@BEERISAC: OT/ICS Security Podcast Playlist

Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats


Listen Later

Podcast: Industrial Cybersecurity Insider
Episode: Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats
Pub date: 2025-08-20

Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization



In this hard-hitting episode of Industrial Cybersecurity Insider, host Dino Busalachi sits down with two battle-tested experts: Debbie Lay from TXOne Networks and Patrick Gillespie from GuidePoint Security.

Together, they pull back the curtain on the messy, complex world of operational technology (OT) cybersecurity, where million-dollar cybersecurity losses happen regularly.

This isn't your typical cybersecurity podcast filled with vendor pitches and theoretical frameworks. Instead, you'll get an unvarnished look at what really happens when industrial organizations try to secure their critical infrastructure.

From the shocking reality of cyber insurance claims being denied over half-implemented multi-factor authentication to the all-too-common sight of HMI passwords scrawled in permanent marker on the plant floor. This conversation exposes the gap between cybersecurity best practices and industrial implementation and protection reality.

What makes this episode essential listening:

  • Real financial impact: Learn why industrial breaches cost $5.5-6 million on average, with downtime running $125,000 per hour
  • Practical solutions that work: Discover how segmentation, virtual patching, and agentless endpoint tools can protect legacy systems without breaking the bank
  • Political warfare decoded: Understand the often-toxic dynamics between IT and OT teams that sabotage security initiatives
  • Implementation roadmaps: Get actionable strategies for deploying zero-trust architectures on the plant floor

Whether you're a CISO struggling to justify OT security budgets, an engineer trying to protect decades-old industrial systems, or a consultant navigating the minefield of industrial cybersecurity politics, this episode delivers the kind of street-smart insights you won't find in vendor whitepapers.

Chapters:

  • 00:00:00 - Cyber insurance denied over incomplete MFA 
  • 00:03:21 - What clients face as they begin the OT security journey
  • 00:06:35 - Industrial breach cost stat ($5.5–$6M; ~$125k/hour downtime) 
  • 00:07:36 - Too many IT tools forced into OT
  • 00:08:47 - Investment hurdles and budgeting misalignment
  • 00:11:05 - Collaboration between OT asset owners and the CISO
  • 00:13:24 - Hamilton ransomware: 80% hit; cyber insurance denied for incomplete MFA
  • 00:14:26 - HMI username/password written in Sharpie; segue to TXOne solutions
  • 00:18:22 - Who embraces TXOne first—IT or OT?
  • 00:20:58 - CISOs on OT priorities and piloting top sites
  • 00:22:25 - The ugly: Lacking OT inventory, unclear playbooks, starting from zero
  • 00:23:26 - The good: Safeguarding OT, anomaly alerts, avoiding risky legacy connections
  • 00:24:34 - Healthcare imaging case: XP-based systems, high replacement costs
  • 00:27:03 - AI useful in SOC/baselining; humans still required on OT side
  • 00:29:15 - Combining best-of-breed solutions to avoid costly deployment gaps
  • 00:29:47 - Why deployments stall—overwhelm and fatigue after tech selection

Links And Resources:

  • Want to Sponsor an episode or be a Guest? Reach out here.
  • Debbie Lay, TXOne Networks on LinkedIn
  • Patrick Gillespie, GuidePoint Security on LinkedIn
  • Industrial Cybersecurity Insider on LinkedIn
  • Cybersecurity & Digital Safety on LinkedIn
  • BW Design Group Cybersecurity
  • Dino Busalachi on LinkedIn
  • Craig Duckworth on LinkedIn

Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!



The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
...more
View all episodesView all episodes
Download on the App Store

@BEERISAC: OT/ICS Security Podcast PlaylistBy Anton Shipulin / Listen Notes

  • 4.4
  • 4.4
  • 4.4
  • 4.4
  • 4.4

4.4

7 ratings


More shows like @BEERISAC: OT/ICS Security Podcast Playlist

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,988 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

640 Listeners

The Ben Shapiro Show by The Daily Wire

The Ben Shapiro Show

153,292 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,019 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,953 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

173 Listeners

The Industrial Security Podcast by PI Media

The Industrial Security Podcast

21 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

129 Listeners

Hack the Plant by Bryson Bort

Hack the Plant

25 Listeners

Nexus: A Claroty Podcast by Claroty

Nexus: A Claroty Podcast

17 Listeners

Error Code by Robert Vamosi

Error Code

9 Listeners

HOU.SEC.CAST. by Michael Farnum and Sam Van Ryder

HOU.SEC.CAST.

7 Listeners