@BEERISAC: OT/ICS Security Podcast Playlist

Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats


Listen Later

Podcast: Industrial Cybersecurity Insider
Episode: Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats
Pub date: 2025-08-20

Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization



In this hard-hitting episode of Industrial Cybersecurity Insider, host Dino Busalachi sits down with two battle-tested experts: Debbie Lay from TXOne Networks and Patrick Gillespie from GuidePoint Security.

Together, they pull back the curtain on the messy, complex world of operational technology (OT) cybersecurity, where million-dollar cybersecurity losses happen regularly.

This isn't your typical cybersecurity podcast filled with vendor pitches and theoretical frameworks. Instead, you'll get an unvarnished look at what really happens when industrial organizations try to secure their critical infrastructure.

From the shocking reality of cyber insurance claims being denied over half-implemented multi-factor authentication to the all-too-common sight of HMI passwords scrawled in permanent marker on the plant floor. This conversation exposes the gap between cybersecurity best practices and industrial implementation and protection reality.

What makes this episode essential listening:

  • Real financial impact: Learn why industrial breaches cost $5.5-6 million on average, with downtime running $125,000 per hour
  • Practical solutions that work: Discover how segmentation, virtual patching, and agentless endpoint tools can protect legacy systems without breaking the bank
  • Political warfare decoded: Understand the often-toxic dynamics between IT and OT teams that sabotage security initiatives
  • Implementation roadmaps: Get actionable strategies for deploying zero-trust architectures on the plant floor

Whether you're a CISO struggling to justify OT security budgets, an engineer trying to protect decades-old industrial systems, or a consultant navigating the minefield of industrial cybersecurity politics, this episode delivers the kind of street-smart insights you won't find in vendor whitepapers.

Chapters:

  • 00:00:00 - Cyber insurance denied over incomplete MFA 
  • 00:03:21 - What clients face as they begin the OT security journey
  • 00:06:35 - Industrial breach cost stat ($5.5–$6M; ~$125k/hour downtime) 
  • 00:07:36 - Too many IT tools forced into OT
  • 00:08:47 - Investment hurdles and budgeting misalignment
  • 00:11:05 - Collaboration between OT asset owners and the CISO
  • 00:13:24 - Hamilton ransomware: 80% hit; cyber insurance denied for incomplete MFA
  • 00:14:26 - HMI username/password written in Sharpie; segue to TXOne solutions
  • 00:18:22 - Who embraces TXOne first—IT or OT?
  • 00:20:58 - CISOs on OT priorities and piloting top sites
  • 00:22:25 - The ugly: Lacking OT inventory, unclear playbooks, starting from zero
  • 00:23:26 - The good: Safeguarding OT, anomaly alerts, avoiding risky legacy connections
  • 00:24:34 - Healthcare imaging case: XP-based systems, high replacement costs
  • 00:27:03 - AI useful in SOC/baselining; humans still required on OT side
  • 00:29:15 - Combining best-of-breed solutions to avoid costly deployment gaps
  • 00:29:47 - Why deployments stall—overwhelm and fatigue after tech selection

Links And Resources:

  • Want to Sponsor an episode or be a Guest? Reach out here.
  • Debbie Lay, TXOne Networks on LinkedIn
  • Patrick Gillespie, GuidePoint Security on LinkedIn
  • Industrial Cybersecurity Insider on LinkedIn
  • Cybersecurity & Digital Safety on LinkedIn
  • BW Design Group Cybersecurity
  • Dino Busalachi on LinkedIn
  • Craig Duckworth on LinkedIn

Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!



The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
...more
View all episodesView all episodes
Download on the App Store

@BEERISAC: OT/ICS Security Podcast PlaylistBy Anton Shipulin / Listen Notes

  • 4.5
  • 4.5
  • 4.5
  • 4.5
  • 4.5

4.5

8 ratings


More shows like @BEERISAC: OT/ICS Security Podcast Playlist

View all
The Joe Rogan Experience by Joe Rogan

The Joe Rogan Experience

229,305 Listeners

WSJ What’s News by The Wall Street Journal

WSJ What’s News

4,350 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

373 Listeners

Risky Business by Patrick Gray

Risky Business

374 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

654 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,023 Listeners

The Daily by The New York Times

The Daily

112,426 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,043 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

181 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Talkin' Bout [Infosec] News by Black Hills Information Security

Talkin' Bout [Infosec] News

92 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

138 Listeners

Cyber Uncut by Momentum Media

Cyber Uncut

0 Listeners

Industrial Cybersecurity Insider by Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

0 Listeners

PrOTect It All by Aaron Crow

PrOTect It All

7 Listeners