Control Loop: The OT Cybersecurity Podcast

The challenges of carrying out vulnerability management.


Listen Later

The Vulkan Papers. The Cyberspace Solarium Commission recommends that CISA set up a test bed to improve maritime cybersecurity. Dragos CEO on critical infrastructure cybersecurity. The JCDC’s pre-ransomware notification efforts. Guest Mike Hoffman, Technical Leader Global Services at Dragos & a SANS instructor, discusses challenges carrying out vulnerability management. In the Learning Lab, Dragos’ VP Product & Industry Market Strategy Mark Urban concludes his two-part discussion about industrial cyber threat intel & collective intelligence with Seth Lacy, Principal Threat Hunter at Dragos.


Control Loop News Brief.The Vulkan Papers.
A Look Inside Putin's Secret Plans for Cyber-Warfare (Der Spiegel)

Secret trove offers rare look into Russian cyberwar ambitions (The Washington Post)

Maritime cybersecurity.

Full Steam Ahead: Enhancing Maritime Cybersecurity (Cyberspace Solarium Commission 2.0)

Cyber experts call for CISA to establish maritime equipment test bed (FedScoop)

Dragos CEO on critical infrastructure cybersecurity.

Full Committee Hearing to Examine Cybersecurity Vulnerabilities to the United States' Energy Infrastructure (Senate Committee on Energy and Natural Resources)

JCDC and pre-ransomware notification.

JCDC Cultivates Pre-Ransomware Notification Capability (CISA)

Getting Ahead of the Ransomware Epidemic: CISA’s Pre-Ransomware Notifications Help Organizations Stop Attacks Before Damage Occurs (CISA)


Control Loop Interview.

The interview is with Mike Hoffman, Technical Leader Global Services at Dragos & SANS instructor, discussing challenges carrying vulnerability management.


Control Loop Learning Lab.

In Part 2 of 2, Dragos’ VP Product & Industry Market Strategy Mark Urban speaks with Seth Lacy, Principal Threat Hunter at Dragos, about industrial cyber threat intel & collective intelligence. 

Industrial Cyber Threat Intel & Collective Intelligence links:

  • Neighborhood Keeper in the Broader Context of Cyber Threat Intelligence
  • Using Trend Analysis to Operationalize OT Threat Intelligence with Neighborhood Keeper

  • Control Loop OT Cybersecurity Briefing.

    A companion monthly newsletter is available through free subscription and on the CyberWire's website.

    Learn more about your ad choices. Visit megaphone.fm/adchoices

    ...more
    View all episodesView all episodes
    Download on the App Store

    Control Loop: The OT Cybersecurity PodcastBy N2K Networks

    • 4.9
    • 4.9
    • 4.9
    • 4.9
    • 4.9

    4.9

    21 ratings


    More shows like Control Loop: The OT Cybersecurity Podcast

    View all
    CyberWire Daily by N2K Networks

    CyberWire Daily

    1,016 Listeners

    Smashing Security by Graham Cluley

    Smashing Security

    322 Listeners

    Darknet Diaries by Jack Rhysider

    Darknet Diaries

    8,010 Listeners

    Afternoon Cyber Tea with Ann Johnson by Microsoft

    Afternoon Cyber Tea with Ann Johnson

    39 Listeners

    Only Malware in the Building by DISCARDED | N2K Networks

    Only Malware in the Building

    8 Listeners