective risk mitigation in building management.</span></p>
<p><span style="font-weight:400;">Securing remote access and implementing segmentation are key measures to protect building management systems from cyber threats. Many organizations are not adequately prepared for cybersecurity threats, either due to limited budgets or lack of expertise.</span></p>
<p><span style="font-weight:400;">It is important to translate cybersecurity risks into business risks to help organizations understand the potential impact on their operations.</span></p>
<p><span style="font-weight:400;">Cyber attacks can come from various sources, including nation-state actors, but also from simple human errors or system failures.</span></p>
<p><span style="font-weight:400;">Selling the importance of cybersecurity can be challenging, as the most likely risks may not be as sensational as nation-state attacks.</span></p>
<p><span style="font-weight:400;">Exciting technological advances in cybersecurity are on the horizon, but they also bring concerns about the potential risks and implications of AI and rapid technological changes.</span></p>
<p><span style="font-weight:400;">—</span></p>
<p><strong>Connect with Kyle:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: <a href="https://www.linkedin.com/in/kyle-peters-2a7173116/">https://www.linkedin.com/in/kyle-peters-2a7173116/</a></span></li>
</ul>
<p><strong>Connect with Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;"></span></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Kyle Peters is a recovering building automation and HVAC technician and programmer who was drawn to the dark side of cybersecurity and never looked back.  Today he is the senior consultant for OT Cybersecurity, focusing on building automation systems at Intelligent Buildings.  If you’d like to geek out on such things, reach out to Kyle via LinkedIn or email blackhole@secretdomain.xyz.
In this conversation, Kyle discusses the world of building management systems and the importance of cybersecurity in this field. He highlights the diversity of building systems and the interconnectedness of various components. The conversation emphasizes the need for a risk-based approach to security and the importance of policies and standards. Kyle also emphasizes the value of understanding the system and planning ahead to mitigate risks. The conversation concludes with a discussion on securing remote access and implementing segmentation. The conversation explores the lack of cybersecurity preparedness in organizations, the need to translate cybersecurity risks to business risks, the likelihood of attacks and targeting, the challenge of selling likely risks, exciting technological advances in cybersecurity, concerns about AI and rapid technological changes, and closing thoughts and a call to action.
 
Takeaways
Building management systems encompass a wide range of components, including HVAC systems, fire alarms, and lighting.
A risk-based approach to security is crucial in building management, considering the diverse systems and potential vulnerabilities.
Policies and standards play a significant role in ensuring the security and reliability of building management systems.
Simple solutions, such as proper cable management and backup plans, can greatly enhance the security and availability of building systems.
Understanding the system and planning ahead are essential for effective risk mitigation in building management.
Securing remote access and implementing segmentation are key measures to protect building management systems from cyber threats. Many organizations are not adequately prepared for cybersecurity threats, either due to limited budgets or lack of expertise.
It is important to translate cybersecurity risks into business risks to help organizations understand the potential impact on their operations.
Cyber attacks can come from various sources, including nation-state actors, but also from simple human errors or system failures.
Selling the importance of cybersecurity can be challenging, as the most likely risks may not be as sensational as nation-state attacks.
Exciting technological advances in cybersecurity are on the horizon, but they also bring concerns about the potential risks and implications of AI and rapid technological changes.
—
Connect with Kyle:

LinkedIn: https://www.linkedin.com/in/kyle-peters-2a7173116/

Connect with Aaron Crow:

Website: www.corvosec.com 
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Exploring the OT Landscape: Insights from Building Management with Kyle Peters]]>
                </itunes:title>
                                    <itunes:episode>3</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Kyle Peters is a recovering building automation and HVAC technician and programmer who was drawn to the dark side of cybersecurity and never looked back.  Today he is the senior consultant for OT Cybersecurity, focusing on building automation systems at Intelligent Buildings.  If you’d like to geek out on such things, reach out to Kyle via LinkedIn or email blackhole@secretdomain.xyz.</span></p>
<p><span style="font-weight:400;">In this conversation, Kyle discusses the world of building management systems and the importance of cybersecurity in this field. He highlights the diversity of building systems and the interconnectedness of various components. The conversation emphasizes the need for a risk-based approach to security and the importance of policies and standards. Kyle also emphasizes the value of understanding the system and planning ahead to mitigate risks. The conversation concludes with a discussion on securing remote access and implementing segmentation. The conversation explores the lack of cybersecurity preparedness in organizations, the need to translate cybersecurity risks to business risks, the likelihood of attacks and targeting, the challenge of selling likely risks, exciting technological advances in cybersecurity, concerns about AI and rapid technological changes, and closing thoughts and a call to action.</span></p>
<p> </p>
<h2><span style="font-weight:400;">Takeaways</span></h2>
<p><span style="font-weight:400;">Building management systems encompass a wide range of components, including HVAC systems, fire alarms, and lighting.</span></p>
<p><span style="font-weight:400;">A risk-based approach to security is crucial in building management, considering the diverse systems and potential vulnerabilities.</span></p>
<p><span style="font-weight:400;">Policies and standards play a significant role in ensuring the security and reliability of building management systems.</span></p>
<p><span style="font-weight:400;">Simple solutions, such as proper cable management and backup plans, can greatly enhance the security and availability of building systems.</span></p>
<p><span style="font-weight:400;">Understanding the system and planning ahead are essential for effective risk mitigation in building management.</span></p>
<p><span style="font-weight:400;">Securing remote access and implementing segmentation are key measures to protect building management systems from cyber threats. Many organizations are not adequately prepared for cybersecurity threats, either due to limited budgets or lack of expertise.</span></p>
<p><span style="font-weight:400;">It is important to translate cybersecurity risks into business risks to help organizations understand the potential impact on their operations.</span></p>
<p><span style="font-weight:400;">Cyber attacks can come from various sources, including nation-state actors, but also from simple human errors or system failures.</span></p>
<p><span style="font-weight:400;">Selling the importance of cybersecurity can be challenging, as the most likely risks may not be as sensational as nation-state attacks.</span></p>
<p><span style="font-weight:400;">Exciting technological advances in cybersecurity are on the horizon, but they also bring concerns about the potential risks and implications of AI and rapid technological changes.</span></p>
<p><span style="font-weight:400;">—</span></p>
<p><strong>Connect with Kyle:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn: <a href="https://www.linkedin.com/in/kyle-peters-2a7173116/">https://www.linkedin.com/in/kyle-peters-2a7173116/</a></span></li>
</ul>
<p><strong>Connect with Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: www.protectitall.co</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: https://twitter.com/protectitall</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: https://www.youtube.com/@PrOTectITAll</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  https://facebook.com/protectitallpodcast</span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Show notes by NMP.</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1659827/c1e-d308xc6wr81twroz6-mq3rqgvgt8x0-bfyjvk.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1659827&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=f8e6809870515f4b863901bb6e0b06279c7cf3b5941dea55667619c3cbb235bf" length="111422352"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Kyle Peters is a recovering building automation and HVAC technician and programmer who was drawn to the dark side of cybersecurity and never looked back.  Today he is the senior consultant for OT Cybersecurity, focusing on building automation systems at Intelligent Buildings.  If you’d like to geek out on such things, reach out to Kyle via LinkedIn or email blackhole@secretdomain.xyz.
In this conversation, Kyle discusses the world of building management systems and the importance of cybersecurity in this field. He highlights the diversity of building systems and the interconnectedness of various components. The conversation emphasizes the need for a risk-based approach to security and the importance of policies and standards. Kyle also emphasizes the value of understanding the system and planning ahead to mitigate risks. The conversation concludes with a discussion on securing remote access and implementing segmentation. The conversation explores the lack of cybersecurity preparedness in organizations, the need to translate cybersecurity risks to business risks, the likelihood of attacks and targeting, the challenge of selling likely risks, exciting technological advances in cybersecurity, concerns about AI and rapid technological changes, and closing thoughts and a call to action.
 
Takeaways
Building management systems encompass a wide range of components, including HVAC systems, fire alarms, and lighting.
A risk-based approach to security is crucial in building management, considering the diverse systems and potential vulnerabilities.
Policies and standards play a significant role in ensuring the security and reliability of building management systems.
Simple solutions, such as proper cable management and backup plans, can greatly enhance the security and availability of building systems.
Understanding the system and planning ahead are essential for effective risk mitigation in building management.
Securing remote access and implementing segmentation are key measures to protect building management systems from cyber threats. Many organizations are not adequately prepared for cybersecurity threats, either due to limited budgets or lack of expertise.
It is important to translate cybersecurity risks into business risks to help organizations understand the potential impact on their operations.
Cyber attacks can come from various sources, including nation-state actors, but also from simple human errors or system failures.
Selling the importance of cybersecurity can be challenging, as the most likely risks may not be as sensational as nation-state attacks.
Exciting technological advances in cybersecurity are on the horizon, but they also bring concerns about the potential risks and implications of AI and rapid technological changes.
—
Connect with Kyle:

LinkedIn: https://www.linkedin.com/in/kyle-peters-2a7173116/

Connect with Aaron Crow:

Website: www.corvosec.com 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1659827/c1a-w52rp-5rv4rg1gu37v-wgtwrh.png"></itunes:image>
                                                                            <itunes:duration>00:58:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Bridging the Gap: OT Cybersecurity in the Evolving Landscape of Industry and Recruitment]]>
                </title>
                <pubDate>Mon, 05 Feb 2024 02:52:00 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1653242</guid>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">With a focus on the OT Cyber Security recruitment space James is the Talent Solutions Director at NDK Cyber. NDK Cyber work with high-growth businesses in the USA, UK &amp; EMEA to provide completely tailored cybersecurity talent attraction solutions. Specialising in long-term talent acquisition and strategy, we have mastered a blend of data insights, the latest technology and our own personal network mastered over 20+ years to build 100s of cybersecurity teams across the globe.<br /></span></p>
<h2><strong>Summary</strong></h2>
<p><strong>Hosted by:</strong><span style="font-weight:400;"> Aaron Crow</span></p>
<p><strong>Guest: </strong><span style="font-weight:400;">James Morris, Director, Talent Solutions at NDK Cyber </span></p>
<p><span style="font-weight:400;">In this conversation, Aaron Crow and James Morris discuss the transition happening in the field of OT security, with a growing need for dedicated OT security engineers and teams. They explore the challenges of budgeting for OT security and the importance of building trust and collaboration between IT and OT departments. They also emphasize the value of cross-disciplinary skills and the need for apprenticeships and on-the-job training to address the skills gap in OT security. The conversation highlights the importance of translating cybersecurity into business risk and the role of education and community in promoting OT security. The conversation covers various topics related to job descriptions, hiring challenges, helping people enter the OT space, companies being more open to training and transferable skills, excitement for the future of OT security, concerns about AI and ML in cybersecurity, and the importance of OT security in uncertain times.</span></p>
<p> </p>
<h2><span style="font-weight:400;">Takeaways</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">There is a growing need for dedicated OT security engineers and teams.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Building trust and collaboration between IT and OT departments is crucial for effective OT security.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Cross-disciplinary skills and apprenticeships can help address the skills gap in OT security.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Translating cybersecurity into business risk is essential for gaining budget and buy-in for OT security initiatives. Job descriptions should be written in a way that encourages more people to apply, focusing on transferable skills and being more inclusive.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Companies should be open to training and developing employees who have the desire and raw skills needed for the job.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The OT security space is growing rapidly, and there are opportunities for individuals to enter the field and for companies to hire the right talent.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">There is excitement about the future of OT security, but concerns exist about the potential risks associated with AI and ML in cybersecurity.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">In uncertain times, it is crucial for companies to prioritize OT security and not cut back on investments in this area.</span></li>
</ul>
<p><span style="font-weight:400;">—</span></p>
<p><strong>Connect with James:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:  <a href="https://www.ndkcyber.com/">https://www.ndkcyber.com/</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:  <a href="https://www.linkedin.com/in/lets-talk-cyber-talent/">https://www.linkedin.com/in/lets-talk-cyber-talent/</a> </span></li>
</ul>
<p><strong>Connect with Aaron Crow:</strong></p>
<ul>
<li></li></ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[With a focus on the OT Cyber Security recruitment space James is the Talent Solutions Director at NDK Cyber. NDK Cyber work with high-growth businesses in the USA, UK & EMEA to provide completely tailored cybersecurity talent attraction solutions. Specialising in long-term talent acquisition and strategy, we have mastered a blend of data insights, the latest technology and our own personal network mastered over 20+ years to build 100s of cybersecurity teams across the globe.
Summary
Hosted by: Aaron Crow
Guest: James Morris, Director, Talent Solutions at NDK Cyber 
In this conversation, Aaron Crow and James Morris discuss the transition happening in the field of OT security, with a growing need for dedicated OT security engineers and teams. They explore the challenges of budgeting for OT security and the importance of building trust and collaboration between IT and OT departments. They also emphasize the value of cross-disciplinary skills and the need for apprenticeships and on-the-job training to address the skills gap in OT security. The conversation highlights the importance of translating cybersecurity into business risk and the role of education and community in promoting OT security. The conversation covers various topics related to job descriptions, hiring challenges, helping people enter the OT space, companies being more open to training and transferable skills, excitement for the future of OT security, concerns about AI and ML in cybersecurity, and the importance of OT security in uncertain times.
 
Takeaways

There is a growing need for dedicated OT security engineers and teams.
Building trust and collaboration between IT and OT departments is crucial for effective OT security.
Cross-disciplinary skills and apprenticeships can help address the skills gap in OT security.
Translating cybersecurity into business risk is essential for gaining budget and buy-in for OT security initiatives. Job descriptions should be written in a way that encourages more people to apply, focusing on transferable skills and being more inclusive.
Companies should be open to training and developing employees who have the desire and raw skills needed for the job.
The OT security space is growing rapidly, and there are opportunities for individuals to enter the field and for companies to hire the right talent.
There is excitement about the future of OT security, but concerns exist about the potential risks associated with AI and ML in cybersecurity.
In uncertain times, it is crucial for companies to prioritize OT security and not cut back on investments in this area.

—
Connect with James:

Website:  https://www.ndkcyber.com/ 
LinkedIn:  https://www.linkedin.com/in/lets-talk-cyber-talent/ 

Connect with Aaron Crow:

]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Bridging the Gap: OT Cybersecurity in the Evolving Landscape of Industry and Recruitment]]>
                </itunes:title>
                                    <itunes:episode>2</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">With a focus on the OT Cyber Security recruitment space James is the Talent Solutions Director at NDK Cyber. NDK Cyber work with high-growth businesses in the USA, UK &amp; EMEA to provide completely tailored cybersecurity talent attraction solutions. Specialising in long-term talent acquisition and strategy, we have mastered a blend of data insights, the latest technology and our own personal network mastered over 20+ years to build 100s of cybersecurity teams across the globe.<br /></span></p>
<h2><strong>Summary</strong></h2>
<p><strong>Hosted by:</strong><span style="font-weight:400;"> Aaron Crow</span></p>
<p><strong>Guest: </strong><span style="font-weight:400;">James Morris, Director, Talent Solutions at NDK Cyber </span></p>
<p><span style="font-weight:400;">In this conversation, Aaron Crow and James Morris discuss the transition happening in the field of OT security, with a growing need for dedicated OT security engineers and teams. They explore the challenges of budgeting for OT security and the importance of building trust and collaboration between IT and OT departments. They also emphasize the value of cross-disciplinary skills and the need for apprenticeships and on-the-job training to address the skills gap in OT security. The conversation highlights the importance of translating cybersecurity into business risk and the role of education and community in promoting OT security. The conversation covers various topics related to job descriptions, hiring challenges, helping people enter the OT space, companies being more open to training and transferable skills, excitement for the future of OT security, concerns about AI and ML in cybersecurity, and the importance of OT security in uncertain times.</span></p>
<p> </p>
<h2><span style="font-weight:400;">Takeaways</span></h2>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">There is a growing need for dedicated OT security engineers and teams.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Building trust and collaboration between IT and OT departments is crucial for effective OT security.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Cross-disciplinary skills and apprenticeships can help address the skills gap in OT security.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Translating cybersecurity into business risk is essential for gaining budget and buy-in for OT security initiatives. Job descriptions should be written in a way that encourages more people to apply, focusing on transferable skills and being more inclusive.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Companies should be open to training and developing employees who have the desire and raw skills needed for the job.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The OT security space is growing rapidly, and there are opportunities for individuals to enter the field and for companies to hire the right talent.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">There is excitement about the future of OT security, but concerns exist about the potential risks associated with AI and ML in cybersecurity.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">In uncertain times, it is crucial for companies to prioritize OT security and not cut back on investments in this area.</span></li>
</ul>
<p><span style="font-weight:400;">—</span></p>
<p><strong>Connect with James:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website:  <a href="https://www.ndkcyber.com/">https://www.ndkcyber.com/</a> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:  <a href="https://www.linkedin.com/in/lets-talk-cyber-talent/">https://www.linkedin.com/in/lets-talk-cyber-talent/</a> </span></li>
</ul>
<p><strong>Connect with Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: www.protectitall.co</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: https://twitter.com/protectitall</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: https://www.youtube.com/@PrOTectITAll</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  https://facebook.com/protectitallpodcast</span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Show notes by NMP.</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1653242/c1e-w52rpb9n1rdt8qxpq-3324vr5dukn6-tqxses.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1653242&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=b887495d53099c0aae672c41d223569a3997492a06e5f35ab22c0b07f768e69e" length="121647077"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[With a focus on the OT Cyber Security recruitment space James is the Talent Solutions Director at NDK Cyber. NDK Cyber work with high-growth businesses in the USA, UK & EMEA to provide completely tailored cybersecurity talent attraction solutions. Specialising in long-term talent acquisition and strategy, we have mastered a blend of data insights, the latest technology and our own personal network mastered over 20+ years to build 100s of cybersecurity teams across the globe.
Summary
Hosted by: Aaron Crow
Guest: James Morris, Director, Talent Solutions at NDK Cyber 
In this conversation, Aaron Crow and James Morris discuss the transition happening in the field of OT security, with a growing need for dedicated OT security engineers and teams. They explore the challenges of budgeting for OT security and the importance of building trust and collaboration between IT and OT departments. They also emphasize the value of cross-disciplinary skills and the need for apprenticeships and on-the-job training to address the skills gap in OT security. The conversation highlights the importance of translating cybersecurity into business risk and the role of education and community in promoting OT security. The conversation covers various topics related to job descriptions, hiring challenges, helping people enter the OT space, companies being more open to training and transferable skills, excitement for the future of OT security, concerns about AI and ML in cybersecurity, and the importance of OT security in uncertain times.
 
Takeaways

There is a growing need for dedicated OT security engineers and teams.
Building trust and collaboration between IT and OT departments is crucial for effective OT security.
Cross-disciplinary skills and apprenticeships can help address the skills gap in OT security.
Translating cybersecurity into business risk is essential for gaining budget and buy-in for OT security initiatives. Job descriptions should be written in a way that encourages more people to apply, focusing on transferable skills and being more inclusive.
Companies should be open to training and developing employees who have the desire and raw skills needed for the job.
The OT security space is growing rapidly, and there are opportunities for individuals to enter the field and for companies to hire the right talent.
There is excitement about the future of OT security, but concerns exist about the potential risks associated with AI and ML in cybersecurity.
In uncertain times, it is crucial for companies to prioritize OT security and not cut back on investments in this area.

—
Connect with James:

Website:  https://www.ndkcyber.com/ 
LinkedIn:  https://www.linkedin.com/in/lets-talk-cyber-talent/ 

Connect with Aaron Crow:

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/65a3de233ee354-30886570/images/1653242/c1a-w52rp-8m7dvz12i2r1-4fhx3f.png"></itunes:image>
                                                                            <itunes:duration>01:02:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Welcome to PrOTect IT All]]>
                </title>
                <pubDate>Tue, 23 Jan 2024 18:18:41 +0000</pubDate>
                <dc:creator>Aaron Crow</dc:creator>
                <guid isPermaLink="false">
                    https://permalink.castos.com/podcast/57542/episode/1640357</guid>
                                <description>
                                            <![CDATA[<p><strong>In this episode, Aaron discusses:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">His background in IT, cybersecurity, and operational technology</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The vision of bridging the gap between OT and IT</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The importance of securing various environments, from industrial floors to cloud and back office enterprises</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The focus of the podcast on cybersecurity trends, challenges, compliance, risk management, and cutting-edge technologies</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Future episodes featuring industry experts, thought leaders, and cybersecurity warriors</span></li>
</ul>
<p><strong>Key Takeaways:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Understanding the convergence of IT and OT</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Insights into compliance, risk management, and cybersecurity technologies</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The importance of staying vigilant and secure in the digital and physical domains</span></li>
</ul>
<p><strong>Connect with Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://www.protectitall.co" target="_blank" rel="noreferrer noopener">www.protectitall.co</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: <a href="https://twitter.com/protectitall" target="_blank" rel="noreferrer noopener">https://twitter.com/protectitall</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: <a href="https://www.youtube.com/@PrOTectITAll" target="_blank" rel="noreferrer noopener">https://www.youtube.com/@PrOTectITAll</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  <a href="https://facebook.com/protectitallpodcast" target="_blank" rel="noreferrer noopener">https://facebook.com/protectitallpodcast</a></span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Show notes by NMP.</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>
<p> </p>
<p><span style="font-weight:400;">NMeojTx5cKjy9dOiv9sV</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Aaron discusses:

His background in IT, cybersecurity, and operational technology
The vision of bridging the gap between OT and IT
The importance of securing various environments, from industrial floors to cloud and back office enterprises
The focus of the podcast on cybersecurity trends, challenges, compliance, risk management, and cutting-edge technologies
Future episodes featuring industry experts, thought leaders, and cybersecurity warriors

Key Takeaways:

Understanding the convergence of IT and OT
Insights into compliance, risk management, and cybersecurity technologies
The importance of staying vigilant and secure in the digital and physical domains

Connect with Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: www.protectitall.co
X: https://twitter.com/protectitall
YouTube: https://www.youtube.com/@PrOTectITAll
FaceBook:  https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at info@protectitall.co
—
Show notes by NMP.
Audio production by NMP. We hear you loud and clear.
 
NMeojTx5cKjy9dOiv9sV]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Welcome to PrOTect IT All]]>
                </itunes:title>
                                    <itunes:episode>1</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>In this episode, Aaron discusses:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">His background in IT, cybersecurity, and operational technology</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The vision of bridging the gap between OT and IT</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The importance of securing various environments, from industrial floors to cloud and back office enterprises</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The focus of the podcast on cybersecurity trends, challenges, compliance, risk management, and cutting-edge technologies</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Future episodes featuring industry experts, thought leaders, and cybersecurity warriors</span></li>
</ul>
<p><strong>Key Takeaways:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Understanding the convergence of IT and OT</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Insights into compliance, risk management, and cybersecurity technologies</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">The importance of staying vigilant and secure in the digital and physical domains</span></li>
</ul>
<p><strong>Connect with Aaron Crow:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Website: </span><a href="http://www.corvosec.com"><span style="font-weight:400;">www.corvosec.com</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">LinkedIn:</span><a href="https://www.linkedin.com/in/aaronccrow"> <span style="font-weight:400;">https://www.linkedin.com/in/aaronccrow</span></a></li>
</ul>
<p><strong>Learn more about PrOTect IT All:</strong></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Email: </span><a href="mailto:info@protectitall.co" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">info@protectitall.co</span></a><span style="font-weight:400;"> </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Website: <a href="https://www.protectitall.co" target="_blank" rel="noreferrer noopener">www.protectitall.co</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">X: <a href="https://twitter.com/protectitall" target="_blank" rel="noreferrer noopener">https://twitter.com/protectitall</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">YouTube: <a href="https://www.youtube.com/@PrOTectITAll" target="_blank" rel="noreferrer noopener">https://www.youtube.com/@PrOTectITAll</a></span></li>
<li style="font-weight:400;"><span style="font-weight:400;">FaceBook:  <a href="https://facebook.com/protectitallpodcast" target="_blank" rel="noreferrer noopener">https://facebook.com/protectitallpodcast</a></span></li>
</ul>
<p><span style="font-weight:400;">To be a guest, or suggest a guest/episode please email us at </span><a href="mailto:info@protectitall.co" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">info@protectitall.co</span></a></p>
<p><span style="font-weight:400;">—</span></p>
<p><span style="font-weight:400;">Show notes by NMP.</span></p>
<p><span style="font-weight:400;">Audio production by NMP. We hear you loud and clear.</span></p>
<p> </p>
<p><span style="font-weight:400;">NMeojTx5cKjy9dOiv9sV</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/65a3de233ee354-30886570/1640357/c1e-z68mps80pzms1kqom-nj91nwg1ud9d-loxeiq.mp3?awCollectionId=57542&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F57542%2Fepisode%2F1640357&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fqomzq&amp;aw_0_azn.pgenre=%5BTechnology%2CBusiness%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fprotectitallpod.com%2F&amp;aw_0_azn.planguage=en&amp;q_co=2f18cbc66d73b80424c225079a570afe94d9fe5c0a4272c344accefe97048d3e" length="6121255"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Aaron discusses:

His background in IT, cybersecurity, and operational technology
The vision of bridging the gap between OT and IT
The importance of securing various environments, from industrial floors to cloud and back office enterprises
The focus of the podcast on cybersecurity trends, challenges, compliance, risk management, and cutting-edge technologies
Future episodes featuring industry experts, thought leaders, and cybersecurity warriors

Key Takeaways:

Understanding the convergence of IT and OT
Insights into compliance, risk management, and cybersecurity technologies
The importance of staying vigilant and secure in the digital and physical domains

Connect with Aaron Crow:

Website: www.corvosec.com 
LinkedIn: https://www.linkedin.com/in/aaronccrow

Learn more about PrOTect IT All:

Email: info@protectitall.co 
Website: www.protectitall.co
X: https://twitter.com/protectitall
YouTube: https://www.youtube.com/@PrOTectITAll
FaceBook:  https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at info@protectitall.co
—
Show notes by NMP.
Audio production by NMP. We hear you loud and clear.
 
NMeojTx5cKjy9dOiv9sV]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[Aaron Crow]]>
                </itunes:author>
                            </item>
            </channel>
</rss>
