
Sign up to save your podcasts
Or
It's Pride Month, and in this episode of Cyber Pulse, we reach halfway around the globe to interview the amazing Lesley Carhart. They are a US Air Force veteran, DEFCON Hacker of the Year, and currently Director of Incident Response for North America at the industrial cybersecurity company Dragos, Inc., leading response to and proactively hunting for threats in customers’ ICS environments.
They share how they got started, the critical differences in Incident Response in OT environments from typical IT environments, how to avoid common mistakes when working with ICS, some guidance on how to break into the field, and why they had to move to Australia.
Topics discussed: Digital Forensics and Incident Response (DFIR), DFIR in Industrial Control Systems (ICS) and Operational Technology (OT) environments, key Incident Response differences between IT and OT environments, getting into ICS/OT
In our News Pulse, Godfather malware is using virtualization to steal data from legit banking apps.
Never miss an episode by signing up for our podcast newsletter at: https://cryptologicfoundation.org/community/cyberpulse-subscribe.html
Send us your questions and episode suggestions at: https://cryptologicfoundation.org/community/cyberpulse-questions-suggestions.html
It's Pride Month, and in this episode of Cyber Pulse, we reach halfway around the globe to interview the amazing Lesley Carhart. They are a US Air Force veteran, DEFCON Hacker of the Year, and currently Director of Incident Response for North America at the industrial cybersecurity company Dragos, Inc., leading response to and proactively hunting for threats in customers’ ICS environments.
They share how they got started, the critical differences in Incident Response in OT environments from typical IT environments, how to avoid common mistakes when working with ICS, some guidance on how to break into the field, and why they had to move to Australia.
Topics discussed: Digital Forensics and Incident Response (DFIR), DFIR in Industrial Control Systems (ICS) and Operational Technology (OT) environments, key Incident Response differences between IT and OT environments, getting into ICS/OT
In our News Pulse, Godfather malware is using virtualization to steal data from legit banking apps.
Never miss an episode by signing up for our podcast newsletter at: https://cryptologicfoundation.org/community/cyberpulse-subscribe.html
Send us your questions and episode suggestions at: https://cryptologicfoundation.org/community/cyberpulse-questions-suggestions.html