<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/cs2ai/" rel="self" type="application/rss+xml"/><title><![CDATA[(CS)²AI Podcast Show: Control System Cyber Security]]></title><podcast:guid>9644029b-c56e-5ade-b351-d93e5187109d</podcast:guid><lastBuildDate>Thu, 05 Feb 2026 18:16:09 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Derek Harp]]></copyright><managingEditor>Derek Harp</managingEditor><itunes:summary><![CDATA[Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, interviews cyber security leaders and brings relevant insights to help any company handle cybersecurity effectively.]]></itunes:summary><image><url>https://artwork.captivate.fm/a646b1e7-5520-4b2a-97ae-87af1f63be55/SI8vqQ-VSQkafbTHh5wUWYW3.jpg</url><title>(CS)²AI Podcast Show: Control System Cyber Security</title><link><![CDATA[https://www.cs2ai.org/podcast]]></link></image><itunes:image href="https://artwork.captivate.fm/a646b1e7-5520-4b2a-97ae-87af1f63be55/SI8vqQ-VSQkafbTHh5wUWYW3.jpg"/><itunes:owner><itunes:name>Derek Harp</itunes:name></itunes:owner><itunes:author>Derek Harp</itunes:author><description>Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, interviews cyber security leaders and brings relevant insights to help any company handle cybersecurity effectively.</description><link>https://www.cs2ai.org/podcast</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Cybersecurity for Today's Workforce]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="Business"><itunes:category text="Careers"/></itunes:category><itunes:category text="News"><itunes:category text="Business News"/></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>131: OT Monitoring &amp; SOC and Incident Response — Lessons from the Field with Cambios Academy</title><itunes:title>131: OT Monitoring &amp; SOC and Incident Response — Lessons from the Field with Cambios Academy</itunes:title><description><![CDATA[<p>In this episode of the (CS)²AI Podcast, host Derek Harp is joined by Jonathan Pollet, Marc Visser, and Bryan Singer for a deep-dive Q&amp;A discussion following CS2AI’s January 21st community event on OT Monitoring &amp; SOC and Incident Response. Drawing on decades of hands-on experience across industrial environments worldwide, the panel expands on questions that couldn’t be fully addressed during the live sessions.</p><p>The conversation explores why OT monitoring and SOC capabilities must come before incident response, and how poor network architecture, lack of visibility, and organizational silos continue to undermine response efforts when incidents occur. Jonathan outlines the architectural foundations required to support effective detection, response, and recovery, while Marc emphasizes the practical realities of implementing OT monitoring—from working with factory engineers to reducing alert fatigue and building usable SOC workflows.</p><p>Bryan brings the incident responder’s perspective, sharing real-world insights from global OT incidents, including prolonged dwell times, ransomware impacts on production, and why organizations without proper segmentation and monitoring often experience the most severe and prolonged outages. The discussion also tackles common questions around Fusion SOCs vs. dedicated OT SOCs, the human challenges of translating OT data into actionable intelligence, and what asset owners should realistically expect from incident response retainers.</p><p>This episode is a must-listen for OT practitioners, security leaders, and asset owners looking to move beyond theory and understand what actually works in the field. Whether you are just beginning your OT monitoring journey or refining mature SOC and IR capabilities, this discussion offers practical guidance rooted in real operational experience.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the (CS)²AI Podcast, host Derek Harp is joined by Jonathan Pollet, Marc Visser, and Bryan Singer for a deep-dive Q&amp;A discussion following CS2AI’s January 21st community event on OT Monitoring &amp; SOC and Incident Response. Drawing on decades of hands-on experience across industrial environments worldwide, the panel expands on questions that couldn’t be fully addressed during the live sessions.</p><p>The conversation explores why OT monitoring and SOC capabilities must come before incident response, and how poor network architecture, lack of visibility, and organizational silos continue to undermine response efforts when incidents occur. Jonathan outlines the architectural foundations required to support effective detection, response, and recovery, while Marc emphasizes the practical realities of implementing OT monitoring—from working with factory engineers to reducing alert fatigue and building usable SOC workflows.</p><p>Bryan brings the incident responder’s perspective, sharing real-world insights from global OT incidents, including prolonged dwell times, ransomware impacts on production, and why organizations without proper segmentation and monitoring often experience the most severe and prolonged outages. The discussion also tackles common questions around Fusion SOCs vs. dedicated OT SOCs, the human challenges of translating OT data into actionable intelligence, and what asset owners should realistically expect from incident response retainers.</p><p>This episode is a must-listen for OT practitioners, security leaders, and asset owners looking to move beyond theory and understand what actually works in the field. Whether you are just beginning your OT monitoring journey or refining mature SOC and IR capabilities, this discussion offers practical guidance rooted in real operational experience.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">ac3c267b-e977-4803-8e9f-de6744a1c82c</guid><itunes:image href="https://artwork.captivate.fm/2cf443f2-9f34-4d41-8903-f2612bad3fde/CS2AI-Podcast-131-OT-MOnitoring-SOC-IR-for-OT.jpg"/><pubDate>Wed, 04 Feb 2026 08:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/ac3c267b-e977-4803-8e9f-de6744a1c82c.mp3" length="61880329" type="audio/mpeg"/><itunes:duration>42:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>131</itunes:episode><podcast:episode>131</podcast:episode></item><item><title>130: S4’s “Connect” Theme Explained — Dale Peterson on OT Security’s Hyper-Connected Future</title><itunes:title>130: S4’s “Connect” Theme Explained — Dale Peterson on OT Security’s Hyper-Connected Future</itunes:title><description><![CDATA[<p>In this episode of the (CS)²AI Podcast, host Derek Harp is joined once again by Dale Peterson, Founder of the S4 Conference and one of the longest-standing voices in OT cybersecurity. As Dale marks 25 years in the industry, the conversation takes a forward-looking turn toward what he believes is the next major inflection point for industrial security: <strong>connectivity driven by AI, data, and business systems.</strong></p><p>Dale explains why the 2026 S4 Conference theme, <em>Connect</em>, is not just about networking people, but about the explosive growth of connections between OT systems, enterprise platforms, and analytics driven by AI. From MES, ERP, and PLCs to asset inventories and security telemetry, these connections are accelerating faster than most security teams are prepared for—often driven by business value rather than security design.</p><p>Listeners will hear why manufacturing is emerging as the epicenter of this transformation, how AI is enabling real-time querying across operational systems, and why OT security teams must prepare for a future where their tools become just another data source in larger operational workflows. Dale also shares how this shift will reshape risk, attack surfaces, and even the role of humans in control and response.</p><p>The episode also provides an inside look at <strong>S4 2026</strong>, including this year’s Proof-of-Concept Pavilion, where vendors will be forced to demonstrate their technologies live on a real manufacturing environment, as well as updates on attendance, ticket availability, and why this will be the final year S4 is held in Miami Beach before moving back to Tampa.</p><p>This is a must-listen for OT security professionals, automation leaders, and anyone trying to understand how AI-driven connectivity will redefine both risk and opportunity across industrial environments in the years ahead.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the (CS)²AI Podcast, host Derek Harp is joined once again by Dale Peterson, Founder of the S4 Conference and one of the longest-standing voices in OT cybersecurity. As Dale marks 25 years in the industry, the conversation takes a forward-looking turn toward what he believes is the next major inflection point for industrial security: <strong>connectivity driven by AI, data, and business systems.</strong></p><p>Dale explains why the 2026 S4 Conference theme, <em>Connect</em>, is not just about networking people, but about the explosive growth of connections between OT systems, enterprise platforms, and analytics driven by AI. From MES, ERP, and PLCs to asset inventories and security telemetry, these connections are accelerating faster than most security teams are prepared for—often driven by business value rather than security design.</p><p>Listeners will hear why manufacturing is emerging as the epicenter of this transformation, how AI is enabling real-time querying across operational systems, and why OT security teams must prepare for a future where their tools become just another data source in larger operational workflows. Dale also shares how this shift will reshape risk, attack surfaces, and even the role of humans in control and response.</p><p>The episode also provides an inside look at <strong>S4 2026</strong>, including this year’s Proof-of-Concept Pavilion, where vendors will be forced to demonstrate their technologies live on a real manufacturing environment, as well as updates on attendance, ticket availability, and why this will be the final year S4 is held in Miami Beach before moving back to Tampa.</p><p>This is a must-listen for OT security professionals, automation leaders, and anyone trying to understand how AI-driven connectivity will redefine both risk and opportunity across industrial environments in the years ahead.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">085e216d-459a-4a17-bd99-b51956b3ba3c</guid><itunes:image href="https://artwork.captivate.fm/3dcc468e-cab8-4581-a0f1-73cf61c3cf3a/CS2AI-Podcast-130-Dale-Peterson-from-S4.png"/><pubDate>Wed, 14 Jan 2026 08:30:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/085e216d-459a-4a17-bd99-b51956b3ba3c.mp3" length="45232448" type="audio/mpeg"/><itunes:duration>31:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>130</itunes:episode><podcast:episode>130</podcast:episode></item><item><title>129: Why OT Cybersecurity Isn&apos;t a One-Tool Problem: Insights to be discussed at Level Zero</title><itunes:title>129: Why OT Cybersecurity Isn&apos;t a One-Tool Problem: Insights to be discussed at Level Zero</itunes:title><description><![CDATA[<p>In this insightful episode of the (CS)²AI Podcast, host Derek Harp welcomes Jay Gignac, Vice President of Sales at FoxGuard Solutions, (CS)²AI Fellow and a passionate OT cybersecurity evangelist. The conversation centers around some of the most pressing challenges in the control systems industry—asset visibility, patch management, and community collaboration. Jay, who will be speaking at the upcoming Level Zero OT Cybersecurity Conference, offers expert-level advice for professionals navigating the complex world of operational technology security.</p><p>Listeners will hear real-world examples of how OT differs from IT, particularly in areas like patching and compliance. Jay shares how asset discovery and lifecycle management remain fundamental hurdles, even after over a decade of cybersecurity initiatives. The discussion explores the nuances across industry verticals—energy, manufacturing, oil &amp; gas—and underscores why tailored approaches are critical when securing diverse OT environments.</p><p>This episode is a must-listen for OT professionals, cybersecurity leaders, and anyone attending Level Zero or looking to deepen their understanding of control systems security. Discover why collaboration, not just technology, is key to long-term success in the OT space. Whether you’re an engineer, a procurement officer, or a seasoned CISO, there’s valuable insight here for everyone working to protect the core of their company’s operations.</p>]]></description><content:encoded><![CDATA[<p>In this insightful episode of the (CS)²AI Podcast, host Derek Harp welcomes Jay Gignac, Vice President of Sales at FoxGuard Solutions, (CS)²AI Fellow and a passionate OT cybersecurity evangelist. The conversation centers around some of the most pressing challenges in the control systems industry—asset visibility, patch management, and community collaboration. Jay, who will be speaking at the upcoming Level Zero OT Cybersecurity Conference, offers expert-level advice for professionals navigating the complex world of operational technology security.</p><p>Listeners will hear real-world examples of how OT differs from IT, particularly in areas like patching and compliance. Jay shares how asset discovery and lifecycle management remain fundamental hurdles, even after over a decade of cybersecurity initiatives. The discussion explores the nuances across industry verticals—energy, manufacturing, oil &amp; gas—and underscores why tailored approaches are critical when securing diverse OT environments.</p><p>This episode is a must-listen for OT professionals, cybersecurity leaders, and anyone attending Level Zero or looking to deepen their understanding of control systems security. Discover why collaboration, not just technology, is key to long-term success in the OT space. Whether you’re an engineer, a procurement officer, or a seasoned CISO, there’s valuable insight here for everyone working to protect the core of their company’s operations.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">70f3a797-a20e-4b6c-a74b-23ee36363cdb</guid><itunes:image href="https://artwork.captivate.fm/4a7168b8-48ee-4e32-ab22-242c64642ba2/pxA_8K0X152rBBHtoVktjpP6.jpg"/><pubDate>Thu, 27 Mar 2025 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d33684dd-4fb9-4394-9cd9-6274163b6788/CS2AI-Jay-FG-converted.mp3" length="17751233" type="audio/mpeg"/><itunes:duration>14:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>129</itunes:episode><podcast:episode>129</podcast:episode></item><item><title>128: From the Pentagon to Public Safety: Lucian Niemeyer’s Mission to Secure OT</title><itunes:title>128: From the Pentagon to Public Safety: Lucian Niemeyer’s Mission to Secure OT</itunes:title><description><![CDATA[<p><strong>Lucian Niemeyer</strong>, Chief Executive Officer of <em>Building Cyber Security</em> and former Assistant Secretary of Defense, joins <strong>Derek Harp</strong> to discuss the growing cyber risks to operational technology (OT) systems and the urgent need for proactive frameworks to protect public safety. Recorded live at <em>Hack the Capitol 7.0</em>, this episode delves into the vulnerabilities in smart buildings, connected infrastructure, and critical systems that could have life-threatening consequences if exploited.</p><p>Lucian shares how his experience in national security shaped his focus on OT cybersecurity, emphasizing the physical impacts of cyberattacks on HVAC systems, elevators, and even water utilities. He introduces the concept of <strong>cyber commissioning</strong>, a process that ensures building systems are configured securely from the start. Lucian also explains how <em>Building Cyber Security</em> is creating industry-specific frameworks to help facility managers, building owners, and policymakers mitigate risks and reduce insurance liabilities.</p><p>With increasing threats from ransomware, nation-states, and insider errors, this episode highlights why securing operational technology is critical to protecting both property and lives. Learn how Lucian’s nonprofit is driving collaboration across industries to address this rapidly evolving threat landscape.</p>]]></description><content:encoded><![CDATA[<p><strong>Lucian Niemeyer</strong>, Chief Executive Officer of <em>Building Cyber Security</em> and former Assistant Secretary of Defense, joins <strong>Derek Harp</strong> to discuss the growing cyber risks to operational technology (OT) systems and the urgent need for proactive frameworks to protect public safety. Recorded live at <em>Hack the Capitol 7.0</em>, this episode delves into the vulnerabilities in smart buildings, connected infrastructure, and critical systems that could have life-threatening consequences if exploited.</p><p>Lucian shares how his experience in national security shaped his focus on OT cybersecurity, emphasizing the physical impacts of cyberattacks on HVAC systems, elevators, and even water utilities. He introduces the concept of <strong>cyber commissioning</strong>, a process that ensures building systems are configured securely from the start. Lucian also explains how <em>Building Cyber Security</em> is creating industry-specific frameworks to help facility managers, building owners, and policymakers mitigate risks and reduce insurance liabilities.</p><p>With increasing threats from ransomware, nation-states, and insider errors, this episode highlights why securing operational technology is critical to protecting both property and lives. Learn how Lucian’s nonprofit is driving collaboration across industries to address this rapidly evolving threat landscape.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">430e017a-5606-49f2-a77a-77317c62c0f0</guid><itunes:image href="https://artwork.captivate.fm/59df7485-09d0-471c-bd1f-d3171ccb31bb/zesaGmqZIuv-Bht1QSVceo7J.png"/><pubDate>Tue, 18 Feb 2025 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c5b7157b-7cc7-454a-89ec-58da840e8592/CS2AI-Lucian-Niemeyer-INTERVIEW-converted.mp3" length="34060602" type="audio/mpeg"/><itunes:duration>28:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>128</itunes:episode><podcast:episode>128</podcast:episode></item><item><title>127: Unlocking the Power of Asset Inventory in OT Cybersecurity with Roya Gordon</title><itunes:title>127: Unlocking the Power of Asset Inventory in OT Cybersecurity with Roya Gordon</itunes:title><description><![CDATA[<p><strong>Roya Gordon</strong>, previously the Executive Industry Consultant - Operational Technology (OT) Cybersecurity at Hexagon Asset Lifecycle Intelligence and currently, is the Deputy CISO at ENGIE North America Inc., joins <strong>Derek Harp</strong> live from <em>Hack the Capitol 7.0</em> to explore the evolving landscape of asset inventory in operational technology (OT). Roya breaks down the differences between asset visibility, inventory, and management, sharing her firsthand experiences from both passive and configuration-based methodologies.</p><p>Roya highlights the critical role of asset inventory in building a strong OT cybersecurity foundation. From distinguishing between passive and active network monitoring to the importance of configuration management, she emphasizes how a multi-layered approach can offer comprehensive visibility and risk management. Roya also dives into why organizations often overlook configuration change management, and how integrating different solutions can optimize security efforts.</p><p>Whether you’re a seasoned OT professional or just starting your cybersecurity journey, this episode offers valuable insights into improving asset management, reducing risks, and fostering collaboration between vendors and operators.</p>]]></description><content:encoded><![CDATA[<p><strong>Roya Gordon</strong>, previously the Executive Industry Consultant - Operational Technology (OT) Cybersecurity at Hexagon Asset Lifecycle Intelligence and currently, is the Deputy CISO at ENGIE North America Inc., joins <strong>Derek Harp</strong> live from <em>Hack the Capitol 7.0</em> to explore the evolving landscape of asset inventory in operational technology (OT). Roya breaks down the differences between asset visibility, inventory, and management, sharing her firsthand experiences from both passive and configuration-based methodologies.</p><p>Roya highlights the critical role of asset inventory in building a strong OT cybersecurity foundation. From distinguishing between passive and active network monitoring to the importance of configuration management, she emphasizes how a multi-layered approach can offer comprehensive visibility and risk management. Roya also dives into why organizations often overlook configuration change management, and how integrating different solutions can optimize security efforts.</p><p>Whether you’re a seasoned OT professional or just starting your cybersecurity journey, this episode offers valuable insights into improving asset management, reducing risks, and fostering collaboration between vendors and operators.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">37ce7abb-003b-4945-9d16-597fd6355e0c</guid><itunes:image href="https://artwork.captivate.fm/7fc1814b-3d70-4cec-a11d-05a81fbddf3c/uAHIgcKVmz5sSgSTYzoPDUwe.png"/><pubDate>Tue, 11 Feb 2025 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/367a191a-18fd-48a3-9091-05f5f3f90e02/CS2AI-Roya-Gordon-INTERVIEW-converted.mp3" length="29220618" type="audio/mpeg"/><itunes:duration>24:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>127</itunes:episode><podcast:episode>127</podcast:episode></item><item><title>126: Shifting Left: Why Secure Software Starts at the Design Stage</title><itunes:title>126: Shifting Left: Why Secure Software Starts at the Design Stage</itunes:title><description><![CDATA[<p>In this episode of the (CS)²AI Podcast, host Derek Harp welcomes <strong>Mehdi Tarrit Mirakhorli</strong>, <em>Associate Professor</em> at the University of Hawaii and a <em>Cybersecurity Expert</em>, to discuss Secure by Design—a fundamental shift in how we develop and deploy software in industrial control systems (ICS) and operational technology (OT). With over 15 years of R&amp;D experience for DARPA, the Air Force, and DHS, Mehdi shares why modern software is inherently vulnerable and how we can learn from aviation, medical, and safety-critical industries to build resilient systems from the ground up.</p><p>The conversation dives deep into the risks of insecure by design software, the challenges of implementing true security practices, and the role of government policies in shifting liability from users to vendors. Mehdi explains the importance of threat modeling, attack surface analysis, and secure architecture frameworks to mitigate cyber threats before they arise. He also highlights how software development must evolve beyond rapid deployment cycles to integrate security as a core design principle.</p><p>If you’re an ICS professional, cybersecurity engineer, or software developer, this episode provides actionable insights on reducing vulnerabilities at scale, implementing proactive security measures, and preparing for the future of cyber threats. Subscribe now and stay ahead in the ever-evolving world of industrial cybersecurity!</p>]]></description><content:encoded><![CDATA[<p>In this episode of the (CS)²AI Podcast, host Derek Harp welcomes <strong>Mehdi Tarrit Mirakhorli</strong>, <em>Associate Professor</em> at the University of Hawaii and a <em>Cybersecurity Expert</em>, to discuss Secure by Design—a fundamental shift in how we develop and deploy software in industrial control systems (ICS) and operational technology (OT). With over 15 years of R&amp;D experience for DARPA, the Air Force, and DHS, Mehdi shares why modern software is inherently vulnerable and how we can learn from aviation, medical, and safety-critical industries to build resilient systems from the ground up.</p><p>The conversation dives deep into the risks of insecure by design software, the challenges of implementing true security practices, and the role of government policies in shifting liability from users to vendors. Mehdi explains the importance of threat modeling, attack surface analysis, and secure architecture frameworks to mitigate cyber threats before they arise. He also highlights how software development must evolve beyond rapid deployment cycles to integrate security as a core design principle.</p><p>If you’re an ICS professional, cybersecurity engineer, or software developer, this episode provides actionable insights on reducing vulnerabilities at scale, implementing proactive security measures, and preparing for the future of cyber threats. Subscribe now and stay ahead in the ever-evolving world of industrial cybersecurity!</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">ccaad777-2818-4574-b545-1c8cd516a09c</guid><itunes:image href="https://artwork.captivate.fm/0207bb21-f222-4e67-a953-29e640605fd4/e6l9STyk3_jN6B9gUsZ-rIOu.png"/><pubDate>Tue, 04 Feb 2025 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/19b9a73a-c745-420f-8256-e397bbbb4f13/CS2AI-Medhi-INTERVIEW-converted.mp3" length="41967858" type="audio/mpeg"/><itunes:duration>35:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>126</itunes:episode><podcast:episode>126</podcast:episode></item><item><title>125: Decoding SBOMs: Kyle McMillian on Cybersecurity and Supply Chain Transparency</title><itunes:title>125: Decoding SBOMs: Kyle McMillian on Cybersecurity and Supply Chain Transparency</itunes:title><description><![CDATA[<p>Derek Harp welcomes <strong>Kyle McMillian</strong>, Product Security Officer at Siemens, to discuss the evolving landscape of software bill of materials (SBOMs) and their role in modern cybersecurity. Recorded live at <em>Hack the Capitol 7.0</em>, this conversation unpacks the challenges and opportunities posed by SBOMs in an industry grappling with legacy systems and modern threats.</p><p>Kyle dives into the origins of SBOMs, their role in addressing vulnerabilities like Log4J, and their potential to transform procurement, risk management, and incident response. He emphasizes the importance of balancing transparency with practicality, noting that SBOMs are a starting point for broader cybersecurity conversations. With his unique perspective from a leading equipment manufacturer, Kyle shares insights into how SBOMs can help bridge the gap between IT and OT systems.</p><p>This episode is essential for anyone looking to understand the future of cybersecurity and the critical role of SBOMs in securing industrial control systems. Learn how these tools can foster trust, streamline risk management, and improve collaboration across the industry.</p>]]></description><content:encoded><![CDATA[<p>Derek Harp welcomes <strong>Kyle McMillian</strong>, Product Security Officer at Siemens, to discuss the evolving landscape of software bill of materials (SBOMs) and their role in modern cybersecurity. Recorded live at <em>Hack the Capitol 7.0</em>, this conversation unpacks the challenges and opportunities posed by SBOMs in an industry grappling with legacy systems and modern threats.</p><p>Kyle dives into the origins of SBOMs, their role in addressing vulnerabilities like Log4J, and their potential to transform procurement, risk management, and incident response. He emphasizes the importance of balancing transparency with practicality, noting that SBOMs are a starting point for broader cybersecurity conversations. With his unique perspective from a leading equipment manufacturer, Kyle shares insights into how SBOMs can help bridge the gap between IT and OT systems.</p><p>This episode is essential for anyone looking to understand the future of cybersecurity and the critical role of SBOMs in securing industrial control systems. Learn how these tools can foster trust, streamline risk management, and improve collaboration across the industry.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">f3c2ca3a-8f74-42d1-b3e8-34789d73d99c</guid><itunes:image href="https://artwork.captivate.fm/cda9ee15-f39f-48e7-b3d6-d7679f767457/LtJVw4EQT7Wj0ebPZzM73x5s.png"/><pubDate>Tue, 28 Jan 2025 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4c8cfb26-78b0-4847-9449-85f1292b5e67/CS2AI-Kyle-McMillian-INTERVIEW-1-converted.mp3" length="32858436" type="audio/mpeg"/><itunes:duration>27:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>125</itunes:episode><podcast:episode>125</podcast:episode></item><item><title>124: Capture the Flag: Transforming Cybersecurity Training with Kenneth Warren</title><itunes:title>124: Capture the Flag: Transforming Cybersecurity Training with Kenneth Warren</itunes:title><description><![CDATA[<p>Derek Harp sits down with <strong>Kenneth Warren</strong>, Staff OT and Offensive Security Engineer at GRIMM Cyber, to discuss how gamification and Capture the Flag (CTF) competitions are revolutionizing cybersecurity training. Recorded live at <em>Hack the Capitol 7.0</em>, this conversation explores how CTFs and cyber ranges create safe, hands-on environments for learning offensive and defensive cybersecurity skills.</p><p>Kenneth explains how CTFs offer opportunities to tackle real-world scenarios, from navigating complex networks to interacting with industrial control protocols. Whether you're an experienced professional or a newcomer to the field, CTFs provide a unique way to build and refine your skills. He also highlights how gamification reaches audiences that traditional training might miss, making learning engaging and accessible.</p><p>This episode provides insights into the growing role of gamified learning in cybersecurity and how it’s inspiring the next generation of professionals. Discover how these competitions foster collaboration, creativity, and innovation in a rapidly evolving industry.</p>]]></description><content:encoded><![CDATA[<p>Derek Harp sits down with <strong>Kenneth Warren</strong>, Staff OT and Offensive Security Engineer at GRIMM Cyber, to discuss how gamification and Capture the Flag (CTF) competitions are revolutionizing cybersecurity training. Recorded live at <em>Hack the Capitol 7.0</em>, this conversation explores how CTFs and cyber ranges create safe, hands-on environments for learning offensive and defensive cybersecurity skills.</p><p>Kenneth explains how CTFs offer opportunities to tackle real-world scenarios, from navigating complex networks to interacting with industrial control protocols. Whether you're an experienced professional or a newcomer to the field, CTFs provide a unique way to build and refine your skills. He also highlights how gamification reaches audiences that traditional training might miss, making learning engaging and accessible.</p><p>This episode provides insights into the growing role of gamified learning in cybersecurity and how it’s inspiring the next generation of professionals. Discover how these competitions foster collaboration, creativity, and innovation in a rapidly evolving industry.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">c5bb9033-83d4-4141-b2c3-a9ac4e59200e</guid><itunes:image href="https://artwork.captivate.fm/15feca04-2317-4454-9a10-4c89b91c9551/hPlD4bL5IEfwwuex4V6Q5mm-.png"/><pubDate>Tue, 21 Jan 2025 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2b9e3a7d-aa4d-452e-90c3-5d9b3a1fa106/CS2AI-Kenny-Warren-INTERVIEW-1-converted.mp3" length="27810696" type="audio/mpeg"/><itunes:duration>23:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>124</itunes:episode><podcast:episode>124</podcast:episode></item><item><title>123: From Classroom to Crisis: Immersive Training for ICS Security Professionals</title><itunes:title>123: From Classroom to Crisis: Immersive Training for ICS Security Professionals</itunes:title><description><![CDATA[<p>Derek Harp hosts <strong>Jeff Hahn</strong>, Project Manager at Idaho National Laboratory (INL), to discuss innovative approaches to training in the ICS and OT cybersecurity space. Recorded live at <em>Hack the Capitol 7.0</em>, Jeff shares insights into how INL’s escape rooms provide hands-on, immersive learning experiences for professionals and students alike.</p><p>The escape rooms integrate learning objectives from INL’s renowned 301 Red Team/Blue Team training, transforming them into engaging, gamified challenges. These exercises offer participants a chance to simulate real-world scenarios, improve teamwork, and develop critical cybersecurity skills. Jeff also highlights the importance of bridging gaps between IT and OT teams through collaborative training initiatives.</p><p>Whether you're a seasoned professional or a newcomer to the field, this episode explores how gamification and experiential education can help prepare the next generation of cybersecurity experts. Discover how these escape rooms are traveling the world, raising awareness, and making learning accessible to everyone.</p>]]></description><content:encoded><![CDATA[<p>Derek Harp hosts <strong>Jeff Hahn</strong>, Project Manager at Idaho National Laboratory (INL), to discuss innovative approaches to training in the ICS and OT cybersecurity space. Recorded live at <em>Hack the Capitol 7.0</em>, Jeff shares insights into how INL’s escape rooms provide hands-on, immersive learning experiences for professionals and students alike.</p><p>The escape rooms integrate learning objectives from INL’s renowned 301 Red Team/Blue Team training, transforming them into engaging, gamified challenges. These exercises offer participants a chance to simulate real-world scenarios, improve teamwork, and develop critical cybersecurity skills. Jeff also highlights the importance of bridging gaps between IT and OT teams through collaborative training initiatives.</p><p>Whether you're a seasoned professional or a newcomer to the field, this episode explores how gamification and experiential education can help prepare the next generation of cybersecurity experts. Discover how these escape rooms are traveling the world, raising awareness, and making learning accessible to everyone.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">63cdc9a2-10ac-4706-b3c2-9de628086f5d</guid><itunes:image href="https://artwork.captivate.fm/89a1e122-30cb-4bc8-9c95-5262f817567e/JYlP8gDLryEV_q9ZqOOxW0aT.png"/><pubDate>Tue, 14 Jan 2025 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b8649970-d2d2-4f5d-a39c-174037f210d6/CS2AI-Jeff-Haun-INTERVIEW-1-converted.mp3" length="27582060" type="audio/mpeg"/><itunes:duration>23:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>123</itunes:episode><podcast:episode>123</podcast:episode></item><item><title>122: Securing the Future: Rob Shaughnessy on Innovation, Supply Chain, and Cyber Threats</title><itunes:title>122: Securing the Future: Rob Shaughnessy on Innovation, Supply Chain, and Cyber Threats</itunes:title><description><![CDATA[<p>Derek Harp welcomes <strong>Rob Shaughnessy</strong>, President &amp; CEO, Director of Psymetis, Inc., to discuss critical issues in the world of ICS and OT security, recorded live at <em>Hack the Capitol 7.0</em>. Rob dives into the vulnerabilities surrounding the development of innovative technologies, supply chain risks, and the evolving threat landscape posed by nation-state actors.</p><p>The conversation highlights the growing need for transparency in supply chains, the legal gaps in cybersecurity requirements for technology companies, and the rise of services like ransomware-as-a-service, which lower the bar for cybercriminals. Rob also shares his perspective on education and workforce challenges in cybersecurity, emphasizing the importance of foundational skills and the risks of over-relying on influencer culture.</p><p>Packed with actionable insights, this episode offers a nuanced look at the complexities of securing critical infrastructure, balancing innovation with security, and preparing for a more connected, yet vulnerable, future.</p>]]></description><content:encoded><![CDATA[<p>Derek Harp welcomes <strong>Rob Shaughnessy</strong>, President &amp; CEO, Director of Psymetis, Inc., to discuss critical issues in the world of ICS and OT security, recorded live at <em>Hack the Capitol 7.0</em>. Rob dives into the vulnerabilities surrounding the development of innovative technologies, supply chain risks, and the evolving threat landscape posed by nation-state actors.</p><p>The conversation highlights the growing need for transparency in supply chains, the legal gaps in cybersecurity requirements for technology companies, and the rise of services like ransomware-as-a-service, which lower the bar for cybercriminals. Rob also shares his perspective on education and workforce challenges in cybersecurity, emphasizing the importance of foundational skills and the risks of over-relying on influencer culture.</p><p>Packed with actionable insights, this episode offers a nuanced look at the complexities of securing critical infrastructure, balancing innovation with security, and preparing for a more connected, yet vulnerable, future.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">ff35e45c-7c8c-4cae-987d-ed5dae31b5a8</guid><itunes:image href="https://artwork.captivate.fm/bed34949-18d6-45c3-998c-0da69595cb02/WMXj-72kfEoU-Bz2GoPpznn5.jpg"/><pubDate>Tue, 07 Jan 2025 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b4371dfc-e7ab-4f07-b901-0c5c5aab32de/CS2AI-Rob-Shaughnessy-INTERVIEW-converted.mp3" length="39834444" type="audio/mpeg"/><itunes:duration>33:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>122</itunes:episode><podcast:episode>122</podcast:episode></item><item><title>121: From Farm to Fork: Kristin Demoranville on Food Safety and Cybersecurity</title><itunes:title>121: From Farm to Fork: Kristin Demoranville on Food Safety and Cybersecurity</itunes:title><description><![CDATA[<p>The intersection of cybersecurity and the food industry takes center stage as Kristin Demoranville, founder and CEO of Anson Sage and host of <em>Bytes and Bites</em>, joins Derek Harp at <em>Hack the Capitol 7.0</em>. This compelling conversation reveals how digital systems impact every aspect of the food supply chain, from farming and production to transportation and storage.</p><p>Kristin highlights key vulnerabilities, including risks in automated farming equipment, robotic processing lines, and self-driving refrigerated trucks. She advocates for embedding cybersecurity into food safety practices to protect both trust and the integrity of what we eat. As the industry embraces groundbreaking innovations like AI and lab-grown food, addressing these challenges is more crucial than ever.</p><p>Listeners will gain valuable insights into the urgent need for collaboration, awareness, and action to secure the systems that sustain our daily lives. This dialogue sheds light on the essential role of cybersecurity in ensuring a safe and reliable food supply for everyone.</p>]]></description><content:encoded><![CDATA[<p>The intersection of cybersecurity and the food industry takes center stage as Kristin Demoranville, founder and CEO of Anson Sage and host of <em>Bytes and Bites</em>, joins Derek Harp at <em>Hack the Capitol 7.0</em>. This compelling conversation reveals how digital systems impact every aspect of the food supply chain, from farming and production to transportation and storage.</p><p>Kristin highlights key vulnerabilities, including risks in automated farming equipment, robotic processing lines, and self-driving refrigerated trucks. She advocates for embedding cybersecurity into food safety practices to protect both trust and the integrity of what we eat. As the industry embraces groundbreaking innovations like AI and lab-grown food, addressing these challenges is more crucial than ever.</p><p>Listeners will gain valuable insights into the urgent need for collaboration, awareness, and action to secure the systems that sustain our daily lives. This dialogue sheds light on the essential role of cybersecurity in ensuring a safe and reliable food supply for everyone.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">00c480c7-35b3-40ab-9830-9baf953e280d</guid><itunes:image href="https://artwork.captivate.fm/a87d1850-72cd-419c-b3a0-f06e0e9058ad/voTBvnVLrkbavurQuHOFYk4T.jpg"/><pubDate>Tue, 31 Dec 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ee00afb5-a62c-4e1f-9299-85db4fb49f50/CS2AI-Kristin-Demoranville-INTERVIEW-converted.mp3" length="29474310" type="audio/mpeg"/><itunes:duration>24:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>121</itunes:episode><podcast:episode>121</podcast:episode></item><item><title>120: ResetCon and the Future of Cybersecurity: Insights from Jay Warne</title><itunes:title>120: ResetCon and the Future of Cybersecurity: Insights from Jay Warne</itunes:title><description><![CDATA[<p>In this episode of the <strong>(CS)²AI Podcast</strong>, host <strong>Derek Harp</strong> welcomes <strong>Jay Warne</strong>, co-founder of ResetCon, to discuss the intersection of cybersecurity research, critical infrastructure, and collaborative defense strategies. Recorded live at <em>Hack the Capitol 7.0</em>, this conversation highlights the pressing need to close gaps between academia, offensive researchers, and critical industries.</p><p>Jay delves into the mission of ResetCon, an inaugural conference designed to connect academic researchers, defense experts, and key players from the civilian and commercial sectors. Together, they aim to anticipate emerging threats, mitigate risks, and reduce recovery times for critical systems. The discussion also explores the challenges of integrating IT and OT security teams, the importance of "cyber-informed engineering," and the need for secure-by-design principles.</p><p>Listeners will gain insights into the future of cybersecurity, including lessons learned from DARPA research, the importance of bridging silos, and how to build more resilient systems. Don’t miss this episode if you’re passionate about protecting critical infrastructure and fostering innovation.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the <strong>(CS)²AI Podcast</strong>, host <strong>Derek Harp</strong> welcomes <strong>Jay Warne</strong>, co-founder of ResetCon, to discuss the intersection of cybersecurity research, critical infrastructure, and collaborative defense strategies. Recorded live at <em>Hack the Capitol 7.0</em>, this conversation highlights the pressing need to close gaps between academia, offensive researchers, and critical industries.</p><p>Jay delves into the mission of ResetCon, an inaugural conference designed to connect academic researchers, defense experts, and key players from the civilian and commercial sectors. Together, they aim to anticipate emerging threats, mitigate risks, and reduce recovery times for critical systems. The discussion also explores the challenges of integrating IT and OT security teams, the importance of "cyber-informed engineering," and the need for secure-by-design principles.</p><p>Listeners will gain insights into the future of cybersecurity, including lessons learned from DARPA research, the importance of bridging silos, and how to build more resilient systems. Don’t miss this episode if you’re passionate about protecting critical infrastructure and fostering innovation.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">9a133305-dc9a-49e0-b48c-b776c2f31e82</guid><itunes:image href="https://artwork.captivate.fm/e8eca897-cce2-447d-b86b-de2de3ea8c2b/BF5A60Ci0BoxXPZE7JR8TOnf.png"/><pubDate>Tue, 24 Dec 2024 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5b5afd8d-cdf5-4895-b939-d6445ad9a9b7/CS2AI-Jay-Warne-INTERVIEW-converted.mp3" length="26896152" type="audio/mpeg"/><itunes:duration>22:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>120</itunes:episode><podcast:episode>120</podcast:episode></item><item><title>119: Revealing the OT Threat Landscape: Remote Access, Supply Chain, and Lateral Movement</title><itunes:title>119: Revealing the OT Threat Landscape: Remote Access, Supply Chain, and Lateral Movement</itunes:title><description><![CDATA[<p>Our host <strong>Derek Harp</strong> sits down with <strong>Adam Robbie</strong>, Head of OT Threat Research at Palo Alto Networks, live from <em>Hack the Capitol 7.0</em>. Adam shares critical insights into emerging cybersecurity challenges within Operational Technology (OT) environments, including findings from Palo Alto's extensive OT threat landscape research.</p><p>Listeners will hear about the top attack vectors impacting critical infrastructure: <strong>remote access vulnerabilities</strong>, <strong>supply chain risks</strong>, and <strong>lateral movement</strong> across networks. Adam discusses the importance of <strong>network segmentation</strong>, cross-team collaboration between IT and OT, and innovative tools like the <em>Cyberwall</em>, a hands-on demonstration environment showcasing real-world OT threats.</p><p>Whether you're an OT security professional or new to the field, this episode delivers practical takeaways to enhance your cybersecurity strategies. Don’t miss this engaging conversation focused on securing control systems and building stronger, collaborative defenses.</p>]]></description><content:encoded><![CDATA[<p>Our host <strong>Derek Harp</strong> sits down with <strong>Adam Robbie</strong>, Head of OT Threat Research at Palo Alto Networks, live from <em>Hack the Capitol 7.0</em>. Adam shares critical insights into emerging cybersecurity challenges within Operational Technology (OT) environments, including findings from Palo Alto's extensive OT threat landscape research.</p><p>Listeners will hear about the top attack vectors impacting critical infrastructure: <strong>remote access vulnerabilities</strong>, <strong>supply chain risks</strong>, and <strong>lateral movement</strong> across networks. Adam discusses the importance of <strong>network segmentation</strong>, cross-team collaboration between IT and OT, and innovative tools like the <em>Cyberwall</em>, a hands-on demonstration environment showcasing real-world OT threats.</p><p>Whether you're an OT security professional or new to the field, this episode delivers practical takeaways to enhance your cybersecurity strategies. Don’t miss this engaging conversation focused on securing control systems and building stronger, collaborative defenses.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">8b94dc37-d33a-4eea-9ff0-02a1e897b1fb</guid><itunes:image href="https://artwork.captivate.fm/a8c307c0-882c-460b-89fa-42e69da1bddc/IyrpEUNPsAZwCHXAToGb0t6R.jpg"/><pubDate>Tue, 17 Dec 2024 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/583e51b3-3fce-4638-890d-a97f1f86a31f/CS2AI-Adam-Robbie-INTERVIEWb-converted.mp3" length="23524554" type="audio/mpeg"/><itunes:duration>19:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>119</itunes:episode><podcast:episode>119</podcast:episode></item><item><title>118: Preparing for Cyber Threats: A Strategic Discussion with Mark Montgomery on Securing Our Future</title><itunes:title>118: Preparing for Cyber Threats: A Strategic Discussion with Mark Montgomery on Securing Our Future</itunes:title><description><![CDATA[<p>In this episode of the <em>CS2AI Podcast</em>, host Derek Harp dives deep into the evolving threats to national security and critical infrastructure with Mark Montgomery, Senior Fellow at the Foundation for Defense of Democracies. Recorded live at the Hack the Capitol 7.0 conference in Washington D.C., this episode sheds light on the increasing cyber vulnerabilities faced by the United States from nation-states like China and Russia, as well as criminal actors exploiting critical infrastructure. Mark shares his extensive experience and expertise, offering insights into how the U.S. government can better prepare and protect itself in the face of modern cyber threats.</p><p>Mark discusses the significant mismatch between the capabilities of the Department of Defense and intelligence agencies, and the authorities of civilian federal agencies responsible for protecting sectors like power, water, and transportation. He also highlights the pressing issue of underperforming federal agencies tasked with safeguarding critical infrastructure, and the dire need for a comprehensive, bipartisan approach to cybersecurity legislation. With over 32 years in the U.S. Navy and years of policy work in the federal government, Mark offers a unique perspective on the future of cybersecurity and what needs to change to address these challenges effectively.</p><p>One of the key takeaways from this episode is Mark’s call for a more cohesive strategy to defend against cyber threats and protect public safety and economic productivity. Despite the ongoing challenges, there’s a sense of hope as Mark emphasizes the bipartisan nature of cybersecurity solutions and the possibility of enacting meaningful changes. This conversation is essential for anyone involved in cybersecurity, national security, or government policy and provides crucial insights into the future of cyber defense in the United States.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the <em>CS2AI Podcast</em>, host Derek Harp dives deep into the evolving threats to national security and critical infrastructure with Mark Montgomery, Senior Fellow at the Foundation for Defense of Democracies. Recorded live at the Hack the Capitol 7.0 conference in Washington D.C., this episode sheds light on the increasing cyber vulnerabilities faced by the United States from nation-states like China and Russia, as well as criminal actors exploiting critical infrastructure. Mark shares his extensive experience and expertise, offering insights into how the U.S. government can better prepare and protect itself in the face of modern cyber threats.</p><p>Mark discusses the significant mismatch between the capabilities of the Department of Defense and intelligence agencies, and the authorities of civilian federal agencies responsible for protecting sectors like power, water, and transportation. He also highlights the pressing issue of underperforming federal agencies tasked with safeguarding critical infrastructure, and the dire need for a comprehensive, bipartisan approach to cybersecurity legislation. With over 32 years in the U.S. Navy and years of policy work in the federal government, Mark offers a unique perspective on the future of cybersecurity and what needs to change to address these challenges effectively.</p><p>One of the key takeaways from this episode is Mark’s call for a more cohesive strategy to defend against cyber threats and protect public safety and economic productivity. Despite the ongoing challenges, there’s a sense of hope as Mark emphasizes the bipartisan nature of cybersecurity solutions and the possibility of enacting meaningful changes. This conversation is essential for anyone involved in cybersecurity, national security, or government policy and provides crucial insights into the future of cyber defense in the United States.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">ad8d795c-c6bd-4a4e-94a1-ba475dd174ae</guid><itunes:image href="https://artwork.captivate.fm/5b990c48-231b-4bf1-b5b8-0b4879e8fe36/gVJbAyfi3ZFc9z1l8XVKrmiZ.jpg"/><pubDate>Tue, 10 Dec 2024 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/780ae1e1-bf8d-4945-9fd9-98e2e0072c5e/CS2A-Mark-Montgomery-INTERVIEWd-converted.mp3" length="16110587" type="audio/mpeg"/><itunes:duration>13:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>118</itunes:episode><podcast:episode>118</podcast:episode></item><item><title>117: Rapid7’s Approach to ICS and OT Security: Lessons from the Field</title><itunes:title>117: Rapid7’s Approach to ICS and OT Security: Lessons from the Field</itunes:title><description><![CDATA[<p class="ql-align-justify">Join Derek Harp and his guests from Rapid7—Lonnie Best, William Price, and Nicholas Butcher—as they delve into the critical challenges and exciting opportunities within the Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity landscape. Recorded live at Hack the Capitol 7.0, this episode highlights the growing demand for OT cybersecurity, innovative approaches to managing threats, and the evolving dynamics between IT and OT professionals.</p><p class="ql-align-justify">In this episode, the panel discusses real-world examples of managing ICS threats, the nuances of integrating OT into traditional IT security frameworks, and the importance of trust and communication in bridging gaps between teams. Learn how managed security services are adapting to meet the unique demands of OT environments and why collaboration across roles and expertise is essential.</p><p class="ql-align-justify">Whether you’re a seasoned professional or new to the field, this episode offers actionable insights and inspiring stories that highlight the importance of securing critical infrastructure in today’s evolving threat landscape. </p><p class="ql-align-justify">Visit <strong>cs2ai.org</strong> to learn more about resources, events, and professional development opportunities in OT and ICS cybersecurity.</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Join Derek Harp and his guests from Rapid7—Lonnie Best, William Price, and Nicholas Butcher—as they delve into the critical challenges and exciting opportunities within the Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity landscape. Recorded live at Hack the Capitol 7.0, this episode highlights the growing demand for OT cybersecurity, innovative approaches to managing threats, and the evolving dynamics between IT and OT professionals.</p><p class="ql-align-justify">In this episode, the panel discusses real-world examples of managing ICS threats, the nuances of integrating OT into traditional IT security frameworks, and the importance of trust and communication in bridging gaps between teams. Learn how managed security services are adapting to meet the unique demands of OT environments and why collaboration across roles and expertise is essential.</p><p class="ql-align-justify">Whether you’re a seasoned professional or new to the field, this episode offers actionable insights and inspiring stories that highlight the importance of securing critical infrastructure in today’s evolving threat landscape. </p><p class="ql-align-justify">Visit <strong>cs2ai.org</strong> to learn more about resources, events, and professional development opportunities in OT and ICS cybersecurity.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">d061f00f-848c-46b8-8593-011df80688d0</guid><itunes:image href="https://artwork.captivate.fm/67b7eadd-2d5c-4afe-bdc6-d536bf68c00d/FOoHE_tB6ceSyKCM27_KzP_a.jpg"/><pubDate>Tue, 03 Dec 2024 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ee7863bb-f3ba-4a14-a237-9c48294f9432/CS2AI-Rapid-7-converted.mp3" length="29673191" type="audio/mpeg"/><itunes:duration>24:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>117</itunes:episode><podcast:episode>117</podcast:episode></item><item><title>116: Cyber Safety in the Age of OT Threats: Insights from Lucian Niemeyer</title><itunes:title>116: Cyber Safety in the Age of OT Threats: Insights from Lucian Niemeyer</itunes:title><description><![CDATA[<p>In this episode of the CS²AI Podcast, host Derek Harp is joined by Lucian Niemeyer, CEO of Building Cybersecurity, for an enlightening discussion on the critical importance of protecting operational technology (OT) systems. Recorded at the Hack the Capitol 7.0 conference, Lucian emphasizes the increasing threats to critical infrastructure posed by nation-state actors and other adversaries, describing the current landscape as a "Sputnik moment" for cybersecurity.</p><p>From vulnerabilities in water systems to the cyber-physical risks of modern vehicles, this conversation highlights the pressing need for a collective defense strategy. Lucian shares actionable insights on the roles of the private sector and national defense in addressing these challenges and calls for a bipartisan commitment to safeguard life-essential systems.</p><p>If you're curious about how cybersecurity intersects with human safety and national security, this episode is a must-listen. Learn about proactive measures, emerging frameworks, and how you can contribute to strengthening our defenses.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the CS²AI Podcast, host Derek Harp is joined by Lucian Niemeyer, CEO of Building Cybersecurity, for an enlightening discussion on the critical importance of protecting operational technology (OT) systems. Recorded at the Hack the Capitol 7.0 conference, Lucian emphasizes the increasing threats to critical infrastructure posed by nation-state actors and other adversaries, describing the current landscape as a "Sputnik moment" for cybersecurity.</p><p>From vulnerabilities in water systems to the cyber-physical risks of modern vehicles, this conversation highlights the pressing need for a collective defense strategy. Lucian shares actionable insights on the roles of the private sector and national defense in addressing these challenges and calls for a bipartisan commitment to safeguard life-essential systems.</p><p>If you're curious about how cybersecurity intersects with human safety and national security, this episode is a must-listen. Learn about proactive measures, emerging frameworks, and how you can contribute to strengthening our defenses.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">f04f1fe4-904a-4307-ad8b-2e66909ea0e3</guid><itunes:image href="https://artwork.captivate.fm/e53c8edc-a7f8-468a-ac60-1044499c225e/VwpeaSp6IQQh4aUIRRySH7JV.jpg"/><pubDate>Tue, 26 Nov 2024 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c78e642f-ce26-4f91-823b-477221345015/CS2AI-Lucian-Niemey-converted.mp3" length="37827876" type="audio/mpeg"/><itunes:duration>31:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>116</itunes:episode><podcast:episode>116</podcast:episode></item><item><title>115: Cyber Informed Engineering: Protecting Critical Infrastructure with Ginger Wright</title><itunes:title>115: Cyber Informed Engineering: Protecting Critical Infrastructure with Ginger Wright</itunes:title><description><![CDATA[<p>Derek Harp hosts Virginia "Ginger" Wright, a program manager at Idaho National Laboratory, known for her pioneering work in cybersecurity for critical infrastructure. Ginger shares the history and importance of Cyber Informed Engineering (CIE) and how this engineering philosophy integrates safety protocols directly into the design of industrial systems, making them resilient against cyber threats. They discuss the origins of CIE in nuclear energy safety, the unique assets of Idaho National Laboratory, and the vital role engineers play in safeguarding critical infrastructure. Ginger also dives into practical resources like the Cyber Informed Engineering Implementation Guide, sharing how organizations and educators can adopt this methodology. Join us for insights into CIE’s impact on the future of OT and ICS cybersecurity.</p>]]></description><content:encoded><![CDATA[<p>Derek Harp hosts Virginia "Ginger" Wright, a program manager at Idaho National Laboratory, known for her pioneering work in cybersecurity for critical infrastructure. Ginger shares the history and importance of Cyber Informed Engineering (CIE) and how this engineering philosophy integrates safety protocols directly into the design of industrial systems, making them resilient against cyber threats. They discuss the origins of CIE in nuclear energy safety, the unique assets of Idaho National Laboratory, and the vital role engineers play in safeguarding critical infrastructure. Ginger also dives into practical resources like the Cyber Informed Engineering Implementation Guide, sharing how organizations and educators can adopt this methodology. Join us for insights into CIE’s impact on the future of OT and ICS cybersecurity.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">e5285e36-f599-4538-9b5b-ca92c0e5df9a</guid><itunes:image href="https://artwork.captivate.fm/206404c2-512c-4ccb-874f-25b2d35a1aca/HphYNqw-t3h95TS03yK8tW_6.png"/><pubDate>Tue, 19 Nov 2024 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d6027d92-c946-4ec5-894a-4417a217962b/CS2AI-Ginger-Wright-converted.mp3" length="28916814" type="audio/mpeg"/><itunes:duration>24:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>115</itunes:episode><podcast:episode>115</podcast:episode></item><item><title>114: Hack the Capitol 7.0: Building Cybersecurity Connections with Bryson Bort &amp; Tom Van Norman</title><itunes:title>114: Hack the Capitol 7.0: Building Cybersecurity Connections with Bryson Bort &amp; Tom Van Norman</itunes:title><description><![CDATA[<p>In this episode, host Derek Harp sits down with Bryson Bort and Tom Van Norman, co-founders of ICS Village and creators of Hack the Capitol. They discuss the origins and evolution of Hack the Capitol, now in its seventh year, and the conference’s unique focus on bridging cybersecurity professionals with policy makers and industry leaders. They dive into the value of hands-on learning, the launch of Workforce Development Day, and the ongoing need for practical cybersecurity education and career opportunities for all. Bryson and Tom also highlight the significance of candor in the field and what attendees can look forward to at future conferences. Tune in for insights into the world of OT and ICS cybersecurity, hands-on training, and the importance of building community partnerships.</p>]]></description><content:encoded><![CDATA[<p>In this episode, host Derek Harp sits down with Bryson Bort and Tom Van Norman, co-founders of ICS Village and creators of Hack the Capitol. They discuss the origins and evolution of Hack the Capitol, now in its seventh year, and the conference’s unique focus on bridging cybersecurity professionals with policy makers and industry leaders. They dive into the value of hands-on learning, the launch of Workforce Development Day, and the ongoing need for practical cybersecurity education and career opportunities for all. Bryson and Tom also highlight the significance of candor in the field and what attendees can look forward to at future conferences. Tune in for insights into the world of OT and ICS cybersecurity, hands-on training, and the importance of building community partnerships.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">5cf08e6d-bb29-4aad-9530-1029f9cf3194</guid><itunes:image href="https://artwork.captivate.fm/10d93974-4903-4b5d-bff7-e3eefec70eaf/5jt6cQPYArYaoCrj6Lj682mj.jpg"/><pubDate>Tue, 12 Nov 2024 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/57bc9afa-4923-4dc9-8ff3-913ebe229cf9/CS2AI-Bryson-Tom-1-converted.mp3" length="20561259" type="audio/mpeg"/><itunes:duration>17:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>114</itunes:episode><podcast:episode>114</podcast:episode></item><item><title>113: Shaping the Future of OT Security with Dale Peterson</title><itunes:title>113: Shaping the Future of OT Security with Dale Peterson</itunes:title><description><![CDATA[<p>In this episode, the conversation centers on the critical role of operational technology (OT) security and the unique contributions of the S4 Conference. Dale Peterson shares his journey and insights into the challenges of underrepresentation in cybersecurity, especially for women and other groups, and highlights innovative scholarship initiatives aimed at bridging this gap. The discussion also delves into the evolving landscape of AI in cybersecurity, addressing both its potential and the complexities it brings. Listeners will gain valuable perspectives on managing cybersecurity risks, prioritizing investments, and developing effective recovery strategies in OT environments. As we look forward to S4 2025 in Tampa, Florida, this episode offers a glimpse into the future of cybersecurity and the importance of resilience in our systems</p>]]></description><content:encoded><![CDATA[<p>In this episode, the conversation centers on the critical role of operational technology (OT) security and the unique contributions of the S4 Conference. Dale Peterson shares his journey and insights into the challenges of underrepresentation in cybersecurity, especially for women and other groups, and highlights innovative scholarship initiatives aimed at bridging this gap. The discussion also delves into the evolving landscape of AI in cybersecurity, addressing both its potential and the complexities it brings. Listeners will gain valuable perspectives on managing cybersecurity risks, prioritizing investments, and developing effective recovery strategies in OT environments. As we look forward to S4 2025 in Tampa, Florida, this episode offers a glimpse into the future of cybersecurity and the importance of resilience in our systems</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">3ad53e7f-8b72-4395-8d73-992efcecd03f</guid><itunes:image href="https://artwork.captivate.fm/b895c382-f83c-4b65-9429-d3e1b4f2f133/InrciO7mIpvozMLSUX7OWLD7.png"/><pubDate>Wed, 06 Nov 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/52a24ec3-0aa6-4b76-8456-791628538e85/CS2AI-Dale-D2-converted.mp3" length="38891381" type="audio/mpeg"/><itunes:duration>32:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>113</itunes:episode><podcast:episode>113</podcast:episode></item><item><title>112: Breaking Barriers in Cybersecurity: Roya Gordon’s Transformative Journey and Expert Advice for Veterans</title><itunes:title>112: Breaking Barriers in Cybersecurity: Roya Gordon’s Transformative Journey and Expert Advice for Veterans</itunes:title><description><![CDATA[<p>Today, we are thrilled to welcome Roya Gordon as our guest.&nbsp;</p><p>Roya is an executive industry consultant specializing in operational technology, cybersecurity, and Hexagon. She is a military veteran, an accomplished technologist, and a prolific speaker in our industry. Her creativity knows no bounds, encompassing her passion for the arts and her love of opera and symphonies. She is also an avid traveler and a super fun person to have around.</p><p>Roya brings a unique and engaging perspective to our discussion today. She shares her journey from a pre-law magnet program to becoming a skilled speaker in the Navy, highlighting the value of communication skills for conveying technical information to audiences and sharing the challenges and opportunities veterans face when breaking into the cybersecurity industry.</p><p>Stay tuned as Roya shares her invaluable insights and experiences, offering guidance for veterans aspiring to enter the cybersecurity field. You will not want to miss the wisdom and stories Roya shares with us today.</p><p><strong>Show highlights:</strong></p><ul><li>Roya shares her background as an army brat.</li><li>Roya discusses her six-year experience in the Navy.</li><li>How Roya gradually realized she was involved in technology through her Navy intelligence work</li><li>Roya talks about her studies in international relations and national security after leaving the Navy and how she pivoted to studying cyber-warfare</li><li>Roya landed a job as a security researcher at Idaho National Laboratory (INL) despite lacking an IT background.</li><li>Roya talks about the foundational training she received in OT cybersecurity at INL.&nbsp;</li><li>How advanced tools often get underutilized due to a lack of trained personnel&nbsp;&nbsp;&nbsp;</li><li>Roya highlights the value of certifications.&nbsp;</li><li>How non-technical roles like journalism and event planning can offer entryways into the cybersecurity space.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://hexagon.com/" rel="noopener noreferrer" target="_blank">Hexagon</a></p><p>Roya Gordon on&nbsp;<a href="https://www.linkedin.com/in/roya-gordon-ot-cyber-sme/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Today, we are thrilled to welcome Roya Gordon as our guest.&nbsp;</p><p>Roya is an executive industry consultant specializing in operational technology, cybersecurity, and Hexagon. She is a military veteran, an accomplished technologist, and a prolific speaker in our industry. Her creativity knows no bounds, encompassing her passion for the arts and her love of opera and symphonies. She is also an avid traveler and a super fun person to have around.</p><p>Roya brings a unique and engaging perspective to our discussion today. She shares her journey from a pre-law magnet program to becoming a skilled speaker in the Navy, highlighting the value of communication skills for conveying technical information to audiences and sharing the challenges and opportunities veterans face when breaking into the cybersecurity industry.</p><p>Stay tuned as Roya shares her invaluable insights and experiences, offering guidance for veterans aspiring to enter the cybersecurity field. You will not want to miss the wisdom and stories Roya shares with us today.</p><p><strong>Show highlights:</strong></p><ul><li>Roya shares her background as an army brat.</li><li>Roya discusses her six-year experience in the Navy.</li><li>How Roya gradually realized she was involved in technology through her Navy intelligence work</li><li>Roya talks about her studies in international relations and national security after leaving the Navy and how she pivoted to studying cyber-warfare</li><li>Roya landed a job as a security researcher at Idaho National Laboratory (INL) despite lacking an IT background.</li><li>Roya talks about the foundational training she received in OT cybersecurity at INL.&nbsp;</li><li>How advanced tools often get underutilized due to a lack of trained personnel&nbsp;&nbsp;&nbsp;</li><li>Roya highlights the value of certifications.&nbsp;</li><li>How non-technical roles like journalism and event planning can offer entryways into the cybersecurity space.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://hexagon.com/" rel="noopener noreferrer" target="_blank">Hexagon</a></p><p>Roya Gordon on&nbsp;<a href="https://www.linkedin.com/in/roya-gordon-ot-cyber-sme/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">86340537-f84b-4802-961c-ca5463792801</guid><itunes:image href="https://artwork.captivate.fm/dc57fdf7-586d-44ae-bf35-2be21936c764/AFmg8hyoEAPZTxMSPJ7xzVnX.jpg"/><pubDate>Tue, 04 Jun 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4b48e37a-83d0-48f0-a740-9f8bc5c87f26/CS2AI-EP-112-Audio-converted.mp3" length="56174904" type="audio/mpeg"/><itunes:duration>46:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>112</itunes:episode><podcast:episode>112</podcast:episode></item><item><title>111: From Scrubbing Hard Drives to Securing the Future: Max&apos;s Journey in Cybersecurity</title><itunes:title>111: From Scrubbing Hard Drives to Securing the Future: Max&apos;s Journey in Cybersecurity</itunes:title><description><![CDATA[<p>We are thrilled to have Max Aulakh, the Founder and CEO of Ignyte Assurance Platform, joining us today.&nbsp;</p><p>Max is a military veteran and motorcycle enthusiast who enjoys doing voluntary work. He is a prolific contributor to the cybersecurity community, always willing to be of service to others. When Max was three, his father applied for American citizenship at the US Embassy in India. It was an extremely long process, and after losing all hope, he and his family finally migrated to Oklahoma a decade later.&nbsp;</p><p>Join us to learn how Max transitioned from the military to founding the successful Ignyte Assurance Platform. He also shares his views on regulations, discusses how AI has impacted the security field, and offers prudent and practical advice for anyone interested in pursuing a cybersecurity career.&nbsp;</p><p>Stay tuned for today’s candid and fascinating interview with Max Aulakh, the Founder and CEO of Ignyte.</p><p><strong>Show highlights:</strong></p><ul><li>How Max’s military experience led to his career in security</li><li>Max’s Air Force mentor encouraged voluntary service.</li><li>How working with the Department of Treasury, scrubbing hard drives, led to Max’s interest in security.</li><li>Max explains how his military experience instilled a service mindset beneficial for security roles.</li><li>While in service, he attended the American Military University due to its flexible programs for deployed personnel.</li><li>The challenges he faced transitioning from a services company to a product-based company</li><li>Max shares how he launched Ignyte in 2019/2020</li><li>How Max assists companies with the Cybersecurity Maturity Model, particularly in thedefense sector.</li><li>Why standardization and testing are essential in operational technology</li><li>Max shares his views on the potential of AI</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.ignyteplatform.com/" rel="noopener noreferrer" target="_blank">Ignyte Assurance Platform</a></p><p>Max Aulakh on&nbsp;<a href="https://www.linkedin.com/in/maxaulakh/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>We are thrilled to have Max Aulakh, the Founder and CEO of Ignyte Assurance Platform, joining us today.&nbsp;</p><p>Max is a military veteran and motorcycle enthusiast who enjoys doing voluntary work. He is a prolific contributor to the cybersecurity community, always willing to be of service to others. When Max was three, his father applied for American citizenship at the US Embassy in India. It was an extremely long process, and after losing all hope, he and his family finally migrated to Oklahoma a decade later.&nbsp;</p><p>Join us to learn how Max transitioned from the military to founding the successful Ignyte Assurance Platform. He also shares his views on regulations, discusses how AI has impacted the security field, and offers prudent and practical advice for anyone interested in pursuing a cybersecurity career.&nbsp;</p><p>Stay tuned for today’s candid and fascinating interview with Max Aulakh, the Founder and CEO of Ignyte.</p><p><strong>Show highlights:</strong></p><ul><li>How Max’s military experience led to his career in security</li><li>Max’s Air Force mentor encouraged voluntary service.</li><li>How working with the Department of Treasury, scrubbing hard drives, led to Max’s interest in security.</li><li>Max explains how his military experience instilled a service mindset beneficial for security roles.</li><li>While in service, he attended the American Military University due to its flexible programs for deployed personnel.</li><li>The challenges he faced transitioning from a services company to a product-based company</li><li>Max shares how he launched Ignyte in 2019/2020</li><li>How Max assists companies with the Cybersecurity Maturity Model, particularly in thedefense sector.</li><li>Why standardization and testing are essential in operational technology</li><li>Max shares his views on the potential of AI</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.ignyteplatform.com/" rel="noopener noreferrer" target="_blank">Ignyte Assurance Platform</a></p><p>Max Aulakh on&nbsp;<a href="https://www.linkedin.com/in/maxaulakh/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">f98d2429-c6d1-464c-8cff-e9b0f24f22d2</guid><itunes:image href="https://artwork.captivate.fm/e0de2377-62d6-40e6-be88-5cb9648cfc78/TswTanwqkjroqh6eueNNuNjS.jpg"/><pubDate>Tue, 28 May 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ad541bfc-8283-4fb4-b7dc-2a6899a11c74/CS2AI-EP-111-Audio-converted.mp3" length="43247052" type="audio/mpeg"/><itunes:duration>36:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>111</itunes:episode><podcast:episode>111</podcast:episode></item><item><title>110: Global Cybersecurity Insights with Mike Holcomb</title><itunes:title>110: Global Cybersecurity Insights with Mike Holcomb</itunes:title><description><![CDATA[<p>We are delighted to have Mike Holcomb joining us on the show today.</p><p>Mike is both a fellow and a cybersecurity director, and he currently serves as the ICS OT Cybersecurity Global Lead at Fluor, a massive multinational engineering and construction firm with over 40,000 employees. He has participated in many major building projects, and we are excited to learn from his extensive experience today.&nbsp;</p><p>Stay tuned as Mike shares his insights and expertise.</p><p><strong>Show Highlights:</strong></p><ul><li>Mike discusses the two years he spent in China building bowling alleys</li><li>Mike talks about his time teaching and consulting at a training company in San Diego</li><li>How Mike had the opportunity to double his salary and work with the Navy SEALs during 9/11</li><li>Mike discusses his experience working in IT security</li><li>Mike explains that Fluor has built some of the largest control system environments in the world&nbsp;</li><li>Mike discusses challenges in the energy sector</li><li>How regulations impact cybersecurity in various industries</li><li>Why cybersecurity regulations are essential within critical infrastructure</li><li>Mike discusses the challenge of aligning IT and OT cybersecurity teams&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.bridewell.com/" rel="noopener noreferrer" target="_blank">Bridewell</a></p><p>Michael Holcomb on&nbsp;<a href="https://www.linkedin.com/in/mikeholcomb/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.fluor.com/" rel="noopener noreferrer" target="_blank">Fluor</a></p>]]></description><content:encoded><![CDATA[<p>We are delighted to have Mike Holcomb joining us on the show today.</p><p>Mike is both a fellow and a cybersecurity director, and he currently serves as the ICS OT Cybersecurity Global Lead at Fluor, a massive multinational engineering and construction firm with over 40,000 employees. He has participated in many major building projects, and we are excited to learn from his extensive experience today.&nbsp;</p><p>Stay tuned as Mike shares his insights and expertise.</p><p><strong>Show Highlights:</strong></p><ul><li>Mike discusses the two years he spent in China building bowling alleys</li><li>Mike talks about his time teaching and consulting at a training company in San Diego</li><li>How Mike had the opportunity to double his salary and work with the Navy SEALs during 9/11</li><li>Mike discusses his experience working in IT security</li><li>Mike explains that Fluor has built some of the largest control system environments in the world&nbsp;</li><li>Mike discusses challenges in the energy sector</li><li>How regulations impact cybersecurity in various industries</li><li>Why cybersecurity regulations are essential within critical infrastructure</li><li>Mike discusses the challenge of aligning IT and OT cybersecurity teams&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.bridewell.com/" rel="noopener noreferrer" target="_blank">Bridewell</a></p><p>Michael Holcomb on&nbsp;<a href="https://www.linkedin.com/in/mikeholcomb/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.fluor.com/" rel="noopener noreferrer" target="_blank">Fluor</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">29627557-34c9-47be-8517-8ff3fb8ccbb5</guid><itunes:image href="https://artwork.captivate.fm/855fc79c-e528-4cc2-9f87-ad54fdaef7eb/5nrw9Ktp_aHFsz3fxLzkXF7X.jpg"/><pubDate>Tue, 21 May 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/55f0df0e-be8d-462c-b6dc-90aebb9bea06/CS2AI-Episode-110-v3-Audio.mp3" length="73446357" type="audio/mpeg"/><itunes:duration>50:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>110</itunes:episode><podcast:episode>110</podcast:episode></item><item><title>109: Teaser for the CNI Research Report with Chase Richardson</title><itunes:title>109: Teaser for the CNI Research Report with Chase Richardson</itunes:title><description><![CDATA[<p>We are delighted to have Chase Richardson, the VP of Consulting at Bridewell, back on the show today.&nbsp;</p><p>Bridewell boasts a rich history in industrials, offering comprehensive cybersecurity services across the entire cybersecurity spectrum, including operating technology.&nbsp;</p><p>Recently, Bridewell came up with an insightful report on cybersecurity within the US critical infrastructure.&nbsp;In this episode, Chase dives into the current state of cybersecurity regulations in critical infrastructure and shares the details and origin of the upcoming Bridewell report, which falls squarely within the interest of CSAI.&nbsp;</p><p>Tune in to learn more about this exciting project.</p><p><strong>Show highlights:</strong></p><ul><li>How the attacks experienced by CISOs and cyber managers have decreased despite an increase in risk sentiment&nbsp;</li><li>The challenges small and mid-sized airports face when implementing regulations due to their limited cybersecurity budgets</li><li>How cybersecurity regulations in the US differ from those in the UK</li><li>What is the link between IT and OT security?</li><li>Why it is essential to implement a hybrid of IT and OT security measures to protect critical infrastructure</li><li>Why organizations need to comply with relevant cybersecurity standards and regulations</li><li>Chase shares key findings and insights from&nbsp;Bridewell's&nbsp;upcoming cybersecurity report for critical infrastructure.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.bridewell.com/" rel="noopener noreferrer" target="_blank">Bridewell</a></p><p>Chase Richardson on&nbsp;<a href="https://www.linkedin.com/in/chaserichardsonmba/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>We are delighted to have Chase Richardson, the VP of Consulting at Bridewell, back on the show today.&nbsp;</p><p>Bridewell boasts a rich history in industrials, offering comprehensive cybersecurity services across the entire cybersecurity spectrum, including operating technology.&nbsp;</p><p>Recently, Bridewell came up with an insightful report on cybersecurity within the US critical infrastructure.&nbsp;In this episode, Chase dives into the current state of cybersecurity regulations in critical infrastructure and shares the details and origin of the upcoming Bridewell report, which falls squarely within the interest of CSAI.&nbsp;</p><p>Tune in to learn more about this exciting project.</p><p><strong>Show highlights:</strong></p><ul><li>How the attacks experienced by CISOs and cyber managers have decreased despite an increase in risk sentiment&nbsp;</li><li>The challenges small and mid-sized airports face when implementing regulations due to their limited cybersecurity budgets</li><li>How cybersecurity regulations in the US differ from those in the UK</li><li>What is the link between IT and OT security?</li><li>Why it is essential to implement a hybrid of IT and OT security measures to protect critical infrastructure</li><li>Why organizations need to comply with relevant cybersecurity standards and regulations</li><li>Chase shares key findings and insights from&nbsp;Bridewell's&nbsp;upcoming cybersecurity report for critical infrastructure.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.bridewell.com/" rel="noopener noreferrer" target="_blank">Bridewell</a></p><p>Chase Richardson on&nbsp;<a href="https://www.linkedin.com/in/chaserichardsonmba/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">9251ca91-3026-47ea-93ca-4ef990f7ef03</guid><itunes:image href="https://artwork.captivate.fm/b69f8d41-2e98-4beb-8a6d-3bf2e170dda3/wZE_lGeZFa07lVH7-RAGhAk6.jpg"/><pubDate>Tue, 14 May 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/37cad69c-df4a-46f2-9bdc-21ee94bbcd51/CS2AI-Episode-109-Audio-converted.mp3" length="21841919" type="audio/mpeg"/><itunes:duration>18:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>109</itunes:episode><podcast:episode>109</podcast:episode></item><item><title>108: Mastering Data Complexity: Insights from Chase Richardson and Martin Riley on OT Integration</title><itunes:title>108: Mastering Data Complexity: Insights from Chase Richardson and Martin Riley on OT Integration</itunes:title><description><![CDATA[<p>We are delighted to have Chase Richardson, Head of US Operations for Bridewell, and Martin Riley, Director of Managed Services for Bridewell, joining us today!</p><p>We are changing things slightly for this episode, with Martin and Chase diving into how to integrate OT systems into your sim rather than presenting our regular biographical format. Their focus today is predominantly on the increasingly relevant topic of managing data across diverse platforms, particularly in OT applications.&nbsp;</p><p>Join us as we explore this integration and unravel the challenges it presents.</p><p><strong>Show highlights:</strong></p><ul><li>The evolution of cybersecurity technology</li><li>How the industry struggles with integrating IoT and OT data into security sims</li><li>Why integrating separate systems into one platform is crucial for security teams </li><li>How security and operational technology leadership teams converge</li><li>Why hybrid teams are essential for managing cybersecurity risks</li><li>The importance of asset visibility and understanding the architecture for effectively implementing security solutions </li><li>How AI and machine learning can help to reduce noise in security operations</li><li>Why threat intelligence is essential for business risk and control validation</li><li>The importance of threat intelligence in the cybersecurity industry</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Chase Richardson on&nbsp;<a href="https://www.linkedin.com/in/chaserichardsonmba/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Martin Riley on&nbsp;<a href="https://www.linkedin.com/in/martinariley/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.bridewell.com/" rel="noopener noreferrer" target="_blank">Bridewell</a></p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>We are delighted to have Chase Richardson, Head of US Operations for Bridewell, and Martin Riley, Director of Managed Services for Bridewell, joining us today!</p><p>We are changing things slightly for this episode, with Martin and Chase diving into how to integrate OT systems into your sim rather than presenting our regular biographical format. Their focus today is predominantly on the increasingly relevant topic of managing data across diverse platforms, particularly in OT applications.&nbsp;</p><p>Join us as we explore this integration and unravel the challenges it presents.</p><p><strong>Show highlights:</strong></p><ul><li>The evolution of cybersecurity technology</li><li>How the industry struggles with integrating IoT and OT data into security sims</li><li>Why integrating separate systems into one platform is crucial for security teams </li><li>How security and operational technology leadership teams converge</li><li>Why hybrid teams are essential for managing cybersecurity risks</li><li>The importance of asset visibility and understanding the architecture for effectively implementing security solutions </li><li>How AI and machine learning can help to reduce noise in security operations</li><li>Why threat intelligence is essential for business risk and control validation</li><li>The importance of threat intelligence in the cybersecurity industry</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Chase Richardson on&nbsp;<a href="https://www.linkedin.com/in/chaserichardsonmba/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Martin Riley on&nbsp;<a href="https://www.linkedin.com/in/martinariley/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.bridewell.com/" rel="noopener noreferrer" target="_blank">Bridewell</a></p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">77ac351e-7fd0-48ae-b222-18c90b512f0e</guid><itunes:image href="https://artwork.captivate.fm/c8fb5dd9-6f1b-4ea0-9c1c-a69fa5912cd4/ZSn2oO1BzVAqy9syQ5EDwQVh.jpg"/><pubDate>Tue, 20 Feb 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/caaffc36-463b-431b-9a6e-27f82efc4571/CS2AI-Episode-108-Audio.mp3" length="59213877" type="audio/mpeg"/><itunes:duration>49:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>108</itunes:episode><podcast:episode>108</podcast:episode></item><item><title>107: Keeping the Lights On: Carlos&apos;s Roadmap to Becoming an Energy Cybersecurity Pro</title><itunes:title>107: Keeping the Lights On: Carlos&apos;s Roadmap to Becoming an Energy Cybersecurity Pro</itunes:title><description><![CDATA[<p>We are thrilled to welcome Juan Carlos Buenano as our distinguished guest for today’s episode of the CS2AI podcast!&nbsp;</p><p>Carlos is the Chief Technology Officer for OT at Armis. He is a born technologist and an engineer by training. Beyond his professional endeavors, he embraces a life filled with adventure, enjoying many outdoor activities, including scuba diving, mountain biking, and exploring the scenic expanses of unspoiled nature.&nbsp;</p><p>Carlos was born in Venezuela and grew up in a small town outside Caracas. After graduating as an electronic engineer in Venezuela, he traveled to Australia to learn English, fell in love with the country, the lifestyle, and the nature, and has lived there for the last 23 years.</p><p>Carlos brings a unique perspective to today’s show, shaped by his professional and personal experiences. Join us for an engaging discussion as he shares his wealth of experiences and insights and explains how he serves his community.</p><p><strong>Show Highlights:</strong></p><ul><li>Carlos shares his journey to becoming an engineer in the energy industry</li><li>How his interest in control systems began</li><li>Carlos recounts his early cybersecurity experiences in industrial systems during the early 2000s</li><li>The importance of keeping operating systems up to date to prevent vulnerabilities and ensure reliability</li><li>Why it is essential to understand how technology works in both physical security and cybersecurity</li><li>Carlos discusses the challenges of integrating cybersecurity into process control systems</li><li>Carlos offers advice for engineers who want to get into cybersecurity</li><li>The importance of mentorship and learning from others in their industry</li><li>Carlos discusses the weekly open mic Ask Me Anything sessions he does at work</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.linkedin.com/in/juan-carlos-b-53bb00a/" rel="noopener noreferrer" target="_blank">Carlos Buenano on LinkedIn</a></p><p><a href="https://www.armis.com/" rel="noopener noreferrer" target="_blank">Armis</a></p>]]></description><content:encoded><![CDATA[<p>We are thrilled to welcome Juan Carlos Buenano as our distinguished guest for today’s episode of the CS2AI podcast!&nbsp;</p><p>Carlos is the Chief Technology Officer for OT at Armis. He is a born technologist and an engineer by training. Beyond his professional endeavors, he embraces a life filled with adventure, enjoying many outdoor activities, including scuba diving, mountain biking, and exploring the scenic expanses of unspoiled nature.&nbsp;</p><p>Carlos was born in Venezuela and grew up in a small town outside Caracas. After graduating as an electronic engineer in Venezuela, he traveled to Australia to learn English, fell in love with the country, the lifestyle, and the nature, and has lived there for the last 23 years.</p><p>Carlos brings a unique perspective to today’s show, shaped by his professional and personal experiences. Join us for an engaging discussion as he shares his wealth of experiences and insights and explains how he serves his community.</p><p><strong>Show Highlights:</strong></p><ul><li>Carlos shares his journey to becoming an engineer in the energy industry</li><li>How his interest in control systems began</li><li>Carlos recounts his early cybersecurity experiences in industrial systems during the early 2000s</li><li>The importance of keeping operating systems up to date to prevent vulnerabilities and ensure reliability</li><li>Why it is essential to understand how technology works in both physical security and cybersecurity</li><li>Carlos discusses the challenges of integrating cybersecurity into process control systems</li><li>Carlos offers advice for engineers who want to get into cybersecurity</li><li>The importance of mentorship and learning from others in their industry</li><li>Carlos discusses the weekly open mic Ask Me Anything sessions he does at work</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.linkedin.com/in/juan-carlos-b-53bb00a/" rel="noopener noreferrer" target="_blank">Carlos Buenano on LinkedIn</a></p><p><a href="https://www.armis.com/" rel="noopener noreferrer" target="_blank">Armis</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">ece0d4ae-f5c5-4053-a042-92091f057f8e</guid><itunes:image href="https://artwork.captivate.fm/308f06e9-8151-47ec-b444-cb41336f3bf6/SY-ZwWGMh4Ufs9Zpx7ZBprVf.jpg"/><pubDate>Tue, 06 Feb 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ae35a707-00d2-4271-81c8-edc4ee5ae96f/CS2AI-Episode-107-Audio-converted.mp3" length="49886892" type="audio/mpeg"/><itunes:duration>41:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>107</itunes:episode><podcast:episode>107</podcast:episode></item><item><title>106: Top Gun Meets the Cloud: Ken&apos;s Guide to Keeping Your Airplanes (and Data) Safe</title><itunes:title>106: Top Gun Meets the Cloud: Ken&apos;s Guide to Keeping Your Airplanes (and Data) Safe</itunes:title><description><![CDATA[<p>We are delighted to have Ken Munro joining us from the UK today!&nbsp;</p><p>Ken is a Partner and Co-founder of Pen Test Partners. He is a seasoned technologist, the founder of multiple ventures, a pilot, a skier, and a dynamic and adventurous contributor to our community.&nbsp;</p><p>Ken brings a wealth of experience and expertise that promises to enrich our understanding of the evolving landscape in cybersecurity. In today's discussion, we dive into his remarkable career journey and explore his perspective on OT and ICS-related cybersecurity.</p><p>Join us for this informative session with Ken as he shares his valuable perspectives.</p><p><strong>Show Highlights:</strong></p><ul><li>Ken discusses his cybersecurity industry journey</li><li>How Ken’s past Air Force experience relates to his current work in cybersecurity</li><li>The benefits of telling a story when communicating complex concepts</li><li>Ken shares a story to highlight the importance of safety and security within the aviation industry</li><li>Ken talks about the unique systems on board planes and their vulnerabilities</li><li>How the isolated protocols used in older aircraft systems are more robust and stable than the modern systems</li><li>How even simple display systems can cause airport outages</li><li>Ken shares his concerns about cybersecurity risks within cloud management platforms for industrial control systems</li><li>How including contractual language for liability in procurement contracts can protect organizations against cybersecurity risks</li><li>Ken shares his thoughts on the future of the cybersecurity industry</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Ken Munro on&nbsp;<a href="https://www.linkedin.com/in/ken-munro-17899b1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.pentestpartners.com/" rel="noopener noreferrer" target="_blank">Pen TestPartners</a></p>]]></description><content:encoded><![CDATA[<p>We are delighted to have Ken Munro joining us from the UK today!&nbsp;</p><p>Ken is a Partner and Co-founder of Pen Test Partners. He is a seasoned technologist, the founder of multiple ventures, a pilot, a skier, and a dynamic and adventurous contributor to our community.&nbsp;</p><p>Ken brings a wealth of experience and expertise that promises to enrich our understanding of the evolving landscape in cybersecurity. In today's discussion, we dive into his remarkable career journey and explore his perspective on OT and ICS-related cybersecurity.</p><p>Join us for this informative session with Ken as he shares his valuable perspectives.</p><p><strong>Show Highlights:</strong></p><ul><li>Ken discusses his cybersecurity industry journey</li><li>How Ken’s past Air Force experience relates to his current work in cybersecurity</li><li>The benefits of telling a story when communicating complex concepts</li><li>Ken shares a story to highlight the importance of safety and security within the aviation industry</li><li>Ken talks about the unique systems on board planes and their vulnerabilities</li><li>How the isolated protocols used in older aircraft systems are more robust and stable than the modern systems</li><li>How even simple display systems can cause airport outages</li><li>Ken shares his concerns about cybersecurity risks within cloud management platforms for industrial control systems</li><li>How including contractual language for liability in procurement contracts can protect organizations against cybersecurity risks</li><li>Ken shares his thoughts on the future of the cybersecurity industry</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Ken Munro on&nbsp;<a href="https://www.linkedin.com/in/ken-munro-17899b1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.pentestpartners.com/" rel="noopener noreferrer" target="_blank">Pen TestPartners</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">273f7c39-ab27-4806-b1e2-7eec8a34b7d6</guid><itunes:image href="https://artwork.captivate.fm/91c00e32-a9e1-4c15-9939-b26ee96f2a67/4K2zRdYvseu10AoD54G12Rwc.jpg"/><pubDate>Thu, 01 Feb 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/31bb60ae-b7d2-4716-a135-c4056f7e3710/CS2AI-Episode-106-v1-Audio-converted.mp3" length="50512248" type="audio/mpeg"/><itunes:duration>42:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>106</itunes:episode><podcast:episode>106</podcast:episode></item><item><title>105: Beyond Boundaries: Unveiling the Multifaceted World of Michelle Balderson</title><itunes:title>105: Beyond Boundaries: Unveiling the Multifaceted World of Michelle Balderson</itunes:title><description><![CDATA[<p>We are excited to bring you another captivating industry leader interview today.&nbsp;&nbsp;</p><p>In this episode, we interview Michelle Balderson, the Principal Security Architect at Issquared. Michelle is a seasoned professional. In addition to having extensive experience as an established contributor and leader within the industry, she is a technologist, devoted mother, wife, chef, and a true jack of all trades. Beyond her contributions to the industry, Michelle finds joy in the great outdoors, whether she is conquering hiking trails, setting up camp, or enjoying four-by-four adventures.&nbsp;</p><p>In our discussion today, Michelle talks about her personal and professional journey, sharing insights she gained along the way and shedding light on the path that brought her to where she is in her current role as a security specialist.</p><p>Join us as we dive into the rich reservoir of wisdom and experience that Michelle brings to the table.</p><p><strong>Show Highlights:</strong></p><ul><li>How moving around a lot while growing up allowed Michelle to develop an excellent rapport with others</li><li>Michelle describes her first experience with technology</li><li>Michelle shares her experience of working at Fortinet and SonicWALL</li><li>Work opportunities within the OT security space</li><li>Why a more holistic approach to security is needed</li><li>The importance of changing the culture within businesses to bridge the gap between different domains&nbsp;</li><li>How empathy and active listening can drive business success</li><li>Michelle discusses her role at Issquared</li><li>Michelle shares the advice she would give to her younger self</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Michelle Balderson on&nbsp;<a href="https://www.linkedin.com/in/michelle-balderson-34498a13/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.issquaredinc.com/" rel="noopener noreferrer" target="_blank">ISSQUARED Inc.</a></p>]]></description><content:encoded><![CDATA[<p>We are excited to bring you another captivating industry leader interview today.&nbsp;&nbsp;</p><p>In this episode, we interview Michelle Balderson, the Principal Security Architect at Issquared. Michelle is a seasoned professional. In addition to having extensive experience as an established contributor and leader within the industry, she is a technologist, devoted mother, wife, chef, and a true jack of all trades. Beyond her contributions to the industry, Michelle finds joy in the great outdoors, whether she is conquering hiking trails, setting up camp, or enjoying four-by-four adventures.&nbsp;</p><p>In our discussion today, Michelle talks about her personal and professional journey, sharing insights she gained along the way and shedding light on the path that brought her to where she is in her current role as a security specialist.</p><p>Join us as we dive into the rich reservoir of wisdom and experience that Michelle brings to the table.</p><p><strong>Show Highlights:</strong></p><ul><li>How moving around a lot while growing up allowed Michelle to develop an excellent rapport with others</li><li>Michelle describes her first experience with technology</li><li>Michelle shares her experience of working at Fortinet and SonicWALL</li><li>Work opportunities within the OT security space</li><li>Why a more holistic approach to security is needed</li><li>The importance of changing the culture within businesses to bridge the gap between different domains&nbsp;</li><li>How empathy and active listening can drive business success</li><li>Michelle discusses her role at Issquared</li><li>Michelle shares the advice she would give to her younger self</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Michelle Balderson on&nbsp;<a href="https://www.linkedin.com/in/michelle-balderson-34498a13/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.issquaredinc.com/" rel="noopener noreferrer" target="_blank">ISSQUARED Inc.</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">4fe51161-2e07-46a2-8669-bbc3a3bd5130</guid><itunes:image href="https://artwork.captivate.fm/7d1470c5-77b9-43a6-81f4-afaa2edba77a/yCagciz33drd24vZlIYjk1iZ.jpg"/><pubDate>Tue, 16 Jan 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/aa28f024-1e22-41e7-bbe8-dc21a0932da9/CS2AI-Episode-105-Audio-converted.mp3" length="55901898" type="audio/mpeg"/><itunes:duration>46:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>105</itunes:episode><podcast:episode>105</podcast:episode></item><item><title>104: Author Spotlight™ - An Interview with Andrew Ginter, Author of Engineering-Grade OT Security: A Guide for Managers</title><itunes:title>104: Author Spotlight™ - An Interview with Andrew Ginter, Author of Engineering-Grade OT Security: A Guide for Managers</itunes:title><description><![CDATA[<p>Today, we are bringing you a fresh, new format called the Author Spotlight, where we focus on the authors within our community.&nbsp;</p><p>We are delighted to launch the Author Spotlight by shining our light on Andrew Ginter, the VP of Industrial Security at Waterfall Security Solutions. Andrew has been a steadfast CS2AI supporter since its inception, dedicating considerable time to CS2AI initiatives, and Waterfall is one of our oldest sponsors.&nbsp;</p><p>We are grateful to Andrew for generously sharing his insights and all the invaluable contributions he and his company, Waterfall, have made. Andrew's offerings include editing, reading, and committing much of his time to community projects.&nbsp; </p><p>Join us today as we explore Andrew's wealth of wisdom and experience.</p><p><strong>Show Highlights</strong></p><ul><li>Andrew reflects on his writing process and discusses his new book, The Golden Black Book.</li><li>Andrew talks about a new approach of combining cybersecurity and engineering to manage risk.</li><li>How Andrew structured his book for a mixed audience of engineers and managers</li><li>The importance of using mathematical modeling when making cybersecurity decisions rather than relying on intuition or guesswork</li><li>Andrew highlights the lack of cybersecurity expertise within industrial settings.</li><li>How complex risks have created the need for a multi-faceted approach to cybersecurity</li><li>Andrew emphasizes the importance of security by design within product development.</li><li>Why it’s essential to understand the broader definition of vulnerability&nbsp;</li><li>Andrew discusses the challenges of writing a book on industrial cybersecurity</li></ul><br/><p>&nbsp;<strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Andrew Ginter on&nbsp;<a href="https://www.linkedin.com/in/andrewginter/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://waterfall-security.com/" rel="noopener noreferrer" target="_blank">WaterfallSecurity</a></p>]]></description><content:encoded><![CDATA[<p>Today, we are bringing you a fresh, new format called the Author Spotlight, where we focus on the authors within our community.&nbsp;</p><p>We are delighted to launch the Author Spotlight by shining our light on Andrew Ginter, the VP of Industrial Security at Waterfall Security Solutions. Andrew has been a steadfast CS2AI supporter since its inception, dedicating considerable time to CS2AI initiatives, and Waterfall is one of our oldest sponsors.&nbsp;</p><p>We are grateful to Andrew for generously sharing his insights and all the invaluable contributions he and his company, Waterfall, have made. Andrew's offerings include editing, reading, and committing much of his time to community projects.&nbsp; </p><p>Join us today as we explore Andrew's wealth of wisdom and experience.</p><p><strong>Show Highlights</strong></p><ul><li>Andrew reflects on his writing process and discusses his new book, The Golden Black Book.</li><li>Andrew talks about a new approach of combining cybersecurity and engineering to manage risk.</li><li>How Andrew structured his book for a mixed audience of engineers and managers</li><li>The importance of using mathematical modeling when making cybersecurity decisions rather than relying on intuition or guesswork</li><li>Andrew highlights the lack of cybersecurity expertise within industrial settings.</li><li>How complex risks have created the need for a multi-faceted approach to cybersecurity</li><li>Andrew emphasizes the importance of security by design within product development.</li><li>Why it’s essential to understand the broader definition of vulnerability&nbsp;</li><li>Andrew discusses the challenges of writing a book on industrial cybersecurity</li></ul><br/><p>&nbsp;<strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Andrew Ginter on&nbsp;<a href="https://www.linkedin.com/in/andrewginter/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://waterfall-security.com/" rel="noopener noreferrer" target="_blank">WaterfallSecurity</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">679ac697-6ef2-423c-8371-2ad474e9dcdd</guid><itunes:image href="https://artwork.captivate.fm/46f8edfd-115a-4ad1-9308-0cd79d044d59/DR7RMmX2nEPIMxFioPqrIwkV.jpg"/><pubDate>Tue, 05 Dec 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/25077bdf-74b5-4ce3-afc2-51a03f239d7a/CS2AI-Episode-104-Audio-converted.mp3" length="81831726" type="audio/mpeg"/><itunes:duration>01:08:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>104</itunes:episode><podcast:episode>104</podcast:episode></item><item><title>103: Diving into the Multifaceted World of Ron Fabela: From Cybersecurity Leadership to Goat Herding and Beyond</title><itunes:title>103: Diving into the Multifaceted World of Ron Fabela: From Cybersecurity Leadership to Goat Herding and Beyond</itunes:title><description><![CDATA[<p>We are thrilled to have another exceptional guest on the show today!</p><p>Ron Fabela is the Field Chief Technology Officer at Xona. He is a multifaceted individual who has been a stalwart contributor to the industry for many years. His impressive resume includes being an Industrial Security champion, a military veteran, and a technologist. Beyond his professional achievements, Ron is also a founder, a father, a husband, an astronomy expert interested in anything space-related, and, believe it or not, a goat herder.&nbsp;</p><p>Ron has had a wealth of experiences, making him an all-around fascinating guest. Get ready for a long-overdue and truly insightful discussion with Ron Fabela!</p><p><strong>Show highlights:</strong></p><ul><li>How Ron’s interest in technology began</li><li>Ron discusses his career in the military and talks about his cybersecurity training</li><li>Ron offers advice for young people&nbsp;</li><li>The benefits of working for large organizations, doing internships, and doing volunteer work</li><li>How Ron progressed in his cybersecurity career</li><li>Why no opportunity for exposure to systems and networks should ever get squandered</li><li>How Ron’s military experience shaped his approach to work</li><li>Ron shares insights on the challenges of consulting</li><li>The importance of having hobbies and passions outside of work</li><li>Ron talks about his role as a Field CTO</li><li>How the control systems cybersecurity industry has evolved</li><li>Why it is essential to persevere with projects, even when facing challenges or the progress is slow&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Ron Fabela on&nbsp;<a href="https://www.linkedin.com/in/ronniefabela/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.xonasystems.com/" rel="noopener noreferrer" target="_blank">Xona</a></p>]]></description><content:encoded><![CDATA[<p>We are thrilled to have another exceptional guest on the show today!</p><p>Ron Fabela is the Field Chief Technology Officer at Xona. He is a multifaceted individual who has been a stalwart contributor to the industry for many years. His impressive resume includes being an Industrial Security champion, a military veteran, and a technologist. Beyond his professional achievements, Ron is also a founder, a father, a husband, an astronomy expert interested in anything space-related, and, believe it or not, a goat herder.&nbsp;</p><p>Ron has had a wealth of experiences, making him an all-around fascinating guest. Get ready for a long-overdue and truly insightful discussion with Ron Fabela!</p><p><strong>Show highlights:</strong></p><ul><li>How Ron’s interest in technology began</li><li>Ron discusses his career in the military and talks about his cybersecurity training</li><li>Ron offers advice for young people&nbsp;</li><li>The benefits of working for large organizations, doing internships, and doing volunteer work</li><li>How Ron progressed in his cybersecurity career</li><li>Why no opportunity for exposure to systems and networks should ever get squandered</li><li>How Ron’s military experience shaped his approach to work</li><li>Ron shares insights on the challenges of consulting</li><li>The importance of having hobbies and passions outside of work</li><li>Ron talks about his role as a Field CTO</li><li>How the control systems cybersecurity industry has evolved</li><li>Why it is essential to persevere with projects, even when facing challenges or the progress is slow&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Ron Fabela on&nbsp;<a href="https://www.linkedin.com/in/ronniefabela/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.xonasystems.com/" rel="noopener noreferrer" target="_blank">Xona</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">d3eaabb4-dddd-4e4a-bd64-a3b64a70386d</guid><itunes:image href="https://artwork.captivate.fm/46cff634-394d-4e14-bd63-49089b4964cc/y1YE5Zw3l3B5ZF45ViQLVgPE.jpg"/><pubDate>Tue, 28 Nov 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/897f3543-c8e4-49a0-a344-28b4c0c37db4/CS2AI-103-Edited-Audio-converted.mp3" length="55501001" type="audio/mpeg"/><itunes:duration>46:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>103</itunes:episode><podcast:episode>103</podcast:episode></item><item><title>102: Unveiling the Multifaceted Brilliance: A Dive into the World of Bill Lawrence</title><itunes:title>102: Unveiling the Multifaceted Brilliance: A Dive into the World of Bill Lawrence</itunes:title><description><![CDATA[<p>We are delighted to have Bill Lawrence, the Chief Delivery Officer at Itegriti Corporation, joining us on the podcast today!&nbsp;</p><p>For those unfamiliar with Bill, he is a well-rounded and multifaceted individual. He is a technologist, artist, and a loving father and husband, in addition to being a talented singer, Navy veteran, and pilot.</p><p>Bill is known in the industry for his many achievements. In today’s conversation, we unveil the various layers of his experiences and perspectives, and he shares insights into the unique facets that have defined his professional and personal journey.&nbsp;</p><p>Stay tuned as we delve into the steps and milestones that have shaped Bill’s dynamic career!</p><p><strong>Show highlights:</strong></p><ul><li>How Bill started programming in the fourth or fifth grade</li><li>How a movie inspire him to join the military</li><li>Bill shares some of his exciting fighter pilot experiences&nbsp;</li><li>Bill’s Naval Academy experiences included computer science studies and exposure to cybersecurity</li><li>Bill reflects on teaching cybersecurity at the Naval Academy </li><li>How he transitioned in his career after quitting the Naval Academy&nbsp;</li><li>Bill discusses his time spent as a project manager at NERC</li><li>How Grid X evolved and grew</li><li>Cybersecurity and compliance within the energy industry</li><li>The importance of reading books and applying them to life to make a positive impact</li><li>Why Bill finds quantum computing and AI exciting prospects&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Bill Lawrence on&nbsp;<a href="https://www.linkedin.com/in/wlawrence1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://itegriti.com/" rel="noopener noreferrer" target="_blank">ItegritiCorporation</a></p><p><strong>Books mentioned:</strong></p><p>The Ideal Team Player by Patrick Lencioni&nbsp;</p><p>How to Be Perfect by Michael Perry</p>]]></description><content:encoded><![CDATA[<p>We are delighted to have Bill Lawrence, the Chief Delivery Officer at Itegriti Corporation, joining us on the podcast today!&nbsp;</p><p>For those unfamiliar with Bill, he is a well-rounded and multifaceted individual. He is a technologist, artist, and a loving father and husband, in addition to being a talented singer, Navy veteran, and pilot.</p><p>Bill is known in the industry for his many achievements. In today’s conversation, we unveil the various layers of his experiences and perspectives, and he shares insights into the unique facets that have defined his professional and personal journey.&nbsp;</p><p>Stay tuned as we delve into the steps and milestones that have shaped Bill’s dynamic career!</p><p><strong>Show highlights:</strong></p><ul><li>How Bill started programming in the fourth or fifth grade</li><li>How a movie inspire him to join the military</li><li>Bill shares some of his exciting fighter pilot experiences&nbsp;</li><li>Bill’s Naval Academy experiences included computer science studies and exposure to cybersecurity</li><li>Bill reflects on teaching cybersecurity at the Naval Academy </li><li>How he transitioned in his career after quitting the Naval Academy&nbsp;</li><li>Bill discusses his time spent as a project manager at NERC</li><li>How Grid X evolved and grew</li><li>Cybersecurity and compliance within the energy industry</li><li>The importance of reading books and applying them to life to make a positive impact</li><li>Why Bill finds quantum computing and AI exciting prospects&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Bill Lawrence on&nbsp;<a href="https://www.linkedin.com/in/wlawrence1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://itegriti.com/" rel="noopener noreferrer" target="_blank">ItegritiCorporation</a></p><p><strong>Books mentioned:</strong></p><p>The Ideal Team Player by Patrick Lencioni&nbsp;</p><p>How to Be Perfect by Michael Perry</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">9d0e6821-fd0a-4722-9d4c-d99c71123f9a</guid><itunes:image href="https://artwork.captivate.fm/75644df2-bad2-4d0a-bc88-997f53a873c4/MUaTLJTJsKHG-hyROF0fAcRY.jpg"/><pubDate>Tue, 14 Nov 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bc1629cf-af68-493f-9e6c-be50001addb0/CS2AI-Episode-102.mp3" length="53331242" type="audio/mpeg"/><itunes:duration>44:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>102</itunes:episode><podcast:episode>102</podcast:episode></item><item><title>101: Exploring the IoT and OT Cybersecurity World with Dr. Jesus Molina: An Expert&apos;s Insights and Experiences</title><itunes:title>101: Exploring the IoT and OT Cybersecurity World with Dr. Jesus Molina: An Expert&apos;s Insights and Experiences</itunes:title><description><![CDATA[<p>We are delighted to have another remarkable guest joining us on the podcast today!&nbsp;&nbsp;</p><p>Dr. Jesus Molina, the Director of Industrial IoT at Waterfall Security Solutions, is a seasoned cybersecurity practitioner and well-known OT cybersecurity thought leader. He is a technologist and inventor driven by an insatiable curiosity. In addition to being a copious reader and an electrical engineer with a Master's degree and a Ph.D. in the field, Dr. Molina is a dedicated researcher, a sailor, an intrepid traveler, a compelling public speaker, and an ardent educator.&nbsp;</p><p>Dr. Molina’s passion for cybersecurity, particularly in the context of IoT and OT, is evident in everything he does. Join us today as we delve into the insights and experiences of this accomplished cybersecurity expert.</p><p><strong>Show highlights:</strong></p><ul><li>Dr. Molina talks about his early life experiences</li><li>How his interest in cybersecurity began</li><li>Dr. Molina explains how he created a virus that infected every computer in his high school</li><li>Dr. Molina shares his experience of pursuing a Master's degree in the US after studying in Spain</li><li>A valuable lesson learned about remaining cautious and protecting a group or organization after a security breach</li><li>Cybersecurity challenges and solutions in various industries</li><li>How Dr. Molina discovered he could control every room in a hotel by exploiting a wireless network vulnerability</li><li>Dr. Molina shares a cautionary story about the importance of watching what you say around journalists</li><li>How curiosity drives creativity</li><li>Dr. Molina discusses his views on the future</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Dr. Jesus Molina on&nbsp;<a href="https://www.linkedin.com/in/molinajesus/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://waterfall-security.com/" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a></p>]]></description><content:encoded><![CDATA[<p>We are delighted to have another remarkable guest joining us on the podcast today!&nbsp;&nbsp;</p><p>Dr. Jesus Molina, the Director of Industrial IoT at Waterfall Security Solutions, is a seasoned cybersecurity practitioner and well-known OT cybersecurity thought leader. He is a technologist and inventor driven by an insatiable curiosity. In addition to being a copious reader and an electrical engineer with a Master's degree and a Ph.D. in the field, Dr. Molina is a dedicated researcher, a sailor, an intrepid traveler, a compelling public speaker, and an ardent educator.&nbsp;</p><p>Dr. Molina’s passion for cybersecurity, particularly in the context of IoT and OT, is evident in everything he does. Join us today as we delve into the insights and experiences of this accomplished cybersecurity expert.</p><p><strong>Show highlights:</strong></p><ul><li>Dr. Molina talks about his early life experiences</li><li>How his interest in cybersecurity began</li><li>Dr. Molina explains how he created a virus that infected every computer in his high school</li><li>Dr. Molina shares his experience of pursuing a Master's degree in the US after studying in Spain</li><li>A valuable lesson learned about remaining cautious and protecting a group or organization after a security breach</li><li>Cybersecurity challenges and solutions in various industries</li><li>How Dr. Molina discovered he could control every room in a hotel by exploiting a wireless network vulnerability</li><li>Dr. Molina shares a cautionary story about the importance of watching what you say around journalists</li><li>How curiosity drives creativity</li><li>Dr. Molina discusses his views on the future</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Dr. Jesus Molina on&nbsp;<a href="https://www.linkedin.com/in/molinajesus/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://waterfall-security.com/" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">b8240f6e-7b91-47fc-93c6-2b6df57dcbc3</guid><itunes:image href="https://artwork.captivate.fm/aac1ea10-2364-455d-aff1-0819c069ad08/Q26Am47MKksfLTe46kPTeNdW.jpg"/><pubDate>Tue, 07 Nov 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a9e7cc92-62c7-4b32-a33a-b23cb500f6da/CS2AI-Episode-Audio-converted.mp3" length="73726632" type="audio/mpeg"/><itunes:duration>01:01:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>101</itunes:episode><podcast:episode>101</podcast:episode></item><item><title>100: Exploring OT Security and Cyber Practices with IBM&apos;s Rob Dyson</title><itunes:title>100: Exploring OT Security and Cyber Practices with IBM&apos;s Rob Dyson</itunes:title><description><![CDATA[<p>We are delighted to welcome Rob Dyson as our special guest for the 100th episode of the CS2AI podcast!&nbsp;&nbsp;</p><p>Rob is the Global OT Security Services Leader for IBM. Beyond his corporate role, he is a military veteran, a tech enthusiast, a devoted father and husband, a proud grandfather, and an avid scuba diver.&nbsp;</p><p>His extensive experience overseeing key service areas within an industry giant like IBM makes Rob an exceptional guest for this milestone podcast. He joins us today to share his insights on control systems, operating technology, and cybersecurity practices.</p><p>Rob truly brings a wealth of knowledge and clarity to today’s discussion. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>How Rob’s interest in technology influenced his desire to explore new things and push boundaries</li><li>The challenges of setting up a business continuity plan in a remote location</li><li>How security measures have evolved from the early days of network security to modern-day cybersecurity</li><li>The importance of understanding the network for OT security</li><li>How software developers can bring valuable skills to cybersecurity after mastering the fundamentals of networking</li><li>Rob shares his insights on entrepreneurship in the cybersecurity space</li><li>How Rob got offered a job with IBM in 2012 after a quick and unexpected interview process&nbsp; </li><li>Rob explains how he transitioned to full-time OT security work in 2016&nbsp;</li><li>Why is there a need for a different mindset and cultural understanding within the OT cybersecurity industry?&nbsp;</li><li>Rob offers advice for people who have recently begun their career journeys</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Rob Dyson on&nbsp;<a href="https://www.linkedin.com/in/dysonrob/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.ibm.com/us-en" rel="noopener noreferrer" target="_blank">IBM</a></p>]]></description><content:encoded><![CDATA[<p>We are delighted to welcome Rob Dyson as our special guest for the 100th episode of the CS2AI podcast!&nbsp;&nbsp;</p><p>Rob is the Global OT Security Services Leader for IBM. Beyond his corporate role, he is a military veteran, a tech enthusiast, a devoted father and husband, a proud grandfather, and an avid scuba diver.&nbsp;</p><p>His extensive experience overseeing key service areas within an industry giant like IBM makes Rob an exceptional guest for this milestone podcast. He joins us today to share his insights on control systems, operating technology, and cybersecurity practices.</p><p>Rob truly brings a wealth of knowledge and clarity to today’s discussion. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>How Rob’s interest in technology influenced his desire to explore new things and push boundaries</li><li>The challenges of setting up a business continuity plan in a remote location</li><li>How security measures have evolved from the early days of network security to modern-day cybersecurity</li><li>The importance of understanding the network for OT security</li><li>How software developers can bring valuable skills to cybersecurity after mastering the fundamentals of networking</li><li>Rob shares his insights on entrepreneurship in the cybersecurity space</li><li>How Rob got offered a job with IBM in 2012 after a quick and unexpected interview process&nbsp; </li><li>Rob explains how he transitioned to full-time OT security work in 2016&nbsp;</li><li>Why is there a need for a different mindset and cultural understanding within the OT cybersecurity industry?&nbsp;</li><li>Rob offers advice for people who have recently begun their career journeys</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Rob Dyson on&nbsp;<a href="https://www.linkedin.com/in/dysonrob/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.ibm.com/us-en" rel="noopener noreferrer" target="_blank">IBM</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">ea5912da-e264-4705-a8a1-5a6e73a018c7</guid><itunes:image href="https://artwork.captivate.fm/b96235da-8f3c-48bf-b6e1-3b2a8c44f036/JOSiD2_fjRPe8_EokK11YIVB.jpg"/><pubDate>Tue, 31 Oct 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0f1912e1-1d03-4108-8023-d63e1b69c80d/CS2AI-100-Audio-converted.mp3" length="68197608" type="audio/mpeg"/><itunes:duration>56:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>100</itunes:episode><podcast:episode>100</podcast:episode></item><item><title>99: Exploring the Multifaceted World of Gary Kessler: From Cybersecurity Expert to Master Scuba Diver Trainer</title><itunes:title>99: Exploring the Multifaceted World of Gary Kessler: From Cybersecurity Expert to Master Scuba Diver Trainer</itunes:title><description><![CDATA[<p>We are delighted to have Gary Kessler joining us as our special guest for today's episode of the CS2AI podcast show!&nbsp;</p><p>Gary is a multifaceted individual with a diverse array of interests. He has been involved in many different projects over time and has worn various hats under the umbrella of his company, Gary Kessler Associates.&nbsp;</p><p>His impressive literary contributions include over 75 articles and three books, establishing him as a prolific authority on cybersecurity. He started his journey as a computer programmer and continues to embrace that today. He is a former EMT firefighter, a passionate outdoorsman, an avid cyclist, and an accomplished master scuba diver trainer. He also is a boat captain, a retired college professor, and a dedicated husband and father.&nbsp;</p><p>Stay tuned for Gary’s interesting backstory and fascinating insights on maritime cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>Gary shares his backstory and cybersecurity journey&nbsp;</li><li>How Gary got into maritime cybersecurity</li><li>Some early computer security vulnerabilities and hacking techniques</li><li>Gary dives into current shipbuilding practices</li><li>Some potential maritime cybersecurity risks and threats</li><li>Gary discusses his initial focal point with maritime cybersecurity</li><li>Can a ship be hacked to gain potentially damaging data?</li><li>Security by design and resilience in engineering</li><li>Why bridge crews and officers have to be more technologically aware now than ever before</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Gary Kessler on&nbsp;<a href="https://www.linkedin.com/in/garykessler/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.garykessler.net/" rel="noopener noreferrer" target="_blank">Gary KesslerAssociates</a></p>]]></description><content:encoded><![CDATA[<p>We are delighted to have Gary Kessler joining us as our special guest for today's episode of the CS2AI podcast show!&nbsp;</p><p>Gary is a multifaceted individual with a diverse array of interests. He has been involved in many different projects over time and has worn various hats under the umbrella of his company, Gary Kessler Associates.&nbsp;</p><p>His impressive literary contributions include over 75 articles and three books, establishing him as a prolific authority on cybersecurity. He started his journey as a computer programmer and continues to embrace that today. He is a former EMT firefighter, a passionate outdoorsman, an avid cyclist, and an accomplished master scuba diver trainer. He also is a boat captain, a retired college professor, and a dedicated husband and father.&nbsp;</p><p>Stay tuned for Gary’s interesting backstory and fascinating insights on maritime cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>Gary shares his backstory and cybersecurity journey&nbsp;</li><li>How Gary got into maritime cybersecurity</li><li>Some early computer security vulnerabilities and hacking techniques</li><li>Gary dives into current shipbuilding practices</li><li>Some potential maritime cybersecurity risks and threats</li><li>Gary discusses his initial focal point with maritime cybersecurity</li><li>Can a ship be hacked to gain potentially damaging data?</li><li>Security by design and resilience in engineering</li><li>Why bridge crews and officers have to be more technologically aware now than ever before</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Gary Kessler on&nbsp;<a href="https://www.linkedin.com/in/garykessler/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.garykessler.net/" rel="noopener noreferrer" target="_blank">Gary KesslerAssociates</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">869b654d-8636-4961-972b-8b52d7a86ac0</guid><itunes:image href="https://artwork.captivate.fm/a0cb0047-e244-460d-9e86-852266413a77/umuPH6wpmQwaaWCDhtbShOHp.jpg"/><pubDate>Tue, 24 Oct 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ab5024df-3771-4fec-b90b-750123cc4faa/CS2AI-Ep-99-Audio.mp3" length="63524603" type="audio/mpeg"/><itunes:duration>52:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>99</itunes:episode><podcast:episode>99</podcast:episode></item><item><title>98: Unlocking the Cybersecurity World with Vincent Riou: Insights and FIC Event Preview</title><itunes:title>98: Unlocking the Cybersecurity World with Vincent Riou: Insights and FIC Event Preview</itunes:title><description><![CDATA[<p>We are delighted to welcome Vincent Riou as our special guest for today’s CS2AI podcast!&nbsp; </p><p>Vincent is a distinguished figure within the cybersecurity industry who has profoundly impacted the field in recent years. He is a multifaceted individual with a passion for uniting people- even tens of thousands of individuals at times, for various causes. He is a French Navy veteran, a technologist, a founder, a dedicated father, a loving husband, a culinary artist, and above all, an all-around stand-up guy!&nbsp;</p><p>Vincent has a wealth of knowledge to share with us today! He joins us to discuss some pertinent cybersecurity issues and concerns and the upcoming FIC event in Montreal on October 25th and 26th. </p><p>Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The story behind the FIC Conference that took place in Lille, France, just over a year ago</li><li>Why were the FIC events started?</li><li>How cybersecurity is part of the fabric of every type of business organization, institution, and government body</li><li>Vincent explains why he organizes open events focusing on those who rely on the digital transformation of the world</li><li>Vincent talks about the OT part of the Montreal event and explains how it started </li><li>Vincent explains what comes first when he organizes an event</li><li>How the Montreal event will differ from the event that took place in Lille last year</li><li>Vincent pulls back the curtain to reveal how the big conferences work and what it is like to run them</li><li>Vincent shares his future vision for news conferences in North America</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Vincent Riou on&nbsp;<a href="https://www.linkedin.com/in/vincent-riou-753a4112/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://incyber.org/en/save-the-date-fic-north-america-october-25-and-26-2023/" rel="noopener noreferrer" target="_blank">SAVE THE DATE FIC North America – October 25 and 26, 2023</a></p>]]></description><content:encoded><![CDATA[<p>We are delighted to welcome Vincent Riou as our special guest for today’s CS2AI podcast!&nbsp; </p><p>Vincent is a distinguished figure within the cybersecurity industry who has profoundly impacted the field in recent years. He is a multifaceted individual with a passion for uniting people- even tens of thousands of individuals at times, for various causes. He is a French Navy veteran, a technologist, a founder, a dedicated father, a loving husband, a culinary artist, and above all, an all-around stand-up guy!&nbsp;</p><p>Vincent has a wealth of knowledge to share with us today! He joins us to discuss some pertinent cybersecurity issues and concerns and the upcoming FIC event in Montreal on October 25th and 26th. </p><p>Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The story behind the FIC Conference that took place in Lille, France, just over a year ago</li><li>Why were the FIC events started?</li><li>How cybersecurity is part of the fabric of every type of business organization, institution, and government body</li><li>Vincent explains why he organizes open events focusing on those who rely on the digital transformation of the world</li><li>Vincent talks about the OT part of the Montreal event and explains how it started </li><li>Vincent explains what comes first when he organizes an event</li><li>How the Montreal event will differ from the event that took place in Lille last year</li><li>Vincent pulls back the curtain to reveal how the big conferences work and what it is like to run them</li><li>Vincent shares his future vision for news conferences in North America</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Vincent Riou on&nbsp;<a href="https://www.linkedin.com/in/vincent-riou-753a4112/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://incyber.org/en/save-the-date-fic-north-america-october-25-and-26-2023/" rel="noopener noreferrer" target="_blank">SAVE THE DATE FIC North America – October 25 and 26, 2023</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">ecdf0142-bc81-4df9-bcf7-3e720b9614d5</guid><itunes:image href="https://artwork.captivate.fm/5e73f84f-8838-4ba6-8ac5-db7014f61c41/W0BJYh6hnF2F0mpz2742PlVu.jpg"/><pubDate>Tue, 17 Oct 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0969abd1-fef7-4968-8e61-a05e7ffb1ca4/CS2AI-Ep-98.mp3" length="41077897" type="audio/mpeg"/><itunes:duration>27:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>98</itunes:episode><podcast:episode>98</podcast:episode></item><item><title>Encore: Using Mentorship to Help Advance Your Cybersecurity Career with Susan Peterson Sturm</title><itunes:title>Encore: Using Mentorship to Help Advance Your Cybersecurity Career with Susan Peterson Sturm</itunes:title><description><![CDATA[<p>Today, Derek Harp interviews Susan Peterson Sturm, the Chief Information Security Officer at Cognite.&nbsp;</p><p>Susan is a Transformational Operational Technology leader with 20 years of experience in profitably scaling innovative software-based businesses, including automation, IIOT, and cyber security. She has a proven track record of growing and structuring early-stage, profitable digital software-driven P&amp;Ls in excess of $150M. She specializes in change management, product management, M&amp;A, and strategic alliances. Susan serves on advisory boards of Cognite, Innosphere Ventures &amp; One Warm Coat.&nbsp;</p><p>Susan is an incredible individual with vast experience! She’s an empath, DEI champion, mentor, board advisor, and volunteer focused on poverty alleviation.&nbsp;</p><p>In this episode, she discusses her background, talks to Derek about her professional journey, and offers helpful tips and advice.</p><p>You won’t want to miss this episode if you are considering a career in the cybersecurity space. Tune in to hear Susan’s fascinating story and benefit from her years of experience in the security field.&nbsp;</p><p>Show highlights:</p><ul><li>Susan talks about her studies.</li><li>Her motivation for pivoting into energy after graduating from college.</li><li>What she gained from her career in international affairs.</li><li>Some of Susan’s interesting roles early on in her career.</li><li>The benefits of getting in-the-field experience.</li><li>There are many different leadership paths to be chosen within the industry.</li><li>What you can gain from working abroad with distributed teams.</li><li>Where security first intersected with Susan’s career.</li><li>Why it’s worth investing your time in networks.</li><li>How being vulnerable can help you develop valuable relationships.</li><li>The role mentorship has played in Susan’s career.</li><li>How Susan ended up in her current role as a CISO.</li><li>Motherhood can be very challenging for women in senior roles.&nbsp;</li><li>The importance of moving on from any workplace where you don’t feel safe to express your needs.</li></ul><br/><p>Links and resources:</p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.cognite.com/en/" rel="noopener noreferrer" target="_blank">Cognite</a></p><p>Susan Peterson Sturm&nbsp;<a href="https://www.linkedin.com/in/susanpeterson-sturm/" rel="noopener noreferrer" target="_blank">on LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp interviews Susan Peterson Sturm, the Chief Information Security Officer at Cognite.&nbsp;</p><p>Susan is a Transformational Operational Technology leader with 20 years of experience in profitably scaling innovative software-based businesses, including automation, IIOT, and cyber security. She has a proven track record of growing and structuring early-stage, profitable digital software-driven P&amp;Ls in excess of $150M. She specializes in change management, product management, M&amp;A, and strategic alliances. Susan serves on advisory boards of Cognite, Innosphere Ventures &amp; One Warm Coat.&nbsp;</p><p>Susan is an incredible individual with vast experience! She’s an empath, DEI champion, mentor, board advisor, and volunteer focused on poverty alleviation.&nbsp;</p><p>In this episode, she discusses her background, talks to Derek about her professional journey, and offers helpful tips and advice.</p><p>You won’t want to miss this episode if you are considering a career in the cybersecurity space. Tune in to hear Susan’s fascinating story and benefit from her years of experience in the security field.&nbsp;</p><p>Show highlights:</p><ul><li>Susan talks about her studies.</li><li>Her motivation for pivoting into energy after graduating from college.</li><li>What she gained from her career in international affairs.</li><li>Some of Susan’s interesting roles early on in her career.</li><li>The benefits of getting in-the-field experience.</li><li>There are many different leadership paths to be chosen within the industry.</li><li>What you can gain from working abroad with distributed teams.</li><li>Where security first intersected with Susan’s career.</li><li>Why it’s worth investing your time in networks.</li><li>How being vulnerable can help you develop valuable relationships.</li><li>The role mentorship has played in Susan’s career.</li><li>How Susan ended up in her current role as a CISO.</li><li>Motherhood can be very challenging for women in senior roles.&nbsp;</li><li>The importance of moving on from any workplace where you don’t feel safe to express your needs.</li></ul><br/><p>Links and resources:</p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.cognite.com/en/" rel="noopener noreferrer" target="_blank">Cognite</a></p><p>Susan Peterson Sturm&nbsp;<a href="https://www.linkedin.com/in/susanpeterson-sturm/" rel="noopener noreferrer" target="_blank">on LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">6795b036-770b-47b7-97f4-41fa3b49c6b7</guid><itunes:image href="https://artwork.captivate.fm/184ddbd0-0d07-4b39-8fa6-885834edc31c/yLmI260pE1NEFEAljhde5Ywh.jpg"/><pubDate>Tue, 10 Oct 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b899f3b9-793e-4aeb-b579-a5891c922406/CS2AI-20Susan-20Peterson-20-20Edited-20Audio.mp3" length="36508551" type="audio/mpeg"/><itunes:duration>37:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Encore: Leveraging Your Military Career to Carve Out a Cyber Security Career with Dr. Michael Chipley</title><itunes:title>Encore: Leveraging Your Military Career to Carve Out a Cyber Security Career with Dr. Michael Chipley</itunes:title><description><![CDATA[<p>Dr. Michael Chipley, the Founder and President of the PMC Group, is the guest for today’s podcast.</p><p>Dr. Chipley has over 30 years of consulting experience in the areas of Program and Project Management, Cybersecurity, Energy and Environmental (LEED, Energy Star, and Carbon Footprint); Critical Infrastructure Protection and Analysis; Building Information Modeling (BIM) Technology; Base Realignment and Closure (BRAC), and Emergency Management/Disaster Recovery.&nbsp;</p><p>Dr. Chipley served 24 years as a Civil Engineer in the US Air Force and has been consulting since 2001. He is a former adjunct faculty member at George Mason University, where he taught the Infrastructure Security Engineering, Building Security, and Building Information Modeling courses.</p><p>Dr. Chipley grew up on a farm in Oregon. He is a long-time contributor to cybersecurity for control systems, civil engineer, US Airforce veteran, husband, father, grandfather, outdoor enthusiast, and wine enthusiast. He joins Derek Harp today to discuss his military background and career journey and share his insights and advice.&nbsp;</p><p>You will not want to miss this episode if you are leaving the military and considering a career in cybersecurity. Stay tuned to hear Dr. Chipley’s story and benefit from his breadth of experience!</p><p>Show highlights:</p><ul><li>What Dr. Chipley did and studied during the 24 years he spent in the military.&nbsp;</li><li>Dr. Chipley talks about Shodan.io and what it can do.</li><li>Some advice about skills and opportunities in the control systems space.</li><li>How Dr. Chipley benefited from joining the military.</li><li>Why you can never stop learning in the control systems world.</li><li>Why women tend to excel in the cyber field.</li><li>How students can find opportunities to join internship programs.</li><li>Potential challenges that people in cybersecurity could face.</li><li>Some of the projects with which Dr. Chipley is currently involved.</li><li>What can young people do to add to their knowledge and education to increase their value five years from now?</li></ul><br/><p>Links and resources:</p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://pmc-group.com/" rel="noopener noreferrer" target="_blank">The PMC Group</a></p><p><a href="https://www.linkedin.com/in/michael-chipley-phd-gicsp-pmp-4943455/" rel="noopener noreferrer" target="_blank">Michael Chipley on LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Dr. Michael Chipley, the Founder and President of the PMC Group, is the guest for today’s podcast.</p><p>Dr. Chipley has over 30 years of consulting experience in the areas of Program and Project Management, Cybersecurity, Energy and Environmental (LEED, Energy Star, and Carbon Footprint); Critical Infrastructure Protection and Analysis; Building Information Modeling (BIM) Technology; Base Realignment and Closure (BRAC), and Emergency Management/Disaster Recovery.&nbsp;</p><p>Dr. Chipley served 24 years as a Civil Engineer in the US Air Force and has been consulting since 2001. He is a former adjunct faculty member at George Mason University, where he taught the Infrastructure Security Engineering, Building Security, and Building Information Modeling courses.</p><p>Dr. Chipley grew up on a farm in Oregon. He is a long-time contributor to cybersecurity for control systems, civil engineer, US Airforce veteran, husband, father, grandfather, outdoor enthusiast, and wine enthusiast. He joins Derek Harp today to discuss his military background and career journey and share his insights and advice.&nbsp;</p><p>You will not want to miss this episode if you are leaving the military and considering a career in cybersecurity. Stay tuned to hear Dr. Chipley’s story and benefit from his breadth of experience!</p><p>Show highlights:</p><ul><li>What Dr. Chipley did and studied during the 24 years he spent in the military.&nbsp;</li><li>Dr. Chipley talks about Shodan.io and what it can do.</li><li>Some advice about skills and opportunities in the control systems space.</li><li>How Dr. Chipley benefited from joining the military.</li><li>Why you can never stop learning in the control systems world.</li><li>Why women tend to excel in the cyber field.</li><li>How students can find opportunities to join internship programs.</li><li>Potential challenges that people in cybersecurity could face.</li><li>Some of the projects with which Dr. Chipley is currently involved.</li><li>What can young people do to add to their knowledge and education to increase their value five years from now?</li></ul><br/><p>Links and resources:</p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://pmc-group.com/" rel="noopener noreferrer" target="_blank">The PMC Group</a></p><p><a href="https://www.linkedin.com/in/michael-chipley-phd-gicsp-pmp-4943455/" rel="noopener noreferrer" target="_blank">Michael Chipley on LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">6d3bc121-02e5-490e-9c3e-d5caddc26752</guid><itunes:image href="https://artwork.captivate.fm/86f8ca8a-a365-48df-b1c1-1821a7e69b92/vda_hWKI-jhgNInKm5VtN5vK.jpg"/><pubDate>Tue, 03 Oct 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b65abcf7-5bf9-404a-a83b-e4c897680235/CS2AI-20Micheal-20Chipley-20-20Edited-20Audio.mp3" length="41691073" type="audio/mpeg"/><itunes:duration>41:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>97: Navigating Transportation Security: A Keynote with TSA Administrator David Pekoske</title><itunes:title>97: Navigating Transportation Security: A Keynote with TSA Administrator David Pekoske</itunes:title><description><![CDATA[<p>We are excited and very grateful to have David Pekoske, the current Administrator for the Transportation Security Administration (TSA), joining us today to share a closeout keynote he recently delivered.&nbsp;</p><p>With a distinguished career spanning many years of dedicated service within the Coast Guard and the Department of Homeland Security, Administrator Pekoske has held various pivotal roles. Now, he stands at the helm of the Transportation Security Administration.&nbsp; With his wealth of experience and insights, this episode promises to offer a unique perspective on the challenges and innovations in transportation security. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>What the TSA does for security beyond the aviation system</li><li>Administrator Pekoske discusses cybersecurity measures for critical infrastructure</li><li>What are the cybersecurity regulations for critical infrastructure?</li><li>The importance of cybersecurity and the need for a coordinated response to cyber attacks</li><li>Which measures have been put in place for cybersecurity in the transportation sector?</li><li>Cybersecurity regulations and compliance</li><li>Which cybersecurity measures in place for critical infrastructure?&nbsp;</li><li>What should the regulator have a basic understanding of and be willing to do to achieve their goals?</li><li>How insider threats within the aviation industry</li><li>Cybersecurity and workforce development in the aviation industry</li><li>Options for cybersecurity careers in the government and private sectors</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>David Pekoske on&nbsp;<a href="https://www.linkedin.com/in/david-p-22838833/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.tsa.gov/" rel="noopener noreferrer" target="_blank">TransportationSecurity Administration (TSA)</a></p>]]></description><content:encoded><![CDATA[<p>We are excited and very grateful to have David Pekoske, the current Administrator for the Transportation Security Administration (TSA), joining us today to share a closeout keynote he recently delivered.&nbsp;</p><p>With a distinguished career spanning many years of dedicated service within the Coast Guard and the Department of Homeland Security, Administrator Pekoske has held various pivotal roles. Now, he stands at the helm of the Transportation Security Administration.&nbsp; With his wealth of experience and insights, this episode promises to offer a unique perspective on the challenges and innovations in transportation security. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>What the TSA does for security beyond the aviation system</li><li>Administrator Pekoske discusses cybersecurity measures for critical infrastructure</li><li>What are the cybersecurity regulations for critical infrastructure?</li><li>The importance of cybersecurity and the need for a coordinated response to cyber attacks</li><li>Which measures have been put in place for cybersecurity in the transportation sector?</li><li>Cybersecurity regulations and compliance</li><li>Which cybersecurity measures in place for critical infrastructure?&nbsp;</li><li>What should the regulator have a basic understanding of and be willing to do to achieve their goals?</li><li>How insider threats within the aviation industry</li><li>Cybersecurity and workforce development in the aviation industry</li><li>Options for cybersecurity careers in the government and private sectors</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>David Pekoske on&nbsp;<a href="https://www.linkedin.com/in/david-p-22838833/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.tsa.gov/" rel="noopener noreferrer" target="_blank">TransportationSecurity Administration (TSA)</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">14db8060-8e15-4c7c-9d0e-3bd013a4df85</guid><itunes:image href="https://artwork.captivate.fm/4e0f8ff3-162d-4b97-8ed1-4ac02352ac67/3vME9Z62-CYg3x6Rs9-g2CKc.jpg"/><pubDate>Tue, 26 Sep 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f3260a19-eaee-4f84-8252-8e3e7a0d3cfc/CS2AI-Ep-97-Audio.mp3" length="69281409" type="audio/mpeg"/><itunes:duration>47:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>97</itunes:episode><podcast:episode>97</podcast:episode></item><item><title>96: Exploring the Depths of Industrial Cybersecurity with Joe Weiss</title><itunes:title>96: Exploring the Depths of Industrial Cybersecurity with Joe Weiss</itunes:title><description><![CDATA[<p>Derek is thrilled to have a true industry legend returning to the podcast today!</p><p>Joe Weiss, the Managing Partner at Applied Control Solutions LLC, initially appeared on the show in episode 61. If you have not already done so, you can listen to that episode to learn more about his biography and personal journey.&nbsp;</p><p>Joe's reputation in the industry precedes him, as he is among the select few who can honestly claim to have dedicated more time and expertise to the field of cybersecurity field than almost anyone else. His career includes tenures at renowned organizations, and he is the curator of one of the world's largest incident databases. </p><p>As in the words of Paul Simon, there have been incidents, accidents, hints, and allegations, and Joe Weiss has been at the forefront of understanding and dissecting all of those challenges.&nbsp;Join us for a thought-provoking episode where we dive into the complexities of cyber incidents, attribution, and the ever-evolving landscape of industrial security.&nbsp;</p><p>You are in for an enlightening conversation today, so stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The story of how Joe started his database&nbsp;</li><li>Cybersecurity in the context of nuclear safety and control systems</li><li>Joe discusses his database of incidents, explaining how it provides valuable insights into the history of cybersecurity incidents.</li><li>Control system cybersecurity incidents and their causes </li><li>Cybersecurity threats and vulnerabilities in industrial control systems</li><li>The importance of securing sensors and actuators in industrial control system</li><li>Why do engineers need training on policies and procedures to address security concerns with field devices?</li><li>Security issues within the industry</li><li>Joe shares his frustration with the lack of progress in IoT security.</li><li>Ways to live with insecure systems and even turn them into money-making machines for end users</li><li>Why is Joe calling for a holistic approach to control systems?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Joe Weiss on&nbsp;<a href="https://www.linkedin.com/in/joew1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="http://realtimeacs.com/" rel="noopener noreferrer" target="_blank">Applied ControlSolutions LLC</a></p>]]></description><content:encoded><![CDATA[<p>Derek is thrilled to have a true industry legend returning to the podcast today!</p><p>Joe Weiss, the Managing Partner at Applied Control Solutions LLC, initially appeared on the show in episode 61. If you have not already done so, you can listen to that episode to learn more about his biography and personal journey.&nbsp;</p><p>Joe's reputation in the industry precedes him, as he is among the select few who can honestly claim to have dedicated more time and expertise to the field of cybersecurity field than almost anyone else. His career includes tenures at renowned organizations, and he is the curator of one of the world's largest incident databases. </p><p>As in the words of Paul Simon, there have been incidents, accidents, hints, and allegations, and Joe Weiss has been at the forefront of understanding and dissecting all of those challenges.&nbsp;Join us for a thought-provoking episode where we dive into the complexities of cyber incidents, attribution, and the ever-evolving landscape of industrial security.&nbsp;</p><p>You are in for an enlightening conversation today, so stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The story of how Joe started his database&nbsp;</li><li>Cybersecurity in the context of nuclear safety and control systems</li><li>Joe discusses his database of incidents, explaining how it provides valuable insights into the history of cybersecurity incidents.</li><li>Control system cybersecurity incidents and their causes </li><li>Cybersecurity threats and vulnerabilities in industrial control systems</li><li>The importance of securing sensors and actuators in industrial control system</li><li>Why do engineers need training on policies and procedures to address security concerns with field devices?</li><li>Security issues within the industry</li><li>Joe shares his frustration with the lack of progress in IoT security.</li><li>Ways to live with insecure systems and even turn them into money-making machines for end users</li><li>Why is Joe calling for a holistic approach to control systems?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Joe Weiss on&nbsp;<a href="https://www.linkedin.com/in/joew1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="http://realtimeacs.com/" rel="noopener noreferrer" target="_blank">Applied ControlSolutions LLC</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">6ef5110c-2386-4d61-9048-a08e57bfe87d</guid><itunes:image href="https://artwork.captivate.fm/be104fdb-73d4-4901-ae89-790cdb3f9a61/wGgbwRW5qzTV89JFGdYR9jgS.jpg"/><pubDate>Tue, 19 Sep 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fd8b6fc1-0bd1-4f7b-bc2e-48ee9bdc1a5b/CS2AI-Ep-96-Revised-Video.mp3" length="65756013" type="audio/mpeg"/><itunes:duration>54:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>96</itunes:episode><podcast:episode>96</podcast:episode></item><item><title>95: Exploring the Tech Odyssey: A Conversation with Ron Gula,  Co-Founder of Tenable</title><itunes:title>95: Exploring the Tech Odyssey: A Conversation with Ron Gula,  Co-Founder of Tenable</itunes:title><description><![CDATA[<p>Derek is delighted to welcome Ron Gula of Gula Tech Adventures and Co-Founder of Tenable as the guest for today’s show! His name is synonymous with innovation and expertise, and many listeners are bound to recognize the companies he has either birthed or influenced.&nbsp;</p><p>Ron is originally from upstate New York. He was born in Rochester, grew up in Syracuse, and went to Clarkson University. He has had a multifaceted background and has worn many hats throughout his career. First and foremost, he is a technologist, with his roots tracing back to his formal training as an electrical engineer. He is also a programmer, founder, and CEO.&nbsp;</p><p>Beyond his professional accomplishments, Ron is a military veteran after serving in the United States Air Force. He is a husband, father, podcasting enthusiast, masterful 3D animator, and scuba diver. He also indulges in cigar appreciation, holds roles as an investor, advisor, and board member across diverse ventures, and is a passionate champion of philanthropy.&nbsp;</p><p>Today's conversation promises to be enlightening and inspiring! Stay tuned as we delve into the multifaceted tapestry of Ron's life and myriad experiences!</p><p><strong>Show highlights:</strong></p><ul><li>How Ron became a hacker</li><li>One of Ron’s worst experiences</li><li>The importance of understanding the mission of a company</li><li>Ron talks about Dragon, network security, and how Dragon got acquired by another company</li><li>Ron shares his motivation for starting his business and explains how he did it</li><li>Ron shares his advice for doing a startup</li><li>How Ron and his business partner co-founded Tenable&nbsp;</li><li>Why Ron called his company Gula Tech Adventures</li><li>What they do at Gula Tech Adventures&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Ron Gula on&nbsp;<a href="https://www.linkedin.com/in/rongula/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.gula.tech/" rel="noopener noreferrer" target="_blank">Gula Tech Adventures</a></p>]]></description><content:encoded><![CDATA[<p>Derek is delighted to welcome Ron Gula of Gula Tech Adventures and Co-Founder of Tenable as the guest for today’s show! His name is synonymous with innovation and expertise, and many listeners are bound to recognize the companies he has either birthed or influenced.&nbsp;</p><p>Ron is originally from upstate New York. He was born in Rochester, grew up in Syracuse, and went to Clarkson University. He has had a multifaceted background and has worn many hats throughout his career. First and foremost, he is a technologist, with his roots tracing back to his formal training as an electrical engineer. He is also a programmer, founder, and CEO.&nbsp;</p><p>Beyond his professional accomplishments, Ron is a military veteran after serving in the United States Air Force. He is a husband, father, podcasting enthusiast, masterful 3D animator, and scuba diver. He also indulges in cigar appreciation, holds roles as an investor, advisor, and board member across diverse ventures, and is a passionate champion of philanthropy.&nbsp;</p><p>Today's conversation promises to be enlightening and inspiring! Stay tuned as we delve into the multifaceted tapestry of Ron's life and myriad experiences!</p><p><strong>Show highlights:</strong></p><ul><li>How Ron became a hacker</li><li>One of Ron’s worst experiences</li><li>The importance of understanding the mission of a company</li><li>Ron talks about Dragon, network security, and how Dragon got acquired by another company</li><li>Ron shares his motivation for starting his business and explains how he did it</li><li>Ron shares his advice for doing a startup</li><li>How Ron and his business partner co-founded Tenable&nbsp;</li><li>Why Ron called his company Gula Tech Adventures</li><li>What they do at Gula Tech Adventures&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Ron Gula on&nbsp;<a href="https://www.linkedin.com/in/rongula/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.gula.tech/" rel="noopener noreferrer" target="_blank">Gula Tech Adventures</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">8c266bd4-8b12-4ace-bab8-a63dc8253160</guid><itunes:image href="https://artwork.captivate.fm/3f1a4a05-d5a8-4e21-84e7-8fd7aac9e97e/odG3GrEVtsSLvXct7bidL2-t.jpg"/><pubDate>Tue, 12 Sep 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6ba836ae-c35d-4743-ad62-5965e92db0df/CS2AI-95-Edited-Audio.mp3" length="75016331" type="audio/mpeg"/><itunes:duration>51:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>95</itunes:episode><podcast:episode>95</podcast:episode></item><item><title>94: Exploring Cybersecurity and Beyond: The Remarkable Journey of Robert Putman</title><itunes:title>94: Exploring Cybersecurity and Beyond: The Remarkable Journey of Robert Putman</itunes:title><description><![CDATA[<p>Step into the cybersecurity world alongside Derek today as he brings you another riveting discussion with an esteemed expert!&nbsp;</p><p>Rob Putman is the Global Manager of Cybersecurity Services at ABB Process Automation. At the core of his journey lies an unquenchable thirst for understanding that has fueled his prowess within the cybersecurity world and beyond. Apart from his impressive professional portfolio, his life encompasses interwoven threads of diverse experiences. He is a US Army veteran, a devoted father, a relentless technologist, a car enthusiast, an intrepid skier, adaring rock climber, and a masterful team builder.&nbsp;</p><p>With Rob hailing from the scenic Bainbridge Island in Washington State, just beyond the heart of Seattle, his insatiable curiosity about the mechanics of the world ignited his trailblazing path. With a penchant for dismantling and deciphering, he embarked on a lifelong mission to unravel the inner workings of things, often charting unorthodox courses to unveil hidden truths.&nbsp;</p><p>Rob's curiosity and unyielding quest for understanding demonstrate the boundless possibilities that emerge when dedication intersects with ingenuity. Join Derek in witnessing the blend of expertise and passion embodied by Rob's exceptional journey as he peels back the layers of his life and work.&nbsp;</p><p>This episode will enrich your understanding of cybersecurity and illuminate the transformative power of unbridled curiosity and purpose-driven endeavors! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Rob shares his superhero backstory.</li><li>The jobs Rob did early in his career.</li><li>How Rob transitioned into the tech world.</li><li>The benefits of being opportunistic.</li><li>How Rob managed to stay connected with interesting people as they moved around.</li><li>How did he get into industrial control?</li><li>The importance of having a diverse workforce to protect critical and control systems.</li><li>Building trust and building bridges within a company.</li><li>The challenges Rob faces and something he has to think about continuously in his current role.&nbsp;</li><li>Some sage advice from Rob.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Rob Putman on&nbsp;<a href="https://www.linkedin.com/in/roputman/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://global.abb/group/en" rel="noopener noreferrer" target="_blank">ABB ProcessAutomation</a></p>]]></description><content:encoded><![CDATA[<p>Step into the cybersecurity world alongside Derek today as he brings you another riveting discussion with an esteemed expert!&nbsp;</p><p>Rob Putman is the Global Manager of Cybersecurity Services at ABB Process Automation. At the core of his journey lies an unquenchable thirst for understanding that has fueled his prowess within the cybersecurity world and beyond. Apart from his impressive professional portfolio, his life encompasses interwoven threads of diverse experiences. He is a US Army veteran, a devoted father, a relentless technologist, a car enthusiast, an intrepid skier, adaring rock climber, and a masterful team builder.&nbsp;</p><p>With Rob hailing from the scenic Bainbridge Island in Washington State, just beyond the heart of Seattle, his insatiable curiosity about the mechanics of the world ignited his trailblazing path. With a penchant for dismantling and deciphering, he embarked on a lifelong mission to unravel the inner workings of things, often charting unorthodox courses to unveil hidden truths.&nbsp;</p><p>Rob's curiosity and unyielding quest for understanding demonstrate the boundless possibilities that emerge when dedication intersects with ingenuity. Join Derek in witnessing the blend of expertise and passion embodied by Rob's exceptional journey as he peels back the layers of his life and work.&nbsp;</p><p>This episode will enrich your understanding of cybersecurity and illuminate the transformative power of unbridled curiosity and purpose-driven endeavors! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Rob shares his superhero backstory.</li><li>The jobs Rob did early in his career.</li><li>How Rob transitioned into the tech world.</li><li>The benefits of being opportunistic.</li><li>How Rob managed to stay connected with interesting people as they moved around.</li><li>How did he get into industrial control?</li><li>The importance of having a diverse workforce to protect critical and control systems.</li><li>Building trust and building bridges within a company.</li><li>The challenges Rob faces and something he has to think about continuously in his current role.&nbsp;</li><li>Some sage advice from Rob.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Rob Putman on&nbsp;<a href="https://www.linkedin.com/in/roputman/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://global.abb/group/en" rel="noopener noreferrer" target="_blank">ABB ProcessAutomation</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">afd3be93-631f-4da4-b32d-cc3c6c0d3c96</guid><itunes:image href="https://artwork.captivate.fm/3903f627-831b-4153-a57e-3357020a849e/RegE8FbWf-ElefbP7vYnIC6Z.jpg"/><pubDate>Tue, 29 Aug 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bc8b3639-1c54-4511-9403-506c0a647276/CS2AI-Episode-94-Audio.mp3" length="70136087" type="audio/mpeg"/><itunes:duration>47:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>94</itunes:episode><podcast:episode>94</podcast:episode></item><item><title>93: Navigating Cybersecurity Realms: Unveiling Chris Kirsch&apos;s Multifaceted Journey</title><itunes:title>93: Navigating Cybersecurity Realms: Unveiling Chris Kirsch&apos;s Multifaceted Journey</itunes:title><description><![CDATA[<p>In the captivating world of cybersecurity, where technology and innovation intersect to safeguard our digital landscapes, Derek is delighted to welcome today's distinguished guest, Chris Kirsch!&nbsp;</p><p>Chris is a man of multifaceted talents and roles. In addition to being the Co-founder and CEO of runZero , he is also a husband, a runner, a social engineer, an unwavering devotee to cybersecurity, a seasoned member of various security ventures, and a chef specializing in the art of bread baking!&nbsp;</p><p>With his company serving as a bridge to the operational technology community, Chris's journey is a tale that weaves through diverse geographies. He grew up and went to primary school in Germany. He then attended boarding school in Switzerland, after which he continued his education in the United Kingdom.</p><p>As we journey through Chris's narrative, we dive into his role as a longstanding contributor to the cybersecurity landscape and his pivotal role in bridging the gap between the digital domain and operational technology.&nbsp;</p><p>Join us as we delve into the diverse facets of the narrative of Chris Kirsch, a remarkable force in the cybersecurity world! You’re bound to be enthralled by his unique story that intertwines his personal experiences with his unyielding commitment to the cybersecurity domain!</p><p><strong>Show highlights:</strong></p><ul><li>Some lessons learned from PGP.</li><li>Bridging the gap between hardware and software.</li><li>How adding a second product to the sales process changes the hearts and minds of a sales team.</li><li>Transitioning from working with crypto-geeks to hackers. (18:51)</li><li>The value of cold-calling managers. (26:01)</li><li>Two essential attitudes you can have to an acquisition.</li><li>The benefits of being open and having conversations without expectations.</li><li>Fingerprinting flaky devices.</li><li>The importance of having a good inventory.&nbsp;</li><li>Chris’s advice to his younger self.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Chris Kirsch on&nbsp;<a href="https://www.linkedin.com/in/ckirsch/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.runzero.com/" rel="noopener noreferrer" target="_blank">RunZero</a></p>]]></description><content:encoded><![CDATA[<p>In the captivating world of cybersecurity, where technology and innovation intersect to safeguard our digital landscapes, Derek is delighted to welcome today's distinguished guest, Chris Kirsch!&nbsp;</p><p>Chris is a man of multifaceted talents and roles. In addition to being the Co-founder and CEO of runZero , he is also a husband, a runner, a social engineer, an unwavering devotee to cybersecurity, a seasoned member of various security ventures, and a chef specializing in the art of bread baking!&nbsp;</p><p>With his company serving as a bridge to the operational technology community, Chris's journey is a tale that weaves through diverse geographies. He grew up and went to primary school in Germany. He then attended boarding school in Switzerland, after which he continued his education in the United Kingdom.</p><p>As we journey through Chris's narrative, we dive into his role as a longstanding contributor to the cybersecurity landscape and his pivotal role in bridging the gap between the digital domain and operational technology.&nbsp;</p><p>Join us as we delve into the diverse facets of the narrative of Chris Kirsch, a remarkable force in the cybersecurity world! You’re bound to be enthralled by his unique story that intertwines his personal experiences with his unyielding commitment to the cybersecurity domain!</p><p><strong>Show highlights:</strong></p><ul><li>Some lessons learned from PGP.</li><li>Bridging the gap between hardware and software.</li><li>How adding a second product to the sales process changes the hearts and minds of a sales team.</li><li>Transitioning from working with crypto-geeks to hackers. (18:51)</li><li>The value of cold-calling managers. (26:01)</li><li>Two essential attitudes you can have to an acquisition.</li><li>The benefits of being open and having conversations without expectations.</li><li>Fingerprinting flaky devices.</li><li>The importance of having a good inventory.&nbsp;</li><li>Chris’s advice to his younger self.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Chris Kirsch on&nbsp;<a href="https://www.linkedin.com/in/ckirsch/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.runzero.com/" rel="noopener noreferrer" target="_blank">RunZero</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">4a0e3bb1-b4a5-4e43-986a-e52a568b0eb7</guid><itunes:image href="https://artwork.captivate.fm/0683c560-63b5-4949-9617-82f926c189f3/PjHqwcY0tWTznC6oT6wqI7Jg.jpg"/><pubDate>Tue, 22 Aug 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2e846609-a66d-40f4-bc0d-661007dc6178/CS2AI-93-Edited-Audio.mp3" length="73831057" type="audio/mpeg"/><itunes:duration>50:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>93</itunes:episode><podcast:episode>93</podcast:episode></item><item><title>92: From Military Service to Cyber Luminary: Bryson Bort&apos;s Inspiring Journey</title><itunes:title>92: From Military Service to Cyber Luminary: Bryson Bort&apos;s Inspiring Journey</itunes:title><description><![CDATA[<p>Step into the cybersecurity world with Derek Harp for another riveting episode of the CS2AI podcast show! Derek has welcomed a vast array of industry titans onto the podcast, and this episode is no exception!</p><p>Today’s show features Bryson Bort, the CEO and luminary Founder of Scythe. Bryson’s influence spans the domains he has touched, nurtured, advised, and meticulously built from the ground up. As the creator of the renowned ICS Village and the driving force behind Grimm, his story is an intricate tapestry of innovation and impact.&nbsp;</p><p>A military veteran from the US Army, a nurturing father, a culinary maestro hosting his own show, a kayaker, a relentless charity fundraiser, and an all-around exceptional individual, Bryson embodies a remarkable depth that will most certainly captivate all listeners!&nbsp;</p><p>Bryson spent his formative years in Germany and the Soviet Union. His linguistic journey began with German, followed by immersion language programs to master English, which was crucial for his educational pursuits. He spent his early years in Berlin until 1988, then in Moscow until 1990. His journey eventually culminated in the United States during his teenage years.</p><p>Grab a seat and tune in as Derek unravels the narrative that shaped the exceptional Bryson Bort!</p><p><strong>Show highlights:</strong></p><ul><li>How Bryson got into cybersecurity.</li><li>How Bryson learned that procurement is your best friend.</li><li>The importance of building relationships and providing exceptional service.</li><li>Bryson shares his recommendations for working with individuals with technical backgrounds and getting them on board.&nbsp;</li><li>The importance of understanding the business and mission of the company you work for.</li><li>How cybersecurity eventually took over Bryson’s career path.</li><li>How Bryson got the nickname, Grimm.</li><li>Bryson talks about starting his company.</li><li>Bryson shares some advice for taking on new ideas.</li><li>Bryson explains what the ICS Village is all about.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Bryson Bort on&nbsp;<a href="https://www.linkedin.com/in/brysonbort/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://scythe.io/" rel="noopener noreferrer" target="_blank">Scythe</a></p><p><a href="https://grimmcyber.com/" rel="noopener noreferrer" target="_blank">GRIMM</a></p><p><a href="https://www.cs2ai.org/podcast/episode/1b3ff2fb/79-achieving-leadership-roles-in-an-early-cybersecurity-career-with-megan-samford" rel="noopener noreferrer" target="_blank">Episode 79 withMegan Sanford</a></p>]]></description><content:encoded><![CDATA[<p>Step into the cybersecurity world with Derek Harp for another riveting episode of the CS2AI podcast show! Derek has welcomed a vast array of industry titans onto the podcast, and this episode is no exception!</p><p>Today’s show features Bryson Bort, the CEO and luminary Founder of Scythe. Bryson’s influence spans the domains he has touched, nurtured, advised, and meticulously built from the ground up. As the creator of the renowned ICS Village and the driving force behind Grimm, his story is an intricate tapestry of innovation and impact.&nbsp;</p><p>A military veteran from the US Army, a nurturing father, a culinary maestro hosting his own show, a kayaker, a relentless charity fundraiser, and an all-around exceptional individual, Bryson embodies a remarkable depth that will most certainly captivate all listeners!&nbsp;</p><p>Bryson spent his formative years in Germany and the Soviet Union. His linguistic journey began with German, followed by immersion language programs to master English, which was crucial for his educational pursuits. He spent his early years in Berlin until 1988, then in Moscow until 1990. His journey eventually culminated in the United States during his teenage years.</p><p>Grab a seat and tune in as Derek unravels the narrative that shaped the exceptional Bryson Bort!</p><p><strong>Show highlights:</strong></p><ul><li>How Bryson got into cybersecurity.</li><li>How Bryson learned that procurement is your best friend.</li><li>The importance of building relationships and providing exceptional service.</li><li>Bryson shares his recommendations for working with individuals with technical backgrounds and getting them on board.&nbsp;</li><li>The importance of understanding the business and mission of the company you work for.</li><li>How cybersecurity eventually took over Bryson’s career path.</li><li>How Bryson got the nickname, Grimm.</li><li>Bryson talks about starting his company.</li><li>Bryson shares some advice for taking on new ideas.</li><li>Bryson explains what the ICS Village is all about.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Bryson Bort on&nbsp;<a href="https://www.linkedin.com/in/brysonbort/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://scythe.io/" rel="noopener noreferrer" target="_blank">Scythe</a></p><p><a href="https://grimmcyber.com/" rel="noopener noreferrer" target="_blank">GRIMM</a></p><p><a href="https://www.cs2ai.org/podcast/episode/1b3ff2fb/79-achieving-leadership-roles-in-an-early-cybersecurity-career-with-megan-samford" rel="noopener noreferrer" target="_blank">Episode 79 withMegan Sanford</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">cd15639e-f1d0-4371-bf41-d13178ad54e2</guid><itunes:image href="https://artwork.captivate.fm/5057c527-5dae-46de-b8ac-55b9bf0d3e07/Vcx6KuhIMd9vl-QoUDO2ZL-0.jpg"/><pubDate>Tue, 15 Aug 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1d238b0c-dc1a-4d42-894a-7dfe0169997f/CS2AI-92-Edited-Audio.mp3" length="82927658" type="audio/mpeg"/><itunes:duration>57:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>92</itunes:episode><podcast:episode>92</podcast:episode></item><item><title>91: Explore How We Can Shape a Promising Future with Dr. Barton Miller</title><itunes:title>91: Explore How We Can Shape a Promising Future with Dr. Barton Miller</itunes:title><description><![CDATA[<p>In an ever-evolving world where progress accelerates exponentially, the pursuit of knowledge and an unwavering commitment to shaping a prosperous future have never been more vital.</p><p>Today, we have the distinct honor of hosting a true trailblazer in the field of academia and industry as Dr. Barton Miller, the esteemed Vilas Distinguished Achievement Professor at the University of Wisconsin-Madison, joins Derek to share his passion, talk about what he does in the industry, and discuss how we can create a better tomorrow.&nbsp;</p><p>Since first setting foot on the grounds of the prestigious Wisconsin-Madison University in 1984, Bart has spent nearly four decades at the forefront of research and innovation. With his roots in Southern California and his current abode in Johnson, his passion continues to burn as bright as the Californian sun he grew up under!&nbsp;</p><p>Join us for an enlightening journey as Bart embarks on a riveting conversation, unraveling his unwavering passion, pioneering contributions in the industry, and vision for a brighter future!&nbsp;</p><p>Get ready to delve into a world of cutting-edge ideas and explore how we can shape a promising future holding boundless potential!</p><p><strong>Show highlights:</strong>&nbsp;</p><ul><li>Bart shares his origin story.&nbsp;</li><li>Why is it essential to get early exposure to control systems and focus on a specific area of interest?</li><li>The value of resiliency and keeping systems up.</li><li>What is plus-testing?</li><li>Bart dives into how he uses terms like deep-fried security, crispy on the outside and juicy on the  inside, when teaching.</li><li>Examples of physical attacks on industrial systems.&nbsp;</li><li>How did Bart get started in computer science?&nbsp;</li><li>Bart explains fuzz-testing.</li><li>The pros and cons of open source.&nbsp;</li><li>Bart gets into his Introduction to Software Security course.&nbsp;</li><li>Bart discusses something he has been looking at most recently- ransomware.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Dr. Barton Miller on&nbsp;<a href="https://www.linkedin.com/in/barton-miller/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.wisc.edu/" rel="noopener noreferrer" target="_blank">University of Wisconsin-Madison</a></p>]]></description><content:encoded><![CDATA[<p>In an ever-evolving world where progress accelerates exponentially, the pursuit of knowledge and an unwavering commitment to shaping a prosperous future have never been more vital.</p><p>Today, we have the distinct honor of hosting a true trailblazer in the field of academia and industry as Dr. Barton Miller, the esteemed Vilas Distinguished Achievement Professor at the University of Wisconsin-Madison, joins Derek to share his passion, talk about what he does in the industry, and discuss how we can create a better tomorrow.&nbsp;</p><p>Since first setting foot on the grounds of the prestigious Wisconsin-Madison University in 1984, Bart has spent nearly four decades at the forefront of research and innovation. With his roots in Southern California and his current abode in Johnson, his passion continues to burn as bright as the Californian sun he grew up under!&nbsp;</p><p>Join us for an enlightening journey as Bart embarks on a riveting conversation, unraveling his unwavering passion, pioneering contributions in the industry, and vision for a brighter future!&nbsp;</p><p>Get ready to delve into a world of cutting-edge ideas and explore how we can shape a promising future holding boundless potential!</p><p><strong>Show highlights:</strong>&nbsp;</p><ul><li>Bart shares his origin story.&nbsp;</li><li>Why is it essential to get early exposure to control systems and focus on a specific area of interest?</li><li>The value of resiliency and keeping systems up.</li><li>What is plus-testing?</li><li>Bart dives into how he uses terms like deep-fried security, crispy on the outside and juicy on the  inside, when teaching.</li><li>Examples of physical attacks on industrial systems.&nbsp;</li><li>How did Bart get started in computer science?&nbsp;</li><li>Bart explains fuzz-testing.</li><li>The pros and cons of open source.&nbsp;</li><li>Bart gets into his Introduction to Software Security course.&nbsp;</li><li>Bart discusses something he has been looking at most recently- ransomware.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Dr. Barton Miller on&nbsp;<a href="https://www.linkedin.com/in/barton-miller/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.wisc.edu/" rel="noopener noreferrer" target="_blank">University of Wisconsin-Madison</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">edaa2a09-de70-4624-8ecf-1d85de181db8</guid><itunes:image href="https://artwork.captivate.fm/4d54ff11-71d6-4311-9d3c-b103f85e6279/MOtB0WB9GgU_Y8XZzVPhfkMX.jpg"/><pubDate>Tue, 08 Aug 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/83d8ff72-20f0-4445-9459-58b60b042d35/CS2AI-Episode-91-Audio.mp3" length="71454073" type="audio/mpeg"/><itunes:duration>48:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>91</itunes:episode><podcast:episode>91</podcast:episode></item><item><title>90: SBOM: The Future of Cybersecurity with Daniel Bardenstein</title><itunes:title>90: SBOM: The Future of Cybersecurity with Daniel Bardenstein</itunes:title><description><![CDATA[<p>Prepare yourself for another captivating episode of the CS2AI Podcast!&nbsp;</p><p>Today, we feature an exclusive interview with Daniel Bardenstein, a former USG official turned entrepreneur. Having recently launched a groundbreaking start-up centered on the critical concept of SBOM, Daniel brings a wealth of insider knowledge and experience to the table!&nbsp;</p><p>Daniel is the Co-founder and Chief Technology Officer of Manifest, a pioneering company specializing in comprehensive SBOM management. Their core mission is to facilitate organizations in embracing this innovative and relatively new concept with utmost simplicity and automation. Through their state-of-the-art solutions, Manifest empowers businesses to navigate the complexities of SBOM seamlessly, ushering in a new era of efficiency and ease.</p><p>In today’s riveting discussion, hosted by Bryson Bort, Daniel pulls back the curtain on what truly happens in the trenches of SBOM and unlocks the secrets to implementing his game-changing approach within organizations.&nbsp;</p><p>If you have ever wondered what SBOM is all about and how it could transform the way in which your organization operates, this interview is a must-listen! Get ready to dive into the nitty-gritty of SBOM as Daniel spills the beans on what is happening in the thick of it, offering invaluable insights on how to begin implementing this cutting-edge technology within your organization, starting today!</p><p>Fasten your seatbelt and gear up to elevate your cybersecurity game to unprecedented heights!</p><p><strong>Show highlights:</strong> </p><ul><li>What is an SBOM?&nbsp; </li><li>Why SBOM is essential for asset owners.&nbsp;</li><li>Two key ways to collect SBOMs.</li><li>Integrating vulnerability management with asset management.&nbsp;</li><li>Looking retroactively at legacy systems. </li><li>How SBOM makes vulnerability management better. </li><li>The importance of vulnerability management.&nbsp;</li><li>How to get started with internal product security.</li><li>How to get customers to take action.&nbsp;</li><li>How long will it take to see value?&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Daniel Bardenstein on&nbsp;<a href="https://www.linkedin.com/in/bardenstein/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.manifestcyber.com/" rel="noopener noreferrer" target="_blank">Manifest</a></p><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Prepare yourself for another captivating episode of the CS2AI Podcast!&nbsp;</p><p>Today, we feature an exclusive interview with Daniel Bardenstein, a former USG official turned entrepreneur. Having recently launched a groundbreaking start-up centered on the critical concept of SBOM, Daniel brings a wealth of insider knowledge and experience to the table!&nbsp;</p><p>Daniel is the Co-founder and Chief Technology Officer of Manifest, a pioneering company specializing in comprehensive SBOM management. Their core mission is to facilitate organizations in embracing this innovative and relatively new concept with utmost simplicity and automation. Through their state-of-the-art solutions, Manifest empowers businesses to navigate the complexities of SBOM seamlessly, ushering in a new era of efficiency and ease.</p><p>In today’s riveting discussion, hosted by Bryson Bort, Daniel pulls back the curtain on what truly happens in the trenches of SBOM and unlocks the secrets to implementing his game-changing approach within organizations.&nbsp;</p><p>If you have ever wondered what SBOM is all about and how it could transform the way in which your organization operates, this interview is a must-listen! Get ready to dive into the nitty-gritty of SBOM as Daniel spills the beans on what is happening in the thick of it, offering invaluable insights on how to begin implementing this cutting-edge technology within your organization, starting today!</p><p>Fasten your seatbelt and gear up to elevate your cybersecurity game to unprecedented heights!</p><p><strong>Show highlights:</strong> </p><ul><li>What is an SBOM?&nbsp; </li><li>Why SBOM is essential for asset owners.&nbsp;</li><li>Two key ways to collect SBOMs.</li><li>Integrating vulnerability management with asset management.&nbsp;</li><li>Looking retroactively at legacy systems. </li><li>How SBOM makes vulnerability management better. </li><li>The importance of vulnerability management.&nbsp;</li><li>How to get started with internal product security.</li><li>How to get customers to take action.&nbsp;</li><li>How long will it take to see value?&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Daniel Bardenstein on&nbsp;<a href="https://www.linkedin.com/in/bardenstein/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.manifestcyber.com/" rel="noopener noreferrer" target="_blank">Manifest</a></p><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">997e8e99-61a2-41f3-aff5-24190957f3e4</guid><itunes:image href="https://artwork.captivate.fm/3e5da0b4-3a49-47b6-ad9b-ab926106d971/3SXPl3pky2bS5FAkQET7Wmue.jpg"/><pubDate>Tue, 25 Jul 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fef89112-ccd5-41bd-b7e6-7cd76ccb11ad/CS2AI-Episode-90-Audio.mp3" length="49802940" type="audio/mpeg"/><itunes:duration>34:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>90</itunes:episode><podcast:episode>90</podcast:episode></item><item><title>89: Putting Creativity and Problem Solving Skills to Use in Cybersecurity with Mike Radigan</title><itunes:title>89: Putting Creativity and Problem Solving Skills to Use in Cybersecurity with Mike Radigan</itunes:title><description><![CDATA[<p>Get ready for another captivating interview with a true cybersecurity luminary!</p><p>Joining Derek on the podcast today is the multi-talented Mike Radigan! Mike is a seasoned cyber risk advisor at Cisco with a diverse background and a knack for problem-solving.</p><p>Mike's current role is impressive, and his entire journey has been nothing short of extraordinary! Renowned for his creativity and expertise, and with a background in electrical engineering, he has proven himself a formidable problem-solver. Beyond his professional pursuits, Mike is also an avid educator, a master networker, and a passionate connector within Ohio's business and security events. Additionally, he boasts a fascinating range of interests, from being a semi-retired basketball player to a devoted cigar enthusiast and dog lover.&nbsp;</p><p>With Derek having been privileged to know Mike for years, today’s interview promises to unveil intriguing insights and stories that will captivate cybersecurity enthusiasts and general audiences alike! Stay tuned to hear about Mike’s fascinating journey and learn from his many years of cybersecurity experience!</p><p><strong>Show highlights:</strong></p><ul><li>How Mike became interested in technology.</li><li>When security first came into play at Cisco.</li><li>The evolution of cybersecurity from the early days to today.</li><li>Risk quantification and cybersecurity.&nbsp;</li><li>The importance of reliability in cyber security.&nbsp;</li><li>An agnostic model for defining how risk works.</li><li>How are those models applied in OT environments?</li><li>The importance of reliability in cyber security.</li><li>Why risk is a derived value.&nbsp;</li><li>Lessons learned from the DRC Organization.&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Mike Radigan on&nbsp;<a href="https://www.linkedin.com/in/radiganatbos/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.cisco.com/" rel="noopener noreferrer" target="_blank">Cisco</a></p>]]></description><content:encoded><![CDATA[<p>Get ready for another captivating interview with a true cybersecurity luminary!</p><p>Joining Derek on the podcast today is the multi-talented Mike Radigan! Mike is a seasoned cyber risk advisor at Cisco with a diverse background and a knack for problem-solving.</p><p>Mike's current role is impressive, and his entire journey has been nothing short of extraordinary! Renowned for his creativity and expertise, and with a background in electrical engineering, he has proven himself a formidable problem-solver. Beyond his professional pursuits, Mike is also an avid educator, a master networker, and a passionate connector within Ohio's business and security events. Additionally, he boasts a fascinating range of interests, from being a semi-retired basketball player to a devoted cigar enthusiast and dog lover.&nbsp;</p><p>With Derek having been privileged to know Mike for years, today’s interview promises to unveil intriguing insights and stories that will captivate cybersecurity enthusiasts and general audiences alike! Stay tuned to hear about Mike’s fascinating journey and learn from his many years of cybersecurity experience!</p><p><strong>Show highlights:</strong></p><ul><li>How Mike became interested in technology.</li><li>When security first came into play at Cisco.</li><li>The evolution of cybersecurity from the early days to today.</li><li>Risk quantification and cybersecurity.&nbsp;</li><li>The importance of reliability in cyber security.&nbsp;</li><li>An agnostic model for defining how risk works.</li><li>How are those models applied in OT environments?</li><li>The importance of reliability in cyber security.</li><li>Why risk is a derived value.&nbsp;</li><li>Lessons learned from the DRC Organization.&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Mike Radigan on&nbsp;<a href="https://www.linkedin.com/in/radiganatbos/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.cisco.com/" rel="noopener noreferrer" target="_blank">Cisco</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">1bd5fc87-0593-4031-ab5d-50067e10dcbe</guid><itunes:image href="https://artwork.captivate.fm/eac6d8ba-a1e8-4f39-970e-680ca28ce1f0/iddk7b2gPvBBwRxzu2h6owwz.jpg"/><pubDate>Tue, 18 Jul 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ee22eb26-9f58-4d69-9331-8c496cad2b5f/CS2AI-Episdoe-89-Audio-converted.mp3" length="25660058" type="audio/mpeg"/><itunes:duration>51:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>89</itunes:episode><podcast:episode>89</podcast:episode></item><item><title>88: CyberSecurity - The Passport to a Global Career with Omar Sherin</title><itunes:title>88: CyberSecurity - The Passport to a Global Career with Omar Sherin</itunes:title><description><![CDATA[<p>You are in for a treat today because we have an extraordinary guest and true industry titan joining us!</p><p>Omar Sherin is a renowned cybersecurity expert. He is a partner at Ernst and Young Digital Solutions and Cybersecurity and former director of OT Cybersecurity for the same prestigious firm. However, Omar is multifaceted, and his story goes beyond his professional achievements. He is also a founder, dedicated father, adventurous scuba diver, and an avid lover of cars and motorcycles!&nbsp;</p><p>With his vast experience and diverse interests, Omar has traversed the realms of technology and exploration, making him a captivating and inspiring figure in the cybersecurity world. In today’s discussion, he sheds light on his journey and delves into his remarkable contributions as a regional leader, sharing intriguing insights from his region of the world. He also gets into an exciting topic that lies ahead- prepping for the World Cup!&nbsp;</p><p>Omar Sherin is not just a technologist but also a true adventurer and global citizen! Brace yourself for an enlightening conversation that transcends the boundaries of cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>How Omar got into cybersecurity.</li><li>Two occurrences in Omar's life triggered his professional momentum.</li><li>Omar discusses the incident that opened his eyes to the value of data.</li><li>Why state-sponsored attacks require state-sponsored defenses.</li><li>Omar shares his unique perspective on cybersecurity.</li><li>How safety culture is embedded in cybersecurity.</li><li>Omar talks about building an OT team in Africa.</li><li>The ramifications of holding a world cup in Qatar.</li><li>How to prepare for a major event.</li><li>Why is cybersecurity a golden opportunity for young people?</li><li><br></li></ul><br/>]]></description><content:encoded><![CDATA[<p>You are in for a treat today because we have an extraordinary guest and true industry titan joining us!</p><p>Omar Sherin is a renowned cybersecurity expert. He is a partner at Ernst and Young Digital Solutions and Cybersecurity and former director of OT Cybersecurity for the same prestigious firm. However, Omar is multifaceted, and his story goes beyond his professional achievements. He is also a founder, dedicated father, adventurous scuba diver, and an avid lover of cars and motorcycles!&nbsp;</p><p>With his vast experience and diverse interests, Omar has traversed the realms of technology and exploration, making him a captivating and inspiring figure in the cybersecurity world. In today’s discussion, he sheds light on his journey and delves into his remarkable contributions as a regional leader, sharing intriguing insights from his region of the world. He also gets into an exciting topic that lies ahead- prepping for the World Cup!&nbsp;</p><p>Omar Sherin is not just a technologist but also a true adventurer and global citizen! Brace yourself for an enlightening conversation that transcends the boundaries of cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>How Omar got into cybersecurity.</li><li>Two occurrences in Omar's life triggered his professional momentum.</li><li>Omar discusses the incident that opened his eyes to the value of data.</li><li>Why state-sponsored attacks require state-sponsored defenses.</li><li>Omar shares his unique perspective on cybersecurity.</li><li>How safety culture is embedded in cybersecurity.</li><li>Omar talks about building an OT team in Africa.</li><li>The ramifications of holding a world cup in Qatar.</li><li>How to prepare for a major event.</li><li>Why is cybersecurity a golden opportunity for young people?</li><li><br></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">3f3bd6a4-b0a2-43e5-b4b5-ea3ae05e170e</guid><itunes:image href="https://artwork.captivate.fm/4644f59e-32c8-48aa-8077-e6678a5d3c8a/h9QzWVMltzgLH0AAagcCzeny.jpg"/><pubDate>Tue, 11 Jul 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/775373cb-9544-4faf-84cb-672e0756b8da/CS2AI-88-Edited-Audio-converted.mp3" length="24054191" type="audio/mpeg"/><itunes:duration>49:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>88</itunes:episode><podcast:episode>88</podcast:episode></item><item><title>87: Cyber Security for Transportation, Part 3 : Rails</title><itunes:title>87: Cyber Security for Transportation, Part 3 : Rails</itunes:title><description><![CDATA[<p>Today, we are excited to share a riveting panel discussion on cybersecurity for Rails!&nbsp;</p><p>We are honored to introduce our esteemed panelists, three remarkable individuals with a wealth of knowledge and expertise. Their diverse backgrounds and extensive experience in their respective domains make them invaluable contributors to today's discussion.</p><p>Miki Shifman holds the esteemed positions of CTO and Co-founder of Cylus, a company wholly dedicated to cybersecurity. With an impressive career spanning over 15 years, his expertise encompasses cybersecurity research and development, as well as communications and embedded systems. For the past six years, he has been at the helm of Cylus, focusing on rail cybersecurity and actively participating as a member of global standardization groups, advocating for awareness and best practices. Recognized as part of Forbes 30 under 30, Miki also enjoys indulging in the strategic game of chess.</p><p>Omar Sherin is a partner at EY. He leads the OT cybersecurity efforts for the MENA region. With an impressive 20-year track record in cybersecurity and a wealth of practical knowledge, his expertise extends to national security and the establishment of resilient infrastructures, including those within the rail systems.&nbsp;</p><p>Jo Dalton is a seasoned cybersecurity professional with 17 years of comprehensive industry experience. Her versatile background encompasses various facets of the field, from business compliance to operational components, along with the groundbreaking research conducted at Pen Test Partners.&nbsp;</p><p>Today’s enlightening panel discussion will provide a comprehensive view of the transportation industry, focusing on the scenarios within the rail sector.&nbsp;</p><p>Stay tuned for a thought-provoking exploration that will give you a broader perspective on railway transportation security.</p><p><strong>Show highlights:</strong></p><ul><li>How the connected world has changed things.</li><li>The complexity of the rail industry.</li><li>Why do we need more detailed standards?</li><li>Global regulations for critical infrastructure.</li><li>How old is the technology in rail?</li><li>Challenges to be faced in the next three years.</li><li>The typical life cycle of a rail safety system.</li><li>The importance of having multiple companies working together.</li><li>Cyber resilience in the rail industry.</li><li>The need for industry-driven regulation of security.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Omar Sherin on&nbsp;<a href="https://www.linkedin.com/in/osherin/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.ey.com/en_gl" rel="noopener noreferrer" target="_blank">Ernst &amp; Young (EY)</a></p><p>Jo Dalton on&nbsp;<a href="https://www.linkedin.com/in/jdalton1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.pentestpartners.com/" rel="noopener noreferrer" target="_blank">Pen Test Partners</a></p><p>Miki Shifman on&nbsp;<a href="https://www.linkedin.com/in/miki-shifman-5a5756123/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.cylus.com/" rel="noopener noreferrer" target="_blank">Cylus</a></p>]]></description><content:encoded><![CDATA[<p>Today, we are excited to share a riveting panel discussion on cybersecurity for Rails!&nbsp;</p><p>We are honored to introduce our esteemed panelists, three remarkable individuals with a wealth of knowledge and expertise. Their diverse backgrounds and extensive experience in their respective domains make them invaluable contributors to today's discussion.</p><p>Miki Shifman holds the esteemed positions of CTO and Co-founder of Cylus, a company wholly dedicated to cybersecurity. With an impressive career spanning over 15 years, his expertise encompasses cybersecurity research and development, as well as communications and embedded systems. For the past six years, he has been at the helm of Cylus, focusing on rail cybersecurity and actively participating as a member of global standardization groups, advocating for awareness and best practices. Recognized as part of Forbes 30 under 30, Miki also enjoys indulging in the strategic game of chess.</p><p>Omar Sherin is a partner at EY. He leads the OT cybersecurity efforts for the MENA region. With an impressive 20-year track record in cybersecurity and a wealth of practical knowledge, his expertise extends to national security and the establishment of resilient infrastructures, including those within the rail systems.&nbsp;</p><p>Jo Dalton is a seasoned cybersecurity professional with 17 years of comprehensive industry experience. Her versatile background encompasses various facets of the field, from business compliance to operational components, along with the groundbreaking research conducted at Pen Test Partners.&nbsp;</p><p>Today’s enlightening panel discussion will provide a comprehensive view of the transportation industry, focusing on the scenarios within the rail sector.&nbsp;</p><p>Stay tuned for a thought-provoking exploration that will give you a broader perspective on railway transportation security.</p><p><strong>Show highlights:</strong></p><ul><li>How the connected world has changed things.</li><li>The complexity of the rail industry.</li><li>Why do we need more detailed standards?</li><li>Global regulations for critical infrastructure.</li><li>How old is the technology in rail?</li><li>Challenges to be faced in the next three years.</li><li>The typical life cycle of a rail safety system.</li><li>The importance of having multiple companies working together.</li><li>Cyber resilience in the rail industry.</li><li>The need for industry-driven regulation of security.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Omar Sherin on&nbsp;<a href="https://www.linkedin.com/in/osherin/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.ey.com/en_gl" rel="noopener noreferrer" target="_blank">Ernst &amp; Young (EY)</a></p><p>Jo Dalton on&nbsp;<a href="https://www.linkedin.com/in/jdalton1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.pentestpartners.com/" rel="noopener noreferrer" target="_blank">Pen Test Partners</a></p><p>Miki Shifman on&nbsp;<a href="https://www.linkedin.com/in/miki-shifman-5a5756123/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.cylus.com/" rel="noopener noreferrer" target="_blank">Cylus</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">58848ad9-ac31-44bb-9632-1acdc9aacf68</guid><itunes:image href="https://artwork.captivate.fm/2296659b-74b6-457f-8222-2d9c6a1e0560/G5zIbGL2tuXSYL_YY6BJzNQp.jpg"/><pubDate>Tue, 04 Jul 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1af9540e-d648-485c-aa3f-33709d1d65af/CS2AI-Ttansport-Part-4-Edited-audio-converted.mp3" length="37362083" type="audio/mpeg"/><itunes:duration>51:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>87</itunes:episode><podcast:episode>87</podcast:episode></item><item><title>86: Cyber Security for Transportation, Part 3: Maritime</title><itunes:title>86: Cyber Security for Transportation, Part 3: Maritime</itunes:title><description><![CDATA[<p>Today, we have the pleasure of introducing two esteemed panelists poised to ignite our minds with their profound expertise on cybersecurity in the maritime sector.&nbsp;</p><p>Gary Kessler and James Cabe are two remarkable individuals who will shed light on the vast spectrum of applications that intertwine maritime operations and the crucial realm of cybersecurity.&nbsp;</p><p>Gary Kessler is a retired cybersecurity professor who has embraced diverse roles. With a remarkable career starting in the late 1970s, Gary has immersed himself in information security. However, his passion for maritime cyber has captivated his attention for the past five to six years. During the challenging times of the COVID-19 pandemic, Gary undertook a personal project close to his heart: writing a book on maritime cyber. Presently, he dedicates his life to exploring the depths of the water, both physically and intellectually, as he navigates the intricacies of cybersecurity in the maritime realm.</p><p>James Cabe is a seasoned cybersecurity specialist. He hails from a background deeply rooted in the history of the industry. Having spent his formative years at BBN Planet, James carries a wealth of experience. He ventured into diverse sectors during his career, including retail, foreign national critical infrastructure, and the oil and gas industry. He is currently immersed in the IoT realm, spearheading his own startup focused on developing a chaos-resilient Human-Machine Interface (HMI) independent of Windows. While James acknowledges his comparatively lesser experience in the maritime domain, his expertise in the oil and gas sector, particularly in anchoring systems, vibration analysis, and mud logging, adds a unique perspective to this distinguished panel.&nbsp;</p><p>In today’s exhilarating exploration, we delve into the intricate world where technology meets the high seas and discover how safeguarding our industry has become paramount in the face of emerging digital challenges. The diverse backgrounds and perspectives of the panelists ensure an engaging and comprehensive discussion on the topic at hand.</p><p>Stay tuned for an enlightening and dynamic conversation that promises to capture the essence of the maritime industry's cybersecurity landscape!</p><p><strong>Show highlights:</strong></p><ul><li>The importance of cybersecurity in the maritime sector.</li><li>Why maritime is essential for national security, defense, energy, food security, and economic security.</li><li>Dealing with high-consequence events.</li><li>The cost of retrofitting new technologies onto old ships.</li><li>The push for autonomy on ships.</li><li>The dangers of relying on digital information.</li><li>The future of big boats and smart ships.</li><li>The lack of resiliency in maritime systems.</li><li>Automation and digitalization of the Maritime industry.</li><li>Building a cyber safety culture.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Gary Kessler on&nbsp;<a href="https://www.linkedin.com/in/garykessler/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.garykessler.net/" rel="noopener noreferrer" target="_blank">Gary Kessler Associates</a></p><p>James Cabe on&nbsp;<a href="https://www.linkedin.com/in/jamescabe/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://zpesystems.com/" rel="noopener noreferrer" target="_blank">ZPE Systems</a></p>]]></description><content:encoded><![CDATA[<p>Today, we have the pleasure of introducing two esteemed panelists poised to ignite our minds with their profound expertise on cybersecurity in the maritime sector.&nbsp;</p><p>Gary Kessler and James Cabe are two remarkable individuals who will shed light on the vast spectrum of applications that intertwine maritime operations and the crucial realm of cybersecurity.&nbsp;</p><p>Gary Kessler is a retired cybersecurity professor who has embraced diverse roles. With a remarkable career starting in the late 1970s, Gary has immersed himself in information security. However, his passion for maritime cyber has captivated his attention for the past five to six years. During the challenging times of the COVID-19 pandemic, Gary undertook a personal project close to his heart: writing a book on maritime cyber. Presently, he dedicates his life to exploring the depths of the water, both physically and intellectually, as he navigates the intricacies of cybersecurity in the maritime realm.</p><p>James Cabe is a seasoned cybersecurity specialist. He hails from a background deeply rooted in the history of the industry. Having spent his formative years at BBN Planet, James carries a wealth of experience. He ventured into diverse sectors during his career, including retail, foreign national critical infrastructure, and the oil and gas industry. He is currently immersed in the IoT realm, spearheading his own startup focused on developing a chaos-resilient Human-Machine Interface (HMI) independent of Windows. While James acknowledges his comparatively lesser experience in the maritime domain, his expertise in the oil and gas sector, particularly in anchoring systems, vibration analysis, and mud logging, adds a unique perspective to this distinguished panel.&nbsp;</p><p>In today’s exhilarating exploration, we delve into the intricate world where technology meets the high seas and discover how safeguarding our industry has become paramount in the face of emerging digital challenges. The diverse backgrounds and perspectives of the panelists ensure an engaging and comprehensive discussion on the topic at hand.</p><p>Stay tuned for an enlightening and dynamic conversation that promises to capture the essence of the maritime industry's cybersecurity landscape!</p><p><strong>Show highlights:</strong></p><ul><li>The importance of cybersecurity in the maritime sector.</li><li>Why maritime is essential for national security, defense, energy, food security, and economic security.</li><li>Dealing with high-consequence events.</li><li>The cost of retrofitting new technologies onto old ships.</li><li>The push for autonomy on ships.</li><li>The dangers of relying on digital information.</li><li>The future of big boats and smart ships.</li><li>The lack of resiliency in maritime systems.</li><li>Automation and digitalization of the Maritime industry.</li><li>Building a cyber safety culture.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Gary Kessler on&nbsp;<a href="https://www.linkedin.com/in/garykessler/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.garykessler.net/" rel="noopener noreferrer" target="_blank">Gary Kessler Associates</a></p><p>James Cabe on&nbsp;<a href="https://www.linkedin.com/in/jamescabe/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://zpesystems.com/" rel="noopener noreferrer" target="_blank">ZPE Systems</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">b316c456-430f-4c6b-9547-5408a593981d</guid><itunes:image href="https://artwork.captivate.fm/b11e2af1-24fb-4d0b-bde1-0f99094edf13/6I7B5MyTzfFkTgA7agjf19YN.png"/><pubDate>Tue, 27 Jun 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3455df0d-e387-4607-b261-3c35f29dead7/CS-2AI-86-Edited-Audio-converted.mp3" length="26155018" type="audio/mpeg"/><itunes:duration>54:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>86</itunes:episode><podcast:episode>86</podcast:episode></item><item><title>85: Cyber Security for the Aviation Industry, Part 2</title><itunes:title>85: Cyber Security for the Aviation Industry, Part 2</itunes:title><description><![CDATA[<p>We are delighted to welcome you to a riveting panel discussion on a subject at the intersection of technology, security, and the boundless skies!&nbsp;</p><p>Today, we delve into the captivating realm of cyber security for aviation and aerospace! We are honored to introduce our three remarkable panelists, each of whom possesses a wealth of knowledge and expertise in their respective domain:</p><p>Jonathan Pollet is a renowned figure at Red Tiger Security, known for his 22 years of dedicated work in OT and industrial control systems cybersecurity.&nbsp;</p><p>Barbara Grofe hails from the esteemed Institute of Space and Cyber Research, where she specializes in space asset security and resiliency.&nbsp;&nbsp;</p><p>Shawn Goudge is a seasoned professional who has made significant contributions to physical security in aviation globally while actively exploring the convergence of physical security and cybersecurity.&nbsp;</p><p>This esteemed trio of experts joins forces to shed light on the vital connection between physical security and cybersecurity.&nbsp;</p><p>Stay tuned for today’s enlightening panel discussion on cyber security for aviation and aerospace that promises to unravel the intricacies of safeguarding our skies and beyond!</p><p><strong>Show highlights:</strong></p><ul><li>Jonathan talks about a recent assessment of airport systems in Doha, Qatar.</li><li>Why is cybersecurity very immature from the aerospace and satellite perspective?&nbsp;</li><li>Who is responsible for OT cybersecurity at the airport?</li><li>There is a lot of confusion within organizations about who is responsible for looking at threats.</li><li>Why does cybersecurity legislation need to catch up?</li><li>How physical and cybersecurity systems do not intertwine properly.</li><li>Who is responsible for aviation security?</li><li>Are satellites still easy to hack if they are sophisticated and compartmentalized?</li><li>Do 5G and 6G pose specific risks for the aviation and aerospace sectors?</li><li>The most common types of attacks on airlines.</li><li>Barbara shares the key to addressing aerospace cybersecurity.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Jonathan Pollet on&nbsp;<a href="https://www.linkedin.com/in/jonathanpollet/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="http://redtigersecurity.com/" rel="noopener noreferrer" target="_blank">Red Tiger Security</a></p><p>Barbara Grofe on&nbsp;<a href="https://www.linkedin.com/in/barbaragrofeitconsultant/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.iscr-us.org/" rel="noopener noreferrer" target="_blank">Institute of Space and Cyber Research</a></p><p>Shawn Goudge on&nbsp;<a href="https://www.linkedin.com/in/shawn-goudge-cpp-avsec-pm-84250213/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.yyc.com/" rel="noopener noreferrer" target="_blank">The Calgary Airport Authority</a></p>]]></description><content:encoded><![CDATA[<p>We are delighted to welcome you to a riveting panel discussion on a subject at the intersection of technology, security, and the boundless skies!&nbsp;</p><p>Today, we delve into the captivating realm of cyber security for aviation and aerospace! We are honored to introduce our three remarkable panelists, each of whom possesses a wealth of knowledge and expertise in their respective domain:</p><p>Jonathan Pollet is a renowned figure at Red Tiger Security, known for his 22 years of dedicated work in OT and industrial control systems cybersecurity.&nbsp;</p><p>Barbara Grofe hails from the esteemed Institute of Space and Cyber Research, where she specializes in space asset security and resiliency.&nbsp;&nbsp;</p><p>Shawn Goudge is a seasoned professional who has made significant contributions to physical security in aviation globally while actively exploring the convergence of physical security and cybersecurity.&nbsp;</p><p>This esteemed trio of experts joins forces to shed light on the vital connection between physical security and cybersecurity.&nbsp;</p><p>Stay tuned for today’s enlightening panel discussion on cyber security for aviation and aerospace that promises to unravel the intricacies of safeguarding our skies and beyond!</p><p><strong>Show highlights:</strong></p><ul><li>Jonathan talks about a recent assessment of airport systems in Doha, Qatar.</li><li>Why is cybersecurity very immature from the aerospace and satellite perspective?&nbsp;</li><li>Who is responsible for OT cybersecurity at the airport?</li><li>There is a lot of confusion within organizations about who is responsible for looking at threats.</li><li>Why does cybersecurity legislation need to catch up?</li><li>How physical and cybersecurity systems do not intertwine properly.</li><li>Who is responsible for aviation security?</li><li>Are satellites still easy to hack if they are sophisticated and compartmentalized?</li><li>Do 5G and 6G pose specific risks for the aviation and aerospace sectors?</li><li>The most common types of attacks on airlines.</li><li>Barbara shares the key to addressing aerospace cybersecurity.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Jonathan Pollet on&nbsp;<a href="https://www.linkedin.com/in/jonathanpollet/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="http://redtigersecurity.com/" rel="noopener noreferrer" target="_blank">Red Tiger Security</a></p><p>Barbara Grofe on&nbsp;<a href="https://www.linkedin.com/in/barbaragrofeitconsultant/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.iscr-us.org/" rel="noopener noreferrer" target="_blank">Institute of Space and Cyber Research</a></p><p>Shawn Goudge on&nbsp;<a href="https://www.linkedin.com/in/shawn-goudge-cpp-avsec-pm-84250213/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.yyc.com/" rel="noopener noreferrer" target="_blank">The Calgary Airport Authority</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">2bcc8e4a-288c-492c-8d4b-f62026f04eb2</guid><itunes:image href="https://artwork.captivate.fm/175682af-05e2-48d2-8155-47c8819e067b/46zCs0Sonp29VvBt-4pBmQri.png"/><pubDate>Tue, 20 Jun 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0dcdc337-7ed5-4015-87ed-b6e8cbecceb3/CS-2AI-85-Transport-Pt-2-Edited-Audio-converted.mp3" length="23546679" type="audio/mpeg"/><itunes:duration>48:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>85</itunes:episode><podcast:episode>85</podcast:episode></item><item><title>84: Cyber Security for the Automotive &amp; Trucking Industry, Part 1</title><itunes:title>84: Cyber Security for the Automotive &amp; Trucking Industry, Part 1</itunes:title><description><![CDATA[<p>We are excited to welcome you to our eagerly anticipated panel discussion on the ever-evolving automotive and trucking industries!&nbsp;</p><p>Today, we are privileged to host a remarkable trio of experts who will provide us with invaluable insights and diverse perspectives. We are delighted to introduce our esteemed panelists, Michael Clifford, Nikhil Bogam, and Antwan Banks. Each of these luminaries brings a unique perspective, promising a diverse and enlightening discussion that will unveil the inner workings of their respective organizations.</p><p>Antwan Banks joined the National Motor Freight Traffic Association (NMFTA) about two months ago. His primary role is advocating for security practices as the industry advances into autonomous trucks, electric vehicles, and interconnected networks. With the overarching aim of safeguarding the welfare of motor carriers, Antwan's mission aligns with the NMFTA's dedication to fostering a thriving and secure environment within the motor freight industry.</p><p>Nikhil Bogam is a seasoned professional with a remarkable career spanning 17 years in the automotive industry. He currently serves as a technical lead in functional safety and cybersecurity at Faurecia Forvia. With over six years dedicated to cybersecurity, Nikhil possesses a profound understanding of the intricate relationship between automotive technology and cybersecurity, recognizing its unique nature compared to conventional infrastructure security. He brings extensive expertise in the 21434 Standard, a recently published industry benchmark, and is actively involved in shaping forthcoming European regulations concerning automotive cybersecurity.&nbsp;</p><p>Michael Clifford is a highly regarded professional and principal researcher in cybersecurity and privacy at Toyota Infotech Labs, the prestigious advanced research and development division of Toyota. With a unique focus on long-term projections, Michael engages in projects that anticipate developments a decade or more into the future. His responsibilities involve predicting and addressing security challenges for technologies that have yet to materialize. Moreover, Michael takes on a leadership role in a consortium of universities dedicated to cutting-edge cybersecurity research, encompassing a diverse range of domains such as security theory, cyber-physical attacks and defenses, and machine learning. His extensive expertise in cybersecurity research dates back to 1998, and his interests span a wide spectrum, including security, privacy, machine learning, autonomy, ad hoc networks, energy efficiency, engineering, transportation, manufacturing, and user-centric design. With a wealth of knowledge and a forward-thinking mindset, Michael plays a pivotal role in driving innovation and ensuring the security of future technologies.</p><p>We invite you to join us as we embark on this compelling odyssey of knowledge and discovery and uncover the intricacies of the automotive and trucking industries and the remarkable visions that lie ahead. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The differences between trucking industrial control system cybersecurity and traditional cybersecurity.</li><li>Michael shares his thoughts on electric vehicle (EV) charging stations.</li><li>Security and privacy for autonomous vehicles.</li><li>Why the automotive industry needs to think about problems that will occur.</li><li>The evolution of the automotive industry.</li><li>The future of security in the transportation industry.</li><li>Does the automotive and trucking industry view federal rules as positive for cybersecurity or a hindrance?</li><li>Looking at standards within the industry.</li><li>Where automakers are, in terms of taking on cybersecurity for cars and trucks.</li><li>How AI plays into the future of the automotive industry.</li><li>Are common protocols and standards shared across the automotive industry?</li><li>Can EVs be used to spread malicious...]]></description><content:encoded><![CDATA[<p>We are excited to welcome you to our eagerly anticipated panel discussion on the ever-evolving automotive and trucking industries!&nbsp;</p><p>Today, we are privileged to host a remarkable trio of experts who will provide us with invaluable insights and diverse perspectives. We are delighted to introduce our esteemed panelists, Michael Clifford, Nikhil Bogam, and Antwan Banks. Each of these luminaries brings a unique perspective, promising a diverse and enlightening discussion that will unveil the inner workings of their respective organizations.</p><p>Antwan Banks joined the National Motor Freight Traffic Association (NMFTA) about two months ago. His primary role is advocating for security practices as the industry advances into autonomous trucks, electric vehicles, and interconnected networks. With the overarching aim of safeguarding the welfare of motor carriers, Antwan's mission aligns with the NMFTA's dedication to fostering a thriving and secure environment within the motor freight industry.</p><p>Nikhil Bogam is a seasoned professional with a remarkable career spanning 17 years in the automotive industry. He currently serves as a technical lead in functional safety and cybersecurity at Faurecia Forvia. With over six years dedicated to cybersecurity, Nikhil possesses a profound understanding of the intricate relationship between automotive technology and cybersecurity, recognizing its unique nature compared to conventional infrastructure security. He brings extensive expertise in the 21434 Standard, a recently published industry benchmark, and is actively involved in shaping forthcoming European regulations concerning automotive cybersecurity.&nbsp;</p><p>Michael Clifford is a highly regarded professional and principal researcher in cybersecurity and privacy at Toyota Infotech Labs, the prestigious advanced research and development division of Toyota. With a unique focus on long-term projections, Michael engages in projects that anticipate developments a decade or more into the future. His responsibilities involve predicting and addressing security challenges for technologies that have yet to materialize. Moreover, Michael takes on a leadership role in a consortium of universities dedicated to cutting-edge cybersecurity research, encompassing a diverse range of domains such as security theory, cyber-physical attacks and defenses, and machine learning. His extensive expertise in cybersecurity research dates back to 1998, and his interests span a wide spectrum, including security, privacy, machine learning, autonomy, ad hoc networks, energy efficiency, engineering, transportation, manufacturing, and user-centric design. With a wealth of knowledge and a forward-thinking mindset, Michael plays a pivotal role in driving innovation and ensuring the security of future technologies.</p><p>We invite you to join us as we embark on this compelling odyssey of knowledge and discovery and uncover the intricacies of the automotive and trucking industries and the remarkable visions that lie ahead. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The differences between trucking industrial control system cybersecurity and traditional cybersecurity.</li><li>Michael shares his thoughts on electric vehicle (EV) charging stations.</li><li>Security and privacy for autonomous vehicles.</li><li>Why the automotive industry needs to think about problems that will occur.</li><li>The evolution of the automotive industry.</li><li>The future of security in the transportation industry.</li><li>Does the automotive and trucking industry view federal rules as positive for cybersecurity or a hindrance?</li><li>Looking at standards within the industry.</li><li>Where automakers are, in terms of taking on cybersecurity for cars and trucks.</li><li>How AI plays into the future of the automotive industry.</li><li>Are common protocols and standards shared across the automotive industry?</li><li>Can EVs be used to spread malicious codes?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Antwan Banks on&nbsp;<a href="https://www.linkedin.com/in/antwan-banks-cism-cissp-cisa-ceh-cciso-29465314/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://nmfta.org/" rel="noopener noreferrer" target="_blank">National Motor Freight Traffic Association</a></p><p>Nikhil Bogam on&nbsp;<a href="https://www.linkedin.com/in/nikhil-bogam-b6986317/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.faurecia.com/en/newsroom/faurecia-and-hella-announce-name-worlds-seventh-largest-automotive-supplier" rel="noopener noreferrer" target="_blank">Forvia Faurecia</a></p><p>Michael Clifford on&nbsp;<a href="https://www.linkedin.com/in/michael-clifford-90651814/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://amrd.toyota.com/division/itl/" rel="noopener noreferrer" target="_blank">Toyota InfoTech Labs</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">416bcbe6-a3d6-416d-83ec-a7ab3ba8f814</guid><itunes:image href="https://artwork.captivate.fm/f3a95c23-203d-473e-849e-5edda31b7337/JUaAI4Mf9CTACObbBhujI8Mf.jpeg"/><pubDate>Tue, 13 Jun 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f6bf5c7a-87be-4caa-8bd5-81d4acee1a56/CS-2AI-Automotive-Panel-Edited-Audio-converted.mp3" length="41237266" type="audio/mpeg"/><itunes:duration>56:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>84</itunes:episode><podcast:episode>84</podcast:episode></item><item><title>83: Steve Mustard with Bob Radvanovsky: Latest Developments, Challenges, and Emerging Trends in Cybersecurity</title><itunes:title>83: Steve Mustard with Bob Radvanovsky: Latest Developments, Challenges, and Emerging Trends in Cybersecurity</itunes:title><description><![CDATA[<p>Welcome to today’s ground-breaking episode of the CS2AI podcast, where we have the privilege of hosting a dynamic duo of cybersecurity specialists who have dedicated their careers to protecting our critical infrastructure!&nbsp;</p><p>Steve Mustard is a seasoned automation engineer from Houston, Texas, with a passion for securing automation and control systems. Having served as President of the International Society of Automation in 2021, his commitment to this field runs deep.&nbsp;</p><p>Bob Radvanovsky is a true pioneer in industrial cybersecurity! He is the Co-founder of the renowned SCADASEC mailing list and the mastermind behind Project Shine. With his vast expertise in safeguarding control systems, IoT, and industrial IoT systems, Bob is currently at the forefront of fortifying our energy sector and protecting the grid.&nbsp;</p><p>In this innovative episode, Steve Mustard, with his unwavering commitment to the field, and Bob Radvanovsky, a true trailblazer in industrial cybersecurity, share their wealth of knowledge and experience in securing automation and control systems.&nbsp;</p><p>Stay tuned as Steve and Bob unravel the latest developments, challenges, and emerging trends in the ever-evolving world of cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>Why are we still having serious major incidents when there is so much awareness around cybersecurity?</li><li>Bob talks about the idea behind Skidmark, his publically-accessible database for collecting information about industrial cybersecurity incidents.</li><li>Staying up to date with cyber security.</li><li>Why is there a disconnect between CEOs and operations?</li><li>Managing cybersecurity on a risk basis.</li><li>Problems with remote access.</li><li>Do regulations actually help improve cybersecurity?</li><li>Why must people who help people have an intimate understanding of the subject?</li><li>What is a holistic approach to critical infrastructure?</li><li>Simple things that can prevent egregious attacks.</li><li>What can you expect from the fifth edition of Bob’s book, Critical Infrastructure, Homeland Security, and Emergency Preparedness?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Bob Radvanovsky on&nbsp;<a href="https://www.linkedin.com/in/infracritical/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Steve Mustard on&nbsp;<a href="https://www.linkedin.com/in/steve-mustard-794a0a2/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Welcome to today’s ground-breaking episode of the CS2AI podcast, where we have the privilege of hosting a dynamic duo of cybersecurity specialists who have dedicated their careers to protecting our critical infrastructure!&nbsp;</p><p>Steve Mustard is a seasoned automation engineer from Houston, Texas, with a passion for securing automation and control systems. Having served as President of the International Society of Automation in 2021, his commitment to this field runs deep.&nbsp;</p><p>Bob Radvanovsky is a true pioneer in industrial cybersecurity! He is the Co-founder of the renowned SCADASEC mailing list and the mastermind behind Project Shine. With his vast expertise in safeguarding control systems, IoT, and industrial IoT systems, Bob is currently at the forefront of fortifying our energy sector and protecting the grid.&nbsp;</p><p>In this innovative episode, Steve Mustard, with his unwavering commitment to the field, and Bob Radvanovsky, a true trailblazer in industrial cybersecurity, share their wealth of knowledge and experience in securing automation and control systems.&nbsp;</p><p>Stay tuned as Steve and Bob unravel the latest developments, challenges, and emerging trends in the ever-evolving world of cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>Why are we still having serious major incidents when there is so much awareness around cybersecurity?</li><li>Bob talks about the idea behind Skidmark, his publically-accessible database for collecting information about industrial cybersecurity incidents.</li><li>Staying up to date with cyber security.</li><li>Why is there a disconnect between CEOs and operations?</li><li>Managing cybersecurity on a risk basis.</li><li>Problems with remote access.</li><li>Do regulations actually help improve cybersecurity?</li><li>Why must people who help people have an intimate understanding of the subject?</li><li>What is a holistic approach to critical infrastructure?</li><li>Simple things that can prevent egregious attacks.</li><li>What can you expect from the fifth edition of Bob’s book, Critical Infrastructure, Homeland Security, and Emergency Preparedness?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Bob Radvanovsky on&nbsp;<a href="https://www.linkedin.com/in/infracritical/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Steve Mustard on&nbsp;<a href="https://www.linkedin.com/in/steve-mustard-794a0a2/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">b49c0986-3d86-4c81-a290-2bd9257b39ce</guid><itunes:image href="https://artwork.captivate.fm/3eda1207-a54f-48bd-98f1-d592b756c7f2/GKDq9KHv422heaCDoJRLF4qb.jpg"/><pubDate>Tue, 06 Jun 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/106586e3-8ef1-4ce5-b290-f7b82303c0d3/CS-2AI-83-Edited-Audio-converted.mp3" length="26798107" type="audio/mpeg"/><itunes:duration>54:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>83</itunes:episode><podcast:episode>83</podcast:episode></item><item><title>82: Shaping the Cybersecurity Industry Through Persistent Innovation with Jonathan Pollet</title><itunes:title>82: Shaping the Cybersecurity Industry Through Persistent Innovation with Jonathan Pollet</itunes:title><description><![CDATA[<p>Derek is super excited to welcome a true trailblazer in the world of cybersecurity today!</p><p>Jonathan Pollet is the Founder and Executive Director of Red Tiger Security. He is an invaluable pioneer and a long-time contributor to the cybersecurity community. He has been a guiding light for those who ventured into cybersecurity from traditional IP backgrounds over a decade ago.&nbsp;</p><p>Red Tiger Security is a focused SCADA Security consultancy, training, and research firm dedicated to the resiliency of national critical infrastructure and mission-critical business systems that must be available on a 24x7 basis. Red Tiger Security has developed and implemented a 6-layer Vulnerability Assessment approach that encompasses both Physical and Cyber security for ICS (Industrial Control Systems).</p><p>Hailing from the vibrant city of New Orleans, Louisiana, Jonathan’s upbringing was shaped by the unwavering dedication of his single mother. Determined to pursue a path in electrical engineering, he tirelessly sought opportunities to secure a full scholarship, ultimately leading him to the doors of Louisiana State University. Fortunately, his efforts paid off, and he emerged holding a four-year degree at the age of 21. Growing up in the lively streets of New Orleans instilled in him a belief that anything is possible when met with resilience and a zest for life!</p><p>With an illustrious background as a SCADA engineer, Jonathan has become an AI and OT security evangelist, leaving an indelible mark as an entrepreneur and business owner. In addition, he is also an instructor, speaker, scuba diver, and even a talented sax player!</p><p>Join us as we uncover the extraordinary life of Jonathan Pollet, a multifaceted force shaping the landscape of cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>How Jonathan got started in digital process control.</li><li>Jonathan shares a pivotal moment in his cybersecurity journey where he witnessed the entire system repeatedly crashing due to a network issue caused by a user in Australia attempting to draw a network diagram.</li><li>Jonathan explains how he taught himself cybersecurity and became an advocate for it.</li><li>What prompted him to create a course in cybersecurity?</li><li>Jonathan dives into his transition from working for Chevron to becoming an entrepreneur.</li><li>Why selling cybersecurity is not always easy.</li><li>Is the industry waking up to the importance of cyber hygiene?</li><li>How is OT learning from the IT world?</li><li>Jonathan explains how things will become more and more connected in the future.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="http://redtigersecurity.com/" rel="noopener noreferrer" target="_blank">Red Tiger Security</a></p><p>Jonathan Pollet on&nbsp;<a href="https://www.linkedin.com/in/jonathanpollet/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Red Tiger Security on&nbsp;<a href="https://www.linkedin.com/company/redtigersec/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Derek is super excited to welcome a true trailblazer in the world of cybersecurity today!</p><p>Jonathan Pollet is the Founder and Executive Director of Red Tiger Security. He is an invaluable pioneer and a long-time contributor to the cybersecurity community. He has been a guiding light for those who ventured into cybersecurity from traditional IP backgrounds over a decade ago.&nbsp;</p><p>Red Tiger Security is a focused SCADA Security consultancy, training, and research firm dedicated to the resiliency of national critical infrastructure and mission-critical business systems that must be available on a 24x7 basis. Red Tiger Security has developed and implemented a 6-layer Vulnerability Assessment approach that encompasses both Physical and Cyber security for ICS (Industrial Control Systems).</p><p>Hailing from the vibrant city of New Orleans, Louisiana, Jonathan’s upbringing was shaped by the unwavering dedication of his single mother. Determined to pursue a path in electrical engineering, he tirelessly sought opportunities to secure a full scholarship, ultimately leading him to the doors of Louisiana State University. Fortunately, his efforts paid off, and he emerged holding a four-year degree at the age of 21. Growing up in the lively streets of New Orleans instilled in him a belief that anything is possible when met with resilience and a zest for life!</p><p>With an illustrious background as a SCADA engineer, Jonathan has become an AI and OT security evangelist, leaving an indelible mark as an entrepreneur and business owner. In addition, he is also an instructor, speaker, scuba diver, and even a talented sax player!</p><p>Join us as we uncover the extraordinary life of Jonathan Pollet, a multifaceted force shaping the landscape of cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>How Jonathan got started in digital process control.</li><li>Jonathan shares a pivotal moment in his cybersecurity journey where he witnessed the entire system repeatedly crashing due to a network issue caused by a user in Australia attempting to draw a network diagram.</li><li>Jonathan explains how he taught himself cybersecurity and became an advocate for it.</li><li>What prompted him to create a course in cybersecurity?</li><li>Jonathan dives into his transition from working for Chevron to becoming an entrepreneur.</li><li>Why selling cybersecurity is not always easy.</li><li>Is the industry waking up to the importance of cyber hygiene?</li><li>How is OT learning from the IT world?</li><li>Jonathan explains how things will become more and more connected in the future.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="http://redtigersecurity.com/" rel="noopener noreferrer" target="_blank">Red Tiger Security</a></p><p>Jonathan Pollet on&nbsp;<a href="https://www.linkedin.com/in/jonathanpollet/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Red Tiger Security on&nbsp;<a href="https://www.linkedin.com/company/redtigersec/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">a782b88d-301e-488f-b1c8-6cdfa934a454</guid><itunes:image href="https://artwork.captivate.fm/8bbfa366-bfea-465f-ace5-95391a96f62d/xU5wP5J0vrD8ALoGA5OgDrr-.jpg"/><pubDate>Tue, 23 May 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c3f27b29-adbf-485f-9514-94e2bff6e7d3/CS2AI-Episode-82-Edited-Audio-converted.mp3" length="43325446" type="audio/mpeg"/><itunes:duration>43:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>82</itunes:episode><podcast:episode>82</podcast:episode></item><item><title>81: Cyber Security for Railway Systems with Olivier De Visscher</title><itunes:title>81: Cyber Security for Railway Systems with Olivier De Visscher</itunes:title><description><![CDATA[<p>Derek is delighted to have a special guest calling in from Brussels today!&nbsp;</p><p>Olivier De Visscher is the current Head of Railway Industrial Cybersecurity at the Expleo Group. He joins Derek to shed light on the importance of cybersecurity for the railway industry and discuss its implications for the future.</p><p>With a total of 25 years of experience, Olivier has dedicated ten of those years to the field of Industrial Cybersecurity. He shares his expertise and promotes collaboration with the cybersecurity domain of the European Transportation sector. He remains closely connected to the railway community, including RU, IM, and the Industry, as it provides him with a valuable opportunity to work across different areas. Olivier continues to support various European initiatives in the field of railway cybersecurity.</p><p>As we kick off our focus on transportation this month, starting with a series of events, seminars, and podcast episodes on May 17th, we could not be more excited to have Olivier joining us. With over 25 years of experience in IT and technology, Olivier brings a wealth of knowledge and expertise in railway systems and other industrial applications. Stay tuned to learn more about Olivier and his insights on railway cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>Olivier discusses his background in cybersecurity.</li><li>What led Olivier to specialize in rail security?</li><li>Olivier dives into the need for a new cybersecurity standard for rail.</li><li>Why is cyber security so important in the transport sector?</li><li>The importance of a cybersecurity approach in the safety case.</li><li>Why you cannot protect against everything, especially when the threats are high-level.</li><li>What is the tech refresh rate?&nbsp;</li><li>Is ancient technology still in play?</li><li>What is going uniquely well in the rail industry?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://expleo.com/global/en/" rel="noopener noreferrer" target="_blank">Expleo Group</a></p><p>Olivier De Visscher on&nbsp;<a href="https://www.linkedin.com/in/olivierdevisscher/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Derek is delighted to have a special guest calling in from Brussels today!&nbsp;</p><p>Olivier De Visscher is the current Head of Railway Industrial Cybersecurity at the Expleo Group. He joins Derek to shed light on the importance of cybersecurity for the railway industry and discuss its implications for the future.</p><p>With a total of 25 years of experience, Olivier has dedicated ten of those years to the field of Industrial Cybersecurity. He shares his expertise and promotes collaboration with the cybersecurity domain of the European Transportation sector. He remains closely connected to the railway community, including RU, IM, and the Industry, as it provides him with a valuable opportunity to work across different areas. Olivier continues to support various European initiatives in the field of railway cybersecurity.</p><p>As we kick off our focus on transportation this month, starting with a series of events, seminars, and podcast episodes on May 17th, we could not be more excited to have Olivier joining us. With over 25 years of experience in IT and technology, Olivier brings a wealth of knowledge and expertise in railway systems and other industrial applications. Stay tuned to learn more about Olivier and his insights on railway cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>Olivier discusses his background in cybersecurity.</li><li>What led Olivier to specialize in rail security?</li><li>Olivier dives into the need for a new cybersecurity standard for rail.</li><li>Why is cyber security so important in the transport sector?</li><li>The importance of a cybersecurity approach in the safety case.</li><li>Why you cannot protect against everything, especially when the threats are high-level.</li><li>What is the tech refresh rate?&nbsp;</li><li>Is ancient technology still in play?</li><li>What is going uniquely well in the rail industry?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://expleo.com/global/en/" rel="noopener noreferrer" target="_blank">Expleo Group</a></p><p>Olivier De Visscher on&nbsp;<a href="https://www.linkedin.com/in/olivierdevisscher/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">4f00978f-4d02-45b5-ac11-e4f7b01d1486</guid><itunes:image href="https://artwork.captivate.fm/ee20cace-6afd-4db2-a281-9415861e9573/nm1_CWGEjWaWVif7bhBBmH5e.jpg"/><pubDate>Tue, 16 May 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/94140b2c-cb37-4dd2-8a40-44e5ff1a4cac/CS2AI-81-Edited-Audio-converted.mp3" length="12366197" type="audio/mpeg"/><itunes:duration>25:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>81</itunes:episode><podcast:episode>81</podcast:episode></item><item><title>80: Robots, Rails, Bytes and Risk A Modern ICS Success Story with Brent Huston</title><itunes:title>80: Robots, Rails, Bytes and Risk A Modern ICS Success Story with Brent Huston</itunes:title><description><![CDATA[<p>We have a special treat for you today! Our friend and colleague, Brent Huston, joins Derek for an online CS2AI session to explore the fascinating modern ICS success story of robots, rails, bytes, and risk.&nbsp;</p><p>Brent Huston is a cybersecurity expert who has been a business owner in this space for over three decades. He has a deep technical background but can explain complex concepts in a way that is easily understandable by everyone.&nbsp;</p><p>In the 30 years he has been in the technology business, Brent has worked on various projects involving automated warehousing, inventory control systems, and point-of-sale systems. He also has expertise in cybersecurity and industrial automation.&nbsp;</p><p>With his years of experience and expertise in the field, Brent will take us on a journey through the evolution of ICS security and share some valuable insights on achieving success in this constantly evolving landscape. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Why warehousing is becoming a hot area for disruption.</li><li>How robots move at high speeds and are user-programmable.</li><li>Were there any considerations given to EMF attacks or sonic attacks?</li><li>Brent dives into staffing with a team used to OT protocols.</li><li>Using NLP to parse documentation and generate inventory reports and configuration maps.</li><li>Creating an initial attack surface map.</li><li>Using machine learning to analyze the network data to build a network map.</li><li>Brent talks about moving the same techniques from automated warehousing into production environments.</li><li>When they first got the system, everyone on the team expected the robots to be smarter than they are.</li><li>How much automation is available today?</li><li>Were there any considerations given to EMF attacks or sonic attacks?</li><li>Brent shares his prediction for the future of cybersecurity.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Brent Huston on&nbsp;<a href="https://www.linkedin.com/in/lbhuston/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>We have a special treat for you today! Our friend and colleague, Brent Huston, joins Derek for an online CS2AI session to explore the fascinating modern ICS success story of robots, rails, bytes, and risk.&nbsp;</p><p>Brent Huston is a cybersecurity expert who has been a business owner in this space for over three decades. He has a deep technical background but can explain complex concepts in a way that is easily understandable by everyone.&nbsp;</p><p>In the 30 years he has been in the technology business, Brent has worked on various projects involving automated warehousing, inventory control systems, and point-of-sale systems. He also has expertise in cybersecurity and industrial automation.&nbsp;</p><p>With his years of experience and expertise in the field, Brent will take us on a journey through the evolution of ICS security and share some valuable insights on achieving success in this constantly evolving landscape. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Why warehousing is becoming a hot area for disruption.</li><li>How robots move at high speeds and are user-programmable.</li><li>Were there any considerations given to EMF attacks or sonic attacks?</li><li>Brent dives into staffing with a team used to OT protocols.</li><li>Using NLP to parse documentation and generate inventory reports and configuration maps.</li><li>Creating an initial attack surface map.</li><li>Using machine learning to analyze the network data to build a network map.</li><li>Brent talks about moving the same techniques from automated warehousing into production environments.</li><li>When they first got the system, everyone on the team expected the robots to be smarter than they are.</li><li>How much automation is available today?</li><li>Were there any considerations given to EMF attacks or sonic attacks?</li><li>Brent shares his prediction for the future of cybersecurity.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Brent Huston on&nbsp;<a href="https://www.linkedin.com/in/lbhuston/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">6c8cca68-05fe-4f72-b258-b9d8a8905741</guid><itunes:image href="https://artwork.captivate.fm/df63b857-95a1-48d3-aa18-3046b64d6f4d/mqTGSOPy8YhTQrwbFsONJEf3.jpg"/><pubDate>Tue, 09 May 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a388fa19-c94f-434f-b1e4-54ce8c602e6a/CS-2AI-EP-80-Edited-Audio.mp3" length="68541635" type="audio/mpeg"/><itunes:duration>01:11:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>80</itunes:episode><podcast:episode>80</podcast:episode></item><item><title>79: Achieving Leadership Roles in an Early Cybersecurity Career with Megan Samford</title><itunes:title>79: Achieving Leadership Roles in an Early Cybersecurity Career with Megan Samford</itunes:title><description><![CDATA[<p>Derek is delighted to have Megan Samford joining him today!</p><p>Megan is an executive experienced in Product Security programs, ICS/OT, PSIRTs, Threat Intel, and Critical Infrastructure Protection. She is currently the VP and Chief Product Security Officer of Energy Management at Schneider Electric.</p><p>Megan is a well-rounded and fascinating person! In addition to being a cyber-emergency manager, she is a critical infrastructure protection hero, the founder of many things, a mother, a rock hunter, and a genealogy enthusiast! She loves shopping, interior design, and cars-specifically 300zx!</p><p>In today’s episode, Megan tells her story, discusses her career trajectory, and shares her experience, insight, advice, and free resources for anyone considering a career in cybersecurity.</p><p><strong>Show highlights:</strong></p><ul><li>How Megan's mother helped Megan grow into her full potential.</li><li>Megan talks about being part of the first graduating class of the world's first accredited degree program in Homeland Security and Emergency Preparedness at Virginia University.</li><li>How Megan gained a core foundation for critical infrastructure while doing an internship at the governor’s office in 2007.</li><li>Megan discusses her first encounter with policy work and explains how much she loved it.</li><li>Megan talks about being promoted to leading critical infrastructure for the Commonwealth of Virginia when she was only twenty-six.</li><li>What Megan did that allowed her to get promoted to lead critical infrastructure for the Commonwealth of Virginia at only twenty-six years of age.</li><li>Why do people like working with Megan professionally?</li><li>How Megan got to work at GE, and how she ended up working at Schneider Electric.</li><li>Megan dives into the work she does with ICS4ICS.</li><li>Megan shares free resources via ICS4ICS for FEMA online incident command system training.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.se.com/ww/en/" rel="noopener noreferrer" target="_blank">Schneider Electric</a></p><p><a href="https://www.linkedin.com/in/megan-samford-13282814/" rel="noopener noreferrer" target="_blank">Megan Samford on LinkedIn</a></p><p><a href="https://www.ics4ics.org/training" rel="noopener noreferrer" target="_blank">ICS4ICS training</a></p>]]></description><content:encoded><![CDATA[<p>Derek is delighted to have Megan Samford joining him today!</p><p>Megan is an executive experienced in Product Security programs, ICS/OT, PSIRTs, Threat Intel, and Critical Infrastructure Protection. She is currently the VP and Chief Product Security Officer of Energy Management at Schneider Electric.</p><p>Megan is a well-rounded and fascinating person! In addition to being a cyber-emergency manager, she is a critical infrastructure protection hero, the founder of many things, a mother, a rock hunter, and a genealogy enthusiast! She loves shopping, interior design, and cars-specifically 300zx!</p><p>In today’s episode, Megan tells her story, discusses her career trajectory, and shares her experience, insight, advice, and free resources for anyone considering a career in cybersecurity.</p><p><strong>Show highlights:</strong></p><ul><li>How Megan's mother helped Megan grow into her full potential.</li><li>Megan talks about being part of the first graduating class of the world's first accredited degree program in Homeland Security and Emergency Preparedness at Virginia University.</li><li>How Megan gained a core foundation for critical infrastructure while doing an internship at the governor’s office in 2007.</li><li>Megan discusses her first encounter with policy work and explains how much she loved it.</li><li>Megan talks about being promoted to leading critical infrastructure for the Commonwealth of Virginia when she was only twenty-six.</li><li>What Megan did that allowed her to get promoted to lead critical infrastructure for the Commonwealth of Virginia at only twenty-six years of age.</li><li>Why do people like working with Megan professionally?</li><li>How Megan got to work at GE, and how she ended up working at Schneider Electric.</li><li>Megan dives into the work she does with ICS4ICS.</li><li>Megan shares free resources via ICS4ICS for FEMA online incident command system training.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Derek Harp on&nbsp;<a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.se.com/ww/en/" rel="noopener noreferrer" target="_blank">Schneider Electric</a></p><p><a href="https://www.linkedin.com/in/megan-samford-13282814/" rel="noopener noreferrer" target="_blank">Megan Samford on LinkedIn</a></p><p><a href="https://www.ics4ics.org/training" rel="noopener noreferrer" target="_blank">ICS4ICS training</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">51025cd8-2ae9-417f-be92-801535bda9e2</guid><itunes:image href="https://artwork.captivate.fm/c6e162cf-9c0a-4414-9de1-ba175a5f3344/y8im5iIom8EkEQq1Rfvn1tZQ.jpg"/><pubDate>Tue, 25 Apr 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b67e6bfd-0fd1-4810-9d98-5ca540bbf041/CS2AI-Ep-79-Edited-Audio-converted.mp3" length="21425089" type="audio/mpeg"/><itunes:duration>44:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>79</itunes:episode><podcast:episode>79</podcast:episode></item><item><title>78: How to Have a Cybersecurity  Career in the Navy with Daniel Ricci</title><itunes:title>78: How to Have a Cybersecurity  Career in the Navy with Daniel Ricci</itunes:title><description><![CDATA[<p>Derek is delighted to have Daniel Ricci joining him on today’s podcast!&nbsp;</p><p>Dan wears many different hats. He is currently the Senior Information Security Officer and Senior System Security Engineer at Frequentis Defense. He is also the founder of the ICS Advisory Project, which focuses on providing small and medium size ICS asset owners with a free data visualization capability to track applicable vulnerabilities and secure Critical Infrastructure. Dan retired from the U.S. Navy after serving 21 years in the Information Warfare community. During his career, he supported and enabled full-spectrum Cyberspace operations, Naval Air, Sea, and Special Warfare operations.&nbsp;</p><p>Dan comes from a small town in the south suburbs of Chicago. In addition to being an engineer, he is also the founder of many things, a military veteran, musician, scuba diver, and data hound. He joins Derek today to discuss his background and career journey, share his insights and experience, and offer nuggets of advice for anyone considering a Naval cybersecurity career.</p><p><strong>Show highlights:</strong></p><ul><li>Why Dan joined the Navy, and what he learned there.</li><li>Dan got introduced to security while in the Navy. He discusses the different aspects he focused on during his tours and the latter part of his Naval career.</li><li>Dan dives into the cybersecurity training opportunities available in the Navy.</li><li>Dan talks about his transition out of the Navy.</li><li>What Dan is working on in his current role.</li><li>Dan discusses the ICS Advisory Project he started.</li><li>Dan shares his vision and concerns for the future of his ICS Advisory Project.</li><li>Dan shares his vision for the future in general.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Derek is delighted to have Daniel Ricci joining him on today’s podcast!&nbsp;</p><p>Dan wears many different hats. He is currently the Senior Information Security Officer and Senior System Security Engineer at Frequentis Defense. He is also the founder of the ICS Advisory Project, which focuses on providing small and medium size ICS asset owners with a free data visualization capability to track applicable vulnerabilities and secure Critical Infrastructure. Dan retired from the U.S. Navy after serving 21 years in the Information Warfare community. During his career, he supported and enabled full-spectrum Cyberspace operations, Naval Air, Sea, and Special Warfare operations.&nbsp;</p><p>Dan comes from a small town in the south suburbs of Chicago. In addition to being an engineer, he is also the founder of many things, a military veteran, musician, scuba diver, and data hound. He joins Derek today to discuss his background and career journey, share his insights and experience, and offer nuggets of advice for anyone considering a Naval cybersecurity career.</p><p><strong>Show highlights:</strong></p><ul><li>Why Dan joined the Navy, and what he learned there.</li><li>Dan got introduced to security while in the Navy. He discusses the different aspects he focused on during his tours and the latter part of his Naval career.</li><li>Dan dives into the cybersecurity training opportunities available in the Navy.</li><li>Dan talks about his transition out of the Navy.</li><li>What Dan is working on in his current role.</li><li>Dan discusses the ICS Advisory Project he started.</li><li>Dan shares his vision and concerns for the future of his ICS Advisory Project.</li><li>Dan shares his vision for the future in general.</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">61b95ed0-0ac0-41e2-a339-98e977a0f201</guid><itunes:image href="https://artwork.captivate.fm/50db146b-09ce-4dc0-bae6-af86957473c1/zs458S97WMx6p3TIMrF-isgC.jpg"/><pubDate>Tue, 18 Apr 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c2c40751-11cb-4049-b89c-1d9a4d7da093/CS2AI-Ep-78-Edited-Audio-converted.mp3" length="21564345" type="audio/mpeg"/><itunes:duration>44:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>78</itunes:episode><podcast:episode>78</podcast:episode></item><item><title>77: ABB Ransom-Aware OT Defense Virtual Summit Keynote Preview with Derek Harp</title><itunes:title>77: ABB Ransom-Aware OT Defense Virtual Summit Keynote Preview with Derek Harp</itunes:title><description><![CDATA[<p>This special edition of the CS2AI podcast features the highlights of a recent interview with Derek, broadcast on the ABB Energy Pod podcast.&nbsp;</p><p>In this episode, Patrik Boo, the Portfolio Manager for Cybersecurity Services at ABB Process Automation, interviews Derek Harp, the Founder and Chairman of CS2AI, about his upcoming keynote presentation that will open the OT Cybersecurity Leaders Virtual Summit on ransomware, which will take place on April 19th, 2023.&nbsp;&nbsp;</p><p>Stay tuned to hear what Derek will cover in his keynote presentation at the OT Cybersecurity Leaders Virtual Summit.&nbsp;</p><p>The summit is hosted by ABB in collaboration with other sponsors.</p><p><strong>Show highlights:</strong></p><ul><li>Derek discusses his main takeaways from the 2022 report.</li><li>Who are the greatest threat actors?</li><li>Derek dives into the need for OT cyber-informed training within the operating environment.</li><li>How ransomware is on the rise in all the different sectors.</li><li>The link between various groups of cyber criminals and the sharp increase in ransomware.</li><li>Who is at risk?</li><li>Other topics that will also be covered at the summit.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p><a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">Derek Harp on LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>This special edition of the CS2AI podcast features the highlights of a recent interview with Derek, broadcast on the ABB Energy Pod podcast.&nbsp;</p><p>In this episode, Patrik Boo, the Portfolio Manager for Cybersecurity Services at ABB Process Automation, interviews Derek Harp, the Founder and Chairman of CS2AI, about his upcoming keynote presentation that will open the OT Cybersecurity Leaders Virtual Summit on ransomware, which will take place on April 19th, 2023.&nbsp;&nbsp;</p><p>Stay tuned to hear what Derek will cover in his keynote presentation at the OT Cybersecurity Leaders Virtual Summit.&nbsp;</p><p>The summit is hosted by ABB in collaboration with other sponsors.</p><p><strong>Show highlights:</strong></p><ul><li>Derek discusses his main takeaways from the 2022 report.</li><li>Who are the greatest threat actors?</li><li>Derek dives into the need for OT cyber-informed training within the operating environment.</li><li>How ransomware is on the rise in all the different sectors.</li><li>The link between various groups of cyber criminals and the sharp increase in ransomware.</li><li>Who is at risk?</li><li>Other topics that will also be covered at the summit.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p><a href="https://www.linkedin.com/in/derekharp/" rel="noopener noreferrer" target="_blank">Derek Harp on LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">033677cf-c766-4c0f-9ede-7c7a12d77cc6</guid><itunes:image href="https://artwork.captivate.fm/1eaa5d80-86c3-4982-9969-b36d289f5def/tL5DTxC_20kjJaZMFO_UPnnJ.jpg"/><pubDate>Fri, 14 Apr 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/77cb3978-542b-4259-ae1b-16f09d3837ce/CS2AI-Ep-77.mp3" length="24158874" type="audio/mpeg"/><itunes:duration>25:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>77</itunes:episode><podcast:episode>77</podcast:episode></item><item><title>76: A (CS)2AI Fellows Panel: S4 Takeaways and a Look Ahead at Our industry</title><itunes:title>76: A (CS)2AI Fellows Panel: S4 Takeaways and a Look Ahead at Our industry</itunes:title><description><![CDATA[<p>Today, Chris Blask, the Vice President of Strategy at Cybeats, and Patrick Miller, the CEO at Ampere, join Derek in an online seminar stimulated by a blog article Patrick wrote just after the last S4 conference.</p><p>Chris and Patrick are both (CS)²AI fellows who have attended many S4 events. In today’s online session, they review the latest S4 conference. They dive into various topics important for the industrial security and OT security communities, answer questions from listeners, and discuss the future of the cybersecurity industry.</p><p>S4 is one of the longest-standing annual cybersecurity conferences focused on control systems, OT, and ICS. Dale Petersen is the founder, creator, and MC of the S4 conferences.</p><p><strong>Show highlights:</strong></p><ul><li>Chris shares a main takeaway from this year’s S4 event.</li><li>How technology is changing.</li><li>Why more people are needed to make cybersecurity work going forward.</li><li>Question: Are discussions of wireless security growing or declining at the conference? Is there a session (or sessions) dedicated to wireless yet?</li><li>Question: Within all OT and IT cybersecurity professionals, what would be the ratio of OT cybersecurity real professionals?&nbsp;</li><li>Why it is normal and expected not to know the answer to some things, and how to find the answer if there is something you don’t know.</li><li>Question: Tribal knowledge is a real threat to OT/ICS security. The aging workforce in OT engineering is part of this problem. What is the best way for organizations to address this challenge?</li><li>Chris and Patrick share their thoughts on executives taking the risk of solving ICS/OT security issues.</li><li>Question: What are your thoughts on Ford applying for a patent on a car that can repossess itself?</li><li>Chris and Patrick discuss metrics, risk management, and cyber insurance.</li><li>Patrick and Chris dive into diversity, equity, and inclusion in the OT space.</li><li>Question: When will we get past the notion that ICS pen-testing has to be a separate category?</li><li>Question: Looking forward, what would you foresee as the big themes of S4/24?</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Chris Blask, the Vice President of Strategy at Cybeats, and Patrick Miller, the CEO at Ampere, join Derek in an online seminar stimulated by a blog article Patrick wrote just after the last S4 conference.</p><p>Chris and Patrick are both (CS)²AI fellows who have attended many S4 events. In today’s online session, they review the latest S4 conference. They dive into various topics important for the industrial security and OT security communities, answer questions from listeners, and discuss the future of the cybersecurity industry.</p><p>S4 is one of the longest-standing annual cybersecurity conferences focused on control systems, OT, and ICS. Dale Petersen is the founder, creator, and MC of the S4 conferences.</p><p><strong>Show highlights:</strong></p><ul><li>Chris shares a main takeaway from this year’s S4 event.</li><li>How technology is changing.</li><li>Why more people are needed to make cybersecurity work going forward.</li><li>Question: Are discussions of wireless security growing or declining at the conference? Is there a session (or sessions) dedicated to wireless yet?</li><li>Question: Within all OT and IT cybersecurity professionals, what would be the ratio of OT cybersecurity real professionals?&nbsp;</li><li>Why it is normal and expected not to know the answer to some things, and how to find the answer if there is something you don’t know.</li><li>Question: Tribal knowledge is a real threat to OT/ICS security. The aging workforce in OT engineering is part of this problem. What is the best way for organizations to address this challenge?</li><li>Chris and Patrick share their thoughts on executives taking the risk of solving ICS/OT security issues.</li><li>Question: What are your thoughts on Ford applying for a patent on a car that can repossess itself?</li><li>Chris and Patrick discuss metrics, risk management, and cyber insurance.</li><li>Patrick and Chris dive into diversity, equity, and inclusion in the OT space.</li><li>Question: When will we get past the notion that ICS pen-testing has to be a separate category?</li><li>Question: Looking forward, what would you foresee as the big themes of S4/24?</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">f23a9850-291f-43e8-83f4-577ab43ebaff</guid><itunes:image href="https://artwork.captivate.fm/90c47a54-7d2e-4c9f-8bf0-0f58c69d71b5/X-m4mdGGY3ZvdtAe6boUlMYB.png"/><pubDate>Tue, 04 Apr 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6c8a074e-f650-40ed-94da-3c9bf4532d76/CS2AI-Ep-76-Edited-Audio.mp3" length="43187180" type="audio/mpeg"/><itunes:duration>01:30:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>76</itunes:episode><podcast:episode>76</podcast:episode></item><item><title>75: Project Management and How It Can Fuel a Cybersecurity Career</title><itunes:title>75: Project Management and How It Can Fuel a Cybersecurity Career</itunes:title><description><![CDATA[<p>Today, Derek interviews Jonathan Tubb, the Director of Industrial Cybersecurity at Siemens Energy in Ohio.&nbsp;</p><p>Jonathan is an experienced Senior Lead with a demonstrated history of working in the power generation industry. He is skilled in Power Plants, Electric Power, Power Systems, Integration, and Research. He has strong project management skills and a Computer Science and Engineering degree from The Ohio State University.</p><p>Jonathan is a well-rounded and interesting individual! He is also a great contributor to the cybersecurity community and a true blue engineer, software engineer, tinkerer, bird and animal lover, Ohio State Buckeye, and art enthusiast. He joins Derek to discuss his background, education, and career trajectory, along with nuggets of advice for anyone considering a career in the cybersecurity space.</p><p><strong>Show highlights:</strong></p><ul><li>Growing up, Jonathan spent much of his time focusing on science and technology.</li><li>How volunteering at the Museum of Science and Industry fed Jonathan’s curiosity and impacted his approach to technology.</li><li>How cybersecurity informed where Jonathan began his career.</li><li>Jonathan discusses his internship with American Electric Power.</li><li>What are the benefits of doing an internship?</li><li>Why must we utilize other people’s knowledge to help solve problems?</li><li>Jonathan discusses his transition to Siemens Energy.</li><li>Jonathan gets into what he has focused on for the last few years at Siemens Energy.</li><li>What makes a good cybersecurity practitioner?</li><li>Jonathan dives into the industrial cybersecurity apprenticeship concept Siemens Energy has put together but not yet implemented.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Derek interviews Jonathan Tubb, the Director of Industrial Cybersecurity at Siemens Energy in Ohio.&nbsp;</p><p>Jonathan is an experienced Senior Lead with a demonstrated history of working in the power generation industry. He is skilled in Power Plants, Electric Power, Power Systems, Integration, and Research. He has strong project management skills and a Computer Science and Engineering degree from The Ohio State University.</p><p>Jonathan is a well-rounded and interesting individual! He is also a great contributor to the cybersecurity community and a true blue engineer, software engineer, tinkerer, bird and animal lover, Ohio State Buckeye, and art enthusiast. He joins Derek to discuss his background, education, and career trajectory, along with nuggets of advice for anyone considering a career in the cybersecurity space.</p><p><strong>Show highlights:</strong></p><ul><li>Growing up, Jonathan spent much of his time focusing on science and technology.</li><li>How volunteering at the Museum of Science and Industry fed Jonathan’s curiosity and impacted his approach to technology.</li><li>How cybersecurity informed where Jonathan began his career.</li><li>Jonathan discusses his internship with American Electric Power.</li><li>What are the benefits of doing an internship?</li><li>Why must we utilize other people’s knowledge to help solve problems?</li><li>Jonathan discusses his transition to Siemens Energy.</li><li>Jonathan gets into what he has focused on for the last few years at Siemens Energy.</li><li>What makes a good cybersecurity practitioner?</li><li>Jonathan dives into the industrial cybersecurity apprenticeship concept Siemens Energy has put together but not yet implemented.</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">4cb37eae-334c-45ce-a4ca-7dca5e347b56</guid><itunes:image href="https://artwork.captivate.fm/9f428af6-73d0-4748-9aca-7e76904ea9f8/CgtelnXC4lYQwjLqwu65Ogp7.jpg"/><pubDate>Tue, 28 Mar 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5a6db48f-988b-4623-b98b-f65ac6784a89/CS2AI-Ep-75-Edited-Audio.mp3" length="21810694" type="audio/mpeg"/><itunes:duration>45:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>75</itunes:episode><podcast:episode>75</podcast:episode></item><item><title>74: Tapping Into Natural Curiosity to Develop Your Cybersecurity Career with Chris Sistrunk</title><itunes:title>74: Tapping Into Natural Curiosity to Develop Your Cybersecurity Career with Chris Sistrunk</itunes:title><description><![CDATA[<p>Today, Chris Sistrunk joins Derek Harp on the podcast. Chris is currently the Technical Manager at Mandiant, which is now part of Google Cloud.</p><p>Chris is a Technical Manager in Mandiant's ICS/OT Consulting practice, focusing on cyber security for industrial control systems (ICS) and critical infrastructure. He focuses on helping secure ICS and critical infrastructure around the world.</p><p>Chris grew up in the hills and hollows of North Louisiana, surrounded by swamps, red clay, and pine trees. He is a relied-on expert in the cybersecurity space. He is also a husband and father, one of the co-founders of the BEER-ISAC, musician, dad joke-teller, bourbon aficionado, and an aspiring BBQ pit-master.&nbsp;</p><p>In this episode, Chris shares his backstory. He also discusses his education and career path and offers helpful advice for anyone interested in working with control systems and control systems security.</p><p><strong>Show highlights:</strong></p><ul><li>Chris had an engineering mindset and was always curious about how things worked while growing up.</li><li>How he got into working with SCADA systems early on in his career.</li><li>How hurricanes taught Chris about instant response and disaster recovery, and prepared him for what he does today.</li><li>Chris offers advice, encouragement, and assistance to anyone who wants to work with control systems and control systems security.</li><li>What Chris learned while working for the power company.&nbsp;</li><li>The kind of thinking he employs when working with cybersecurity.</li><li>How Chris shifted from being an engineer to working with cybersecurity for control systems.</li><li>The various roles Chris has played and the steps he has taken along his career path.</li><li>How Chris got to work at Mandiant.</li><li>The importance of building trust, respect, and working together, to solve difficult problems.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p><a href="https://www.mandiant.com/solutions/operational-technology" rel="noopener noreferrer" target="_blank">Mandiant</a></p><p>Chris Sistrunk on <a href="https://www.linkedin.com/in/chrissistrunk/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Chris Sistrunk on <a href="https://twitter.com/chrissistrunk" rel="noopener noreferrer" target="_blank">Twitter</a></p>]]></description><content:encoded><![CDATA[<p>Today, Chris Sistrunk joins Derek Harp on the podcast. Chris is currently the Technical Manager at Mandiant, which is now part of Google Cloud.</p><p>Chris is a Technical Manager in Mandiant's ICS/OT Consulting practice, focusing on cyber security for industrial control systems (ICS) and critical infrastructure. He focuses on helping secure ICS and critical infrastructure around the world.</p><p>Chris grew up in the hills and hollows of North Louisiana, surrounded by swamps, red clay, and pine trees. He is a relied-on expert in the cybersecurity space. He is also a husband and father, one of the co-founders of the BEER-ISAC, musician, dad joke-teller, bourbon aficionado, and an aspiring BBQ pit-master.&nbsp;</p><p>In this episode, Chris shares his backstory. He also discusses his education and career path and offers helpful advice for anyone interested in working with control systems and control systems security.</p><p><strong>Show highlights:</strong></p><ul><li>Chris had an engineering mindset and was always curious about how things worked while growing up.</li><li>How he got into working with SCADA systems early on in his career.</li><li>How hurricanes taught Chris about instant response and disaster recovery, and prepared him for what he does today.</li><li>Chris offers advice, encouragement, and assistance to anyone who wants to work with control systems and control systems security.</li><li>What Chris learned while working for the power company.&nbsp;</li><li>The kind of thinking he employs when working with cybersecurity.</li><li>How Chris shifted from being an engineer to working with cybersecurity for control systems.</li><li>The various roles Chris has played and the steps he has taken along his career path.</li><li>How Chris got to work at Mandiant.</li><li>The importance of building trust, respect, and working together, to solve difficult problems.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p><a href="https://www.mandiant.com/solutions/operational-technology" rel="noopener noreferrer" target="_blank">Mandiant</a></p><p>Chris Sistrunk on <a href="https://www.linkedin.com/in/chrissistrunk/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Chris Sistrunk on <a href="https://twitter.com/chrissistrunk" rel="noopener noreferrer" target="_blank">Twitter</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">823b14a7-b15a-40a1-b5a0-c925f7f3cc14</guid><itunes:image href="https://artwork.captivate.fm/eeb88783-b2e0-405f-a50a-0797573ddbd6/Y1-1PxrT8aQ8k5sNqmcM2iEk.jpg"/><pubDate>Tue, 21 Mar 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1f0c1ad4-d824-45bc-b7cb-518ab6ffeae9/CS2AI-Epsiode-73-Edited-Audio.mp3" length="26820456" type="audio/mpeg"/><itunes:duration>52:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>74</itunes:episode><podcast:episode>74</podcast:episode></item><item><title>73: Navigating Cybersecurity Start Ups and Scaling to $100M with Jose Seara</title><itunes:title>73: Navigating Cybersecurity Start Ups and Scaling to $100M with Jose Seara</itunes:title><description><![CDATA[<p>Today, Derek Harp interviews Jose Seara, the Founder, and CEO of DeNexus.</p><p>Jose is an entrepreneur with 25+ years of experience building enterprises around critical infrastructure assets across different technologies and geographies. He turned a start-up concept into an international corporation with $100M in revenues. He is now building the global standard for Industrial Cyber Risk quantification at DeNexus and bridging the chasm between cyber threats and business impact.</p><p>Jose comes from Spain. He was born in Barcelona and grew up in Madrid. He is an intriguing person with a fascinating background. In addition to being an entrepreneur, he is also a husband, father, sailor, scuba diver, pilot, skier, builder, runner, and biker. He joins Derek today to discuss his background, professional journey, and the interesting work that gets done at DeNexus. He also shares his experience and offers nuggets of advice for budding entrepreneurs.</p><p><strong>Show highlights:</strong></p><ul><li>Jose discusses his career journey, which began with him studying Naval Engineering at a college in Madrid.</li><li>Even though he is not very technologically savvy, Jose got exposed to technology through various work ventures.</li><li>Jose explains what brought him into the technology and cybersecurity space.</li><li>Jose explains how he shifted from working with traditional energy to becoming an entrepreneur working with wind and solar energies.</li><li>Jose explains how risk-taking has always taken him out of his comfort zone.</li><li>Learning lessons the hard way ensured Jose never forgot what he had learned.</li><li>How Jose inadvertently planted the seeds for DeNexus before starting it.</li><li>Jose reflects on his own entrepreneurial journey and offers advice for entrepreneurs new to the cybersecurity segment and entrepreneurs and CEOs selling cybersecurity to the OT space.&nbsp;</li><li>The various steps Jose took before launching DeNexus.</li><li>What are they doing at DeNexus?</li><li>The role the insurance industry plays in the control systems space.</li><li>What excites Jose about the future?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Jose Seara on&nbsp;<a href="https://www.linkedin.com/in/jmseara/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.denexus.io/" rel="noopener noreferrer" target="_blank">DeNexus</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp interviews Jose Seara, the Founder, and CEO of DeNexus.</p><p>Jose is an entrepreneur with 25+ years of experience building enterprises around critical infrastructure assets across different technologies and geographies. He turned a start-up concept into an international corporation with $100M in revenues. He is now building the global standard for Industrial Cyber Risk quantification at DeNexus and bridging the chasm between cyber threats and business impact.</p><p>Jose comes from Spain. He was born in Barcelona and grew up in Madrid. He is an intriguing person with a fascinating background. In addition to being an entrepreneur, he is also a husband, father, sailor, scuba diver, pilot, skier, builder, runner, and biker. He joins Derek today to discuss his background, professional journey, and the interesting work that gets done at DeNexus. He also shares his experience and offers nuggets of advice for budding entrepreneurs.</p><p><strong>Show highlights:</strong></p><ul><li>Jose discusses his career journey, which began with him studying Naval Engineering at a college in Madrid.</li><li>Even though he is not very technologically savvy, Jose got exposed to technology through various work ventures.</li><li>Jose explains what brought him into the technology and cybersecurity space.</li><li>Jose explains how he shifted from working with traditional energy to becoming an entrepreneur working with wind and solar energies.</li><li>Jose explains how risk-taking has always taken him out of his comfort zone.</li><li>Learning lessons the hard way ensured Jose never forgot what he had learned.</li><li>How Jose inadvertently planted the seeds for DeNexus before starting it.</li><li>Jose reflects on his own entrepreneurial journey and offers advice for entrepreneurs new to the cybersecurity segment and entrepreneurs and CEOs selling cybersecurity to the OT space.&nbsp;</li><li>The various steps Jose took before launching DeNexus.</li><li>What are they doing at DeNexus?</li><li>The role the insurance industry plays in the control systems space.</li><li>What excites Jose about the future?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Jose Seara on&nbsp;<a href="https://www.linkedin.com/in/jmseara/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.denexus.io/" rel="noopener noreferrer" target="_blank">DeNexus</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">377f5cb5-07d8-4f7b-91e4-b58444c972a5</guid><itunes:image href="https://artwork.captivate.fm/74b6cf49-554e-43cd-a980-270207b6d497/lHapdewwWPbyVRal1B0O2D8e.jpg"/><pubDate>Tue, 14 Mar 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1361269f-ced0-4d37-a968-282718341550/CS2AI-Ep-74-Edited-Audio.mp3" length="22115897" type="audio/mpeg"/><itunes:duration>45:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>73</itunes:episode><podcast:episode>73</podcast:episode></item><item><title>72: On the Road, with Derek Harp and Tilo Kaschubek! Post Seminar Q&amp;A</title><itunes:title>72: On the Road, with Derek Harp and Tilo Kaschubek! Post Seminar Q&amp;A</itunes:title><description><![CDATA[<p>On the 7th of December 2022, (CS)²AI hosted a symposium where more questions got asked than could get answered within the allotted time. Tilo Kaschubek was one of the speakers at the event. He joins Derek today on the podcast to respond to some of the unanswered questions.</p><p>Tilo is currently the Director of Cloud Ecosystem and Regional Alliances in EMEA for AVEVA. He was previously with OSIsoft before the merger. (AVEVA is now a subsidiary of a large recognized equipment manufacturer.)</p><p>In this episode, Tilo discusses his role in the recent AVEVA transaction, describes the (CS)²AI symposium in detail, and dives into some of the questions he did not get to answer at the event.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Tilo discusses the changes that recently occurred with AVEVA.</li><li>Tilo summarises his presentation at the (CS)²AI symposium.</li><li>Question: How do you see IIoT (Industrial Internet of Things) playing a role via cloud models for predictive analytics to enhance decision-making for owner-operators?</li><li>Question: On a personal level, big data analytics has raised huge privacy and legal issues. How can these issues not be exacerbated in a commercial market of trading companies’ data into sellable products?</li><li>Tilo discusses the best approach to data vulnerabilities.</li><li>Question: Help me visualize a 100% on-prem PI deployment with all of its virtual machines versus a 100% on-cloud PI deployment. In terms of hybrid, what does that mean, in the sense that I only have on-prem systems talking to the PI on-premises virtual machines, and what exactly is running in the cloud? Alternatively, is the cloud-based solution offered as SaaS, or would the asset owner deploy their favorite cloud?</li><li>Question: Regarding the AVEVA data, is that similar to the AWS Marketplace? For instance, if an organization built a digital twin of a transformer system from Utility Hacks, is the data hub created going to make it easy for Utility Hacks to publish the model so others can use or vie? If not, is there an AVEVA marketplace where organizations can build or share models?</li><li>Question: As an oil and gas control system engineer and user who has applied software for many years, I’d like to know if you have already adopted this new solution and used it for any oil and gas company.</li><li>Tilo explains the PI system philosophy.</li><li>What has AVEVA done to overcome the existing legal constraints and make it easier to share operational data?</li><li>Question: What do ISACs (Information Sharing and Analysis Centers) do?</li><li>What are the benefits of the subscription model?</li><li>What is available for auditing, testing, and verifying technologies like unidirectional gateways and data diodes?</li></ul><br/>]]></description><content:encoded><![CDATA[<p>On the 7th of December 2022, (CS)²AI hosted a symposium where more questions got asked than could get answered within the allotted time. Tilo Kaschubek was one of the speakers at the event. He joins Derek today on the podcast to respond to some of the unanswered questions.</p><p>Tilo is currently the Director of Cloud Ecosystem and Regional Alliances in EMEA for AVEVA. He was previously with OSIsoft before the merger. (AVEVA is now a subsidiary of a large recognized equipment manufacturer.)</p><p>In this episode, Tilo discusses his role in the recent AVEVA transaction, describes the (CS)²AI symposium in detail, and dives into some of the questions he did not get to answer at the event.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Tilo discusses the changes that recently occurred with AVEVA.</li><li>Tilo summarises his presentation at the (CS)²AI symposium.</li><li>Question: How do you see IIoT (Industrial Internet of Things) playing a role via cloud models for predictive analytics to enhance decision-making for owner-operators?</li><li>Question: On a personal level, big data analytics has raised huge privacy and legal issues. How can these issues not be exacerbated in a commercial market of trading companies’ data into sellable products?</li><li>Tilo discusses the best approach to data vulnerabilities.</li><li>Question: Help me visualize a 100% on-prem PI deployment with all of its virtual machines versus a 100% on-cloud PI deployment. In terms of hybrid, what does that mean, in the sense that I only have on-prem systems talking to the PI on-premises virtual machines, and what exactly is running in the cloud? Alternatively, is the cloud-based solution offered as SaaS, or would the asset owner deploy their favorite cloud?</li><li>Question: Regarding the AVEVA data, is that similar to the AWS Marketplace? For instance, if an organization built a digital twin of a transformer system from Utility Hacks, is the data hub created going to make it easy for Utility Hacks to publish the model so others can use or vie? If not, is there an AVEVA marketplace where organizations can build or share models?</li><li>Question: As an oil and gas control system engineer and user who has applied software for many years, I’d like to know if you have already adopted this new solution and used it for any oil and gas company.</li><li>Tilo explains the PI system philosophy.</li><li>What has AVEVA done to overcome the existing legal constraints and make it easier to share operational data?</li><li>Question: What do ISACs (Information Sharing and Analysis Centers) do?</li><li>What are the benefits of the subscription model?</li><li>What is available for auditing, testing, and verifying technologies like unidirectional gateways and data diodes?</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">52fe72aa-4480-48f8-9ffe-0eedeaa2d65c</guid><itunes:image href="https://artwork.captivate.fm/0314155d-9f25-4c8c-9c5b-e5e5ebc4bf8f/_9oD1-cUn-RUnPsxAyqtD7jm.png"/><pubDate>Tue, 07 Mar 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9abe2fa3-b8fc-45e9-9796-5b5c3a46fa76/CS2AI-Ep-72-Edited-Audio.mp3" length="25220547" type="audio/mpeg"/><itunes:duration>52:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>72</itunes:episode><podcast:episode>72</podcast:episode></item><item><title>71: Leadership and Executive Development in the Cybersecurity Industry with Willi Nelson</title><itunes:title>71: Leadership and Executive Development in the Cybersecurity Industry with Willi Nelson</itunes:title><description><![CDATA[<p>Derek Harp interviews Willi Nelson in this episode. Willi is currently the Field CISO of Operation Technology at Fortinet, one of the oldest and longest-standing sponsors of the (CS)²AI organization.</p><p>Willi is a Security/Technology/Visionary who focuses on thought leadership and executive influence for Fortinet. He is responsible for developing security thought leadership, strategy, threat, vulnerability &amp; mitigation insights, and world-class practices for the cybersecurity community and business executives.</p><p>Willi is a technologist, military veteran, woodworker, bee-keeper, outdoorsman, fisherman, metal artist, hunter, cyclist, husband, and father.&nbsp;</p><p>In this episode, he shares his backstory and unpacks what he does for the industry. He also offers valuable nuggets of advice for people with an OT and engineering background who don’t know cyber and those with a cybersecurity background with no knowledge of control systems and OT.</p><p><strong>Show highlights:</strong></p><ul><li>Willi joined the US Army immediately after graduating high school. He gets into what he learned there and why he left.</li><li>Why resiliency is essential.</li><li>How Willi got into computers.</li><li>Willi discusses the importance of education and explains what prompted him to return to college at 27.</li><li>The power of being humble, having a thirst for knowledge, and a work ethic in the workforce.</li><li>Qualities Willi looks for when recruiting people.</li><li>Where OT and cybersecurity first intersected with Willi’s career.</li><li>How he got the opportunity to step into leadership while spending some time working in financials.</li><li>The difference between influential and mandatory leadership.</li><li>What operational technology means in the context of Willi’s current line of work.</li><li>What makes Willi optimistic about the future?</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Derek Harp interviews Willi Nelson in this episode. Willi is currently the Field CISO of Operation Technology at Fortinet, one of the oldest and longest-standing sponsors of the (CS)²AI organization.</p><p>Willi is a Security/Technology/Visionary who focuses on thought leadership and executive influence for Fortinet. He is responsible for developing security thought leadership, strategy, threat, vulnerability &amp; mitigation insights, and world-class practices for the cybersecurity community and business executives.</p><p>Willi is a technologist, military veteran, woodworker, bee-keeper, outdoorsman, fisherman, metal artist, hunter, cyclist, husband, and father.&nbsp;</p><p>In this episode, he shares his backstory and unpacks what he does for the industry. He also offers valuable nuggets of advice for people with an OT and engineering background who don’t know cyber and those with a cybersecurity background with no knowledge of control systems and OT.</p><p><strong>Show highlights:</strong></p><ul><li>Willi joined the US Army immediately after graduating high school. He gets into what he learned there and why he left.</li><li>Why resiliency is essential.</li><li>How Willi got into computers.</li><li>Willi discusses the importance of education and explains what prompted him to return to college at 27.</li><li>The power of being humble, having a thirst for knowledge, and a work ethic in the workforce.</li><li>Qualities Willi looks for when recruiting people.</li><li>Where OT and cybersecurity first intersected with Willi’s career.</li><li>How he got the opportunity to step into leadership while spending some time working in financials.</li><li>The difference between influential and mandatory leadership.</li><li>What operational technology means in the context of Willi’s current line of work.</li><li>What makes Willi optimistic about the future?</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">f02f817d-1e5a-4d53-acf8-40af42b7a9cb</guid><itunes:image href="https://artwork.captivate.fm/f108a02c-30c4-4e8b-86a1-82c76c6f32a1/iorS1k46ff1j9REtbpYSp5hC.jpg"/><pubDate>Tue, 28 Feb 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/91dd30f8-0fc4-4e26-bcd0-a256f60346da/CS2AI-EP71-Edited-Audio.mp3" length="45335212" type="audio/mpeg"/><itunes:duration>47:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>71</itunes:episode><podcast:episode>71</podcast:episode></item><item><title>70: OT Monitoring Tools- A Case Study on How to Choose One- Post Q&amp;A with Raph Arakelian</title><itunes:title>70: OT Monitoring Tools- A Case Study on How to Choose One- Post Q&amp;A with Raph Arakelian</itunes:title><description><![CDATA[<p>Raphael Arakelian joins Derek Harp today for a slightly different podcast.</p><p>Raphael is currently the Manager of OT and IoT Cybersecurity at PwC Canada. He is a cybersecurity practitioner specializing in Operational Technology (OT), the Internet of Things (IoT), and Industrial Control Systems (ICS).</p><p>It has always been challenging for purchasers and end-users to understand how to differentiate between various OT products and determine which tools to select. Raph has developed a methodology for comparing monitoring tools. On the 25th of January this year, he did a CS2AI online show with Derek called OT Monitoring Tools: A Case Study on How to Choose One. It was a popular event, and many questions got submitted. Unfortunately, all the questions could not get answered within the allotted time. So they decided to follow up with a collaborative bonus session to get to the bottom of more of those questions.</p><p>In his episode, Raph discusses his systematic methodology for overcoming the challenge that organizations often face when looking at different vendors in the OT security space to select the right tool for a given situation. He also responds to several unanswered questions from the online CS2AI event.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Raph shares the idea behind his systematic approach and explains what led him to devise it.</li><li>The nine technical areas that get evaluated with Raph’s methodology.</li><li>The nuances that led Raph to the three candidate vendors with whom he did his proof of concept.</li><li>Raph recaps his methodology, discusses the source of truth data critical for the assessment, and explains what happens if an organization does not have the asset inventory beforehand.</li><li>How to differentiate between IT and OT assets.</li><li>Raph gives a quick explanation of industrial protocols.</li><li>Question: During the proof of concept, was there a concern about connecting the tools and a laptop to an active utility system? Was port mirroring enough to ensure one-way communication?</li><li>How to address devices that are not active on the network.</li><li>Question: “Based on your study,&nbsp;<em>How is Asset Characterization for OT Monitoring Tools</em>&nbsp;it seems that there could be a lot of manual edits needed to fix mischaracterization.”</li><li>Raph shares his thoughts on the following: “For most tools, it seems that CDE detection and remediation guidance has a shotgun approach without regard to the hardware on which the CDE is found.”&nbsp;</li><li>Instances in which vendors will be willing to update their products.</li><li>Why Raph believes OT monitoring tools are helpful.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Sign up&nbsp;<a href="https://www.cs2ai.org/become-a-member" rel="noopener noreferrer" target="_blank">here</a>&nbsp;to become a member of our on-demand library.&nbsp;</p><p><a href="https://www.pwc.com/ca/en.html" rel="noopener noreferrer" target="_blank">PwC Canada</a></p><p>Raphael Arakelian on&nbsp;<a href="https://ca.linkedin.com/in/raphael-arakelian-8a3683a0" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Raphael Arakelian joins Derek Harp today for a slightly different podcast.</p><p>Raphael is currently the Manager of OT and IoT Cybersecurity at PwC Canada. He is a cybersecurity practitioner specializing in Operational Technology (OT), the Internet of Things (IoT), and Industrial Control Systems (ICS).</p><p>It has always been challenging for purchasers and end-users to understand how to differentiate between various OT products and determine which tools to select. Raph has developed a methodology for comparing monitoring tools. On the 25th of January this year, he did a CS2AI online show with Derek called OT Monitoring Tools: A Case Study on How to Choose One. It was a popular event, and many questions got submitted. Unfortunately, all the questions could not get answered within the allotted time. So they decided to follow up with a collaborative bonus session to get to the bottom of more of those questions.</p><p>In his episode, Raph discusses his systematic methodology for overcoming the challenge that organizations often face when looking at different vendors in the OT security space to select the right tool for a given situation. He also responds to several unanswered questions from the online CS2AI event.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Raph shares the idea behind his systematic approach and explains what led him to devise it.</li><li>The nine technical areas that get evaluated with Raph’s methodology.</li><li>The nuances that led Raph to the three candidate vendors with whom he did his proof of concept.</li><li>Raph recaps his methodology, discusses the source of truth data critical for the assessment, and explains what happens if an organization does not have the asset inventory beforehand.</li><li>How to differentiate between IT and OT assets.</li><li>Raph gives a quick explanation of industrial protocols.</li><li>Question: During the proof of concept, was there a concern about connecting the tools and a laptop to an active utility system? Was port mirroring enough to ensure one-way communication?</li><li>How to address devices that are not active on the network.</li><li>Question: “Based on your study,&nbsp;<em>How is Asset Characterization for OT Monitoring Tools</em>&nbsp;it seems that there could be a lot of manual edits needed to fix mischaracterization.”</li><li>Raph shares his thoughts on the following: “For most tools, it seems that CDE detection and remediation guidance has a shotgun approach without regard to the hardware on which the CDE is found.”&nbsp;</li><li>Instances in which vendors will be willing to update their products.</li><li>Why Raph believes OT monitoring tools are helpful.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p>Sign up&nbsp;<a href="https://www.cs2ai.org/become-a-member" rel="noopener noreferrer" target="_blank">here</a>&nbsp;to become a member of our on-demand library.&nbsp;</p><p><a href="https://www.pwc.com/ca/en.html" rel="noopener noreferrer" target="_blank">PwC Canada</a></p><p>Raphael Arakelian on&nbsp;<a href="https://ca.linkedin.com/in/raphael-arakelian-8a3683a0" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">67aed387-3168-4517-9e20-5e393d4d9f10</guid><itunes:image href="https://artwork.captivate.fm/46c393df-09ee-4337-ba06-c8775a757e0a/u3j6OfzBWJK76QuQ7tQAI9vO.jpeg"/><pubDate>Tue, 21 Feb 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0ddff1b6-dbd0-4ed1-a7d8-135389894de0/CS2AI-Raph-Arakelian-Edited-Audio.mp3" length="23012036" type="audio/mpeg"/><itunes:duration>44:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>70</itunes:episode><podcast:episode>70</podcast:episode></item><item><title>69: From Military Service to the  Commercial Cybersecurity Industry with Billy Rios</title><itunes:title>69: From Military Service to the  Commercial Cybersecurity Industry with Billy Rios</itunes:title><description><![CDATA[<p>Today, Derek Harp interviews Billy Rios, the Co-Founder of QED Secure Solutions.</p><p>Billy is an experienced technical leader with a strong background in successful strategic security planning, security program development, and security program execution. He excels at seeing the big picture, identifying gaps, and managing initiatives. He is comfortable managing security initiatives for high-profile, high-visibility products and services. He plays an integral role within organizations by providing collaboration, motivation, and direction across teams in diverse and demanding environments.&nbsp;</p><p>Billy’s Dad was in the army, so his family moved around a lot while he was growing up. He currently lives in Colorado. As well as being a long-term contributor to the cybersecurity field, Billy is a former military veteran, active reservist, technologist, author, entrepreneur, security ninja, snowboarder, Jiu-Jitsu brown belt, a well-known researcher in the cybersecurity space, husband, and father.&nbsp;</p><p>He joins Derek today to discuss his background, career journey, and career highlights. He also offers many valuable nuggets of advice for entrepreneurs and anyone in military units looking to break into the commercial cybersecurity industry.</p><p><strong>Show highlights:</strong></p><ul><li>Billy explains how his entry into cybersecurity started with hacking video games as a young kid.</li><li>Billy received scholarships for the Airforce and Marine Corps. He shares his motivation for choosing the Marine Corps and discusses what he did while serving there.</li><li>Billy talks about his study program at the University of Washington.&nbsp;</li><li>Billy has focused on cybersecurity since he left active duty in the Marine Corps almost 20 years ago.</li><li>Billy discusses the guidance he received from leaders and mentors in the organizations he worked for before becoming an entrepreneur.</li><li>How Billy’s diverse roles and experiences shaped his perspective and helped him get to where he is today.</li><li>Billy shares advice for anyone interested in becoming an entrepreneur.</li><li>What do they do at QED Solutions?</li><li>Billy shares his advice for those who want to transition from military to corporate cybersecurity.&nbsp;</li><li>Billy gets into the awesome yet scary things about being a researcher.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.qedsecure.com/" rel="noopener noreferrer" target="_blank">QED Secure Solutions</a>&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/billyrios/" rel="noopener noreferrer" target="_blank">Billy Rios on LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp interviews Billy Rios, the Co-Founder of QED Secure Solutions.</p><p>Billy is an experienced technical leader with a strong background in successful strategic security planning, security program development, and security program execution. He excels at seeing the big picture, identifying gaps, and managing initiatives. He is comfortable managing security initiatives for high-profile, high-visibility products and services. He plays an integral role within organizations by providing collaboration, motivation, and direction across teams in diverse and demanding environments.&nbsp;</p><p>Billy’s Dad was in the army, so his family moved around a lot while he was growing up. He currently lives in Colorado. As well as being a long-term contributor to the cybersecurity field, Billy is a former military veteran, active reservist, technologist, author, entrepreneur, security ninja, snowboarder, Jiu-Jitsu brown belt, a well-known researcher in the cybersecurity space, husband, and father.&nbsp;</p><p>He joins Derek today to discuss his background, career journey, and career highlights. He also offers many valuable nuggets of advice for entrepreneurs and anyone in military units looking to break into the commercial cybersecurity industry.</p><p><strong>Show highlights:</strong></p><ul><li>Billy explains how his entry into cybersecurity started with hacking video games as a young kid.</li><li>Billy received scholarships for the Airforce and Marine Corps. He shares his motivation for choosing the Marine Corps and discusses what he did while serving there.</li><li>Billy talks about his study program at the University of Washington.&nbsp;</li><li>Billy has focused on cybersecurity since he left active duty in the Marine Corps almost 20 years ago.</li><li>Billy discusses the guidance he received from leaders and mentors in the organizations he worked for before becoming an entrepreneur.</li><li>How Billy’s diverse roles and experiences shaped his perspective and helped him get to where he is today.</li><li>Billy shares advice for anyone interested in becoming an entrepreneur.</li><li>What do they do at QED Solutions?</li><li>Billy shares his advice for those who want to transition from military to corporate cybersecurity.&nbsp;</li><li>Billy gets into the awesome yet scary things about being a researcher.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.qedsecure.com/" rel="noopener noreferrer" target="_blank">QED Secure Solutions</a>&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/billyrios/" rel="noopener noreferrer" target="_blank">Billy Rios on LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">24c1d551-6632-496e-922e-2c1b1614ae60</guid><itunes:image href="https://artwork.captivate.fm/1f69637e-a09e-49b5-9d6e-6ba6ab3c0241/cDGDLa3Ws4eDIm-OR2JvHTWx.png"/><pubDate>Tue, 14 Feb 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/071dcdf8-2bd1-40e6-a593-d86f4ded31f6/CS-2AI-Billy-Rios-Edited-Audio.mp3" length="40549187" type="audio/mpeg"/><itunes:duration>42:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>69</itunes:episode><podcast:episode>69</podcast:episode></item><item><title>68: Using Engineering + OT to Launch Your CyberSecurity Career</title><itunes:title>68: Using Engineering + OT to Launch Your CyberSecurity Career</itunes:title><description><![CDATA[<p>Today, Khalid Ansari joins Derek Harp. He is a Senior Engineer of Industrial Control Cybersecurity at FM Approvals in Boston.&nbsp;</p><p>Khalid Ansari is an ICS/OT Cybersecurity Engineer with in-the-trenches experience in industrial automation, control systems, and MES. He is a proponent of secure-by-design products and a secure software development lifecycle.&nbsp;</p><p>Khalid has been working in the control systems field for 25 years. He grew up and went to school and university in a small city in Southern India. In addition to being an engineer and a long-time contributor to the OT control systems cybersecurity community, he is also a husband, father, coder, lifetime learner, avid reader, outdoor enthusiast, and struggling skier.&nbsp;</p><p>In this episode, Khalid shares his modern-day superhero backstory and discusses his education path and career journey. He also shares his insight and offers valuable nuggets of advice for anyone considering a career in cybersecurity.</p><p>&nbsp;<strong>Show highlights:</strong></p><ul><li>Khalid was first exposed to technology when his dad bought him a Commodore 500 during high school.</li><li>Khalid did his first paid job while he was in college.</li><li>Khalid discusses his educational experiences in India, the UK, and the US.</li><li>What would Khalid do differently today? (In terms of his studies.)</li><li>Khalid discusses a job opportunity that arose because he was active on the control systems bulletin board while doing his MBA.</li><li>Khalid talks about moving to the Middle East to gain the asset-owner experience he lacked in his portfolio.</li><li>Khalid offers a global perspective on cybersecurity for control systems.</li><li>Khalid shares his view on government regulations within the industry.</li><li>Some suggestions for certifications and other ways for young professionals to acquire knowledge and gain career experience.</li><li>The benefits of volunteering, and how to go about it.</li><li>The role mentorship has played in Khalid’s career.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Khalid Ansari joins Derek Harp. He is a Senior Engineer of Industrial Control Cybersecurity at FM Approvals in Boston.&nbsp;</p><p>Khalid Ansari is an ICS/OT Cybersecurity Engineer with in-the-trenches experience in industrial automation, control systems, and MES. He is a proponent of secure-by-design products and a secure software development lifecycle.&nbsp;</p><p>Khalid has been working in the control systems field for 25 years. He grew up and went to school and university in a small city in Southern India. In addition to being an engineer and a long-time contributor to the OT control systems cybersecurity community, he is also a husband, father, coder, lifetime learner, avid reader, outdoor enthusiast, and struggling skier.&nbsp;</p><p>In this episode, Khalid shares his modern-day superhero backstory and discusses his education path and career journey. He also shares his insight and offers valuable nuggets of advice for anyone considering a career in cybersecurity.</p><p>&nbsp;<strong>Show highlights:</strong></p><ul><li>Khalid was first exposed to technology when his dad bought him a Commodore 500 during high school.</li><li>Khalid did his first paid job while he was in college.</li><li>Khalid discusses his educational experiences in India, the UK, and the US.</li><li>What would Khalid do differently today? (In terms of his studies.)</li><li>Khalid discusses a job opportunity that arose because he was active on the control systems bulletin board while doing his MBA.</li><li>Khalid talks about moving to the Middle East to gain the asset-owner experience he lacked in his portfolio.</li><li>Khalid offers a global perspective on cybersecurity for control systems.</li><li>Khalid shares his view on government regulations within the industry.</li><li>Some suggestions for certifications and other ways for young professionals to acquire knowledge and gain career experience.</li><li>The benefits of volunteering, and how to go about it.</li><li>The role mentorship has played in Khalid’s career.</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">34af6775-fc46-4e5a-bc06-f0229657a6ad</guid><itunes:image href="https://artwork.captivate.fm/4861af6a-1848-4a15-aa87-733354691e67/mlCsWTseKzLs9gdHV4miFF2Z.png"/><pubDate>Tue, 07 Feb 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ef266baf-abc8-40b0-a2ec-7e729d282e96/CS2AI-Ep-68-Khalid-Ansari-Edited-Audio.mp3" length="40571444" type="audio/mpeg"/><itunes:duration>42:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>68</itunes:episode><podcast:episode>68</podcast:episode></item><item><title>67: Coding as a Springboard  Into Cybersecurity with Matt Wyckhouse</title><itunes:title>67: Coding as a Springboard  Into Cybersecurity with Matt Wyckhouse</itunes:title><description><![CDATA[<p>Today, Derek Harp interviews Matt Wyckhouse, the Founder and CEO of Finite State.&nbsp;</p><p>Before founding Finite State, Matt spent 15 years leading and developing advanced solutions to some of the hardest problems in cyber security, with experience across the spectrum of offensive and defensive cyber operations. Notably, he was the technical founder and CTO of Battelle's Cyber Innovations business unit. Throughout his career, Matt has spearheaded complex national security programs ranging from the detection of malicious integrated circuits in the supply chain to next-generation intrusion detection systems for automotive systems. Matt directed numerous intelligence programs related to the security of embedded and IoT devices and has been a speaker on the subject at security events.</p><p>Matt grew up in Ohio, in a small suburb outside of Toledo. In addition to being an entrepreneur and technologist, he is also a husband, chef, foodie, world traveler, and water sports enthusiast! In this episode, he shares his backstory, discusses his education and professional journey, and offers nuggets of advice for anyone looking to get into cybersecurity.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Matt was in a gifted program in elementary school and started writing codes. He also did a fair amount of programming on the side when in high school.</li><li>Matt did an internship and spent 13 years with the Battelle Center for Science, Engineering, and Public Policy at the Ohio State University.</li><li>Matt explains why he believes in the power of internships.</li><li>Matt discusses the benefits of mentorship and explains how it played out for him early on and the role it plays today.</li><li>The various projects and programs Matt worked on at Battelle.</li><li>How did Matt become a technical leader of the brand-new cybersecurity business unit at Battelle?</li><li>What led to Matt leaving Battelle?</li><li>Matt talks about what he did after leaving Battelle and before founding Finite State.</li><li>Things Matt was afraid of when thinking of starting a company.</li><li>Matt offers advice for anyone contemplating starting a company.</li><li>What does it take for entrepreneurs to raise capital to start a business?</li><li>What does Finite State focus on, and who do they serve?</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp interviews Matt Wyckhouse, the Founder and CEO of Finite State.&nbsp;</p><p>Before founding Finite State, Matt spent 15 years leading and developing advanced solutions to some of the hardest problems in cyber security, with experience across the spectrum of offensive and defensive cyber operations. Notably, he was the technical founder and CTO of Battelle's Cyber Innovations business unit. Throughout his career, Matt has spearheaded complex national security programs ranging from the detection of malicious integrated circuits in the supply chain to next-generation intrusion detection systems for automotive systems. Matt directed numerous intelligence programs related to the security of embedded and IoT devices and has been a speaker on the subject at security events.</p><p>Matt grew up in Ohio, in a small suburb outside of Toledo. In addition to being an entrepreneur and technologist, he is also a husband, chef, foodie, world traveler, and water sports enthusiast! In this episode, he shares his backstory, discusses his education and professional journey, and offers nuggets of advice for anyone looking to get into cybersecurity.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Matt was in a gifted program in elementary school and started writing codes. He also did a fair amount of programming on the side when in high school.</li><li>Matt did an internship and spent 13 years with the Battelle Center for Science, Engineering, and Public Policy at the Ohio State University.</li><li>Matt explains why he believes in the power of internships.</li><li>Matt discusses the benefits of mentorship and explains how it played out for him early on and the role it plays today.</li><li>The various projects and programs Matt worked on at Battelle.</li><li>How did Matt become a technical leader of the brand-new cybersecurity business unit at Battelle?</li><li>What led to Matt leaving Battelle?</li><li>Matt talks about what he did after leaving Battelle and before founding Finite State.</li><li>Things Matt was afraid of when thinking of starting a company.</li><li>Matt offers advice for anyone contemplating starting a company.</li><li>What does it take for entrepreneurs to raise capital to start a business?</li><li>What does Finite State focus on, and who do they serve?</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">e4f3f615-f032-4ff7-ad2b-916c4dc91059</guid><itunes:image href="https://artwork.captivate.fm/3878b4f9-1804-4e1f-926b-774ff5612cca/rflcWiGUrNeZuoS-5PshrrJP.jpg"/><pubDate>Tue, 31 Jan 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/047dca1b-57ed-4bd8-99cc-c926a44f7137/CS2AI-Matt-Wickhouse-Edited-Audio.mp3" length="53356018" type="audio/mpeg"/><itunes:duration>55:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>67</itunes:episode><podcast:episode>67</podcast:episode></item><item><title>66: Become a Cybersecurity Entrepreneur with Michael Schroeder</title><itunes:title>66: Become a Cybersecurity Entrepreneur with Michael Schroeder</itunes:title><description><![CDATA[<p>Today, Derek Harp interviews Michael Schroeder, the Founder, CEO, and Director of OT, FRCS, and ICS Security at 3 Territory Solutions.&nbsp;</p><p>Michael leads an organization that conceptualizes, develops, and implements cybersecurity standards and policies for Facility-Related Control Systems, Medical Devices, Industrial Control Systems, PIT and PIT Systems, Operational Technologies, and most generally, the Internet of Things. They are passionate, challenge the status quo, innovate, and fail forward.</p><p>Michael was born and raised in Pittsburgh, Pennsylvania. He is a long-time contributor to the cybersecurity space. In the early years, he was a Chapter Board Member in the Washington DC Chapter of the Control System Cyber Security Association International. He is also a father, husband, entrepreneur, engineer, project manager, traveler, and race-car driver. He joins Derek today to discuss his education and career path, talk about what he does today, and offer advice for anyone considering a career in cybersecurity.</p><p><strong>Show highlights:</strong></p><ul><li>Michael explains what drew him toward the discipline of engineering and why he decided to study mechanical engineering.</li><li>Michael discusses what he did after graduating from Pennsylvania State University.</li><li>How Michael jumped from engineering and working in construction to cybersecurity in 2015.</li><li>Why should you leave jobs with professionalism and strive to keep the doors open?</li><li>Michael explains why his stint working at a large company was so short.</li><li>Michael shares his motivation for starting his own company and gets into the genesis process.</li><li>How Michael chose the name 3 Territory Solutions.</li><li>Michael shares some insight for entrepreneurs.&nbsp;</li><li>How Michael built his career by taking advantage of opportunities as they presented themselves.</li><li>Michael offers advice for people coming into the cybersecurity space.</li><li>The role mentorship has played in Michael’s career path.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/3tmichaelschroeder/" rel="noopener noreferrer" target="_blank">Michael Schroeder on LinkedIn</a></p><p><a href="https://3tsoln.com/" rel="noopener noreferrer" target="_blank">3 Territory Solutions</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp interviews Michael Schroeder, the Founder, CEO, and Director of OT, FRCS, and ICS Security at 3 Territory Solutions.&nbsp;</p><p>Michael leads an organization that conceptualizes, develops, and implements cybersecurity standards and policies for Facility-Related Control Systems, Medical Devices, Industrial Control Systems, PIT and PIT Systems, Operational Technologies, and most generally, the Internet of Things. They are passionate, challenge the status quo, innovate, and fail forward.</p><p>Michael was born and raised in Pittsburgh, Pennsylvania. He is a long-time contributor to the cybersecurity space. In the early years, he was a Chapter Board Member in the Washington DC Chapter of the Control System Cyber Security Association International. He is also a father, husband, entrepreneur, engineer, project manager, traveler, and race-car driver. He joins Derek today to discuss his education and career path, talk about what he does today, and offer advice for anyone considering a career in cybersecurity.</p><p><strong>Show highlights:</strong></p><ul><li>Michael explains what drew him toward the discipline of engineering and why he decided to study mechanical engineering.</li><li>Michael discusses what he did after graduating from Pennsylvania State University.</li><li>How Michael jumped from engineering and working in construction to cybersecurity in 2015.</li><li>Why should you leave jobs with professionalism and strive to keep the doors open?</li><li>Michael explains why his stint working at a large company was so short.</li><li>Michael shares his motivation for starting his own company and gets into the genesis process.</li><li>How Michael chose the name 3 Territory Solutions.</li><li>Michael shares some insight for entrepreneurs.&nbsp;</li><li>How Michael built his career by taking advantage of opportunities as they presented themselves.</li><li>Michael offers advice for people coming into the cybersecurity space.</li><li>The role mentorship has played in Michael’s career path.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/3tmichaelschroeder/" rel="noopener noreferrer" target="_blank">Michael Schroeder on LinkedIn</a></p><p><a href="https://3tsoln.com/" rel="noopener noreferrer" target="_blank">3 Territory Solutions</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">19bf4c96-a913-4de7-b97b-98c36112c24f</guid><itunes:image href="https://artwork.captivate.fm/4478b670-95dd-4901-b6d8-c0c74a322743/tLkmDWGYDnAJAqg-KO1JGXfy.jpg"/><pubDate>Tue, 24 Jan 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5fa26d7f-ca21-4ce4-8967-e569b6ab7b01/CS2AI-Michael-Schroder-Edited-Audio.mp3" length="43523771" type="audio/mpeg"/><itunes:duration>43:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>66</itunes:episode><podcast:episode>66</podcast:episode></item><item><title>65: How the S4x23 Conference Can Help Your CyberSecurity Career</title><itunes:title>65: How the S4x23 Conference Can Help Your CyberSecurity Career</itunes:title><description><![CDATA[<p>Dale Peterson, the Founder of the S4 Conference, joins Derek Harp today.&nbsp;</p><p>Dale was on an earlier podcast last year where he spoke about the founding and history of the S4 Conference. Today, he joins Derek to discuss the S4x23 Conference coming up shortly. It will open with a preliminary day on February 13th, and the event will take place on the 14th, 15th, and 16th of February.</p><p>For more than 15 years, Dale Peterson has been on the leading/bleeding edge helping security-conscious asset owners effectively and efficiently manage risk to their critical assets. He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in the world. Dale is constantly pushing and prodding the ICS community to move faster and get better.</p><p>The S4 Conference has been growing and evolving for many years. In this episode, Dale dives into what to expect and look forward to for this year’s S4x23 Conference.</p><p><strong>Show highlights:</strong></p><ul><li>Dale gets into what to expect from the upcoming S4x23 Conference</li><li>Dale discusses what excites him about the upcoming event</li><li>Dale talks about the women’s social event that will take place on the night of Monday the 13th</li><li>There will be a My Favorite Metric game show on the morning of Thursday the 16th</li><li>There will be 100 free tickets for women in ICS</li><li>There will be a special space for worthy cause exhibitors</li><li>Who the event is geared toward</li></ul><br/><p><strong>Links and resources:&nbsp;</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://dale-peterson.com/" rel="noopener noreferrer" target="_blank">Dale Peterson’s website</a></p><p>Dale Peterson on&nbsp;<a href="https://www.linkedin.com/in/dale-peterson-s4/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Go to <a href="https://www.s4xevents.com" rel="noopener noreferrer" target="_blank">www.s4xevents.com</a>&nbsp;for more information about the upcoming S4x23 Conference.</p><p><strong>Books mentioned:</strong></p><p><a href="https://amzn.to/3XDFvKD" rel="noopener noreferrer" target="_blank">Start with Why: How Great Leaders Inspire Everyone to Take Action</a> by Simon Sinek</p>]]></description><content:encoded><![CDATA[<p>Dale Peterson, the Founder of the S4 Conference, joins Derek Harp today.&nbsp;</p><p>Dale was on an earlier podcast last year where he spoke about the founding and history of the S4 Conference. Today, he joins Derek to discuss the S4x23 Conference coming up shortly. It will open with a preliminary day on February 13th, and the event will take place on the 14th, 15th, and 16th of February.</p><p>For more than 15 years, Dale Peterson has been on the leading/bleeding edge helping security-conscious asset owners effectively and efficiently manage risk to their critical assets. He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in the world. Dale is constantly pushing and prodding the ICS community to move faster and get better.</p><p>The S4 Conference has been growing and evolving for many years. In this episode, Dale dives into what to expect and look forward to for this year’s S4x23 Conference.</p><p><strong>Show highlights:</strong></p><ul><li>Dale gets into what to expect from the upcoming S4x23 Conference</li><li>Dale discusses what excites him about the upcoming event</li><li>Dale talks about the women’s social event that will take place on the night of Monday the 13th</li><li>There will be a My Favorite Metric game show on the morning of Thursday the 16th</li><li>There will be 100 free tickets for women in ICS</li><li>There will be a special space for worthy cause exhibitors</li><li>Who the event is geared toward</li></ul><br/><p><strong>Links and resources:&nbsp;</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://dale-peterson.com/" rel="noopener noreferrer" target="_blank">Dale Peterson’s website</a></p><p>Dale Peterson on&nbsp;<a href="https://www.linkedin.com/in/dale-peterson-s4/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Go to <a href="https://www.s4xevents.com" rel="noopener noreferrer" target="_blank">www.s4xevents.com</a>&nbsp;for more information about the upcoming S4x23 Conference.</p><p><strong>Books mentioned:</strong></p><p><a href="https://amzn.to/3XDFvKD" rel="noopener noreferrer" target="_blank">Start with Why: How Great Leaders Inspire Everyone to Take Action</a> by Simon Sinek</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">99ad8fb7-30eb-4231-a06f-e609283f52af</guid><itunes:image href="https://artwork.captivate.fm/c2a76165-eb63-46fa-97c3-839f674b7590/mq-d4_1fcFpKEIMlK-EA4Smp.jpg"/><pubDate>Wed, 18 Jan 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/23c10612-8de2-47fb-81be-89f01a8ce03e/CS2AI-Dale-Peterson-Edited-Audio.mp3" length="15027498" type="audio/mpeg"/><itunes:duration>15:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>65</itunes:episode><podcast:episode>65</podcast:episode></item><item><title>64: Education That Alters Your  Career Trajectory</title><itunes:title>64: Education That Alters Your  Career Trajectory</itunes:title><description><![CDATA[<p>Today, Markus Braendle joins Derek Harp as his guest for today’s show. He is Head of Information and Automotive Security at the Volkswagen company, CARIAD.&nbsp;</p><p>Markus has been in the industry for a long time! He is a high-energy and result-driven professional offering extensive leadership and business experience. He has a proven track record of building, strengthening, and leading international teams, evolving organizations to meet future needs, as well as creating a customer-focused culture. He is confident and engaging with refined communication skills. He brings deep technical know-how to areas of information technology, cyber security, or industrial automation.</p><p>Markus was born in Iran and grew up in a small town near Zurich, Switzerland. In addition to being a technologist and an all-around geek, he is also a husband, father, hobby carpenter, mountain biker, and formally-trained software engineer. In this episode, he tells his story, discusses his education and career trajectory, and gets into what they are doing at CARIAD.</p><p>Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>His dad was into technology, and it became clear early on that Markus would also go into technology.</li><li>He studied for four years to get his Master’s in Computer Science and then did a P.h.D. in Theoretical Computer Science.</li><li>Markus talks about the value of the year he spent in the US as an exchange student.</li><li>He explains why he ended up in a corporate research lab after completing his studies.</li><li>Markus discusses his first intersections with control systems and cybersecurity.</li><li>How Markus learned to always ask about the most important thing a product does before trying to link security to it.</li><li>Markus discusses his approach to building a network to advance your career.</li><li>The qualities Markus looks for in candidates when interviewing them.</li><li>What diversity means to him, and why he feels it is essential when building teams.</li><li>How Markus discovered the benefits of working with people with autism.</li><li>Why he left ABB to join Airbus, and why he joined Cariad eight months ago.</li><li>Markus shares some advice for what people starting in their careers should study.</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>Today, Markus Braendle joins Derek Harp as his guest for today’s show. He is Head of Information and Automotive Security at the Volkswagen company, CARIAD.&nbsp;</p><p>Markus has been in the industry for a long time! He is a high-energy and result-driven professional offering extensive leadership and business experience. He has a proven track record of building, strengthening, and leading international teams, evolving organizations to meet future needs, as well as creating a customer-focused culture. He is confident and engaging with refined communication skills. He brings deep technical know-how to areas of information technology, cyber security, or industrial automation.</p><p>Markus was born in Iran and grew up in a small town near Zurich, Switzerland. In addition to being a technologist and an all-around geek, he is also a husband, father, hobby carpenter, mountain biker, and formally-trained software engineer. In this episode, he tells his story, discusses his education and career trajectory, and gets into what they are doing at CARIAD.</p><p>Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>His dad was into technology, and it became clear early on that Markus would also go into technology.</li><li>He studied for four years to get his Master’s in Computer Science and then did a P.h.D. in Theoretical Computer Science.</li><li>Markus talks about the value of the year he spent in the US as an exchange student.</li><li>He explains why he ended up in a corporate research lab after completing his studies.</li><li>Markus discusses his first intersections with control systems and cybersecurity.</li><li>How Markus learned to always ask about the most important thing a product does before trying to link security to it.</li><li>Markus discusses his approach to building a network to advance your career.</li><li>The qualities Markus looks for in candidates when interviewing them.</li><li>What diversity means to him, and why he feels it is essential when building teams.</li><li>How Markus discovered the benefits of working with people with autism.</li><li>Why he left ABB to join Airbus, and why he joined Cariad eight months ago.</li><li>Markus shares some advice for what people starting in their careers should study.</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">74d8542c-1f64-4460-8770-9991b0309fd2</guid><itunes:image href="https://artwork.captivate.fm/401ba9db-f450-48b5-accd-51c370c56596/T1u7e0ZdOexAXdcpCD1V8bms.jpg"/><pubDate>Tue, 10 Jan 2023 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7131a6c5-fc00-4b29-8a38-30cfd664b457/CS2AI-Jan-10-Edited-Audio-v3.mp3" length="39732461" type="audio/mpeg"/><itunes:duration>41:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>64</itunes:episode><podcast:episode>64</podcast:episode></item><item><title>63: OT and Cybersecurity Updates from Rick Kaun of Verve Industrial Protection</title><itunes:title>63: OT and Cybersecurity Updates from Rick Kaun of Verve Industrial Protection</itunes:title><description><![CDATA[<p>Today, Derek Harp shines the spotlight on Verve Industrial Protection. Verve has been around for some time and has been evolving over the last several years.&nbsp;</p><p>Rick Kaun is the VP of Solutions at Verve Industrial Protection. He joins Derek today to share his insights and talk about Verve, explain what sets them apart from the rest, and discuss where they are heading.&nbsp; &nbsp;</p><p>Rick is a CS2AI fellow and a former CS2AI Chapter President. He has been involved with CS2AI since the very early days.</p><p>You will not want to miss this episode if you are interested in learning about what goes on and what people are doing in the OT realm and cybersecurity space. Stay tuned to find out what Verve Industrial Protection does, the verticals they are in, who they help, and how they do it.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Verve’s origin story.</li><li>How Verve differs from its competitors.</li><li>Rick discusses the various verticals Verve is in.</li><li>How and why Rick joined Verve.</li><li>Rick dives into what protection requires.</li><li>The main differences between Verve and traditional tools.</li><li>Why does Verve do managed services?</li><li>Rick unpacks what he finds exciting about where Verve is and the way they do things.</li><li>How do people get selected to do OT or ICS cybersecurity?</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp shines the spotlight on Verve Industrial Protection. Verve has been around for some time and has been evolving over the last several years.&nbsp;</p><p>Rick Kaun is the VP of Solutions at Verve Industrial Protection. He joins Derek today to share his insights and talk about Verve, explain what sets them apart from the rest, and discuss where they are heading.&nbsp; &nbsp;</p><p>Rick is a CS2AI fellow and a former CS2AI Chapter President. He has been involved with CS2AI since the very early days.</p><p>You will not want to miss this episode if you are interested in learning about what goes on and what people are doing in the OT realm and cybersecurity space. Stay tuned to find out what Verve Industrial Protection does, the verticals they are in, who they help, and how they do it.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Verve’s origin story.</li><li>How Verve differs from its competitors.</li><li>Rick discusses the various verticals Verve is in.</li><li>How and why Rick joined Verve.</li><li>Rick dives into what protection requires.</li><li>The main differences between Verve and traditional tools.</li><li>Why does Verve do managed services?</li><li>Rick unpacks what he finds exciting about where Verve is and the way they do things.</li><li>How do people get selected to do OT or ICS cybersecurity?</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">934be58f-4992-4b75-ae28-8cfc59b83885</guid><itunes:image href="https://artwork.captivate.fm/38ae15f3-3ba4-4793-8e68-f594278a3173/pKKwssy4lQwd3MVP8R0lHAWB.jpg"/><pubDate>Tue, 27 Dec 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/09e8bd1e-bbf0-458f-9703-0da68ca728f2/CS2AI-Verve-Industrial-Edited-Audio.mp3" length="42013379" type="audio/mpeg"/><itunes:duration>43:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>63</itunes:episode><podcast:episode>63</podcast:episode></item><item><title>62: Going from Gamer to  Cybersecurity Expert with Donovan Tindill</title><itunes:title>62: Going from Gamer to  Cybersecurity Expert with Donovan Tindill</itunes:title><description><![CDATA[<p>Derek Harp interviews Donovan Tindill today. Donovan is the Director of OT Cybersecurity at DeNexus.&nbsp;</p><p>Donovan Tindill is a control systems cybersecurity subject matter expert with the Honeywell Industrial Cybersecurity team. He spent over 17 years customer-facing as a control systems cybersecurity consultant in Canada, training/mentoring the technical team, and leading major projects across Consulting Services. Donovan supports global industrial cybersecurity by volunteering to teach, contributing to standards, supporting industry conferences, and sharing thought-provoking presentations.&nbsp;</p><p>He is a former ISA-99/62443 trainer, working group co-chair, and contributor. Donovan is an advisor to both the United States and Canadian government control systems cybersecurity conferences (i.e. US DHS ICSJWG Vice-Chair and Public Safety Canada ICS Symposium Vendor Seat) helping select speakers, drive awareness, and increase knowledge in North America. Donovan has an applied Bachelor’s Degree in Network Engineering and Management (NET:1999, BAIST-NM:-2003) from the Northern Alberta Institute of Technology (NAIT) and holds CISSP and GICSP certifications.</p><p>Donovan grew up in Canada, in rural Alberta, and currently lives in Edmonton. He is a long-time contributor to the cybersecurity space. He has been involved for much longer than most and is way more than just a cybersecurity enthusiast. He is also a professional speaker, husband, father, coach, outdoor enthusiast, camper, handyman, and tinkerer. He joins Derek in this episode to tell his story, unpack his career journey, share his experience, and offer advice.</p><p>You won’t want to miss this episode if you are considering a career in cybersecurity. Stay tuned to hear Donovan’s story and benefit from his experience in control systems and cybersecurity!</p><p><strong>Show highlights:</strong>&nbsp;</p><ul><li>How video games and networking computers together led Donovan to get into network engineering.</li><li>What the network engineering program is all about and what you can do with it.&nbsp;</li><li>Donovan discusses a roadblock to growth in the Honeywell cybersecurity business.</li><li>Donavan talks about the first project he worked on at the start of the integration between control systems and networks.</li><li>How has the cybersecurity journey evolved since the early 2000s?</li><li>Donovan talks about his decision to take a leave of absence from Matrikon to complete his degree program.</li><li>The different roles Donovan has been in throughout his career.</li><li>The benefits of volunteering.</li><li>Donovan discusses his motivation for doing what he does in the controls systems cyberspace.</li><li>What will you gain from giving and receiving mentorship?</li><li>Why Donovan decided to move to DeNexus.</li><li>Donovan shares his view of the future.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p>Donovan Tindill on&nbsp;<a href="https://www.linkedin.com/in/donovantindill/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.denexus.io/" rel="noopener noreferrer" target="_blank">DeNexus</a></p>]]></description><content:encoded><![CDATA[<p>Derek Harp interviews Donovan Tindill today. Donovan is the Director of OT Cybersecurity at DeNexus.&nbsp;</p><p>Donovan Tindill is a control systems cybersecurity subject matter expert with the Honeywell Industrial Cybersecurity team. He spent over 17 years customer-facing as a control systems cybersecurity consultant in Canada, training/mentoring the technical team, and leading major projects across Consulting Services. Donovan supports global industrial cybersecurity by volunteering to teach, contributing to standards, supporting industry conferences, and sharing thought-provoking presentations.&nbsp;</p><p>He is a former ISA-99/62443 trainer, working group co-chair, and contributor. Donovan is an advisor to both the United States and Canadian government control systems cybersecurity conferences (i.e. US DHS ICSJWG Vice-Chair and Public Safety Canada ICS Symposium Vendor Seat) helping select speakers, drive awareness, and increase knowledge in North America. Donovan has an applied Bachelor’s Degree in Network Engineering and Management (NET:1999, BAIST-NM:-2003) from the Northern Alberta Institute of Technology (NAIT) and holds CISSP and GICSP certifications.</p><p>Donovan grew up in Canada, in rural Alberta, and currently lives in Edmonton. He is a long-time contributor to the cybersecurity space. He has been involved for much longer than most and is way more than just a cybersecurity enthusiast. He is also a professional speaker, husband, father, coach, outdoor enthusiast, camper, handyman, and tinkerer. He joins Derek in this episode to tell his story, unpack his career journey, share his experience, and offer advice.</p><p>You won’t want to miss this episode if you are considering a career in cybersecurity. Stay tuned to hear Donovan’s story and benefit from his experience in control systems and cybersecurity!</p><p><strong>Show highlights:</strong>&nbsp;</p><ul><li>How video games and networking computers together led Donovan to get into network engineering.</li><li>What the network engineering program is all about and what you can do with it.&nbsp;</li><li>Donovan discusses a roadblock to growth in the Honeywell cybersecurity business.</li><li>Donavan talks about the first project he worked on at the start of the integration between control systems and networks.</li><li>How has the cybersecurity journey evolved since the early 2000s?</li><li>Donovan talks about his decision to take a leave of absence from Matrikon to complete his degree program.</li><li>The different roles Donovan has been in throughout his career.</li><li>The benefits of volunteering.</li><li>Donovan discusses his motivation for doing what he does in the controls systems cyberspace.</li><li>What will you gain from giving and receiving mentorship?</li><li>Why Donovan decided to move to DeNexus.</li><li>Donovan shares his view of the future.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p>Donovan Tindill on&nbsp;<a href="https://www.linkedin.com/in/donovantindill/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.denexus.io/" rel="noopener noreferrer" target="_blank">DeNexus</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">0ff2fbf4-28cc-4eaa-97b6-d681c305c015</guid><itunes:image href="https://artwork.captivate.fm/4412706d-7c69-4084-8522-ed68f2844af8/WChUdc81xQjzTUbVgwqAVdWr.jpg"/><pubDate>Thu, 22 Dec 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4161a400-f032-4218-90bf-9d9b0946bc40/Donovan-Tindill-Edited-Audio.mp3" length="52028282" type="audio/mpeg"/><itunes:duration>54:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>62</itunes:episode><podcast:episode>62</podcast:episode></item><item><title>61: Lessons from the Origins of Control Systems</title><itunes:title>61: Lessons from the Origins of Control Systems</itunes:title><description><![CDATA[<p>Joseph Weiss is an industry expert on control systems and electronic security of control systems, with more than 40 years of experience in the energy industry. Mr. Weiss spent more than 14 years at the Electric Power Research Institute (EPRI) where he led a variety of programs including the Nuclear Plant Instrumentation and Diagnostics Program, the Fossil Plant Instrumentation &amp; Controls Program, the Y2K Embedded Systems Program and, the cyber security for digital control systems.</p><p>As Technical Manager of the Enterprise Infrastructure Security (EIS) Program, he provided technical and outreach leadership for the energy industry’s critical infrastructure protection (CIP) program. He was responsible for developing many utility industry security primers and implementation guidelines. He was also the EPRI Exploratory Research lead on instrumentation, controls, and communications.</p><p>Mr. Weiss serves as a member of numerous organizations related to control system security. These include the North American Electric Reliability Corporation (NERC) Control Systems Security Working Group (CSSWG), the International Electrotechnical Commission (IEC) Technical Committee (TC) 57 Working Group 15 – Data and Communication Security, the Process Controls Security Requirements Forum, CIGRÉ WG D2.22 – Treatment of Information Security for Electric Power Utilities (EPUs), and other industry working groups.</p><p>He served as the Task Force Lead for review of information security impacts on IEEE standards. He is also a Director on ISA’s Standards and Practices Board. He has provided oral and written testimony to three House subcommittees, one Senate Committee, and a formal statement for the record to another House Committee. He has also responded to numerous Government Accountability Office (GAO) information requests on cyber security and Smart Grid issues.</p><p>He is also an invited speaker at many industry and vendor user group security conferences, has chaired numerous panel sessions on control system security, and is often quoted throughout the industry.</p><p>He has published over 80 papers on instrumentation, controls, and diagnostics including chapters on cyber security for&nbsp;<u>Electric Power Substations Engineering&nbsp;</u>and&nbsp;<u>Securing Water and Wastewater Systems</u>. He coauthored&nbsp;<u>Cyber Security Policy Guidebook</u>&nbsp;and authored&nbsp;<u>Protecting Industrial Control Systems from Electronic Threats</u>. He supported MITRE and NIST in extending NIST SP800-53 to include control systems and the development of NIST SP800-82.</p><p>He was tasked to write the White Paper on Industrial Control Systems Security for the Center for Strategic and International Studies Blue Ribbon Panel preparing cyber security recommendations for the Obama administration.</p><p>In February 2016, Mr. Weiss gave the keynote to the National Academy of Science, Engineering, and Medicine on control system cyber security. Mr. Weiss has conducted SCADA, substation, plant control system, and water systems vulnerability and risk assessments and conducted short courses on control system security. He has amassed a database of more than 950 actual control system cyber incidents.</p><p>He is a member of Transportation Safety Board Committee on Cyber Security for Mass Transit. He was a subject matter expert to the International Atomic Energy Agency on nuclear plant control system cyber security. He also established the annual Industrial Control System (ICS) Cyber Security Conference. Mr. Weiss has received numerous industry awards, including the EPRI Presidents Award (2002) and is an ISA Fellow, Managing Director of ISA Fossil Plant Standards, ISA Nuclear Plant Standards, ISA Industrial Automation and Control System Security (ISA99), a Ponemon Institute Fellow, and an IEEE Senior Member. He has been identified as a Smart Grid Pioneer by Smart Grid Today.</p><p>He is a Voting Member of the TC65 TAG and a US Expert to TC65 WG10, Security...]]></description><content:encoded><![CDATA[<p>Joseph Weiss is an industry expert on control systems and electronic security of control systems, with more than 40 years of experience in the energy industry. Mr. Weiss spent more than 14 years at the Electric Power Research Institute (EPRI) where he led a variety of programs including the Nuclear Plant Instrumentation and Diagnostics Program, the Fossil Plant Instrumentation &amp; Controls Program, the Y2K Embedded Systems Program and, the cyber security for digital control systems.</p><p>As Technical Manager of the Enterprise Infrastructure Security (EIS) Program, he provided technical and outreach leadership for the energy industry’s critical infrastructure protection (CIP) program. He was responsible for developing many utility industry security primers and implementation guidelines. He was also the EPRI Exploratory Research lead on instrumentation, controls, and communications.</p><p>Mr. Weiss serves as a member of numerous organizations related to control system security. These include the North American Electric Reliability Corporation (NERC) Control Systems Security Working Group (CSSWG), the International Electrotechnical Commission (IEC) Technical Committee (TC) 57 Working Group 15 – Data and Communication Security, the Process Controls Security Requirements Forum, CIGRÉ WG D2.22 – Treatment of Information Security for Electric Power Utilities (EPUs), and other industry working groups.</p><p>He served as the Task Force Lead for review of information security impacts on IEEE standards. He is also a Director on ISA’s Standards and Practices Board. He has provided oral and written testimony to three House subcommittees, one Senate Committee, and a formal statement for the record to another House Committee. He has also responded to numerous Government Accountability Office (GAO) information requests on cyber security and Smart Grid issues.</p><p>He is also an invited speaker at many industry and vendor user group security conferences, has chaired numerous panel sessions on control system security, and is often quoted throughout the industry.</p><p>He has published over 80 papers on instrumentation, controls, and diagnostics including chapters on cyber security for&nbsp;<u>Electric Power Substations Engineering&nbsp;</u>and&nbsp;<u>Securing Water and Wastewater Systems</u>. He coauthored&nbsp;<u>Cyber Security Policy Guidebook</u>&nbsp;and authored&nbsp;<u>Protecting Industrial Control Systems from Electronic Threats</u>. He supported MITRE and NIST in extending NIST SP800-53 to include control systems and the development of NIST SP800-82.</p><p>He was tasked to write the White Paper on Industrial Control Systems Security for the Center for Strategic and International Studies Blue Ribbon Panel preparing cyber security recommendations for the Obama administration.</p><p>In February 2016, Mr. Weiss gave the keynote to the National Academy of Science, Engineering, and Medicine on control system cyber security. Mr. Weiss has conducted SCADA, substation, plant control system, and water systems vulnerability and risk assessments and conducted short courses on control system security. He has amassed a database of more than 950 actual control system cyber incidents.</p><p>He is a member of Transportation Safety Board Committee on Cyber Security for Mass Transit. He was a subject matter expert to the International Atomic Energy Agency on nuclear plant control system cyber security. He also established the annual Industrial Control System (ICS) Cyber Security Conference. Mr. Weiss has received numerous industry awards, including the EPRI Presidents Award (2002) and is an ISA Fellow, Managing Director of ISA Fossil Plant Standards, ISA Nuclear Plant Standards, ISA Industrial Automation and Control System Security (ISA99), a Ponemon Institute Fellow, and an IEEE Senior Member. He has been identified as a Smart Grid Pioneer by Smart Grid Today.</p><p>He is a Voting Member of the TC65 TAG and a US Expert to TC65 WG10, Security for industrial process measurement and control – network and system security and IEC TC45A Nuclear Plant Cyber Security. Mr. Weiss was featured in Richard Clarke and RP Eddy’s book-&nbsp;<u>Warning – Finding Cassandras to Stop Catastrophes</u>. He has two patents on instrumentation and control systems, is a registered professional engineer in the State of California, a Certified Information Security Manager (CISM) and is certified in Risk and Information Systems Control (CRISC).</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">1b122267-8467-4010-82cc-37a7b971db54</guid><itunes:image href="https://artwork.captivate.fm/ca77b461-da3d-4eb0-8326-1ba0032df0b8/sr-eQ152FA94fPXF4YHP1bUX.jpg"/><pubDate>Tue, 13 Dec 2022 12:15:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/22e43a5b-b20e-4992-968c-9ed117c6bcae/CS2AI-Joe-Weiss-Audio-Edited.mp3" length="52108881" type="audio/mpeg"/><itunes:duration>54:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>61</itunes:episode><podcast:episode>61</podcast:episode></item><item><title>60: Coming Out of the Military  to a Career in CyberSecurity with Charlie Givens</title><itunes:title>60: Coming Out of the Military  to a Career in CyberSecurity with Charlie Givens</itunes:title><description><![CDATA[<p>Today, Derek Harp interviews Charlie Givens, the Project Manager at Bechtel.&nbsp;</p><p>Charlie is an experienced professional with a demonstrated history of working in Information Technology, Engineering Automation, and Cybersecurity. He is a Certified Software Quality Assurance Engineer, Global Industrial Cyber Security Professional, and Control System Cyber Security Association International Fellow. He has invested his career in database design, data analysis, software engineering, system management, software quality assurance, process improvement, procedure development, work process enhancement, digital transformation, and software and system integration. He has also focused on cybersecurity as it relates to industrial control systems.&nbsp;</p><p>Charlie hails from a small town in Georgia. As well as being an engineer, he is also a veteran, father, husband, fishing enthusiast, photographer, and a lifetime learner.&nbsp;</p><p>In this episode, he tells his backstory, discusses his career trajectory, and offers some valuable nuggets of advice for anyone looking to get into cybersecurity.</p><p>This episode is a must if you are considering a career in cybersecurity or the control systems space. Stay tuned to hear how Charlie got to where he is today and benefit from his insights and many years of experience in the field.</p><p><strong>Show highlights:</strong></p><ul><li>Charlie talks about the time he spent in the Navy.</li><li>What Charlie studied after leaving the Navy.</li><li>How he encountered cybersecurity when he joined Bechtel as a software engineer.</li><li>What he learned over time from his perspective as a computer scientist in the engineering field.</li><li>Charlie’s recommendations for the first steps to get into the cybersecurity domain.</li><li>The process used for the ICS center program Charlie helped create.</li><li>The role mentorship has played in Charlie’s journey.</li><li>Some advice for people coming out of school or the military looking to break into cybersecurity.</li><li>Some of the challenges Charlie has faced in his career.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.bechtel.com/" rel="noopener noreferrer" target="_blank">Bechtel</a></p><p><a href="https://www.linkedin.com/in/charlie-givens-mspm-csqe-giscp-45003810/details/experience/" rel="noopener noreferrer" target="_blank">Charlie Givens on LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp interviews Charlie Givens, the Project Manager at Bechtel.&nbsp;</p><p>Charlie is an experienced professional with a demonstrated history of working in Information Technology, Engineering Automation, and Cybersecurity. He is a Certified Software Quality Assurance Engineer, Global Industrial Cyber Security Professional, and Control System Cyber Security Association International Fellow. He has invested his career in database design, data analysis, software engineering, system management, software quality assurance, process improvement, procedure development, work process enhancement, digital transformation, and software and system integration. He has also focused on cybersecurity as it relates to industrial control systems.&nbsp;</p><p>Charlie hails from a small town in Georgia. As well as being an engineer, he is also a veteran, father, husband, fishing enthusiast, photographer, and a lifetime learner.&nbsp;</p><p>In this episode, he tells his backstory, discusses his career trajectory, and offers some valuable nuggets of advice for anyone looking to get into cybersecurity.</p><p>This episode is a must if you are considering a career in cybersecurity or the control systems space. Stay tuned to hear how Charlie got to where he is today and benefit from his insights and many years of experience in the field.</p><p><strong>Show highlights:</strong></p><ul><li>Charlie talks about the time he spent in the Navy.</li><li>What Charlie studied after leaving the Navy.</li><li>How he encountered cybersecurity when he joined Bechtel as a software engineer.</li><li>What he learned over time from his perspective as a computer scientist in the engineering field.</li><li>Charlie’s recommendations for the first steps to get into the cybersecurity domain.</li><li>The process used for the ICS center program Charlie helped create.</li><li>The role mentorship has played in Charlie’s journey.</li><li>Some advice for people coming out of school or the military looking to break into cybersecurity.</li><li>Some of the challenges Charlie has faced in his career.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.bechtel.com/" rel="noopener noreferrer" target="_blank">Bechtel</a></p><p><a href="https://www.linkedin.com/in/charlie-givens-mspm-csqe-giscp-45003810/details/experience/" rel="noopener noreferrer" target="_blank">Charlie Givens on LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">700351d4-69e1-4b8e-84ee-6597c65917ce</guid><itunes:image href="https://artwork.captivate.fm/e211da8a-a954-4872-99db-b3960cf566a8/4Z3B9xQSgT8zs_BIndbhjrcP.jpg"/><pubDate>Tue, 06 Dec 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/91810b8d-fda5-4d99-829e-88904a27572e/CS-2AI-Charlie-Givens-Edited-Video-Audio.mp3" length="38136660" type="audio/mpeg"/><itunes:duration>39:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>60</itunes:episode><podcast:episode>60</podcast:episode></item><item><title>59: Staying Curious and Learning New Things is an Asset in Cyber Security with David Bacque</title><itunes:title>59: Staying Curious and Learning New Things is an Asset in Cyber Security with David Bacque</itunes:title><description><![CDATA[<p>Derek Harp interviews David Bacque today. David is currently the Vice President of Strategic Development and Director of OT/ICS Cybersecurity at RED Group.&nbsp;</p><p>RED Group is an Industrial Control Systems (ICS) technology development and integration firm specializing in Process Automation, IT/OT Consulting, and Industrial Cybersecurity. Dave is an experienced industrial cybersecurity and operational technology (OT) professional who has led, advised on, and delivered cybersecurity projects and initiatives with industrial clients around the world to help operators of critical infrastructure become more resilient to cyber threats. He has a B.S. in Information Systems and Decision Sciences from Louisiana State University and is a holder of the Global Industrial Cybersecurity Professional (GICSP) and Project Management Professional (PMP) certifications.</p><p>Dave grew up and went to school in a small town in South Louisiana. He has many years of experience in the OT space. As well as being an OT/ICS Cybersecurity leader, he is also a father, sailor, chef, barista, traveler, motorcyclist, and hiker. He joins Derek today to talk about his background, education, and career trajectory and discuss the importance of staying curious and being open to learning new things.</p><p>This episode is a must for anyone looking to get into the cybersecurity space! Tune in to hear Dave’s story, learn from his insights and experience, and benefit from his valuable nuggets of career advice!&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>How his dad’s background in mechanical design led to David’s first interactions with technology.</li><li>The many interesting things that took place around the time Dave graduated from LSU in 2001.</li><li>What Dave did and learned when he started his career with Total in the early days of IT and OT convergence.</li><li>The value of getting to know your co-workers personally and building community within organizations.</li><li>Some changes in the OT security space that happened during the course of Dave’s career.</li><li>What does it take for engineers and IT people to become OT cybersecurity qualified and savvy?</li><li>Dave offers advice for leaders looking to get people together to build cross-functional teams.</li><li>What Dave did in his first career roles.</li><li>Dave dives into the power of building long-term relationships</li><li>Dave discusses the informal mentor/mentee relationships he has had in his career</li><li>The value of being able to tell people your story.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://red.group/" rel="noopener noreferrer" target="_blank">RED Group</a></p><p>Dave Bacque on&nbsp;<a href="https://www.linkedin.com/in/david-bacque-48a657/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Derek Harp interviews David Bacque today. David is currently the Vice President of Strategic Development and Director of OT/ICS Cybersecurity at RED Group.&nbsp;</p><p>RED Group is an Industrial Control Systems (ICS) technology development and integration firm specializing in Process Automation, IT/OT Consulting, and Industrial Cybersecurity. Dave is an experienced industrial cybersecurity and operational technology (OT) professional who has led, advised on, and delivered cybersecurity projects and initiatives with industrial clients around the world to help operators of critical infrastructure become more resilient to cyber threats. He has a B.S. in Information Systems and Decision Sciences from Louisiana State University and is a holder of the Global Industrial Cybersecurity Professional (GICSP) and Project Management Professional (PMP) certifications.</p><p>Dave grew up and went to school in a small town in South Louisiana. He has many years of experience in the OT space. As well as being an OT/ICS Cybersecurity leader, he is also a father, sailor, chef, barista, traveler, motorcyclist, and hiker. He joins Derek today to talk about his background, education, and career trajectory and discuss the importance of staying curious and being open to learning new things.</p><p>This episode is a must for anyone looking to get into the cybersecurity space! Tune in to hear Dave’s story, learn from his insights and experience, and benefit from his valuable nuggets of career advice!&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>How his dad’s background in mechanical design led to David’s first interactions with technology.</li><li>The many interesting things that took place around the time Dave graduated from LSU in 2001.</li><li>What Dave did and learned when he started his career with Total in the early days of IT and OT convergence.</li><li>The value of getting to know your co-workers personally and building community within organizations.</li><li>Some changes in the OT security space that happened during the course of Dave’s career.</li><li>What does it take for engineers and IT people to become OT cybersecurity qualified and savvy?</li><li>Dave offers advice for leaders looking to get people together to build cross-functional teams.</li><li>What Dave did in his first career roles.</li><li>Dave dives into the power of building long-term relationships</li><li>Dave discusses the informal mentor/mentee relationships he has had in his career</li><li>The value of being able to tell people your story.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://red.group/" rel="noopener noreferrer" target="_blank">RED Group</a></p><p>Dave Bacque on&nbsp;<a href="https://www.linkedin.com/in/david-bacque-48a657/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">4200fbc5-5e9a-463e-881a-058f85eec829</guid><itunes:image href="https://artwork.captivate.fm/aacadc44-edce-46b1-89c7-d561b625b185/6d3b2Q_wApMEAVO1_pgjd2XI.jpg"/><pubDate>Tue, 29 Nov 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/76f5c255-84c3-49a5-8421-6f9224638ddd/CS2AI-David-Bacque-Edited-Audio.mp3" length="44743287" type="audio/mpeg"/><itunes:duration>44:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>59</itunes:episode><podcast:episode>59</podcast:episode></item><item><title>58: Leveraging Your Military Career to Carve Out a Cyber Security Career with Dr. Michael Chipley</title><itunes:title>58: Leveraging Your Military Career to Carve Out a Cyber Security Career with Dr. Michael Chipley</itunes:title><description><![CDATA[<p>Dr. Michael Chipley, the Founder and President of the PMC Group, is the guest for today’s podcast.</p><p>Dr. Chipley has over 30 years of consulting experience in the areas of Program and Project Management, Cybersecurity, Energy and Environmental (LEED, Energy Star, and Carbon Footprint); Critical Infrastructure Protection and Analysis; Building Information Modeling (BIM) Technology; Base Realignment and Closure (BRAC), and Emergency Management/Disaster Recovery.&nbsp;</p><p>Dr. Chipley served 24 years as a Civil Engineer in the US Air Force and has been consulting since 2001. He is a former adjunct faculty member at George Mason University, where he taught the Infrastructure Security Engineering, Building Security, and Building Information Modeling courses.</p><p>Dr. Chipley grew up on a farm in Oregon. He is a long-time contributor to cybersecurity for control systems, civil engineer, US Airforce veteran, husband, father, grandfather, outdoor enthusiast, and wine enthusiast. He joins Derek Harp today to discuss his military background and career journey and share his insights and advice.&nbsp;</p><p>You will not want to miss this episode if you are leaving the military and considering a career in cybersecurity. Stay tuned to hear Dr. Chipley’s story and benefit from his breadth of experience!</p><p><strong>Show highlights:</strong></p><ul><li>What Dr. Chipley did and studied during the 24 years he spent in the military.&nbsp;</li><li>Dr. Chipley talks about Shodan.io and what it can do.</li><li>Some advice about skills and opportunities in the control systems space.</li><li>How Dr. Chipley benefited from joining the military.</li><li>Why you can never stop learning in the control systems world.</li><li>Why women tend to excel in the cyber field.</li><li>How students can find opportunities to join internship programs.</li><li>Potential challenges that people in cybersecurity could face.</li><li>Some of the projects with which Dr. Chipley is currently involved.</li><li>What can young people do to add to their knowledge and education to increase their value five years from now?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://pmc-group.com/" rel="noopener noreferrer" target="_blank">The PMC Group</a></p><p><a href="https://www.linkedin.com/in/michael-chipley-phd-gicsp-pmp-4943455/" rel="noopener noreferrer" target="_blank">Michael Chipley on LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Dr. Michael Chipley, the Founder and President of the PMC Group, is the guest for today’s podcast.</p><p>Dr. Chipley has over 30 years of consulting experience in the areas of Program and Project Management, Cybersecurity, Energy and Environmental (LEED, Energy Star, and Carbon Footprint); Critical Infrastructure Protection and Analysis; Building Information Modeling (BIM) Technology; Base Realignment and Closure (BRAC), and Emergency Management/Disaster Recovery.&nbsp;</p><p>Dr. Chipley served 24 years as a Civil Engineer in the US Air Force and has been consulting since 2001. He is a former adjunct faculty member at George Mason University, where he taught the Infrastructure Security Engineering, Building Security, and Building Information Modeling courses.</p><p>Dr. Chipley grew up on a farm in Oregon. He is a long-time contributor to cybersecurity for control systems, civil engineer, US Airforce veteran, husband, father, grandfather, outdoor enthusiast, and wine enthusiast. He joins Derek Harp today to discuss his military background and career journey and share his insights and advice.&nbsp;</p><p>You will not want to miss this episode if you are leaving the military and considering a career in cybersecurity. Stay tuned to hear Dr. Chipley’s story and benefit from his breadth of experience!</p><p><strong>Show highlights:</strong></p><ul><li>What Dr. Chipley did and studied during the 24 years he spent in the military.&nbsp;</li><li>Dr. Chipley talks about Shodan.io and what it can do.</li><li>Some advice about skills and opportunities in the control systems space.</li><li>How Dr. Chipley benefited from joining the military.</li><li>Why you can never stop learning in the control systems world.</li><li>Why women tend to excel in the cyber field.</li><li>How students can find opportunities to join internship programs.</li><li>Potential challenges that people in cybersecurity could face.</li><li>Some of the projects with which Dr. Chipley is currently involved.</li><li>What can young people do to add to their knowledge and education to increase their value five years from now?</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://pmc-group.com/" rel="noopener noreferrer" target="_blank">The PMC Group</a></p><p><a href="https://www.linkedin.com/in/michael-chipley-phd-gicsp-pmp-4943455/" rel="noopener noreferrer" target="_blank">Michael Chipley on LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">3a021ca6-3fa8-43e3-9977-7fff25237b28</guid><itunes:image href="https://artwork.captivate.fm/c3162b37-ee30-47b0-b350-22bba0c1493b/DoqI66PLOqI-1xkfOdg3-t-I.jpg"/><pubDate>Tue, 22 Nov 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6c8483bd-1b92-4cf6-b127-7f108ed79328/CS2AI-20Micheal-20Chipley-20-20Edited-20Audio.mp3" length="41691073" type="audio/mpeg"/><itunes:duration>41:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>58</itunes:episode><podcast:episode>58</podcast:episode></item><item><title>57: Using Mentorship to Help Advance Your Cybersecurity Career with Susan Peterson Sturm</title><itunes:title>57: Using Mentorship to Help Advance Your Cybersecurity Career with Susan Peterson Sturm</itunes:title><description><![CDATA[<p>Today, Derek Harp interviews Susan Peterson Sturm, the Chief Information Security Officer at Cognite.&nbsp;</p><p>Susan is a Transformational Operational Technology leader with 20 years of experience in profitably scaling innovative software-based businesses, including automation, IIOT, and cyber security. She has a proven track record of growing and structuring early-stage, profitable digital software-driven P&amp;Ls in excess of $150M. She specializes in change management, product management, M&amp;A, and strategic alliances. Susan serves on advisory boards of Cognite, Innosphere Ventures &amp; One Warm Coat.&nbsp;</p><p>Susan is an incredible individual with vast experience! She’s an empath, DEI champion, mentor, board advisor, and volunteer focused on poverty alleviation.&nbsp;</p><p>In this episode, she discusses her background, talks to Derek about her professional journey, and offers helpful tips and advice.</p><p>You won’t want to miss this episode if you are considering a career in the cybersecurity space. Tune in to hear Susan’s fascinating story and benefit from her years of experience in the security field.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Susan talks about her studies.</li><li>Her motivation for pivoting into energy after graduating from college.</li><li>What she gained from her career in international affairs.</li><li>Some of Susan’s interesting roles early on in her career.</li><li>The benefits of getting in-the-field experience.</li><li>There are many different leadership paths to be chosen within the industry.</li><li>What you can gain from working abroad with distributed teams.</li><li>Where security first intersected with Susan’s career.</li><li>Why it’s worth investing your time in networks.</li><li>How being vulnerable can help you develop valuable relationships.</li><li>The role mentorship has played in Susan’s career.</li><li>How Susan ended up in her current role as a CISO.</li><li>Motherhood can be very challenging for women in senior roles.&nbsp;</li><li>The importance of moving on from any workplace where you don’t feel safe to express your needs.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.cognite.com/en/" rel="noopener noreferrer" target="_blank">Cognite</a></p><p>Susan Peterson Sturm&nbsp;<a href="https://www.linkedin.com/in/susanpeterson-sturm/" rel="noopener noreferrer" target="_blank">on LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp interviews Susan Peterson Sturm, the Chief Information Security Officer at Cognite.&nbsp;</p><p>Susan is a Transformational Operational Technology leader with 20 years of experience in profitably scaling innovative software-based businesses, including automation, IIOT, and cyber security. She has a proven track record of growing and structuring early-stage, profitable digital software-driven P&amp;Ls in excess of $150M. She specializes in change management, product management, M&amp;A, and strategic alliances. Susan serves on advisory boards of Cognite, Innosphere Ventures &amp; One Warm Coat.&nbsp;</p><p>Susan is an incredible individual with vast experience! She’s an empath, DEI champion, mentor, board advisor, and volunteer focused on poverty alleviation.&nbsp;</p><p>In this episode, she discusses her background, talks to Derek about her professional journey, and offers helpful tips and advice.</p><p>You won’t want to miss this episode if you are considering a career in the cybersecurity space. Tune in to hear Susan’s fascinating story and benefit from her years of experience in the security field.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Susan talks about her studies.</li><li>Her motivation for pivoting into energy after graduating from college.</li><li>What she gained from her career in international affairs.</li><li>Some of Susan’s interesting roles early on in her career.</li><li>The benefits of getting in-the-field experience.</li><li>There are many different leadership paths to be chosen within the industry.</li><li>What you can gain from working abroad with distributed teams.</li><li>Where security first intersected with Susan’s career.</li><li>Why it’s worth investing your time in networks.</li><li>How being vulnerable can help you develop valuable relationships.</li><li>The role mentorship has played in Susan’s career.</li><li>How Susan ended up in her current role as a CISO.</li><li>Motherhood can be very challenging for women in senior roles.&nbsp;</li><li>The importance of moving on from any workplace where you don’t feel safe to express your needs.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.cognite.com/en/" rel="noopener noreferrer" target="_blank">Cognite</a></p><p>Susan Peterson Sturm&nbsp;<a href="https://www.linkedin.com/in/susanpeterson-sturm/" rel="noopener noreferrer" target="_blank">on LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">5ba0460a-8717-4466-a540-666bef1894c1</guid><itunes:image href="https://artwork.captivate.fm/7e3dddd6-df9b-4602-a616-820c6886e592/7GG9AfVUJ39WHc3DgwYCI6dV.jpg"/><pubDate>Tue, 08 Nov 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b08609ae-bbf3-4c39-a21f-a202bea949a2/CS2AI-20Susan-20Peterson-20-20Edited-20Audio.mp3" length="36508551" type="audio/mpeg"/><itunes:duration>37:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>57</itunes:episode><podcast:episode>57</podcast:episode></item><item><title>56: The Critical Role of Your Network in Developing Your Cybersecurity Career</title><itunes:title>56: The Critical Role of Your Network in Developing Your Cybersecurity Career</itunes:title><description><![CDATA[<p>Today, Derek Harp interviews Anton Shipulin.&nbsp;</p><p>Anton is an Industrial Cybersecurity Evangelist at Nozomi Networks. His primary responsibilities in his current position include working with Nozomi teams and external stakeholders to understand current challenges and threats, enhance best practices, and mitigate risks. He evaluates the industrial environment's security posture, and future technologies and strategies, for protecting critical infrastructure. He works with industry and non-profit organizations to build and strengthen the OT/ICS cybersecurity community for industrial sectors. He researches global security topics and promotes OT and ICS cybersecurity awareness throughout the industry. He is also a husband, father, sports enthusiast, runner, cyclist, and public speaker&nbsp;</p><p>Anton grew up in Kazakhstan and Russia and currently lives in Dubai, UAE. He is passionate about industrial cybersecurity, critical infrastructure protection, knowledge, and information exchange.&nbsp;&nbsp;He joins Derek today to discuss his career journey, education, and career experiences and share his insights.&nbsp;</p><p>You will gain a lot from this episode if you are thinking of starting a career in cybersecurity or moving into the field from a different industry. Stay tuned to hear Anton’s story and get his valuable tips and advice!</p><p><strong>Show highlights:</strong></p><ul><li>Anton discovered the power of programming when his parents bought him a PC when he was about nine years old.</li><li>Anton explains why he decided to make cybersecurity his university specialty and has continued working with it since then.</li><li>Anton gets into why he learned more working for Croc than in university.</li><li>There is currently a shortage of cybersecurity experts all over the world.</li><li>Anton gets into what he has learned about cybersecurity while working at Croc.</li><li>What he focused on while working for Kaspersky.</li><li>Anton talks about his experience co-founding the RUSCADASEC community.</li><li>Anton offers advice for entry-level individuals looking for resources to develop their professional careers.</li><li>Anton discusses his voluntary position at CCI.</li><li>The power of volunteering and helping others.</li><li>Why does he believe that networking is critical?</li><li>The benefits of both giving and receiving mentorship.</li><li>What excites Anton about the future?</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp interviews Anton Shipulin.&nbsp;</p><p>Anton is an Industrial Cybersecurity Evangelist at Nozomi Networks. His primary responsibilities in his current position include working with Nozomi teams and external stakeholders to understand current challenges and threats, enhance best practices, and mitigate risks. He evaluates the industrial environment's security posture, and future technologies and strategies, for protecting critical infrastructure. He works with industry and non-profit organizations to build and strengthen the OT/ICS cybersecurity community for industrial sectors. He researches global security topics and promotes OT and ICS cybersecurity awareness throughout the industry. He is also a husband, father, sports enthusiast, runner, cyclist, and public speaker&nbsp;</p><p>Anton grew up in Kazakhstan and Russia and currently lives in Dubai, UAE. He is passionate about industrial cybersecurity, critical infrastructure protection, knowledge, and information exchange.&nbsp;&nbsp;He joins Derek today to discuss his career journey, education, and career experiences and share his insights.&nbsp;</p><p>You will gain a lot from this episode if you are thinking of starting a career in cybersecurity or moving into the field from a different industry. Stay tuned to hear Anton’s story and get his valuable tips and advice!</p><p><strong>Show highlights:</strong></p><ul><li>Anton discovered the power of programming when his parents bought him a PC when he was about nine years old.</li><li>Anton explains why he decided to make cybersecurity his university specialty and has continued working with it since then.</li><li>Anton gets into why he learned more working for Croc than in university.</li><li>There is currently a shortage of cybersecurity experts all over the world.</li><li>Anton gets into what he has learned about cybersecurity while working at Croc.</li><li>What he focused on while working for Kaspersky.</li><li>Anton talks about his experience co-founding the RUSCADASEC community.</li><li>Anton offers advice for entry-level individuals looking for resources to develop their professional careers.</li><li>Anton discusses his voluntary position at CCI.</li><li>The power of volunteering and helping others.</li><li>Why does he believe that networking is critical?</li><li>The benefits of both giving and receiving mentorship.</li><li>What excites Anton about the future?</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">3861cf96-ff96-41ff-8831-0c46649de3d3</guid><itunes:image href="https://artwork.captivate.fm/7e98a69b-166d-4336-8509-0bfd88206275/ShFEm9Ce11HOhbVEjjhiwLHT.jpg"/><pubDate>Tue, 01 Nov 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3c031c43-9ac6-4df4-8f0d-14272dcdd543/CS2AI-20Anton-20Shipulin-20-20Edited-20Audio.mp3" length="41971016" type="audio/mpeg"/><itunes:duration>43:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>56</itunes:episode><podcast:episode>56</podcast:episode></item><item><title>55: The Benefits of Working in the Cybersecurity Industry with Dave Salwen</title><itunes:title>55: The Benefits of Working in the Cybersecurity Industry with Dave Salwen</itunes:title><description><![CDATA[<p>Dave Salwen, the VP of Embedded Systems at RunSafe Security Inc., is the guest for today’s podcast.</p><p>Dave is a business leader who delivers emerging technologies to commercial and government markets. He achieves the above plan results with products and services for cyber defense, wireless communications, RF sensing, and electronic warfare areas. He has been successful in building highly effective teams. He has demonstrated his ability to drive the effectiveness of all aspects of the business, from strategic planning and concept development to financial results.</p><p>Dave’s career has always been about technology and people. He has spent his entire career supporting technologists and other super-smart people, helping them have more impact and realize their dreams. He is a father, husband, hiker, skier, tennis player, avid reader, and world traveler. He joins Derek today to discuss his education and career trajectory and share his experience. He gets into how he supports his fellow technologists and the benefits of working in cybersecurity and offers some valuable nuggets of advice.</p><p>This episode is for you if you are thinking of starting a career in cybersecurity or moving over from a different industry. Tune in to get Dave’s career advice and hear about his professional journey.</p><p><strong>Show highlights:</strong></p><ul><li>What Dave has focused on throughout his career is to help technologists have more impact.</li><li>Dave grew up with technology, and it has always been part of his life.</li><li>The benefits of working as part of a team.</li><li>The different technological environments in which Dave has worked.</li><li>Dave gets into the different use cases for RunSafe.</li><li>Dave offers advice for anyone thinking about their career.</li><li>How electronic warfare ties up with cybersecurity.</li><li>People are crucial for developing and implementing security solutions, but electronic warfare still relies on the autonomous capabilities of automation.</li><li>Skills people may already have that they could adapt or extend to work in cybersecurity.</li><li>Dave defines embedded systems.</li><li>Some exciting areas of work within the cybersecurity space.</li><li>The benefits of risk-taking.&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://runsafesecurity.com/" rel="noopener noreferrer" target="_blank">RunSafe Security</a></p><p><a href="https://www.linkedin.com/in/dave-salwen-217667/" rel="noopener noreferrer" target="_blank">Dave Salwen on LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Dave Salwen, the VP of Embedded Systems at RunSafe Security Inc., is the guest for today’s podcast.</p><p>Dave is a business leader who delivers emerging technologies to commercial and government markets. He achieves the above plan results with products and services for cyber defense, wireless communications, RF sensing, and electronic warfare areas. He has been successful in building highly effective teams. He has demonstrated his ability to drive the effectiveness of all aspects of the business, from strategic planning and concept development to financial results.</p><p>Dave’s career has always been about technology and people. He has spent his entire career supporting technologists and other super-smart people, helping them have more impact and realize their dreams. He is a father, husband, hiker, skier, tennis player, avid reader, and world traveler. He joins Derek today to discuss his education and career trajectory and share his experience. He gets into how he supports his fellow technologists and the benefits of working in cybersecurity and offers some valuable nuggets of advice.</p><p>This episode is for you if you are thinking of starting a career in cybersecurity or moving over from a different industry. Tune in to get Dave’s career advice and hear about his professional journey.</p><p><strong>Show highlights:</strong></p><ul><li>What Dave has focused on throughout his career is to help technologists have more impact.</li><li>Dave grew up with technology, and it has always been part of his life.</li><li>The benefits of working as part of a team.</li><li>The different technological environments in which Dave has worked.</li><li>Dave gets into the different use cases for RunSafe.</li><li>Dave offers advice for anyone thinking about their career.</li><li>How electronic warfare ties up with cybersecurity.</li><li>People are crucial for developing and implementing security solutions, but electronic warfare still relies on the autonomous capabilities of automation.</li><li>Skills people may already have that they could adapt or extend to work in cybersecurity.</li><li>Dave defines embedded systems.</li><li>Some exciting areas of work within the cybersecurity space.</li><li>The benefits of risk-taking.&nbsp;</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://runsafesecurity.com/" rel="noopener noreferrer" target="_blank">RunSafe Security</a></p><p><a href="https://www.linkedin.com/in/dave-salwen-217667/" rel="noopener noreferrer" target="_blank">Dave Salwen on LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">409e59b4-252c-4838-99e9-bb39c75fb0b0</guid><itunes:image href="https://artwork.captivate.fm/0cdbc4c0-8729-4472-9141-80246405703b/ENydm97SycNN2w4doOm7VpM1.jpg"/><pubDate>Tue, 25 Oct 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d3f582f6-4296-4402-9e5c-ed1edaaaafab/CS2AI-20Dave-20Salwen-20-20Edited-20Audio.mp3" length="36038607" type="audio/mpeg"/><itunes:duration>37:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>54: The Importance of Mentorship in Your Cybersecurity Career with Daniel Ehrenreich</title><itunes:title>54: The Importance of Mentorship in Your Cybersecurity Career with Daniel Ehrenreich</itunes:title><description><![CDATA[<p>Derek Harp is delighted to have long-time expert thought leader, Daniel Ehrenreich, join him today for another episode in the series of interviews with control system-related cybersecurity leaders.</p><p>Daniel is from Secure Communications and Control Experts. He is an established industry contributor, educator, teacher, and speaker, known to be detail-oriented with some strongly-held opinions. He is an experienced world traveler who has lived in various parts of the world. He is also a writer, safety advocate, father, and grandfather&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Daniel shares his backstory and discusses his education, career journey, and years of experience in the industry.&nbsp;</p><p>You will gain a lot from this episode if you are you are considering an occupation in the cybersecurity space. Stay tuned to get Dan’s advice and learn from his many years of experience in the field.</p><p><strong>Show highlights:</strong></p><ul><li>In 1983, Daniel was selected by an Israeli component vendor to be a subject matter expert for lithium batteries in the USA.</li><li>While at university, Daniel earned an income fixing televisions.</li><li>How SCADA systems got developed by Motorola in Israel in the mid-1980s.</li><li>Why Daniel believes SCADA security should happen on the level of architecture and not on the PLC component level.</li><li>Cybersecurity came up for Daniel toward the end of the twenty years he spent with Motorola.</li><li>Daniel dives into his current areas of focus.</li><li>Daniel discusses the power of giving and receiving mentorship.</li><li>Daniel talks about his training classes and explains why he is detail-oriented.</li><li>Why Daniel believes IT and OT should never converge.</li><li>Some advice for engineers or others considering joining the cybersecurity industry.</li><li>The difference between IoT and IIOT.</li><li>Daniel talks about the ICS Cybersec conference he has coming up in Israel in November.&nbsp;&nbsp;</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Derek Harp is delighted to have long-time expert thought leader, Daniel Ehrenreich, join him today for another episode in the series of interviews with control system-related cybersecurity leaders.</p><p>Daniel is from Secure Communications and Control Experts. He is an established industry contributor, educator, teacher, and speaker, known to be detail-oriented with some strongly-held opinions. He is an experienced world traveler who has lived in various parts of the world. He is also a writer, safety advocate, father, and grandfather&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Daniel shares his backstory and discusses his education, career journey, and years of experience in the industry.&nbsp;</p><p>You will gain a lot from this episode if you are you are considering an occupation in the cybersecurity space. Stay tuned to get Dan’s advice and learn from his many years of experience in the field.</p><p><strong>Show highlights:</strong></p><ul><li>In 1983, Daniel was selected by an Israeli component vendor to be a subject matter expert for lithium batteries in the USA.</li><li>While at university, Daniel earned an income fixing televisions.</li><li>How SCADA systems got developed by Motorola in Israel in the mid-1980s.</li><li>Why Daniel believes SCADA security should happen on the level of architecture and not on the PLC component level.</li><li>Cybersecurity came up for Daniel toward the end of the twenty years he spent with Motorola.</li><li>Daniel dives into his current areas of focus.</li><li>Daniel discusses the power of giving and receiving mentorship.</li><li>Daniel talks about his training classes and explains why he is detail-oriented.</li><li>Why Daniel believes IT and OT should never converge.</li><li>Some advice for engineers or others considering joining the cybersecurity industry.</li><li>The difference between IoT and IIOT.</li><li>Daniel talks about the ICS Cybersec conference he has coming up in Israel in November.&nbsp;&nbsp;</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">1d5f1c7a-e3e5-4cfe-ae84-1510dddaf0a7</guid><itunes:image href="https://artwork.captivate.fm/2ccf9a9b-7a72-4573-b94a-44202260dde5/_02CA3XWf0mKSBAc2U820I1E.jpg"/><pubDate>Tue, 18 Oct 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/40bf50e6-1fe3-427f-9800-e44b1817b783/CS2AI-20Daniel-20E-20-20Edited-20Audio.mp3" length="51644864" type="audio/mpeg"/><itunes:duration>53:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>54</itunes:episode><podcast:episode>54</podcast:episode></item><item><title>53: Career Advice for Women Pursuing Cybersecurity Positions</title><itunes:title>53: Career Advice for Women Pursuing Cybersecurity Positions</itunes:title><description><![CDATA[<p>Today’s guest is Danielle Jablanski. Danielle is an OT Cybersecurity Strategist for Nozomi Networks.</p><p>Danielle was born and raised in Upstate New York and moved to Southern Missouri when she was in high school. Since then, she has moved around a lot and lived and worked in many different places. For the first few years of her career, she got deeply involved in philanthropy and academia. She is a self-proclaimed nerd, researcher, volunteer, vagabond, idea lady, community builder, outdoor enthusiast, and big-time dog mom!&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Danielle discusses her personal and professional journeys and experience and offers excellent advice for women considering a career in the cybersecurity or OT space.</p><p>You will not want to miss this show, particularly if you are a woman thinking of starting a career or shifting into technology, cybersecurity, or control systems! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Studying genocide in Rwanda sparked Danielle’s interest in international relations. She explains how that led her to the cybersecurity space.</li><li>Danielle talks about how she was poached out of grad school for her first job.</li><li>How national security and cybersecurity intersected with her career path.</li><li>Danielle explains why she got poached for a second time, to go to Stanford University.&nbsp;</li><li>Why she chose to pivot to energy before becoming a general OT cybersecurity strategist</li><li>Danielle goes into where the cybersecurity industry is today.</li><li>Where will the industry be twenty years from now?</li><li>What prompted her to get into cybersecurity?</li><li>What she focuses on, as a non-resident fellow at the Atlantic Council.</li><li>Danielle talks about mentorship and discusses her experience as a female expert in the industry.&nbsp;&nbsp;</li><li>Some gold nuggets of advice for women in the early stage of their careers.</li><li>The benefits of focusing on your strengths.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.nozominetworks.com/" rel="noopener noreferrer" target="_blank">Nozomi Networks</a></p><p><strong>Books mentioned:</strong></p><p><br></p><p>The Cuckoo’s Egg by Cliff Stoll</p>]]></description><content:encoded><![CDATA[<p>Today’s guest is Danielle Jablanski. Danielle is an OT Cybersecurity Strategist for Nozomi Networks.</p><p>Danielle was born and raised in Upstate New York and moved to Southern Missouri when she was in high school. Since then, she has moved around a lot and lived and worked in many different places. For the first few years of her career, she got deeply involved in philanthropy and academia. She is a self-proclaimed nerd, researcher, volunteer, vagabond, idea lady, community builder, outdoor enthusiast, and big-time dog mom!&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Danielle discusses her personal and professional journeys and experience and offers excellent advice for women considering a career in the cybersecurity or OT space.</p><p>You will not want to miss this show, particularly if you are a woman thinking of starting a career or shifting into technology, cybersecurity, or control systems! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Studying genocide in Rwanda sparked Danielle’s interest in international relations. She explains how that led her to the cybersecurity space.</li><li>Danielle talks about how she was poached out of grad school for her first job.</li><li>How national security and cybersecurity intersected with her career path.</li><li>Danielle explains why she got poached for a second time, to go to Stanford University.&nbsp;</li><li>Why she chose to pivot to energy before becoming a general OT cybersecurity strategist</li><li>Danielle goes into where the cybersecurity industry is today.</li><li>Where will the industry be twenty years from now?</li><li>What prompted her to get into cybersecurity?</li><li>What she focuses on, as a non-resident fellow at the Atlantic Council.</li><li>Danielle talks about mentorship and discusses her experience as a female expert in the industry.&nbsp;&nbsp;</li><li>Some gold nuggets of advice for women in the early stage of their careers.</li><li>The benefits of focusing on your strengths.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.nozominetworks.com/" rel="noopener noreferrer" target="_blank">Nozomi Networks</a></p><p><strong>Books mentioned:</strong></p><p><br></p><p>The Cuckoo’s Egg by Cliff Stoll</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">c7d6591e-5f8b-4899-9237-95446e088ef6</guid><itunes:image href="https://artwork.captivate.fm/781779cf-6343-48dc-b8b4-477edaa6f120/lD5tAsOHWB50FEfdKy4B3vjy.jpg"/><pubDate>Tue, 11 Oct 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e149c3a6-5166-468c-b604-abfa0ee40ca6/CS2AI-20Danielle-20Jablanski-20-20Edited-20Audio.mp3" length="44146049" type="audio/mpeg"/><itunes:duration>45:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>53</itunes:episode><podcast:episode>53</podcast:episode></item><item><title>52: Cybersecurity Careers, Educational Requirements and Resume Advice with Ron Brash</title><itunes:title>52: Cybersecurity Careers, Educational Requirements and Resume Advice with Ron Brash</itunes:title><description><![CDATA[<p>Today, Ron Brash joins Derek Harp for another great episode in the series on security leaders! Ron is the VP of Technical Research and Integrations at aDolus Technology.&nbsp;</p><p>Ron Brash is a household name when it comes to ICS/OT cybersecurity and embedded vulnerability research. He was instrumental in creating the datasets for the S4 ICS Detection Challenges, received the Top 40 under 40 award for Engineering Leaders 2020 from Plant Engineering, was an embedded developer at Tofino Security, advised several large asset owners in a variety of industries for OT security, and brought several products to market, including consumer neuroscience devices and several industrial networking appliances.</p><p>Ron grew up in a rainforest on Vancouver Island, on the west coast of Canada. He is a problem-solver, a wake-boarder, a mini-Chihuahua-owner, a do-it-yourselfer, a geek, a sharer of information, and an all-around adventurous guy with water sports.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he shares his backstory, discusses his career path, and talks about what he is doing in the industry. He also offers some nuggets of advice around sequential education and degrees, sound resume advice, and some great career tips.&nbsp;</p><p>You will not want to miss this episode if you are considering starting a career in cybersecurity or breaking into that industry and want to know the best way to approach your education. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Ron talks about where he comes from and shares his backstory.&nbsp;</li><li>What he learned from his first paid job, working in a pizza shop.</li><li>Ron’s parents had computers for their business, so that was where his first intersection with technology happened.&nbsp;</li><li>He got into technology because he joined a tech program at his local university that put gifted high school students into certificate and diploma programs for free.</li><li>Ron knew he had to protect himself by planning and starting to save early on.</li><li>Ron’s ICS career started after a chance encounter with Eric Byres, one of the grandfathers of cybersecurity.</li><li>It is important to separate your personal life from your professional life.</li><li>Ron shares how he approached his education.&nbsp;</li><li>A resume tip to better your chances in interviews, and some great career tips.&nbsp;</li><li>Ron discusses the best way to approach university education and explains what your job is when you do a master’s degree.</li><li>What he gained from getting his master’s degree.</li><li>Some advice for people considering sequential education and degrees to further their careers.</li><li>The benefits of doing a SWOT analysis before embarking on a specific career path.</li><li>Ron dives into giving and receiving mentorship.</li><li>Some advice for anyone doing a startup.</li><li>How to set yourself up for a successful future.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Ron Brash joins Derek Harp for another great episode in the series on security leaders! Ron is the VP of Technical Research and Integrations at aDolus Technology.&nbsp;</p><p>Ron Brash is a household name when it comes to ICS/OT cybersecurity and embedded vulnerability research. He was instrumental in creating the datasets for the S4 ICS Detection Challenges, received the Top 40 under 40 award for Engineering Leaders 2020 from Plant Engineering, was an embedded developer at Tofino Security, advised several large asset owners in a variety of industries for OT security, and brought several products to market, including consumer neuroscience devices and several industrial networking appliances.</p><p>Ron grew up in a rainforest on Vancouver Island, on the west coast of Canada. He is a problem-solver, a wake-boarder, a mini-Chihuahua-owner, a do-it-yourselfer, a geek, a sharer of information, and an all-around adventurous guy with water sports.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he shares his backstory, discusses his career path, and talks about what he is doing in the industry. He also offers some nuggets of advice around sequential education and degrees, sound resume advice, and some great career tips.&nbsp;</p><p>You will not want to miss this episode if you are considering starting a career in cybersecurity or breaking into that industry and want to know the best way to approach your education. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Ron talks about where he comes from and shares his backstory.&nbsp;</li><li>What he learned from his first paid job, working in a pizza shop.</li><li>Ron’s parents had computers for their business, so that was where his first intersection with technology happened.&nbsp;</li><li>He got into technology because he joined a tech program at his local university that put gifted high school students into certificate and diploma programs for free.</li><li>Ron knew he had to protect himself by planning and starting to save early on.</li><li>Ron’s ICS career started after a chance encounter with Eric Byres, one of the grandfathers of cybersecurity.</li><li>It is important to separate your personal life from your professional life.</li><li>Ron shares how he approached his education.&nbsp;</li><li>A resume tip to better your chances in interviews, and some great career tips.&nbsp;</li><li>Ron discusses the best way to approach university education and explains what your job is when you do a master’s degree.</li><li>What he gained from getting his master’s degree.</li><li>Some advice for people considering sequential education and degrees to further their careers.</li><li>The benefits of doing a SWOT analysis before embarking on a specific career path.</li><li>Ron dives into giving and receiving mentorship.</li><li>Some advice for anyone doing a startup.</li><li>How to set yourself up for a successful future.</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">846e4de8-edd4-4d9a-aa6e-d651d1695219</guid><itunes:image href="https://artwork.captivate.fm/884dc58f-e225-4fde-ad4f-39ad178ef44c/9suEgAdmLxWOJ6Oq8l6lUVAN.jpg"/><pubDate>Tue, 04 Oct 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5ef45928-5177-4aa9-b7a4-6a8b83ce5812/CS2AI-20-20-20Ron-20Brash-20-20Edited-20Audio.mp3" length="56875588" type="audio/mpeg"/><itunes:duration>59:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>52</itunes:episode><podcast:episode>52</podcast:episode></item><item><title>51: Learning the Discipline of Cybersecurity with Steve Mustard</title><itunes:title>51: Learning the Discipline of Cybersecurity with Steve Mustard</itunes:title><description><![CDATA[<p>Derek Harp is happy to have Steve Mustard, President, and CEO of National Automation Inc., joining him on the show today! Steve has been a long-term contributor to the control systems cybersecurity space.&nbsp;</p><p>Steve Mustard is a Licensed Professional Engineer (Texas, Kansas) and UK Chartered Engineer with technical development and management experience in process automation and business process re-engineering across multiple sectors. He is also a volunteer and past president of the International Society of Automation (ISA), a home brewer, cyclist, guitarist, triathlete, husband, and father.</p><p>Steve grew up in Sunderland, an industrial region famous for coal mining and shipbuilding in the North East of England. Joseph Swan, the inventor of the incandescent light bulb, also came from Sunderland, and Lewis Carroll based much of the Alice in Wonderland story on the times he spent there.</p><p>In this episode of the (CS)²AI Podcast, Steve shares his backstory, discusses his education, gets into his career trajectory, and offers nuggets of career advice.</p><p>You will gain a lot from this show if you are thinking about making a career in cybersecurity or considering moving from a different field into the security space. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>How and where Steve’s interest in technology, cybersecurity, and control systems engineering disciplines originated.</li><li>The event in 1999 that led to Steve’s first intersection with cybersecurity.</li><li>How the National Infrastructure Security Coordination Center (NICC), now called the Center for the Protection of National Infrastructure (CPNI), began in the UK.</li><li>Steve discusses the different areas he gets involved with.</li><li>Why he does not like the idea of cybersecurity always being its own discipline, separate from everything else.</li><li>Steve shares his concerns about digital transformation.&nbsp;</li><li>You don’t have to conform when selecting a career path. Rather think about what motivates you and what you enjoy doing, and forge your own direction.&nbsp;</li><li>Steve dives into his volunteer positions with IET and ISA.</li><li>People should be qualified to work in the cybersecurity or automation space. You can take courses and become certified through ISA.</li><li>There are many advantages to informing your career path with knowledge of safety and cybersecurity.</li><li>Steve offers career advice and tips for engineers looking for some additional knowledge.</li><li>Steve shares his concerns for the future of cybersecurity.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://au2mation.com/" rel="noopener noreferrer" target="_blank">National Automation Inc.</a></p><p><a href="https://www.linkedin.com/in/steve-mustard-794a0a2/" rel="noopener noreferrer" target="_blank">Steve Mustard on LinkedIn</a></p><p><strong>Books mentioned:</strong></p><p>Alice in Sunderland by Bryan Talbot</p><ul><li><br></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Derek Harp is happy to have Steve Mustard, President, and CEO of National Automation Inc., joining him on the show today! Steve has been a long-term contributor to the control systems cybersecurity space.&nbsp;</p><p>Steve Mustard is a Licensed Professional Engineer (Texas, Kansas) and UK Chartered Engineer with technical development and management experience in process automation and business process re-engineering across multiple sectors. He is also a volunteer and past president of the International Society of Automation (ISA), a home brewer, cyclist, guitarist, triathlete, husband, and father.</p><p>Steve grew up in Sunderland, an industrial region famous for coal mining and shipbuilding in the North East of England. Joseph Swan, the inventor of the incandescent light bulb, also came from Sunderland, and Lewis Carroll based much of the Alice in Wonderland story on the times he spent there.</p><p>In this episode of the (CS)²AI Podcast, Steve shares his backstory, discusses his education, gets into his career trajectory, and offers nuggets of career advice.</p><p>You will gain a lot from this show if you are thinking about making a career in cybersecurity or considering moving from a different field into the security space. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>How and where Steve’s interest in technology, cybersecurity, and control systems engineering disciplines originated.</li><li>The event in 1999 that led to Steve’s first intersection with cybersecurity.</li><li>How the National Infrastructure Security Coordination Center (NICC), now called the Center for the Protection of National Infrastructure (CPNI), began in the UK.</li><li>Steve discusses the different areas he gets involved with.</li><li>Why he does not like the idea of cybersecurity always being its own discipline, separate from everything else.</li><li>Steve shares his concerns about digital transformation.&nbsp;</li><li>You don’t have to conform when selecting a career path. Rather think about what motivates you and what you enjoy doing, and forge your own direction.&nbsp;</li><li>Steve dives into his volunteer positions with IET and ISA.</li><li>People should be qualified to work in the cybersecurity or automation space. You can take courses and become certified through ISA.</li><li>There are many advantages to informing your career path with knowledge of safety and cybersecurity.</li><li>Steve offers career advice and tips for engineers looking for some additional knowledge.</li><li>Steve shares his concerns for the future of cybersecurity.</li></ul><br/><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://au2mation.com/" rel="noopener noreferrer" target="_blank">National Automation Inc.</a></p><p><a href="https://www.linkedin.com/in/steve-mustard-794a0a2/" rel="noopener noreferrer" target="_blank">Steve Mustard on LinkedIn</a></p><p><strong>Books mentioned:</strong></p><p>Alice in Sunderland by Bryan Talbot</p><ul><li><br></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">c79fb3d0-b082-4848-bb0b-bb173c18116e</guid><itunes:image href="https://artwork.captivate.fm/2c3e6d91-9a38-4298-9ae5-ee05f3b81cdf/w5kntHsB2_btMx3kgtRWBizI.jpg"/><pubDate>Tue, 27 Sep 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/77685b9b-8c23-437a-bf2f-ba5b2623a827/CS2AI-20Steve-20Mustard-20-20Edited-20Audio.mp3" length="53168062" type="audio/mpeg"/><itunes:duration>55:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>51</itunes:episode><podcast:episode>51</podcast:episode></item><item><title>50: Solution Spotlight: Waterfall Security</title><itunes:title>50: Solution Spotlight: Waterfall Security</itunes:title><description><![CDATA[<p>We are excited to introduce The Solutions Spotlight, our new format for the (CS)²AI Podcast!&nbsp;</p><p>Today’s guests, Lior Frenkel and Andrew Ginter have both been on the show before to share their biographies and personal journeys in our series of interviews with various leaders across the industry in cybersecurity for control systems. Lior is the Co-founder of Waterfall Security, and Andrew is Waterfall’s VP of Industrial Security.&nbsp;</p><p>Lior and Andrew are long-time industry supporters and supporters of (CS)²AI. They join us today for today’s episode of The Solutions Spotlight to talk about Waterfall Security, what it does, and how the company got to where it is today.</p><p>Stay tuned to hear what Lior and Andrew have to say about how Waterfall originated and what they do!</p><p><strong>Show highlights:</strong></p><ul><li>Why they do not like to use the term segmentation at Waterfall and prefer to think of it as safe connectivity.</li><li>How Waterfall provides all the benefits of connectivity without the risks.&nbsp;</li><li>How ransomware has changed the market.</li><li>What data diodes are, what they get used for, and how they differ from unidirectional gateways.&nbsp;</li><li>How Waterfall’s unidirectional security gateway connects and protects industrial and corporate networks.</li><li>How does Waterfall’s unidirectional security gateway work?</li><li>Where Waterfall’s technology gets applied today.</li><li>Lior shares Waterfall’s origin story.&nbsp;</li><li>Lior expected the industry to be more advanced than it is currently</li><li>What excites Lior for the future?</li><li>The changes Andrew foresees for the future.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>We are excited to introduce The Solutions Spotlight, our new format for the (CS)²AI Podcast!&nbsp;</p><p>Today’s guests, Lior Frenkel and Andrew Ginter have both been on the show before to share their biographies and personal journeys in our series of interviews with various leaders across the industry in cybersecurity for control systems. Lior is the Co-founder of Waterfall Security, and Andrew is Waterfall’s VP of Industrial Security.&nbsp;</p><p>Lior and Andrew are long-time industry supporters and supporters of (CS)²AI. They join us today for today’s episode of The Solutions Spotlight to talk about Waterfall Security, what it does, and how the company got to where it is today.</p><p>Stay tuned to hear what Lior and Andrew have to say about how Waterfall originated and what they do!</p><p><strong>Show highlights:</strong></p><ul><li>Why they do not like to use the term segmentation at Waterfall and prefer to think of it as safe connectivity.</li><li>How Waterfall provides all the benefits of connectivity without the risks.&nbsp;</li><li>How ransomware has changed the market.</li><li>What data diodes are, what they get used for, and how they differ from unidirectional gateways.&nbsp;</li><li>How Waterfall’s unidirectional security gateway connects and protects industrial and corporate networks.</li><li>How does Waterfall’s unidirectional security gateway work?</li><li>Where Waterfall’s technology gets applied today.</li><li>Lior shares Waterfall’s origin story.&nbsp;</li><li>Lior expected the industry to be more advanced than it is currently</li><li>What excites Lior for the future?</li><li>The changes Andrew foresees for the future.</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">b38cbde3-8a25-4db7-a77b-0ad1e8fa4f31</guid><itunes:image href="https://artwork.captivate.fm/6fa6eba1-10b2-4d8c-a505-481f8cb97417/YXFLYEXdqtrdRPYTkR1DkVnx.jpg"/><pubDate>Tue, 20 Sep 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e452ddba-5e63-45cb-b8c8-f3265a3d76f4/CS2AI-20Waterfall-20Security-20-20Edited-20Audio.mp3" length="33152352" type="audio/mpeg"/><itunes:duration>34:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>50</itunes:episode><podcast:episode>50</podcast:episode></item><item><title>49: Position Yourself to Win from the Cyber Security Job Explosion with David Hatchell</title><itunes:title>49: Position Yourself to Win from the Cyber Security Job Explosion with David Hatchell</itunes:title><description><![CDATA[<p>Today, Derek Harp is excited to have David Hatchell, the Founder, and Principal of Industrial Cyber Secure, joining him for another episode in the interview series on security leaders. David will soon announce his CEO-ship of a new company dedicated to cybersecurity for the OT space.&nbsp;</p><p>David is recognized as one of the top leaders in the field of ICS/(IoT cybersecurity, leading multiple efforts over the past 10 years to develop new businesses in this emerging cybersecurity field. Leveraging a proven formula of partnerships, positioning, and product around vertical execution, he has worked in multiple roles in strategy development, product development, G2M development, and leading acquisition and integration efforts.</p><p>David comes from a small town in east Texas known for football, pub links, and good barbecue. He is a leader in the industry, a father, a singer, a frustrated runner, and a chef.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he talks to Derek about his background, discusses how he got to where he is today and shares his experience. He also gets into the various decisions he made along the way and offers valuable nuggets of advice.</p><p>There is an explosion in the cybersecurity industry right now! This show is a must for you if are considering a career in that space. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>David shares his backstory and talks about his first introduction to work.</li><li>How the music industry featured and got him into the computer business.&nbsp;</li><li>David got to sell the first MP3 player that ever existed.</li><li>How his journey into the world of cybersecurity began and progressed.</li><li>How David learned about resiliency and safety.</li><li>Some advice for listeners from an IT background who would like to get into that area of cybersecurity.</li><li>How cross-discipline empathy can broaden your career perspective.</li><li>What did David learn from his tenure at Belden?</li><li>Why now is a great time to get into cybersecurity, regardless of your background.</li><li>The role mentorship has played in David’s career.</li></ul><br/><p><br></p><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/david-hatchell-866540/" rel="noopener noreferrer" target="_blank">David Hatchell on LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is excited to have David Hatchell, the Founder, and Principal of Industrial Cyber Secure, joining him for another episode in the interview series on security leaders. David will soon announce his CEO-ship of a new company dedicated to cybersecurity for the OT space.&nbsp;</p><p>David is recognized as one of the top leaders in the field of ICS/(IoT cybersecurity, leading multiple efforts over the past 10 years to develop new businesses in this emerging cybersecurity field. Leveraging a proven formula of partnerships, positioning, and product around vertical execution, he has worked in multiple roles in strategy development, product development, G2M development, and leading acquisition and integration efforts.</p><p>David comes from a small town in east Texas known for football, pub links, and good barbecue. He is a leader in the industry, a father, a singer, a frustrated runner, and a chef.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he talks to Derek about his background, discusses how he got to where he is today and shares his experience. He also gets into the various decisions he made along the way and offers valuable nuggets of advice.</p><p>There is an explosion in the cybersecurity industry right now! This show is a must for you if are considering a career in that space. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>David shares his backstory and talks about his first introduction to work.</li><li>How the music industry featured and got him into the computer business.&nbsp;</li><li>David got to sell the first MP3 player that ever existed.</li><li>How his journey into the world of cybersecurity began and progressed.</li><li>How David learned about resiliency and safety.</li><li>Some advice for listeners from an IT background who would like to get into that area of cybersecurity.</li><li>How cross-discipline empathy can broaden your career perspective.</li><li>What did David learn from his tenure at Belden?</li><li>Why now is a great time to get into cybersecurity, regardless of your background.</li><li>The role mentorship has played in David’s career.</li></ul><br/><p><br></p><p><strong>Links and resources:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/david-hatchell-866540/" rel="noopener noreferrer" target="_blank">David Hatchell on LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">b88bd227-c205-4d32-ba7c-ccd2c548fd79</guid><itunes:image href="https://artwork.captivate.fm/59ad49d4-3161-4bfc-8d4b-df9f1b1d4886/oIdu52lWVMuSfkgTVZGZP26s.jpg"/><pubDate>Tue, 13 Sep 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ead62bb8-c0ca-45f1-a299-47532df0a764/CS2AI-20David-20Hatchell-20-20Edited-20Audio-converted.mp3" length="46418236" type="audio/mpeg"/><itunes:duration>48:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>49</itunes:episode><podcast:episode>49</podcast:episode></item><item><title>48: Engineering: The Perfect  Transition to Cybersecurity with David Brearley</title><itunes:title>48: Engineering: The Perfect  Transition to Cybersecurity with David Brearley</itunes:title><description><![CDATA[<p>Derek Harp is excited to have David Brearley joining him today! David is currently the Operational Technology Cybersecurity Director at HDR.</p><p>David Brearley (GICSP, PMP) is a senior professional associate and the operational technology cybersecurity director at HDR in Charlotte, North Carolina. David has nearly 20 years of international experience providing IT and OT (operational technologies/industrial controls) solutions, services, and consulting. In providing hands-on configuration, assessment, design, and consulting services, his experience covers the comprehensive control system life cycle. David is motivated by helping improve the security awareness and risk posture for HDR’s cross-sector clients.</p><p>David grew up in New Jersey, just off Long Beach Island, and went to school in South Carolina. He is a husband, sailor, chef, outdoorsman, programmer, controls, and cybersecurity enthusiast.<strong>&nbsp;</strong></p><p>In this episode of the (CS)²AI Podcast, he talks to Derek about his professional journey, how his career has evolved, and his current role at HDR. He also offers some nuggets of advice for anyone considering a career in cybersecurity.&nbsp;&nbsp;</p><p>You are sure to gain a lot from this episode if you want to get into the cybersecurity space or are an engineer who would like to augment what you do. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>David shares his modern-day superhero backstory.</li><li>He started looking at computer engineering after getting into programming in high school.</li><li>David discusses his experience as an intern with GE and talks about the benefits of doing an internship.</li><li>GE went through several transitions and eventually returned to being a privately-held company.&nbsp;</li><li>David talks about an opportunity that let him learn a lot more about networks and programming in an industrial environment.</li><li>He discusses the breadth of environments he has worked in his career.</li><li>How did David end up in his current role?</li><li>Where did cybersecurity first intersect with his career?</li><li>A book David recommends for getting one’s mindset geared for the cybersecurity space.&nbsp;</li><li>David discusses the mentorship and cybersecurity training programs he is involved in, both within and outside of HDR.</li><li>David describes how they are building a cybersecurity culture at HDR.</li><li>The benefits of having experience across diverse platforms.</li><li>What you should study to be on the cutting edge in the future.</li></ul><br/><p><br></p><p><br></p>]]></description><content:encoded><![CDATA[<p>Derek Harp is excited to have David Brearley joining him today! David is currently the Operational Technology Cybersecurity Director at HDR.</p><p>David Brearley (GICSP, PMP) is a senior professional associate and the operational technology cybersecurity director at HDR in Charlotte, North Carolina. David has nearly 20 years of international experience providing IT and OT (operational technologies/industrial controls) solutions, services, and consulting. In providing hands-on configuration, assessment, design, and consulting services, his experience covers the comprehensive control system life cycle. David is motivated by helping improve the security awareness and risk posture for HDR’s cross-sector clients.</p><p>David grew up in New Jersey, just off Long Beach Island, and went to school in South Carolina. He is a husband, sailor, chef, outdoorsman, programmer, controls, and cybersecurity enthusiast.<strong>&nbsp;</strong></p><p>In this episode of the (CS)²AI Podcast, he talks to Derek about his professional journey, how his career has evolved, and his current role at HDR. He also offers some nuggets of advice for anyone considering a career in cybersecurity.&nbsp;&nbsp;</p><p>You are sure to gain a lot from this episode if you want to get into the cybersecurity space or are an engineer who would like to augment what you do. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>David shares his modern-day superhero backstory.</li><li>He started looking at computer engineering after getting into programming in high school.</li><li>David discusses his experience as an intern with GE and talks about the benefits of doing an internship.</li><li>GE went through several transitions and eventually returned to being a privately-held company.&nbsp;</li><li>David talks about an opportunity that let him learn a lot more about networks and programming in an industrial environment.</li><li>He discusses the breadth of environments he has worked in his career.</li><li>How did David end up in his current role?</li><li>Where did cybersecurity first intersect with his career?</li><li>A book David recommends for getting one’s mindset geared for the cybersecurity space.&nbsp;</li><li>David discusses the mentorship and cybersecurity training programs he is involved in, both within and outside of HDR.</li><li>David describes how they are building a cybersecurity culture at HDR.</li><li>The benefits of having experience across diverse platforms.</li><li>What you should study to be on the cutting edge in the future.</li></ul><br/><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">dd42fe04-feeb-40a9-a669-5ab93df6a3f4</guid><itunes:image href="https://artwork.captivate.fm/77135756-a667-4ae1-8bf8-12caea5915ec/S1rWVtTcGJoCT7CDSnSN1Fxe.jpg"/><pubDate>Tue, 06 Sep 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ab26eee1-29eb-4b1a-8b0c-51efc03c3c79/CS2AI-20David-20Brearley-20-20Edited-20Audio.mp3" length="37974407" type="audio/mpeg"/><itunes:duration>39:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>48</itunes:episode><podcast:episode>48</podcast:episode></item><item><title>47: From Academia to CyberSecurity Executive with Ron Indeck</title><itunes:title>47: From Academia to CyberSecurity Executive with Ron Indeck</itunes:title><description><![CDATA[<p>We have another interesting episode in our series of interviews with cybersecurity leaders and practitioners in the industrial controls systems or operating technology space.</p><p>Derek Harp is excited to have Ron Indeck, the CEO of Q-Net Security, and a Director, Founder, and Technology Advisor to Exegy and VelociData joining him on the show.&nbsp;</p><p>Ron grew up in Minneapolis, Minnesota, and got his degrees from the University of Minnesota. He is an inventor (he holds more than 100 patents), a distinguished professor at Washington University, a fellow at IEEE and several other professional organizations, an expert in all things magnetic, a serial entrepreneur, a scuba diver, and a father.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Ron discusses his career journey and shares his unique perspective on cybersecurity. He also offers some gold nuggets of career advice and gives insight into upcoming trends in the cybersecurity space.</p><p>You won’t want to miss this episode if you are looking for career inspiration or are interested in moving from the academic space into the world of cybersecurity. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Ron discusses his career path and his motivation for becoming an entrepreneur.</li><li>Ron’s approach to his work at Washington University.</li><li>Why did he transition across various engineering disciplines before ending up in research and patents?</li><li>Ron’s introduction to security came early on in his career while working with people from the FBI.</li><li>How security for industrial control systems evolved throughout Ron’s career.</li><li>How Ron built his patent portfolio.</li><li>Ron’s approach to solving the generational cybersecurity problem.</li><li>What made Ron decide to leave his successful academic career to become an entrepreneur?</li><li>Exciting and rewarding possibilities exist for academics in the industrial technology space.</li><li>How can you get into tech transfer?</li><li>Ron talks about his work at the Airforce Research Laboratory.</li><li>How to recognize an opportunity.</li><li>Teamwork and cooperation are vital for success.</li><li>Ron defines the term hardsec and compares it with a software approach to security solutions for the future.</li><li>Why does Ron believe that cybersecurity is an issue of human rights?</li><li>You can create exciting and rewarding career opportunities in cybersecurity.</li></ul><br/><p><strong>Bio:</strong></p><p>Ronald S. Indeck, Ph.D., received degrees from the University of Minnesota. He is CEO of Q-Net Security and a Director, Founder, and Technology Advisor to Exegy and VelociData.&nbsp;</p><p>He was a National Science Foundation Research Fellow at Tohoku University in Sendai, Japan. From 1988 to 2009 he was in the Department of Electrical Engineering at Washington University where he was the Das Family Distinguished Professor and Director of the Center for Security Technologies.</p><p>He has published more than 60 peer-reviewed technical papers and been awarded more than a hundred patents including MagnePrint. He has received many awards including the NSF Presidential Young Investigator Award from President Bush, the Missouri Bar Association Inventor of the Year, the IBM Faculty Development Award, the Washington University Distinguished Faculty Award, and the IEEE Centennial Key to the Future Award, and the IEEE Young Professional Award.&nbsp;</p><p>He is a Fellow of the IEEE, a member of the American Physical Society, and many other professional organizations. He has served on many local committees and group activities, was on the board of the FBI InfraGard, chaired sessions, and served at several international conferences including General Chairman for International Magnetics Conference, was an editor for the IEEE Transactions on Magnetics, President of the IEEE Magnetics Society, and IEEE Magnetics Society Distinguished Lecturer.&nbsp;</p><p>Specialties: Indeck is experienced...]]></description><content:encoded><![CDATA[<p>We have another interesting episode in our series of interviews with cybersecurity leaders and practitioners in the industrial controls systems or operating technology space.</p><p>Derek Harp is excited to have Ron Indeck, the CEO of Q-Net Security, and a Director, Founder, and Technology Advisor to Exegy and VelociData joining him on the show.&nbsp;</p><p>Ron grew up in Minneapolis, Minnesota, and got his degrees from the University of Minnesota. He is an inventor (he holds more than 100 patents), a distinguished professor at Washington University, a fellow at IEEE and several other professional organizations, an expert in all things magnetic, a serial entrepreneur, a scuba diver, and a father.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Ron discusses his career journey and shares his unique perspective on cybersecurity. He also offers some gold nuggets of career advice and gives insight into upcoming trends in the cybersecurity space.</p><p>You won’t want to miss this episode if you are looking for career inspiration or are interested in moving from the academic space into the world of cybersecurity. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Ron discusses his career path and his motivation for becoming an entrepreneur.</li><li>Ron’s approach to his work at Washington University.</li><li>Why did he transition across various engineering disciplines before ending up in research and patents?</li><li>Ron’s introduction to security came early on in his career while working with people from the FBI.</li><li>How security for industrial control systems evolved throughout Ron’s career.</li><li>How Ron built his patent portfolio.</li><li>Ron’s approach to solving the generational cybersecurity problem.</li><li>What made Ron decide to leave his successful academic career to become an entrepreneur?</li><li>Exciting and rewarding possibilities exist for academics in the industrial technology space.</li><li>How can you get into tech transfer?</li><li>Ron talks about his work at the Airforce Research Laboratory.</li><li>How to recognize an opportunity.</li><li>Teamwork and cooperation are vital for success.</li><li>Ron defines the term hardsec and compares it with a software approach to security solutions for the future.</li><li>Why does Ron believe that cybersecurity is an issue of human rights?</li><li>You can create exciting and rewarding career opportunities in cybersecurity.</li></ul><br/><p><strong>Bio:</strong></p><p>Ronald S. Indeck, Ph.D., received degrees from the University of Minnesota. He is CEO of Q-Net Security and a Director, Founder, and Technology Advisor to Exegy and VelociData.&nbsp;</p><p>He was a National Science Foundation Research Fellow at Tohoku University in Sendai, Japan. From 1988 to 2009 he was in the Department of Electrical Engineering at Washington University where he was the Das Family Distinguished Professor and Director of the Center for Security Technologies.</p><p>He has published more than 60 peer-reviewed technical papers and been awarded more than a hundred patents including MagnePrint. He has received many awards including the NSF Presidential Young Investigator Award from President Bush, the Missouri Bar Association Inventor of the Year, the IBM Faculty Development Award, the Washington University Distinguished Faculty Award, and the IEEE Centennial Key to the Future Award, and the IEEE Young Professional Award.&nbsp;</p><p>He is a Fellow of the IEEE, a member of the American Physical Society, and many other professional organizations. He has served on many local committees and group activities, was on the board of the FBI InfraGard, chaired sessions, and served at several international conferences including General Chairman for International Magnetics Conference, was an editor for the IEEE Transactions on Magnetics, President of the IEEE Magnetics Society, and IEEE Magnetics Society Distinguished Lecturer.&nbsp;</p><p>Specialties: Indeck is experienced in cybersecurity, heterogeneous computing, data mining in massive databases, magnetic measurements and modeling, physical security and authentication, recording physics, and magnetic devices.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">f18dbc85-3a9c-4724-8247-a60a1026c227</guid><itunes:image href="https://artwork.captivate.fm/9a07b4f5-ae7d-471f-af49-3aeb62a3c7b9/R73HpPNx7YkOtlUWK_WlJo6s.jpg"/><pubDate>Tue, 23 Aug 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b1a1dbfe-337e-4c6a-aa9b-f233447b1906/CS2AI-20Ron-20Indeck-20-20Edited-20Audio.mp3" length="44461784" type="audio/mpeg"/><itunes:duration>46:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>47</itunes:episode><podcast:episode>47</podcast:episode></item><item><title>46: From Electrical Engineer to Cybersecurity Executive with Rob Garry</title><itunes:title>46: From Electrical Engineer to Cybersecurity Executive with Rob Garry</itunes:title><description><![CDATA[<p>Derek Harp is excited to have Rob Garry joining him on the show today! Rob is currently the Executive Chief Engineer and VP of Product Security at GE Power.&nbsp;</p><p>Rob is an experienced Chief Executive with a demonstrated history of working in the oil &amp; energy industry. He is skilled in Power Plants, Root Cause Analysis, Power Systems, Renewable Energy, and Engineering. He is a strong finance professional with a BS focused in Electrical Engineering from Union College.</p><p>As well as being an engineer, Rob is also a father, husband, avid cyclist, master ski-racer, handy-around-the-house person, and an enthusiast in many different areas! In this episode of the (CS)²AI Podcast, he offers advice for people looking to enter the cybersecurity space and talks about his shift from control systems to cybersecurity, good leadership, inter-disciplinary team management, and why his job resonates so well with him.</p><p>Rob is passionate about discussing controls, how cyber plays into it, and the emerging role in the industry. You won’t want to miss this episode if you want to know more about cybersecurity from the perspective of a chief engineer. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Growing up, Rob was always working on things and fixing farm equipment.</li><li>As an engineer, Rob opted to go the electrical route. Throughout his career, he has developed and worked on control systems for heavy-duty gas, steam, and wind turbines for power generation.&nbsp;</li><li>How did cybersecurity intersect with Rob’s career?</li><li>Rob describes the work he did with networks in the years before anyone was speaking about security.&nbsp;</li><li>A lesson he learned from cybersecurity helped him where he is in his career today.</li><li>Why is risk in a power plant not binary?</li><li>Knowing how to describe risk in a way that layers into the equation has helped Rob in his current role more than his networking background.</li><li>Rob explains how a mature leader in his field enters discussions and makes judgment calls.</li><li>How does cybersecurity intersect with the monitoring and diagnostics of heavy industrial equipment?&nbsp;</li><li>The importance of inter-disciplinary team building and team management.</li><li>Rob talks about the career challenges people with technical minds sometimes face.&nbsp;</li><li>Rob’s approach to giving and getting mentorship.&nbsp;</li><li>Rob describes the best way to pass a chief engineer review.</li><li>Which area should you focus on learning that would make you invaluable as an employee in the next few years?</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/rob-garry-a731b91b/" rel="noopener noreferrer" target="_blank">Rob Garry on LinkedIn</a></p><p><a href="https://www.ge.com/" rel="noopener noreferrer" target="_blank">GE Power</a></p>]]></description><content:encoded><![CDATA[<p>Derek Harp is excited to have Rob Garry joining him on the show today! Rob is currently the Executive Chief Engineer and VP of Product Security at GE Power.&nbsp;</p><p>Rob is an experienced Chief Executive with a demonstrated history of working in the oil &amp; energy industry. He is skilled in Power Plants, Root Cause Analysis, Power Systems, Renewable Energy, and Engineering. He is a strong finance professional with a BS focused in Electrical Engineering from Union College.</p><p>As well as being an engineer, Rob is also a father, husband, avid cyclist, master ski-racer, handy-around-the-house person, and an enthusiast in many different areas! In this episode of the (CS)²AI Podcast, he offers advice for people looking to enter the cybersecurity space and talks about his shift from control systems to cybersecurity, good leadership, inter-disciplinary team management, and why his job resonates so well with him.</p><p>Rob is passionate about discussing controls, how cyber plays into it, and the emerging role in the industry. You won’t want to miss this episode if you want to know more about cybersecurity from the perspective of a chief engineer. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Growing up, Rob was always working on things and fixing farm equipment.</li><li>As an engineer, Rob opted to go the electrical route. Throughout his career, he has developed and worked on control systems for heavy-duty gas, steam, and wind turbines for power generation.&nbsp;</li><li>How did cybersecurity intersect with Rob’s career?</li><li>Rob describes the work he did with networks in the years before anyone was speaking about security.&nbsp;</li><li>A lesson he learned from cybersecurity helped him where he is in his career today.</li><li>Why is risk in a power plant not binary?</li><li>Knowing how to describe risk in a way that layers into the equation has helped Rob in his current role more than his networking background.</li><li>Rob explains how a mature leader in his field enters discussions and makes judgment calls.</li><li>How does cybersecurity intersect with the monitoring and diagnostics of heavy industrial equipment?&nbsp;</li><li>The importance of inter-disciplinary team building and team management.</li><li>Rob talks about the career challenges people with technical minds sometimes face.&nbsp;</li><li>Rob’s approach to giving and getting mentorship.&nbsp;</li><li>Rob describes the best way to pass a chief engineer review.</li><li>Which area should you focus on learning that would make you invaluable as an employee in the next few years?</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/rob-garry-a731b91b/" rel="noopener noreferrer" target="_blank">Rob Garry on LinkedIn</a></p><p><a href="https://www.ge.com/" rel="noopener noreferrer" target="_blank">GE Power</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">5c9e63db-cbb8-4641-b42a-adfb83d3504f</guid><itunes:image href="https://artwork.captivate.fm/c9d63ac2-e483-4504-a485-1976ce474873/kwMQ0aKRtK35H59Kxrscy8rT.jpg"/><pubDate>Tue, 16 Aug 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cdce3617-62b3-4a1b-a834-101b9e2b7c5c/CS2AI-20-20-20Robb-20Garry-20-20Edited-20Audio.mp3" length="39193352" type="audio/mpeg"/><itunes:duration>40:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>46</itunes:episode><podcast:episode>46</podcast:episode></item><item><title>45: Changing Careers to the  Cybersecurity Field with Ted Greene</title><itunes:title>45: Changing Careers to the  Cybersecurity Field with Ted Greene</itunes:title><description><![CDATA[<p>Derek Harp is happy to have Ted Greene, the Chief Operating Officer at Network Perception, join him today!&nbsp;</p><p>Ted is a Visionary Leader with a strong customer focus. He has a proven record of creating high revenue growth businesses that create shareholder value through new product introduction, identifying new market opportunities, leveraging opportunities with existing customers, solution-oriented sales, acquisition, and strong relationship development.</p><p>Ted is an entrepreneur. He is also a husband, father of three, thinker, strategist, and workaholic.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he talks about his background, career journey, and various entrepreneurial ventures.&nbsp;</p><p>This episode will interest you if you are a leader in another industry and thinking of entering the field of cybersecurity. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>When he was twelve years old, Ted got a job as a paper boy. He has been working ever since then. (3:37)</li><li>Ted explains why he went into banking and talks about the different banks where he has worked. (5:38)</li><li>He explains why he quit his job to start his first business with a friend who was an early technologist. (7:32)</li><li>They became one of the first internet technology companies in the Midwest in 1994. (9:28)</li><li>Why will people entering the ICS space have decades of job security in that space? (13:58)</li><li>At this point, people in our country expect the critical infrastructure to be there and work. So it’s often hard to get their attention around that. (17:21)</li><li>Ted talks about his experience of co-founding several different companies. (21:09)</li><li>How Ted’s early experiences led to him starting Network Perception. (25:40)</li><li>Ted shares the key to being a successful entrepreneur. (27:40)</li><li>Ted always focuses on staying relevant and strategies for growth in his businesses. (31:41)</li><li>Ted offers advice for people considering bringing their experience from senior levels in other sectors to the cybersecurity sector. (40:44)</li><li>There are many exciting opportunities for growth in the cybersecurity space. (46:55)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/theodoregreene/" rel="noopener noreferrer" target="_blank">Ted Greene on LinkedIn</a></p><p><a href="https://network-perception.com/" rel="noopener noreferrer" target="_blank">Network Perception</a></p>]]></description><content:encoded><![CDATA[<p>Derek Harp is happy to have Ted Greene, the Chief Operating Officer at Network Perception, join him today!&nbsp;</p><p>Ted is a Visionary Leader with a strong customer focus. He has a proven record of creating high revenue growth businesses that create shareholder value through new product introduction, identifying new market opportunities, leveraging opportunities with existing customers, solution-oriented sales, acquisition, and strong relationship development.</p><p>Ted is an entrepreneur. He is also a husband, father of three, thinker, strategist, and workaholic.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he talks about his background, career journey, and various entrepreneurial ventures.&nbsp;</p><p>This episode will interest you if you are a leader in another industry and thinking of entering the field of cybersecurity. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>When he was twelve years old, Ted got a job as a paper boy. He has been working ever since then. (3:37)</li><li>Ted explains why he went into banking and talks about the different banks where he has worked. (5:38)</li><li>He explains why he quit his job to start his first business with a friend who was an early technologist. (7:32)</li><li>They became one of the first internet technology companies in the Midwest in 1994. (9:28)</li><li>Why will people entering the ICS space have decades of job security in that space? (13:58)</li><li>At this point, people in our country expect the critical infrastructure to be there and work. So it’s often hard to get their attention around that. (17:21)</li><li>Ted talks about his experience of co-founding several different companies. (21:09)</li><li>How Ted’s early experiences led to him starting Network Perception. (25:40)</li><li>Ted shares the key to being a successful entrepreneur. (27:40)</li><li>Ted always focuses on staying relevant and strategies for growth in his businesses. (31:41)</li><li>Ted offers advice for people considering bringing their experience from senior levels in other sectors to the cybersecurity sector. (40:44)</li><li>There are many exciting opportunities for growth in the cybersecurity space. (46:55)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/theodoregreene/" rel="noopener noreferrer" target="_blank">Ted Greene on LinkedIn</a></p><p><a href="https://network-perception.com/" rel="noopener noreferrer" target="_blank">Network Perception</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">9dbcaafc-1d96-4496-8f41-ffdbddfca580</guid><itunes:image href="https://artwork.captivate.fm/b431d998-ead8-4077-bb15-974f81051c49/OvtxKnF9rB4vy-d-iieGx8Go.jpg"/><pubDate>Tue, 05 Jul 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bd1f982d-aa54-4374-b08f-e505f6030094/CS2AI-20Ted-20Greene-20-20Edited-20Audio.mp3" length="52880760" type="audio/mpeg"/><itunes:duration>54:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>45</itunes:episode><podcast:episode>45</podcast:episode></item><item><title>44: Communications Expertise Can Improve Cyber Security with Brian Foster</title><itunes:title>44: Communications Expertise Can Improve Cyber Security with Brian Foster</itunes:title><description><![CDATA[<p>Derek Harp is happy to have Brian Foster, the GMS Security Lead at Southern California Edison, joining him on the show today!&nbsp;</p><p>Brian Foster is a highly-skilled former Controls Engineer turned OT Cyber Security expert turned Security Leader. He has multiple degrees in engineering and years of experience in managing and leading within the OT Cyber Security field.&nbsp;</p><p>Brian is a well-rounded individual! He is a known speaker and contributor in the cybersecurity industry. He is an engineer, controls systems cybersecurity expert, pilot, brewmaster, outdoorsman, hunter, mentor, dog lover, and husband.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he talks about his backstory, discusses his career journey, and shares many nuggets of advice from his years of experience in the industry. He also highlights the importance of clear communication.</p><p>You won’t want to miss this episode if you want to learn more about cybersecurity or you’re looking for ways to get a foot in the door of the industry! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Brian’s journey was not a clean one. It was more a series of good mistakes. (2:14)</li><li>Brian has had computers and technology around him for as long as he can remember, and he loved playing games when he was growing up! (4:49)</li><li>He did not intend to go into controls engineering. (8:45)</li><li>Having an understanding of networking is fundamental for a successful career. (10:42)</li><li>Brian learned a lot about technology from the mistakes he made. (11:53)</li><li>Cybersecurity was always in the background, but it became a part of Brian’s life when he got bored with controls. (13:17)</li><li>One of his first professional forays into cybersecurity happened when he was an expert witness in a court case. (15:04)</li><li>There is often friction and distrust between OT people and those in IT cybersecurity. Brian shares his thoughts. (18:43)</li><li>Many people struggle to use spoken language to communicate their ideas to one another articulately. That leads to many challenges. (28:37)</li><li>Southern California Edison has much more of an eye on security than many other utilities Brian has worked with, either directly or indirectly. (32:23)</li><li>Brian views cybersecurity systems as no different from safety systems. (37:02)</li><li>The industry needs more people who know what they are doing. Brian struggles to find them, so he mentors people trying to get a foot in the door and learn about cybersecurity. (39:21)</li><li>Brian offers tactical advice for people entering the cybersecurity space. (43:34)</li><li>Brian sees a lot of promise for the future with containerization technology in the OT space. (48:20)</li></ul><br/><p><br></p><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p>Brian Foster on&nbsp;<a href="https://www.linkedin.com/in/bfos227/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><a href="https://www.sce.com/" rel="noopener noreferrer" target="_blank">Southern California Edison (SCE)</a></p>]]></description><content:encoded><![CDATA[<p>Derek Harp is happy to have Brian Foster, the GMS Security Lead at Southern California Edison, joining him on the show today!&nbsp;</p><p>Brian Foster is a highly-skilled former Controls Engineer turned OT Cyber Security expert turned Security Leader. He has multiple degrees in engineering and years of experience in managing and leading within the OT Cyber Security field.&nbsp;</p><p>Brian is a well-rounded individual! He is a known speaker and contributor in the cybersecurity industry. He is an engineer, controls systems cybersecurity expert, pilot, brewmaster, outdoorsman, hunter, mentor, dog lover, and husband.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he talks about his backstory, discusses his career journey, and shares many nuggets of advice from his years of experience in the industry. He also highlights the importance of clear communication.</p><p>You won’t want to miss this episode if you want to learn more about cybersecurity or you’re looking for ways to get a foot in the door of the industry! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Brian’s journey was not a clean one. It was more a series of good mistakes. (2:14)</li><li>Brian has had computers and technology around him for as long as he can remember, and he loved playing games when he was growing up! (4:49)</li><li>He did not intend to go into controls engineering. (8:45)</li><li>Having an understanding of networking is fundamental for a successful career. (10:42)</li><li>Brian learned a lot about technology from the mistakes he made. (11:53)</li><li>Cybersecurity was always in the background, but it became a part of Brian’s life when he got bored with controls. (13:17)</li><li>One of his first professional forays into cybersecurity happened when he was an expert witness in a court case. (15:04)</li><li>There is often friction and distrust between OT people and those in IT cybersecurity. Brian shares his thoughts. (18:43)</li><li>Many people struggle to use spoken language to communicate their ideas to one another articulately. That leads to many challenges. (28:37)</li><li>Southern California Edison has much more of an eye on security than many other utilities Brian has worked with, either directly or indirectly. (32:23)</li><li>Brian views cybersecurity systems as no different from safety systems. (37:02)</li><li>The industry needs more people who know what they are doing. Brian struggles to find them, so he mentors people trying to get a foot in the door and learn about cybersecurity. (39:21)</li><li>Brian offers tactical advice for people entering the cybersecurity space. (43:34)</li><li>Brian sees a lot of promise for the future with containerization technology in the OT space. (48:20)</li></ul><br/><p><br></p><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p>Brian Foster on&nbsp;<a href="https://www.linkedin.com/in/bfos227/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><a href="https://www.sce.com/" rel="noopener noreferrer" target="_blank">Southern California Edison (SCE)</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">f85f067a-1c28-4ff7-ad7b-4d296bef8161</guid><itunes:image href="https://artwork.captivate.fm/25c51c75-7bd4-4c3f-8beb-6e1c0690b3f4/MOzpAU3B3uyOplMruQXSu27y.jpg"/><pubDate>Tue, 28 Jun 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/470f8842-e915-417e-896d-22487a108db3/CS2AI-20-20-20Brian-20Foster-20-20Edited-20Audio.mp3" length="50316031" type="audio/mpeg"/><itunes:duration>52:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>44</itunes:episode><podcast:episode>44</podcast:episode></item><item><title>43: The Military Pathway to a Cybersecurity Career with Sean McGurk</title><itunes:title>43: The Military Pathway to a Cybersecurity Career with Sean McGurk</itunes:title><description><![CDATA[<p>Today, Derek Harp is excited to be talking with Sean McGurk, the Executive Director of Global Cyber Security Operations at Las Vegas Sands Corp.&nbsp;</p><p>Sean McGurk is a man of many talents! He has walked a long and interesting road with many different stops in the world of cybersecurity! He has served in various roles in the federal government, military, and private sector, focusing on information assurance and cybersecurity. He has more than 40 years of experience in advanced systems operation, cyber threat intelligence, and information systems security.</p><p>Sean was born and raised in the greater Philadelphia area. He is a military veteran, sailor, scuba diver, speaker, brewmaster, cyclist, and author.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he shares his modern-day superhero backstory and talks about his career path. He talks about what he learned about cybersecurity in the Navy, his transition from a career in the Navy to the civilian sector, mentorship, team management, and risk-taking.</p><p>You will definitely gain a lot from today’s fascinating conversation with Sean McGurk! Especially if you are new to the cybersecurity field or considering transitioning from the military to a career in cybersecurity. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Sean’s first computer was a Zilog Z80A. He wanted to learn how to program it so that he could copy games and swap them with his friends. (3:20)</li><li>In the Navy, Sean was a Fire Control Technician: Ballistic Missile. The technologies associated with operating within that environment jumpstarted his interest in the field of cyber-physical. (6:39)</li><li>Throughout the inception of power control and nuclear engineering, the focus was primarily on safety. So it was one of the safest industries ever developed. (8:37)</li><li>The complexities associated with the systems for preparing a missile for launch on a submerged submarine made an impression on Sean about the importance of cybersecurity. (10:33)</li><li>Sean culminated his Navy career in one of the most senior enlisted positions- working directly for the Master Chief Petty Officer of the Navy. (11:26)</li><li>Sean talks about his opportunity in the Navy to use technology in a reverse engineering process in the Soviet Union. (12:19)</li><li>The things Sean considered and did when he transitioned from a career in the Navy to the civilian sector. (14:29)</li><li>Sean got exposed to control systems cybersecurity after joining the Department of Homeland Security as the Director of Controls Systems Security Program in December of 2007. (16:31)</li><li>Get out of your comfort zone and learn new ways to translate things and express them without using technical language if you get promoted to leadership management. (18:58)</li><li>Sean shares some lessons he learned about mentorship. (21:40)</li><li>What can mentees do to find a mentor in the world of cybersecurity? (23:49)</li><li>Some advice for managing teams effectively. (26:19)</li><li>The importance of taking risks. (28:37)</li><li>Sean talks about the security systems in modern-day casinos. (32:58)</li><li>About what should new engineers learn more? (38:01)</li></ul><br/><p><br></p><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/search/results/all/?keywords=se%25C3%25A1n%2520mcgurk&amp;origin=RICH_QUERY_SUGGESTION&amp;position=0&amp;searchId=c22e47ce-3c8a-48a4-b712-d2defaf5dfd3&amp;sid=2BW" rel="noopener noreferrer" target="_blank">Sean McGurk on Linkedin</a></p><p><a href="https://www.sands.com/" rel="noopener noreferrer" target="_blank">Las Vegas Sands Corp.</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is excited to be talking with Sean McGurk, the Executive Director of Global Cyber Security Operations at Las Vegas Sands Corp.&nbsp;</p><p>Sean McGurk is a man of many talents! He has walked a long and interesting road with many different stops in the world of cybersecurity! He has served in various roles in the federal government, military, and private sector, focusing on information assurance and cybersecurity. He has more than 40 years of experience in advanced systems operation, cyber threat intelligence, and information systems security.</p><p>Sean was born and raised in the greater Philadelphia area. He is a military veteran, sailor, scuba diver, speaker, brewmaster, cyclist, and author.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he shares his modern-day superhero backstory and talks about his career path. He talks about what he learned about cybersecurity in the Navy, his transition from a career in the Navy to the civilian sector, mentorship, team management, and risk-taking.</p><p>You will definitely gain a lot from today’s fascinating conversation with Sean McGurk! Especially if you are new to the cybersecurity field or considering transitioning from the military to a career in cybersecurity. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Sean’s first computer was a Zilog Z80A. He wanted to learn how to program it so that he could copy games and swap them with his friends. (3:20)</li><li>In the Navy, Sean was a Fire Control Technician: Ballistic Missile. The technologies associated with operating within that environment jumpstarted his interest in the field of cyber-physical. (6:39)</li><li>Throughout the inception of power control and nuclear engineering, the focus was primarily on safety. So it was one of the safest industries ever developed. (8:37)</li><li>The complexities associated with the systems for preparing a missile for launch on a submerged submarine made an impression on Sean about the importance of cybersecurity. (10:33)</li><li>Sean culminated his Navy career in one of the most senior enlisted positions- working directly for the Master Chief Petty Officer of the Navy. (11:26)</li><li>Sean talks about his opportunity in the Navy to use technology in a reverse engineering process in the Soviet Union. (12:19)</li><li>The things Sean considered and did when he transitioned from a career in the Navy to the civilian sector. (14:29)</li><li>Sean got exposed to control systems cybersecurity after joining the Department of Homeland Security as the Director of Controls Systems Security Program in December of 2007. (16:31)</li><li>Get out of your comfort zone and learn new ways to translate things and express them without using technical language if you get promoted to leadership management. (18:58)</li><li>Sean shares some lessons he learned about mentorship. (21:40)</li><li>What can mentees do to find a mentor in the world of cybersecurity? (23:49)</li><li>Some advice for managing teams effectively. (26:19)</li><li>The importance of taking risks. (28:37)</li><li>Sean talks about the security systems in modern-day casinos. (32:58)</li><li>About what should new engineers learn more? (38:01)</li></ul><br/><p><br></p><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/search/results/all/?keywords=se%25C3%25A1n%2520mcgurk&amp;origin=RICH_QUERY_SUGGESTION&amp;position=0&amp;searchId=c22e47ce-3c8a-48a4-b712-d2defaf5dfd3&amp;sid=2BW" rel="noopener noreferrer" target="_blank">Sean McGurk on Linkedin</a></p><p><a href="https://www.sands.com/" rel="noopener noreferrer" target="_blank">Las Vegas Sands Corp.</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">8c8bd27f-ff3e-45f0-8b48-ad4608911980</guid><itunes:image href="https://artwork.captivate.fm/480f454a-f322-4920-8db8-347b711e1562/46CztfRr0GVFD2ZCMpr6nE-j.jpg"/><pubDate>Tue, 21 Jun 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2a419db4-1a7b-45ab-ba5a-c64733646f5c/CS2AI-20Sean-20McGurk-20-20Edited-20Audio.mp3" length="39692070" type="audio/mpeg"/><itunes:duration>41:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>42: How Skills Outside of the CyberSecurity Space Lay the Groundwork for a Great CyberSecurity Career with Art Conklin</title><itunes:title>42: How Skills Outside of the CyberSecurity Space Lay the Groundwork for a Great CyberSecurity Career with Art Conklin</itunes:title><description><![CDATA[<p>Derek Harp is happy to have Art Conklin, another legendary ICS control systems cybersecurity figure joining him on the show today!&nbsp;</p><p>Art is an experienced Information Systems Security professional. He has a background in software development, systems science, and information security.</p><p>&nbsp;He is qualified with CISSP, GICSP, GRID, GCIP, GCFA, GCIA, GCDA, CSSLP, CRISC, and Security+.</p><p>His specialties include information systems security management, network, and systems security, intrusion detection and intrusion detection monitoring, penetration testing, Incident Response, security policy and procedures, risk/threat assessments, Security training/awareness, user interface design and evaluation, FISMA, Secure code design/software engineering, cyber-physical systems security, and security metrics.</p><p>Art is a hacker at heart. Art was born in St. Louis, Missouri, in 1960. He has been a professor at the University of Houston for many years! He is also a well-known speaker, military veteran, technologist, author, sailor, rocket scientist, father, husband, and grandfather. In this episode of the (CS)²AI Podcast, he talks about his formative years, a life-changing Navy experience, taking advantage of learning situations outside of college, the application of knowledge, the benefits of getting an MBA, and the benefits of on the job training,</p><p>If you want to get into the cybersecurity space, you will not want to miss this episode - even if you have qualifications in a different area.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>There is a different level of thinking that gets taught and applied today. (5:49)</li><li>After doing courses at different universities and then starting med school, Art realized it was not where he wanted to go because it was science, not tech, and it was very theory-driven. (8:10)</li><li>Art wanted a career where he could do stuff, so he was advised to get an MBA from Harvard or join the military to learn how to lead men, manage a budget, and learn the difference between those things. Harvard was out of reach, so he joined the Navy. (9:07)</li><li>Art talks about the unique military experience that changed his perspective and made him who he is today. (11:05)</li><li>The cyber-world can benefit from people with no college degree who have problem-solving abilities, communication skills, and the ability to lead. (15:08)</li><li>Learning is about more than just knowledge because knowledge needs to be applied. (18:38)</li><li>Art wanted to leave the Navy to join IBM, but the Admiral did not want him to leave and offered him the opportunity to go to Navy Post Graduate School with no payback. So Art spent three years studying space system engineering, got a Ph.D. equivalent, and flew on a spacecraft. (20:40)</li><li>In some respects, transitioning out of the military is not easy, from a job perspective. (24:01)</li><li>Art explains why he did another degree after getting his doctorate. (27:44)</li><li>Art talks about the qualities of his various mentors and the importance of having connections with people with aspects that will broaden you and make you smarter. (29:14)</li><li>What he has done and is currently doing at the University of Houston. (32:32)</li><li>If you want to work in cybersecurity and you have a breadth of knowledge and experience, you are likely to succeed in the space. (39:16)</li><li>If you want to learn more about OT, many resources are available. Use and apply them. You can also email Art for local resources at&nbsp;<a href="mailto:waconklin@uh.edu" rel="noopener noreferrer" target="_blank">waconklin@uh.edu</a>.&nbsp;</li><li>Most people are willing to share their knowledge and become mentors, so reach out to those you look up to. (44:42)</li><li>How to invest in yourself. (46:20)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a...]]></description><content:encoded><![CDATA[<p>Derek Harp is happy to have Art Conklin, another legendary ICS control systems cybersecurity figure joining him on the show today!&nbsp;</p><p>Art is an experienced Information Systems Security professional. He has a background in software development, systems science, and information security.</p><p>&nbsp;He is qualified with CISSP, GICSP, GRID, GCIP, GCFA, GCIA, GCDA, CSSLP, CRISC, and Security+.</p><p>His specialties include information systems security management, network, and systems security, intrusion detection and intrusion detection monitoring, penetration testing, Incident Response, security policy and procedures, risk/threat assessments, Security training/awareness, user interface design and evaluation, FISMA, Secure code design/software engineering, cyber-physical systems security, and security metrics.</p><p>Art is a hacker at heart. Art was born in St. Louis, Missouri, in 1960. He has been a professor at the University of Houston for many years! He is also a well-known speaker, military veteran, technologist, author, sailor, rocket scientist, father, husband, and grandfather. In this episode of the (CS)²AI Podcast, he talks about his formative years, a life-changing Navy experience, taking advantage of learning situations outside of college, the application of knowledge, the benefits of getting an MBA, and the benefits of on the job training,</p><p>If you want to get into the cybersecurity space, you will not want to miss this episode - even if you have qualifications in a different area.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>There is a different level of thinking that gets taught and applied today. (5:49)</li><li>After doing courses at different universities and then starting med school, Art realized it was not where he wanted to go because it was science, not tech, and it was very theory-driven. (8:10)</li><li>Art wanted a career where he could do stuff, so he was advised to get an MBA from Harvard or join the military to learn how to lead men, manage a budget, and learn the difference between those things. Harvard was out of reach, so he joined the Navy. (9:07)</li><li>Art talks about the unique military experience that changed his perspective and made him who he is today. (11:05)</li><li>The cyber-world can benefit from people with no college degree who have problem-solving abilities, communication skills, and the ability to lead. (15:08)</li><li>Learning is about more than just knowledge because knowledge needs to be applied. (18:38)</li><li>Art wanted to leave the Navy to join IBM, but the Admiral did not want him to leave and offered him the opportunity to go to Navy Post Graduate School with no payback. So Art spent three years studying space system engineering, got a Ph.D. equivalent, and flew on a spacecraft. (20:40)</li><li>In some respects, transitioning out of the military is not easy, from a job perspective. (24:01)</li><li>Art explains why he did another degree after getting his doctorate. (27:44)</li><li>Art talks about the qualities of his various mentors and the importance of having connections with people with aspects that will broaden you and make you smarter. (29:14)</li><li>What he has done and is currently doing at the University of Houston. (32:32)</li><li>If you want to work in cybersecurity and you have a breadth of knowledge and experience, you are likely to succeed in the space. (39:16)</li><li>If you want to learn more about OT, many resources are available. Use and apply them. You can also email Art for local resources at&nbsp;<a href="mailto:waconklin@uh.edu" rel="noopener noreferrer" target="_blank">waconklin@uh.edu</a>.&nbsp;</li><li>Most people are willing to share their knowledge and become mentors, so reach out to those you look up to. (44:42)</li><li>How to invest in yourself. (46:20)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/waconklin/" rel="noopener noreferrer" target="_blank">Art Conklin on LinkedIn</a></p><p><a href="https://uh.edu/" rel="noopener noreferrer" target="_blank">The University of Houston</a>&nbsp;(Search for cybersecurity)</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">b1a68cbf-5a22-4690-aa55-7dd142db4439</guid><itunes:image href="https://artwork.captivate.fm/1c5a8e30-f284-4e10-aca5-261850d38794/6e-y50GOxEd3xzxzLUqFQ3MP.jpg"/><pubDate>Tue, 14 Jun 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ba3392e0-59b0-41ec-a838-56672c5eb454/CS2AI-20-20Art-20Conklin-20-20Edited-20Audio.mp3" length="47298077" type="audio/mpeg"/><itunes:duration>48:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode></item><item><title>41: Writing a Book to Leverage Your Expertise and Improve Your Career with Pascal Ackerman</title><itunes:title>41: Writing a Book to Leverage Your Expertise and Improve Your Career with Pascal Ackerman</itunes:title><description><![CDATA[<p>Derek Harp is happy to welcome Pascal Ackerman as his guest for today’s podcast!</p><p>Pascal is a security professional, focused on industrial control systems and he's currently the Sr Security Consultant for Operational Technology - Threat &amp; Attack Simulation at GuidePoint Security. He has a Master’s of Science degree in Electrical Engineering (MSEE/CE). He has had 18 years of experience in industrial Ethernet design and support, information and network security, risk assessments, pen-testing, forensics, and threat hunting, WAN/LAN/Internet and Wireless Technologies, Windows Environments, Unix, Linux, IIS, and Apache.</p><p>He specialized in the architecture, engineering, and securing of plant-wide Ethernet networks using Purdue-model design strategies, IDS/IPS sensors, network monitoring, Security Information, and Event Management (SIEM) solutions, next-gen firewalls, MS domain services, WSUS servers, MS SQL server clusters, etc.</p><p>Pascal was born and raised in the Netherlands. Right after leaving high school, he was put behind a POC by a company that sent him out across the world installing prototype machinery for filling machines.&nbsp;He is an engineer, programmer, gamer, hacker, traveler, tinkerer, pen-tester, and father.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he shares his superhero backstory and discusses his certifications, his education, and his career path. He also offers advice for those who would like to get into the field of cybersecurity and people thinking about writing a book.</p><p>If you are considering a career in cybersecurity or if you are an engineer and want to specialize in cyber security, you will gain a lot from this podcast! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>After leaving college, Pascal stayed with the company where he did his internship. The company got him to set up a software simulation to test their POC programs and later put him on their commissioning team. (6:51)</li><li>Pascal talks about what he did while working as a controls engineer. (8:08)</li><li>How Pascal got invited to move to the US to continue with his work. (9:50)</li><li>Pascal explains how many doors opened for him after presenting his first report in 2005. (12:27)</li><li>Pascal talks about how security measures first intersected with his work in 2008-2009. (14:07)</li><li>Pascal pinpoints the moment when he decided to change his career path. (16:00)</li><li>Pascal offers advice for traditional engineers who want to improve what they do and join the cyber security workforce. (17:35)</li><li>A Network Plus certification will help controls engineers understand the fundamentals of networking. (18:19)&nbsp;</li><li>Pascal explains why he got hired as a commercial engineer in Network and Security at Rockwell. (21:16)</li><li>Pascal talks about his book,&nbsp;<em>Industrial Cybersecurity</em>. (23:39)</li><li>The book Hacking Exposed by Clint Bodungen inspired Pascal to write his first book. (27:50)</li><li>How Threat GEN became a company based around a game Pascal developed. (29:10)</li><li>Pascal offers advice on where people in IT who want to know more about safety, reliability, resiliency, and POCs can start. (32:36)</li><li>The most successful companies have a combined IT and OT team with knowledgeable people on both sides. (36:43)</li><li>Why do you need to figure out what you like the most and focus on that technology? (37:58)</li><li>Architecture will be the next big step for monitoring everything. (45:06)</li><li>Pascal discusses the process of writing his books and offers advice for those who would like to write a book. (45:49)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/pascal-ackerman-036a867b/" rel="noopener noreferrer" target="_blank">Pascal Ackerman on LinkedIn</a></p><p><a...]]></description><content:encoded><![CDATA[<p>Derek Harp is happy to welcome Pascal Ackerman as his guest for today’s podcast!</p><p>Pascal is a security professional, focused on industrial control systems and he's currently the Sr Security Consultant for Operational Technology - Threat &amp; Attack Simulation at GuidePoint Security. He has a Master’s of Science degree in Electrical Engineering (MSEE/CE). He has had 18 years of experience in industrial Ethernet design and support, information and network security, risk assessments, pen-testing, forensics, and threat hunting, WAN/LAN/Internet and Wireless Technologies, Windows Environments, Unix, Linux, IIS, and Apache.</p><p>He specialized in the architecture, engineering, and securing of plant-wide Ethernet networks using Purdue-model design strategies, IDS/IPS sensors, network monitoring, Security Information, and Event Management (SIEM) solutions, next-gen firewalls, MS domain services, WSUS servers, MS SQL server clusters, etc.</p><p>Pascal was born and raised in the Netherlands. Right after leaving high school, he was put behind a POC by a company that sent him out across the world installing prototype machinery for filling machines.&nbsp;He is an engineer, programmer, gamer, hacker, traveler, tinkerer, pen-tester, and father.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he shares his superhero backstory and discusses his certifications, his education, and his career path. He also offers advice for those who would like to get into the field of cybersecurity and people thinking about writing a book.</p><p>If you are considering a career in cybersecurity or if you are an engineer and want to specialize in cyber security, you will gain a lot from this podcast! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>After leaving college, Pascal stayed with the company where he did his internship. The company got him to set up a software simulation to test their POC programs and later put him on their commissioning team. (6:51)</li><li>Pascal talks about what he did while working as a controls engineer. (8:08)</li><li>How Pascal got invited to move to the US to continue with his work. (9:50)</li><li>Pascal explains how many doors opened for him after presenting his first report in 2005. (12:27)</li><li>Pascal talks about how security measures first intersected with his work in 2008-2009. (14:07)</li><li>Pascal pinpoints the moment when he decided to change his career path. (16:00)</li><li>Pascal offers advice for traditional engineers who want to improve what they do and join the cyber security workforce. (17:35)</li><li>A Network Plus certification will help controls engineers understand the fundamentals of networking. (18:19)&nbsp;</li><li>Pascal explains why he got hired as a commercial engineer in Network and Security at Rockwell. (21:16)</li><li>Pascal talks about his book,&nbsp;<em>Industrial Cybersecurity</em>. (23:39)</li><li>The book Hacking Exposed by Clint Bodungen inspired Pascal to write his first book. (27:50)</li><li>How Threat GEN became a company based around a game Pascal developed. (29:10)</li><li>Pascal offers advice on where people in IT who want to know more about safety, reliability, resiliency, and POCs can start. (32:36)</li><li>The most successful companies have a combined IT and OT team with knowledgeable people on both sides. (36:43)</li><li>Why do you need to figure out what you like the most and focus on that technology? (37:58)</li><li>Architecture will be the next big step for monitoring everything. (45:06)</li><li>Pascal discusses the process of writing his books and offers advice for those who would like to write a book. (45:49)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/pascal-ackerman-036a867b/" rel="noopener noreferrer" target="_blank">Pascal Ackerman on LinkedIn</a></p><p><a href="https://www.amazon.com/Industrial-Cybersecurity-Efficiently-cybersecurity-environment/dp/1800202091" rel="noopener noreferrer" target="_blank"><em>Industrial Cybersecurity by Pascal Ackerman</em></a></p><p><strong>Books mentioned:</strong></p><p><a href="https://www.amazon.com/Hacking-Exposed-Industrial-Control-Systems/dp/1259589714" rel="noopener noreferrer" target="_blank"><em>Hacking Exposed</em>&nbsp;by Clint Bodungen</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">69117fa6-9f36-4c9f-80f6-55313312572e</guid><itunes:image href="https://artwork.captivate.fm/9084352c-d608-4267-afdf-6b18b1c3fbd4/WxZ7a01Dgx2KOLL6RlVdV5vS.jpg"/><pubDate>Tue, 07 Jun 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8f1e0d4e-4ce8-4249-bbed-2c3330091f6b/CS2AI-20Pascal-20Ackerman-20-20-20Edited-20Audio.mp3" length="47891833" type="audio/mpeg"/><itunes:duration>49:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode></item><item><title>40: ICS Village and Why You Should Attend DEF CON with Bryson Bort and Tom VanNorman</title><itunes:title>40: ICS Village and Why You Should Attend DEF CON with Bryson Bort and Tom VanNorman</itunes:title><description><![CDATA[<p>Today, we've got a special episode to highlight a really neat initiative that’s been in the works for awhile. My guests are Bryson Bort and Tom VanNorman.</p><p>Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, and Co-Founder of the ICS Village, a non-profit advancing awareness of industrial control system security. He is a Senior Fellow with the Atlantic Council’s Cyber Statecraft Initiative, the National Security Institute, and an Advisor to the Army Cyber Institute. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain. He was recognized as one of the Top 50 in Cyber in 2020 by Business Insider.</p><p>Tom leads the CyPhy Product group at GRIMM, where his primary focus is securing Industrial Control Systems and the networking of such systems. Tom brings an unparalleled level of operational knowledge and experience, as he has been working in the Operational Technology (OT) field for almost three decades. He also has considerable knowledge in constructing Cyber Physical testing environments for OT systems.</p><p>Tom co-founded the ICS Village, a non-profit organization focused on Control System security and awareness. He is also retired from the Air National Guard, where he worked in Cyber Warfare Operations.</p><p>ICS Village is holding Def Con 29, a 100% virtual event that takes place Aug 6th-8th. There are sessions and workshops covering all aspects of ICS.&nbsp;</p><p><strong>Show Highlights:</strong></p><ul><li>How ICS Village was started</li><li>The original 2 events - RSA and DefCon</li><li>GRIMM and their involvement in ICS Village</li><li>Why no one was thinking about Industrial control systems before ICS Village</li><li>The artwork that started it all</li><li>All of the events that ICS Village has throughout the year</li><li>How the pandemic changed DefCon and the other ICS Village events</li><li>The birth of Hack the Plant Podcast</li><li>Capture the Flag and what we can learn from it</li><li>Highlights of Def Con Table Talks and other sessions</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://cs2ai.org/" rel="noopener noreferrer" target="_blank">CS2AI.org</a></p><p><a href="https://www.icsvillage.com/" rel="noopener noreferrer" target="_blank">ICS Village</a></p><p><a href="https://www.icsvillage.com/schedule-def-con-29" rel="noopener noreferrer" target="_blank">DefCon Event happening Aug 6-8</a></p>]]></description><content:encoded><![CDATA[<p>Today, we've got a special episode to highlight a really neat initiative that’s been in the works for awhile. My guests are Bryson Bort and Tom VanNorman.</p><p>Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, and Co-Founder of the ICS Village, a non-profit advancing awareness of industrial control system security. He is a Senior Fellow with the Atlantic Council’s Cyber Statecraft Initiative, the National Security Institute, and an Advisor to the Army Cyber Institute. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain. He was recognized as one of the Top 50 in Cyber in 2020 by Business Insider.</p><p>Tom leads the CyPhy Product group at GRIMM, where his primary focus is securing Industrial Control Systems and the networking of such systems. Tom brings an unparalleled level of operational knowledge and experience, as he has been working in the Operational Technology (OT) field for almost three decades. He also has considerable knowledge in constructing Cyber Physical testing environments for OT systems.</p><p>Tom co-founded the ICS Village, a non-profit organization focused on Control System security and awareness. He is also retired from the Air National Guard, where he worked in Cyber Warfare Operations.</p><p>ICS Village is holding Def Con 29, a 100% virtual event that takes place Aug 6th-8th. There are sessions and workshops covering all aspects of ICS.&nbsp;</p><p><strong>Show Highlights:</strong></p><ul><li>How ICS Village was started</li><li>The original 2 events - RSA and DefCon</li><li>GRIMM and their involvement in ICS Village</li><li>Why no one was thinking about Industrial control systems before ICS Village</li><li>The artwork that started it all</li><li>All of the events that ICS Village has throughout the year</li><li>How the pandemic changed DefCon and the other ICS Village events</li><li>The birth of Hack the Plant Podcast</li><li>Capture the Flag and what we can learn from it</li><li>Highlights of Def Con Table Talks and other sessions</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://cs2ai.org/" rel="noopener noreferrer" target="_blank">CS2AI.org</a></p><p><a href="https://www.icsvillage.com/" rel="noopener noreferrer" target="_blank">ICS Village</a></p><p><a href="https://www.icsvillage.com/schedule-def-con-29" rel="noopener noreferrer" target="_blank">DefCon Event happening Aug 6-8</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">454837bc-4299-402a-874d-3b3b0f3869e4</guid><itunes:image href="https://artwork.captivate.fm/2fcf47f4-ed47-46b6-bdc9-9707b7cd74b5/q0jz58MC7BgT-20uBptwwGgF.jpg"/><pubDate>Tue, 31 May 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/22a237ed-281c-4eb0-9707-1c6fe8674a8d/ICS-20Village-20Edited-20Audio.mp3" length="23228872" type="audio/mpeg"/><itunes:duration>24:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode></item><item><title>39: From Mechanical Engineering to Database Mastery for Cyber Security with Wanda Lenkewich</title><itunes:title>39: From Mechanical Engineering to Database Mastery for Cyber Security with Wanda Lenkewich</itunes:title><description><![CDATA[<p>Derek Harp is happy to have Wanda Lenkewich, the Founder and CEO of Chinook Systems joining him on the podcast today!</p><p>Wanda Lenkewich harnesses her subject matter expertise in engineering and construction, lifecycle commissioning, and facility management to advance the security and resiliency of critical infrastructure. She is the CEO of Chinook Systems Inc., leading an interdisciplinary team dedicated to commissioning, building systems and controls upgrades and replacements, and cybersecurity for facility-related control systems. Lenkewich has a passion for digital transformation and continues to innovate and advance technology that will protect and extend the life of buildings. That includes the full integration of cybersecurity into Chinook’s commissioning technology; Chinook's CyberCxTM program. Lenkewich is an industry advocate and founding fellow of the Control System Cyber Security Association International - (CS)²AI.</p><p>Wanda is an excellent example of a great set of career path choices! She is a well-rounded individual who brings a fresh perspective and experience to what she does today! She is an entrepreneur, a speaker, and a mechanical-minded engineer with a well-developed creative side! She is a painter, musician, horse enthusiast, and cook.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Wanda tells her story, talks about her career journey, and shares some great nuggets of information about opportunities within the cyber security space.</p><p>You will not want to miss this episode if you are thinking about embarking on a career in cyber security or considering starting a company of your own! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Technology first came into Wanda’s life at a trade show she attended while working at her first job. It fascinated her, and she fell in love with it immediately! (4:21)</li><li>Wanda talks about the first job she did after graduating as a Mechanical Engineer at the Northern Alberta Institute of Technology. (6:15)</li><li>Wanda talks about her satisfying experience when she first got into digital controls. (9:17)</li><li>Wanda started building commissioning in 1991. It was all about the validation of control systems, and it was where she fell in love with databases. (12:16)</li><li>Wanda discusses the catalyst that prompted her to leave the government and start her first company. (13:55)</li><li>Wanda experienced a lot of frustration with the industry because it was slow to adopt new practices. She believes that things are changing, however. (17:45)</li><li>Wanda talks about what happened in the period between the first and the second companies she founded. (18:36)</li><li>The impact that Y2K had on her career path. (23:09)</li><li>Wanda talks about being invited to the Pentagon to help launch their renovation project. She has had a constant and consistent relationship with the Pentagon via Chinook ever since. (29:14)</li><li>Wanda talks about the challenges she faced while moving her business operation from Canada to the US. (32:09)</li><li>When cyber security first intersected with Chinook. (35:33)</li><li>The challenges with new construction and with existing buildings. (39:01)</li><li>Wanda shares some advice based on her years of experience for people entering the field of cyber security. (45:14)</li><li>It takes a lot of skill sets to build a strong cyber team in the OT world. (53:29)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p>Wanda Lenkewich on&nbsp;<a href="https://www.linkedin.com/in/wanda-lenkewich-03821338/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.chinooksystems.com/" rel="noopener noreferrer" target="_blank">Chinook Systems</a></p>]]></description><content:encoded><![CDATA[<p>Derek Harp is happy to have Wanda Lenkewich, the Founder and CEO of Chinook Systems joining him on the podcast today!</p><p>Wanda Lenkewich harnesses her subject matter expertise in engineering and construction, lifecycle commissioning, and facility management to advance the security and resiliency of critical infrastructure. She is the CEO of Chinook Systems Inc., leading an interdisciplinary team dedicated to commissioning, building systems and controls upgrades and replacements, and cybersecurity for facility-related control systems. Lenkewich has a passion for digital transformation and continues to innovate and advance technology that will protect and extend the life of buildings. That includes the full integration of cybersecurity into Chinook’s commissioning technology; Chinook's CyberCxTM program. Lenkewich is an industry advocate and founding fellow of the Control System Cyber Security Association International - (CS)²AI.</p><p>Wanda is an excellent example of a great set of career path choices! She is a well-rounded individual who brings a fresh perspective and experience to what she does today! She is an entrepreneur, a speaker, and a mechanical-minded engineer with a well-developed creative side! She is a painter, musician, horse enthusiast, and cook.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Wanda tells her story, talks about her career journey, and shares some great nuggets of information about opportunities within the cyber security space.</p><p>You will not want to miss this episode if you are thinking about embarking on a career in cyber security or considering starting a company of your own! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Technology first came into Wanda’s life at a trade show she attended while working at her first job. It fascinated her, and she fell in love with it immediately! (4:21)</li><li>Wanda talks about the first job she did after graduating as a Mechanical Engineer at the Northern Alberta Institute of Technology. (6:15)</li><li>Wanda talks about her satisfying experience when she first got into digital controls. (9:17)</li><li>Wanda started building commissioning in 1991. It was all about the validation of control systems, and it was where she fell in love with databases. (12:16)</li><li>Wanda discusses the catalyst that prompted her to leave the government and start her first company. (13:55)</li><li>Wanda experienced a lot of frustration with the industry because it was slow to adopt new practices. She believes that things are changing, however. (17:45)</li><li>Wanda talks about what happened in the period between the first and the second companies she founded. (18:36)</li><li>The impact that Y2K had on her career path. (23:09)</li><li>Wanda talks about being invited to the Pentagon to help launch their renovation project. She has had a constant and consistent relationship with the Pentagon via Chinook ever since. (29:14)</li><li>Wanda talks about the challenges she faced while moving her business operation from Canada to the US. (32:09)</li><li>When cyber security first intersected with Chinook. (35:33)</li><li>The challenges with new construction and with existing buildings. (39:01)</li><li>Wanda shares some advice based on her years of experience for people entering the field of cyber security. (45:14)</li><li>It takes a lot of skill sets to build a strong cyber team in the OT world. (53:29)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p>Wanda Lenkewich on&nbsp;<a href="https://www.linkedin.com/in/wanda-lenkewich-03821338/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.chinooksystems.com/" rel="noopener noreferrer" target="_blank">Chinook Systems</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">dde045df-db31-40a0-8f97-ef3ca2049093</guid><itunes:image href="https://artwork.captivate.fm/6e320b71-614d-44d7-85cf-9b621ad71f2a/bJ9Kx3thoEDmanrppvJkZJ6j.jpg"/><pubDate>Tue, 24 May 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7473be94-ea08-40c1-8127-dfb976fe3f5c/CS2AI-20Wanda-20Lenkewich-20-20Edited-20Audio.mp3" length="59171962" type="audio/mpeg"/><itunes:duration>01:01:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode></item><item><title>38: Cyber Security for Manufacturing with Colin Dunn and Isiah Jones</title><itunes:title>38: Cyber Security for Manufacturing with Colin Dunn and Isiah Jones</itunes:title><description><![CDATA[<p>Derek Harp would like to invite you, the listener, to next week’s (CS)²AI Online Symposium on Secure Control Systems for Smart Manufacturing. Manufacturing is a critical sector that forms a large portion of the American economy. It has over twelve-million workers and currently has 2.3 trillion dollars of output in the US alone!&nbsp;</p><p>The symposium will be in two parts: Part 1 will take place on Wednesday, May the 25th, 2022, at 1 pm EST. Some great prizes will be given to the participants in the question process, including some valuable industry books! Part 2 will happen in August 2022. More topics on manufacturing will be covered in the second part by some additional speakers.</p><p>As a society, we take much of what gets produced within the manufacturing sector for granted, yet cyber threat actors take advantage of every vertical within that sector. Today, Colin Dunn, one of the (CS)²AI sponsors and the CEO of Fend Incorporated, and Isiah Jones, a (CS)²AI Founding Fellow and a well-known cyber security researcher and practitioner, join Derek to share their thoughts on the importance of cyber security for manufacturing. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Isiah saw the kind of problems that happen under normal circumstances with manufacturing baby food years ago when he was with Jacobs Engineering.&nbsp;</li><li>Messing with manufacturing and the supply chain is sure to disrupt any society.&nbsp;</li><li>Supply chains have many vulnerable parts and do not need any additional stress like cyber-attacks right now.</li><li>There are ways to keep cyber attackers out. The symposium is a way to explore some of those options.&nbsp;</li><li>All sectors, especially manufacturing, need to start spending more money on employing trained safety staff.</li><li>One of the assets the manufacturing sector has is the safety culture.</li><li>Thinking about cyber security as key to safety will help it get taken more seriously within the manufacturing sector.</li><li>More attention needs to be paid to problems like ransom threats, the manipulation of logic, and intellectual property theft within the manufacturing sector.</li><li>Much more action needs to be taken around security issues in the manufacturing sector.&nbsp;</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.cs2ai.org/xo-smart-manufacturing-2022-symposium" rel="noopener noreferrer" target="_blank">(CS)²AI Online Symposium Secure Control Systems for Smart Manufacturing</a></p><p>Colin Dunn on&nbsp;<a href="https://www.linkedin.com/in/colindunn/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.fend.tech/" rel="noopener noreferrer" target="_blank">Fend Incorporated</a></p><p>Isiah Jones on <a href="https://www.linkedin.com/in/isiahjonesakaizzy/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Derek Harp would like to invite you, the listener, to next week’s (CS)²AI Online Symposium on Secure Control Systems for Smart Manufacturing. Manufacturing is a critical sector that forms a large portion of the American economy. It has over twelve-million workers and currently has 2.3 trillion dollars of output in the US alone!&nbsp;</p><p>The symposium will be in two parts: Part 1 will take place on Wednesday, May the 25th, 2022, at 1 pm EST. Some great prizes will be given to the participants in the question process, including some valuable industry books! Part 2 will happen in August 2022. More topics on manufacturing will be covered in the second part by some additional speakers.</p><p>As a society, we take much of what gets produced within the manufacturing sector for granted, yet cyber threat actors take advantage of every vertical within that sector. Today, Colin Dunn, one of the (CS)²AI sponsors and the CEO of Fend Incorporated, and Isiah Jones, a (CS)²AI Founding Fellow and a well-known cyber security researcher and practitioner, join Derek to share their thoughts on the importance of cyber security for manufacturing. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Isiah saw the kind of problems that happen under normal circumstances with manufacturing baby food years ago when he was with Jacobs Engineering.&nbsp;</li><li>Messing with manufacturing and the supply chain is sure to disrupt any society.&nbsp;</li><li>Supply chains have many vulnerable parts and do not need any additional stress like cyber-attacks right now.</li><li>There are ways to keep cyber attackers out. The symposium is a way to explore some of those options.&nbsp;</li><li>All sectors, especially manufacturing, need to start spending more money on employing trained safety staff.</li><li>One of the assets the manufacturing sector has is the safety culture.</li><li>Thinking about cyber security as key to safety will help it get taken more seriously within the manufacturing sector.</li><li>More attention needs to be paid to problems like ransom threats, the manipulation of logic, and intellectual property theft within the manufacturing sector.</li><li>Much more action needs to be taken around security issues in the manufacturing sector.&nbsp;</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.cs2ai.org/xo-smart-manufacturing-2022-symposium" rel="noopener noreferrer" target="_blank">(CS)²AI Online Symposium Secure Control Systems for Smart Manufacturing</a></p><p>Colin Dunn on&nbsp;<a href="https://www.linkedin.com/in/colindunn/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://www.fend.tech/" rel="noopener noreferrer" target="_blank">Fend Incorporated</a></p><p>Isiah Jones on <a href="https://www.linkedin.com/in/isiahjonesakaizzy/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">dc2f4e93-b91b-4df7-9ef6-c53aeb492342</guid><itunes:image href="https://artwork.captivate.fm/680d4332-2352-41f6-9b17-91d60eba4da7/-FvBJ9A9pjsOy2cYdWTPVhif.png"/><pubDate>Sun, 22 May 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f79e96fc-675c-41a8-8341-0bf6076e2b97/CS2AI-20Special-20Episode-202022May-20-20Edited-20Audio.mp3" length="10604100" type="audio/mpeg"/><itunes:duration>11:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode></item><item><title>37: Engineers Should Consider a Cyber Security Career with Vivek Ponnada</title><itunes:title>37: Engineers Should Consider a Cyber Security Career with Vivek Ponnada</itunes:title><description><![CDATA[<p>Derek Harp is excited to have Vivek Ponnada, the Regional Sales Director for Nozomi Networks, joining him for another episode in the series on security leaders! Vivek was also a long-time contributor at GE.</p><p>Vivek Ponnada has over 23 years of experience in Industrial Control Systems. He currently serves customers in Western Canada for Nozomi Networks with market-leading OT and IoT Security &amp; Visibility solutions.&nbsp;</p><p>He started his career in ICS as an Instrumentation Technician and then became a Controls Engineer and commissioned Gas Turbine Controls systems in Europe, Middle-East, Africa, and South-East Asia. During his career, Vivek has held multiple roles including Sales, Marketing &amp; Business Development, and Services covering Control systems &amp; Cybersecurity solutions for Critical Infrastructure (Power, Oil &amp; Gas, Water, and Mining) industries at GE and ICI Electrical Engineering in North America. He is a co-lead for the Top 20 Secure PLC Coding Practices Project and his recent talks and contributions include ICS Village (DefCon 29), Industrial Security Conference in Copenhagen &amp; several BSides.&nbsp;</p><p>Vivek has a bachelor's degree in Electrical Engineering from I.E. India, an MBA from The University of Texas at Austin, and GICSP certification from GIAC. He is an active member of the Infosec community in Vancouver, BC as a Board Member for Mainland Advanced Research Society, Volunteers for ISACA, and is a member of the ISA.</p><p>Vivek is a thoughtful and fun individual! He is an engineer, analyst, and finance guy! He is also a motorcycle enthusiast, an intermediate skier, and a husband!&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Vivek shares his backstory, discusses his education, and talks about his career trajectory. He also offers gold nuggets of advice for engineers with an interest in cyber security.</p><p>This is one show you will not want to miss- particularly if you are an engineer considering moving into the field of cyber security. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Vivek grew up in South India. He became an engineer and developed skills in control systems long before he became a cybersecurity guy. (1:50)</li><li>The first job Vivek remembers doing was helping someone with gardening when he was seven or eight years old. (2:98)</li><li>When Vivek graduated from high school, he was in a technical program. So he was already in an electronics and communication phase. (4:10)</li><li>Vivek studied his engineering undergrad part-time because he was also working full-time. It all worked out well because the work he was doing and his studies were all connected. (4:43)</li><li>He enjoyed learning how to connect his work-life with his education organically. (6:25)</li><li>Vivek discusses his twenty-year history with GE. (7:10)</li><li>Security is a discipline that is a constant learning process. (12:26)</li><li>Some helpful advice for engineers who have an interest in cyber security, but don’t know where to start or how to break into the field. (14:52)</li><li>Vivek talks about the career challenges he faced at GE and how he navigated them. (19:00)</li><li>Two things that most engineers tend to struggle with. (21:01)</li><li>Vivek jumped around in his career path, so he never had a mentor. He had some excellent coaches and managers, however. (23:17)</li><li>People in the cybersecurity community are always open to advising and helping one another. (25:14)</li><li>How sales came into Vivek’s career journey. (27:09)</li><li>Vivek talks about the Top 20 Secure PLC Coding Practices Project to which he is contributing. (30:40)</li><li>It is always good to have a plan for the next few years. (32:57)</li><li>Vivek shares his recommendations for career choices in the field of cyber security. (39:13)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a...]]></description><content:encoded><![CDATA[<p>Derek Harp is excited to have Vivek Ponnada, the Regional Sales Director for Nozomi Networks, joining him for another episode in the series on security leaders! Vivek was also a long-time contributor at GE.</p><p>Vivek Ponnada has over 23 years of experience in Industrial Control Systems. He currently serves customers in Western Canada for Nozomi Networks with market-leading OT and IoT Security &amp; Visibility solutions.&nbsp;</p><p>He started his career in ICS as an Instrumentation Technician and then became a Controls Engineer and commissioned Gas Turbine Controls systems in Europe, Middle-East, Africa, and South-East Asia. During his career, Vivek has held multiple roles including Sales, Marketing &amp; Business Development, and Services covering Control systems &amp; Cybersecurity solutions for Critical Infrastructure (Power, Oil &amp; Gas, Water, and Mining) industries at GE and ICI Electrical Engineering in North America. He is a co-lead for the Top 20 Secure PLC Coding Practices Project and his recent talks and contributions include ICS Village (DefCon 29), Industrial Security Conference in Copenhagen &amp; several BSides.&nbsp;</p><p>Vivek has a bachelor's degree in Electrical Engineering from I.E. India, an MBA from The University of Texas at Austin, and GICSP certification from GIAC. He is an active member of the Infosec community in Vancouver, BC as a Board Member for Mainland Advanced Research Society, Volunteers for ISACA, and is a member of the ISA.</p><p>Vivek is a thoughtful and fun individual! He is an engineer, analyst, and finance guy! He is also a motorcycle enthusiast, an intermediate skier, and a husband!&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Vivek shares his backstory, discusses his education, and talks about his career trajectory. He also offers gold nuggets of advice for engineers with an interest in cyber security.</p><p>This is one show you will not want to miss- particularly if you are an engineer considering moving into the field of cyber security. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Vivek grew up in South India. He became an engineer and developed skills in control systems long before he became a cybersecurity guy. (1:50)</li><li>The first job Vivek remembers doing was helping someone with gardening when he was seven or eight years old. (2:98)</li><li>When Vivek graduated from high school, he was in a technical program. So he was already in an electronics and communication phase. (4:10)</li><li>Vivek studied his engineering undergrad part-time because he was also working full-time. It all worked out well because the work he was doing and his studies were all connected. (4:43)</li><li>He enjoyed learning how to connect his work-life with his education organically. (6:25)</li><li>Vivek discusses his twenty-year history with GE. (7:10)</li><li>Security is a discipline that is a constant learning process. (12:26)</li><li>Some helpful advice for engineers who have an interest in cyber security, but don’t know where to start or how to break into the field. (14:52)</li><li>Vivek talks about the career challenges he faced at GE and how he navigated them. (19:00)</li><li>Two things that most engineers tend to struggle with. (21:01)</li><li>Vivek jumped around in his career path, so he never had a mentor. He had some excellent coaches and managers, however. (23:17)</li><li>People in the cybersecurity community are always open to advising and helping one another. (25:14)</li><li>How sales came into Vivek’s career journey. (27:09)</li><li>Vivek talks about the Top 20 Secure PLC Coding Practices Project to which he is contributing. (30:40)</li><li>It is always good to have a plan for the next few years. (32:57)</li><li>Vivek shares his recommendations for career choices in the field of cyber security. (39:13)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/1ot/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">Vivek Ponnada on LinkedIn</a></p><p><a href="https://www.nozominetworks.com/" rel="noopener noreferrer" target="_blank">Nozomi Networks</a></p><p><a href="https://gca.isa.org/blog/the-top-20-secure-plc-coding-practices-project" rel="noopener noreferrer" target="_blank">Top 20 Secure PLC Coding Practices Project</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">5a4596c7-968d-4254-8744-c1bbb4c1a21b</guid><itunes:image href="https://artwork.captivate.fm/a6e793ab-74ef-4639-a309-487c55eaf647/vDMkfPdWH3_2XemptHypkO-9.jpg"/><pubDate>Tue, 17 May 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9049be0f-5e81-49df-85e6-285e098fbcc9/CS2AI-20-20Vivek-20Ponnada-20-20Edited-20Audio.mp3" length="37997056" type="audio/mpeg"/><itunes:duration>39:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode></item><item><title>36: The S4 Conference: Why You Should Attend Every Year</title><itunes:title>36: The S4 Conference: Why You Should Attend Every Year</itunes:title><description><![CDATA[<p>The S4 Conference is one of the pinnacle events of the year for anyone interested in hearing deep subject matter experts speak. It is definitely worth attending if you are not formally part of the (CS)²AI community. </p><p>Today, Derek Harp shares a short podcast he created after attending the 22nd S4 Conference, held from the 19th to the 21st of April this year.</p><p>Dale Peterson is the Founder, Creator, and MC of the S4 Conference. He was on a recent (CS)²AI Podcast episode, talking about how S4 came about. Patrick Miller was also a recent guest on the (CS)²AI Podcast. He “accidentally” founded the informal yet powerful and informative after-hours BEER ISAC part of the S4 event. </p><p>The recent S4 Conference was a great opportunity for everyone to get back together, in person after Covid! This year, 800 people attended the event. The speaker line-up was just as amazing as it has always been in the past! Many women were present, and there was also a well-attended Women in ICS social pre-event that took place on the Monday before the main event.</p><p>In this episode, we share some comments on the recent S4 event made by Andrew Ginter, VP Industrial Security from Waterfall Security Solutions and Isiah Jones, Principal Security Engineer-ICS Security Integration from Resilience. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Andrew’s biggest takeaway from the event was finding out that the industry wants cyber security regulations.&nbsp;</li><li>The shipping industry is price sensitive. They should spend some money and effort on cyber security but won’t spend a penny unless their competition does the same.</li><li>Andrew explains why he was surprised to learn that the industry wants cyber security regulations.</li><li>Isiah enjoyed the diversity at the event! He was happy to see so many female technical engineers and black people attending the event.&nbsp;&nbsp;</li><li>Isiah enjoyed seeing many new people interested in the more technical topics.</li><li>Isiah explains why he was happy to see Jen Easterly show up at the event to address the community directly.</li><li>Isiah enjoyed listening to new topics on PLCs, containers, and the latest attackers living off the land.</li><li>Seeing and interacting with everyone at the latest S4 event, and seeing new people get their coins, was good for Isiah’s mental health!</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The S4 Conference is one of the pinnacle events of the year for anyone interested in hearing deep subject matter experts speak. It is definitely worth attending if you are not formally part of the (CS)²AI community. </p><p>Today, Derek Harp shares a short podcast he created after attending the 22nd S4 Conference, held from the 19th to the 21st of April this year.</p><p>Dale Peterson is the Founder, Creator, and MC of the S4 Conference. He was on a recent (CS)²AI Podcast episode, talking about how S4 came about. Patrick Miller was also a recent guest on the (CS)²AI Podcast. He “accidentally” founded the informal yet powerful and informative after-hours BEER ISAC part of the S4 event. </p><p>The recent S4 Conference was a great opportunity for everyone to get back together, in person after Covid! This year, 800 people attended the event. The speaker line-up was just as amazing as it has always been in the past! Many women were present, and there was also a well-attended Women in ICS social pre-event that took place on the Monday before the main event.</p><p>In this episode, we share some comments on the recent S4 event made by Andrew Ginter, VP Industrial Security from Waterfall Security Solutions and Isiah Jones, Principal Security Engineer-ICS Security Integration from Resilience. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Andrew’s biggest takeaway from the event was finding out that the industry wants cyber security regulations.&nbsp;</li><li>The shipping industry is price sensitive. They should spend some money and effort on cyber security but won’t spend a penny unless their competition does the same.</li><li>Andrew explains why he was surprised to learn that the industry wants cyber security regulations.</li><li>Isiah enjoyed the diversity at the event! He was happy to see so many female technical engineers and black people attending the event.&nbsp;&nbsp;</li><li>Isiah enjoyed seeing many new people interested in the more technical topics.</li><li>Isiah explains why he was happy to see Jen Easterly show up at the event to address the community directly.</li><li>Isiah enjoyed listening to new topics on PLCs, containers, and the latest attackers living off the land.</li><li>Seeing and interacting with everyone at the latest S4 event, and seeing new people get their coins, was good for Isiah’s mental health!</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">a410b3e9-b19c-4808-83e2-abb3d63696f2</guid><itunes:image href="https://artwork.captivate.fm/f023472e-850c-4d2e-888c-7aa9df958322/hjWHJDtTbXqm-lUOzZd9z4yb.jpg"/><pubDate>Tue, 10 May 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5a82a943-3918-478d-ae34-abdfb83b71d0/CS2AI-20Audio-20Only-20-20Ep-20S4.mp3" length="8343630" type="audio/mpeg"/><itunes:duration>08:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode></item><item><title>35: Building a Consulting Career in the Cyber Security Industry with Patrick C. Miller</title><itunes:title>35: Building a Consulting Career in the Cyber Security Industry with Patrick C. Miller</itunes:title><description><![CDATA[<p>Derek Harp is happy to have Patrick Miller joining him today for another episode in the Security Leaders series! Patrick is a well-known legend in the ICS cyber security space. He is currently the Chief Executive Officer of Ampere Industrial Security.&nbsp;(<a href="http://www.amperesec.com/" rel="noopener noreferrer" target="_blank">www.amperesec.com</a>)</p><p>Patrick Miller has dedicated his career to the protection and defense of critical infrastructures. As President and CEO of Ampere Industrial Security, he is a trusted independent security and regulatory advisor for industrial control systems worldwide. In addition to his role at Ampere, Mr. Miller is also the founder, director, and president emeritus of EnergySec and US. Coordinator for the Industrial Cybersecurity Center. Patrick's diverse background spans the Energy, Telecommunications, Water, Wastewater, Manufacturing, and Financial Services verticals, including key positions with regulatory agencies, private consulting firms, utility asset owners, and commercial organizations. Patrick was instrumental in the establishment of the NERC CIP standards in the US as a drafting team member and the first CIP auditor in the nation. He currently serves on or contributes to multiple NERC CIP guidance and standards drafting teams. Patrick is also an instructor for the ICS456 NERC CIP course with the SANS Institute.</p><p>Patrick loves tech and the outdoors! As well as being a technologist, he is also a chef, a keen kayaker, a father, and a builder of communities! In this episode of the (CS)²AI Podcast, he tells his modern-day superhero origin story, talks about the various milestones in his professional journey, and shares valuable nuggets of advice for people from different backgrounds who would like to get into the cyber security industry.&nbsp;</p><p>You won’t want to miss this episode if you would like to make a career in cyber security, become a better security professional, or start a cybersecurity business of your own. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Entrepreneurship is in Patrick’s blood. (3:05)</li><li>Growing up in the early days of technology, Patrick was lucky enough to get the new tech as it came out. (4:15)</li><li>Patrick was using cutting-edge technology to do a senior capstone biology project just before he dropped out of school to do tech. (6:32)</li><li>Any kind of background can be helpful for you as a security professional. (9:00)</li><li>How phone systems have advanced and transformed over the last few decades. (10:30)</li><li>Patrick’s first “hacking job”. (11:29)</li><li>Patrick talks about when he decided to specialize in security and the point when industrial security first intersected with his journey. (13:23)</li><li>Patrick discusses his stint as a regulator for WECC (Western Electricity Coordinating Council.) (17:54)</li><li>Joining standards bodies in the early stage can help people break into the cyber security industry. (24:26)</li><li>What motivated Patrick to start a consulting firm? (26:14)</li><li>The Dawn of Energy Sec (Energy Sector Security Consortium). (32:24)</li><li>Patrick shares his vision for Ampere. (35:15)</li><li>Why good communication skills are essential. (38:40)</li><li>What is ISAC all about, and how did Patrick instigate it? (41:40)&nbsp;</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Derek Harp is happy to have Patrick Miller joining him today for another episode in the Security Leaders series! Patrick is a well-known legend in the ICS cyber security space. He is currently the Chief Executive Officer of Ampere Industrial Security.&nbsp;(<a href="http://www.amperesec.com/" rel="noopener noreferrer" target="_blank">www.amperesec.com</a>)</p><p>Patrick Miller has dedicated his career to the protection and defense of critical infrastructures. As President and CEO of Ampere Industrial Security, he is a trusted independent security and regulatory advisor for industrial control systems worldwide. In addition to his role at Ampere, Mr. Miller is also the founder, director, and president emeritus of EnergySec and US. Coordinator for the Industrial Cybersecurity Center. Patrick's diverse background spans the Energy, Telecommunications, Water, Wastewater, Manufacturing, and Financial Services verticals, including key positions with regulatory agencies, private consulting firms, utility asset owners, and commercial organizations. Patrick was instrumental in the establishment of the NERC CIP standards in the US as a drafting team member and the first CIP auditor in the nation. He currently serves on or contributes to multiple NERC CIP guidance and standards drafting teams. Patrick is also an instructor for the ICS456 NERC CIP course with the SANS Institute.</p><p>Patrick loves tech and the outdoors! As well as being a technologist, he is also a chef, a keen kayaker, a father, and a builder of communities! In this episode of the (CS)²AI Podcast, he tells his modern-day superhero origin story, talks about the various milestones in his professional journey, and shares valuable nuggets of advice for people from different backgrounds who would like to get into the cyber security industry.&nbsp;</p><p>You won’t want to miss this episode if you would like to make a career in cyber security, become a better security professional, or start a cybersecurity business of your own. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Entrepreneurship is in Patrick’s blood. (3:05)</li><li>Growing up in the early days of technology, Patrick was lucky enough to get the new tech as it came out. (4:15)</li><li>Patrick was using cutting-edge technology to do a senior capstone biology project just before he dropped out of school to do tech. (6:32)</li><li>Any kind of background can be helpful for you as a security professional. (9:00)</li><li>How phone systems have advanced and transformed over the last few decades. (10:30)</li><li>Patrick’s first “hacking job”. (11:29)</li><li>Patrick talks about when he decided to specialize in security and the point when industrial security first intersected with his journey. (13:23)</li><li>Patrick discusses his stint as a regulator for WECC (Western Electricity Coordinating Council.) (17:54)</li><li>Joining standards bodies in the early stage can help people break into the cyber security industry. (24:26)</li><li>What motivated Patrick to start a consulting firm? (26:14)</li><li>The Dawn of Energy Sec (Energy Sector Security Consortium). (32:24)</li><li>Patrick shares his vision for Ampere. (35:15)</li><li>Why good communication skills are essential. (38:40)</li><li>What is ISAC all about, and how did Patrick instigate it? (41:40)&nbsp;</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">326b8e0c-3b23-4565-b694-bf3eb1b52137</guid><itunes:image href="https://artwork.captivate.fm/c6196277-588d-49d7-afde-5633a8fa515f/Pt_Wj5kLhBzXHPrJXxWbyJyJ.jpg"/><pubDate>Tue, 19 Apr 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/19f465e9-6d58-422d-ae47-6bc13d125d11/CS2AI-20-20Patrick-20Miller-20-20Edited-20Audio.mp3" length="52442562" type="audio/mpeg"/><itunes:duration>54:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode></item><item><title>34: Foundations for Starting Your Own Cyber Security Business with Dale Peterson</title><itunes:title>34: Foundations for Starting Your Own Cyber Security Business with Dale Peterson</itunes:title><description><![CDATA[<p>Derek Harp is thrilled to have Dale Peterson of Digital Bond joining him for another great episode in the series on security leaders! Dale is a legend and leader in the cyber security industry!</p><p>For over 15 years, Dale Peterson has been on the leading/bleeding edge helping security-conscious asset owners effectively and efficiently manage risk to their critical assets. He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in the world. Dale is constantly pushing and prodding the ICS community to move faster and get better.</p><p>Dale is a catalyst in the ICS cyber security space. He is most famous for his S4 Events. (The latest S4 Event will be coming up between the 19th and 21st of April 2022.) He is also an author, former cryptologist, skier, hiker, outdoorsman, well-known speaker, husband, and father.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Dale shares his origin story and discusses his career trajectory. He explains what led him to start Digital Bond, he talks about how the S4 Events came about, and he also offers some valuable nuggets of advice for people looking to start a business.</p><p>You won’t want to miss this episode if you are looking for ways to get into the cyber security industry or if you want to know which moves to make to become a leader within the industry or start a company of your own. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The most interesting and influential work that Dale did early on. (3:10)</li><li>What it takes to produce S4 Events. (4:46)</li><li>Dale first worked on computers when he was in junior high school. (6:06)</li><li>After getting a degree in finance, Dale worked for the NSA as a cryptologist and then went on to work for a company selling military encryption equipment before starting his own company. (8:10)&nbsp;</li><li>Starting a company is not for everyone. (12:48)</li><li>What led to Dale starting Digital Bond? (13:13)</li><li>Dale shares his biggest failure so that others need not make the same mistake. He also offers advice for anyone wanting to start a business. (16:13)</li><li>How the S4 events came about in 2007. (12:53)</li><li>The highlights and the worst moments Dale remembers from doing S4 events. (30:15)</li><li>You need never be afraid to try something new in your business or career. (32:05)</li><li>Dale talks about where he has helped the most as a mentor. (36:54)</li><li>If you are very good at something, you can quickly make yourself known and become the best in the world at it in new sectors. (38:06)</li><li>Where you can start reading and researching to augment your professional knowledge. (42:39)</li><li>You need to understand your mission when you start a conference or an event. (48:42)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://dale-peterson.com/" rel="noopener noreferrer" target="_blank">Dale Peterson’s website</a></p><p>Dale Peterson on&nbsp;<a href="https://www.linkedin.com/in/dale-peterson-s4/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><strong>Books mentioned:</strong></p><p><a href="https://amzn.to/3KDAAmV" rel="noopener noreferrer" target="_blank">The Brand You 50</a>&nbsp;by Tom Peters</p>]]></description><content:encoded><![CDATA[<p>Derek Harp is thrilled to have Dale Peterson of Digital Bond joining him for another great episode in the series on security leaders! Dale is a legend and leader in the cyber security industry!</p><p>For over 15 years, Dale Peterson has been on the leading/bleeding edge helping security-conscious asset owners effectively and efficiently manage risk to their critical assets. He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in the world. Dale is constantly pushing and prodding the ICS community to move faster and get better.</p><p>Dale is a catalyst in the ICS cyber security space. He is most famous for his S4 Events. (The latest S4 Event will be coming up between the 19th and 21st of April 2022.) He is also an author, former cryptologist, skier, hiker, outdoorsman, well-known speaker, husband, and father.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Dale shares his origin story and discusses his career trajectory. He explains what led him to start Digital Bond, he talks about how the S4 Events came about, and he also offers some valuable nuggets of advice for people looking to start a business.</p><p>You won’t want to miss this episode if you are looking for ways to get into the cyber security industry or if you want to know which moves to make to become a leader within the industry or start a company of your own. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The most interesting and influential work that Dale did early on. (3:10)</li><li>What it takes to produce S4 Events. (4:46)</li><li>Dale first worked on computers when he was in junior high school. (6:06)</li><li>After getting a degree in finance, Dale worked for the NSA as a cryptologist and then went on to work for a company selling military encryption equipment before starting his own company. (8:10)&nbsp;</li><li>Starting a company is not for everyone. (12:48)</li><li>What led to Dale starting Digital Bond? (13:13)</li><li>Dale shares his biggest failure so that others need not make the same mistake. He also offers advice for anyone wanting to start a business. (16:13)</li><li>How the S4 events came about in 2007. (12:53)</li><li>The highlights and the worst moments Dale remembers from doing S4 events. (30:15)</li><li>You need never be afraid to try something new in your business or career. (32:05)</li><li>Dale talks about where he has helped the most as a mentor. (36:54)</li><li>If you are very good at something, you can quickly make yourself known and become the best in the world at it in new sectors. (38:06)</li><li>Where you can start reading and researching to augment your professional knowledge. (42:39)</li><li>You need to understand your mission when you start a conference or an event. (48:42)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://dale-peterson.com/" rel="noopener noreferrer" target="_blank">Dale Peterson’s website</a></p><p>Dale Peterson on&nbsp;<a href="https://www.linkedin.com/in/dale-peterson-s4/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><strong>Books mentioned:</strong></p><p><a href="https://amzn.to/3KDAAmV" rel="noopener noreferrer" target="_blank">The Brand You 50</a>&nbsp;by Tom Peters</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">321ae7c2-7303-42f4-858a-2643b3f3ffae</guid><itunes:image href="https://artwork.captivate.fm/1e4530f5-ddb2-4449-a490-425c8afedf03/-nMiClzCSZecN69cu0pxxOPa.jpg"/><pubDate>Tue, 12 Apr 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2aea4c35-fb88-4884-9f7d-8eecd43b5c91/CS2AI-20Dale-20Peterson-20-20Edited-20Audio.mp3" length="49976981" type="audio/mpeg"/><itunes:duration>51:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode></item><item><title>33: Certifications and Instructional Careers in Cybersecurity with Justin Searle</title><itunes:title>33: Certifications and Instructional Careers in Cybersecurity with Justin Searle</itunes:title><description><![CDATA[<p>Derek Harp is excited to welcome Justin Searle as his guest for another episode in the series on security leaders!&nbsp;</p><p>Justin is the Director of ICS Security at InGuardians, specializing in ICS security architecture design and penetration testing. He has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities, corporations, and security conferences. He is currently a Senior Instructor for the SANS Institute and a faculty member at IANS. In addition to electric power industry conferences, he frequently presents at top international security conferences such as Black Hat, DEFCON, OWASP, Nullcon, and AusCERT.</p><p>Justin is well-balanced and versatile and a super fascinating person! He was born in Utah and has lived there for most of his life. He has a Bachelor’s Degree in Technology Education with minors in computer science and electrical engineering, and a Master’s Degree in International Business and Information Systems. He is an entrepreneur, researcher, security practitioner, open-source advocate, instructor, teacher, and author. He is an outdoor enthusiast and has some cool hobbies, like scuba diving and rock climbing. He is also a falconer, a helicopter pilot, and a globetrotter.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he shares his modern-day superhero backstory, and he talks to Derek about how his career journey led to him becoming immersed neck-deep in cyber security for control systems. He also talks about the value of certifications and becoming an instructor. You will gain a lot from this show if you would like to make a career in cyber security or become an instructor in the field. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Justin started doing basic programming when he was in elementary school and almost earned an Associate’s Degree in Electronics Engineering in high school. (4:58)</li><li>Justin talks about the certifications he obtained to build credibility and advance his career. (9:40)</li><li>Justin shares his thoughts about certifications. (11:50)</li><li>Getting a certification will help students stand out trying to find an internship. (Justin recommends the CompTIA Security+ Certification because it is an inexpensive option.) (13:22)</li><li>Graduates should consider getting a&nbsp;<a href="https://www.isc2.org/Certifications/CISSP" rel="noopener noreferrer" target="_blank">CISSP Certification</a>. (13:48)</li><li>Justin explains why he shifted to focus on networking technologies, IT technologies, and cyber security in 2000-2001. (18:10)</li><li>Getting into his niche area- penetration testing in industrial control systems. (19:50)</li><li>How can listeners break into becoming teachers or instructors? ( 22:38)</li><li>The pros and cons of joining communities and collaborative groups. (27:08)</li><li>Justin enjoys being an informal mentor to others and providing feedback when people ask questions. (31:04)</li><li>Justin offers advice for maximizing your benefit when you change jobs or your positions within a company. (33:22)</li><li>You will be valued in the field if you get into any area of cyber security. (40:10)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/meeas/" rel="noopener noreferrer" target="_blank">Justin Searle on LinkedIn</a></p><p><a href="https://www.inguardians.com/" rel="noopener noreferrer" target="_blank">In Guardians</a></p><p><a href="https://www.isc2.org/Certifications/CISSP" rel="noopener noreferrer" target="_blank">CISSP Certification</a></p>]]></description><content:encoded><![CDATA[<p>Derek Harp is excited to welcome Justin Searle as his guest for another episode in the series on security leaders!&nbsp;</p><p>Justin is the Director of ICS Security at InGuardians, specializing in ICS security architecture design and penetration testing. He has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities, corporations, and security conferences. He is currently a Senior Instructor for the SANS Institute and a faculty member at IANS. In addition to electric power industry conferences, he frequently presents at top international security conferences such as Black Hat, DEFCON, OWASP, Nullcon, and AusCERT.</p><p>Justin is well-balanced and versatile and a super fascinating person! He was born in Utah and has lived there for most of his life. He has a Bachelor’s Degree in Technology Education with minors in computer science and electrical engineering, and a Master’s Degree in International Business and Information Systems. He is an entrepreneur, researcher, security practitioner, open-source advocate, instructor, teacher, and author. He is an outdoor enthusiast and has some cool hobbies, like scuba diving and rock climbing. He is also a falconer, a helicopter pilot, and a globetrotter.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he shares his modern-day superhero backstory, and he talks to Derek about how his career journey led to him becoming immersed neck-deep in cyber security for control systems. He also talks about the value of certifications and becoming an instructor. You will gain a lot from this show if you would like to make a career in cyber security or become an instructor in the field. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Justin started doing basic programming when he was in elementary school and almost earned an Associate’s Degree in Electronics Engineering in high school. (4:58)</li><li>Justin talks about the certifications he obtained to build credibility and advance his career. (9:40)</li><li>Justin shares his thoughts about certifications. (11:50)</li><li>Getting a certification will help students stand out trying to find an internship. (Justin recommends the CompTIA Security+ Certification because it is an inexpensive option.) (13:22)</li><li>Graduates should consider getting a&nbsp;<a href="https://www.isc2.org/Certifications/CISSP" rel="noopener noreferrer" target="_blank">CISSP Certification</a>. (13:48)</li><li>Justin explains why he shifted to focus on networking technologies, IT technologies, and cyber security in 2000-2001. (18:10)</li><li>Getting into his niche area- penetration testing in industrial control systems. (19:50)</li><li>How can listeners break into becoming teachers or instructors? ( 22:38)</li><li>The pros and cons of joining communities and collaborative groups. (27:08)</li><li>Justin enjoys being an informal mentor to others and providing feedback when people ask questions. (31:04)</li><li>Justin offers advice for maximizing your benefit when you change jobs or your positions within a company. (33:22)</li><li>You will be valued in the field if you get into any area of cyber security. (40:10)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/meeas/" rel="noopener noreferrer" target="_blank">Justin Searle on LinkedIn</a></p><p><a href="https://www.inguardians.com/" rel="noopener noreferrer" target="_blank">In Guardians</a></p><p><a href="https://www.isc2.org/Certifications/CISSP" rel="noopener noreferrer" target="_blank">CISSP Certification</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">51f4f9d7-0b0f-4044-be17-1de5e18921e5</guid><itunes:image href="https://artwork.captivate.fm/05536fd3-dd93-42d6-9a13-8238c62d0797/Db3pd2hG1E2Ofo48BUFO0ZDk.jpg"/><pubDate>Tue, 05 Apr 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/daa98fa0-b056-4e92-b6c3-c1ddbbc0c84d/CS2AI-20Justin-20Searle-20-20Edited-20Audio.mp3" length="21977250" type="audio/mpeg"/><itunes:duration>45:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode></item><item><title>32: Creating a Cyber Security Career in Production Environments with Rick Kaun</title><itunes:title>32: Creating a Cyber Security Career in Production Environments with Rick Kaun</itunes:title><description><![CDATA[<p>Today, Derek Harp is excited to interview Rick Kaun for another episode in the security leaders series. Rick is the VP of Solutions at Verve Industrial Protection.&nbsp;&nbsp;</p><p>Rick is a well-versed OT cyber security thought leader, evangelist, advocate, and solution provider with more than 20 years in the identification, development, and provision of all sizes and shapes of security programs. Regardless of the industry, security maturity level, or standard (corporate, regulatory, or best practice) Rick has focused on helping clients to find solutions that are effective, affordable, and manageable. With a special experience in production environments, he has had the pleasure of working around the world with multiple organizations ranging from Power to Oil and Gas, Refining, Mining, Pulp and Paper, discrete manufacturing to corporate and regulatory projects.</p><p>Rick is an honest and authentic person. He is a straight talker, known for getting right to the heart of the matter. He is a husband and father and a keen outdoorsman. He is also an ice hockey fan, traveler, boater, and dog lover.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he tells his story and shares his wisdom. He talks about his career, discusses the decisions he made that led him to where he is today and shares some gold nuggets of career advice.</p><p>You won’t want to miss this episode if you are looking for career direction, considering a career in cyber security, or already in the security field and would like to move forward in your career. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Rick shares his superhero origin story. (5:28)</li><li>In grade four, Rick became the computer lab administrator for his class. (8:34)</li><li>Rick did not start his career in cyber security with a technical degree. He explains how he went from studying sociology to learning about technology. (11:26)</li><li>Technology is such a complex field, and it has so many opportunities that you can have an entire career and a specialty within it. (12:04)</li><li>There are various technical studies courses that you can do at the Northern Alberta Institute of Technology (NAIT). (13:04)</li><li>Rick believes that security basics should underpin every course that anyone ever does. He would love to have a panel discussion on safety culture! (16:58)</li><li>Rick explains how he jumped into security for control systems at Honeywell twenty-one years ago. (18:53)</li><li>Rick joined Verve about five years ago, and since then, they have doubled twice. (24:23)</li><li>We need meaningful and sustainable risk reduction for the future. (25:19)</li><li>People you know now could become important in the future. That’s why you need to invest in as many quality relationships as possible within the cyber security industry. (25:51)</li><li>Some of the challenges Rick has faced while navigating his career journey. (28:28)</li><li>Rick discusses the importance of collaboration. (34:21)</li><li>With trainees, it is way better to be humble and honest about things you don’t know than to make something up. (41:49)</li><li>Rick feels that mentorship is the key component for anybody to get anywhere. (44:27)</li><li>You need to enjoy the work you do. (47:28)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/rickkaun/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">Rick Kaun on LinkedIn</a></p><p><a href="https://verveindustrial.com/" rel="noopener noreferrer" target="_blank">Verve Industrial Protection</a></p><p><a href="https://www.nait.ca/nait/home" rel="noopener noreferrer" target="_blank">Northern Alberta Institute of Technology (NAIT)</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is excited to interview Rick Kaun for another episode in the security leaders series. Rick is the VP of Solutions at Verve Industrial Protection.&nbsp;&nbsp;</p><p>Rick is a well-versed OT cyber security thought leader, evangelist, advocate, and solution provider with more than 20 years in the identification, development, and provision of all sizes and shapes of security programs. Regardless of the industry, security maturity level, or standard (corporate, regulatory, or best practice) Rick has focused on helping clients to find solutions that are effective, affordable, and manageable. With a special experience in production environments, he has had the pleasure of working around the world with multiple organizations ranging from Power to Oil and Gas, Refining, Mining, Pulp and Paper, discrete manufacturing to corporate and regulatory projects.</p><p>Rick is an honest and authentic person. He is a straight talker, known for getting right to the heart of the matter. He is a husband and father and a keen outdoorsman. He is also an ice hockey fan, traveler, boater, and dog lover.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, he tells his story and shares his wisdom. He talks about his career, discusses the decisions he made that led him to where he is today and shares some gold nuggets of career advice.</p><p>You won’t want to miss this episode if you are looking for career direction, considering a career in cyber security, or already in the security field and would like to move forward in your career. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Rick shares his superhero origin story. (5:28)</li><li>In grade four, Rick became the computer lab administrator for his class. (8:34)</li><li>Rick did not start his career in cyber security with a technical degree. He explains how he went from studying sociology to learning about technology. (11:26)</li><li>Technology is such a complex field, and it has so many opportunities that you can have an entire career and a specialty within it. (12:04)</li><li>There are various technical studies courses that you can do at the Northern Alberta Institute of Technology (NAIT). (13:04)</li><li>Rick believes that security basics should underpin every course that anyone ever does. He would love to have a panel discussion on safety culture! (16:58)</li><li>Rick explains how he jumped into security for control systems at Honeywell twenty-one years ago. (18:53)</li><li>Rick joined Verve about five years ago, and since then, they have doubled twice. (24:23)</li><li>We need meaningful and sustainable risk reduction for the future. (25:19)</li><li>People you know now could become important in the future. That’s why you need to invest in as many quality relationships as possible within the cyber security industry. (25:51)</li><li>Some of the challenges Rick has faced while navigating his career journey. (28:28)</li><li>Rick discusses the importance of collaboration. (34:21)</li><li>With trainees, it is way better to be humble and honest about things you don’t know than to make something up. (41:49)</li><li>Rick feels that mentorship is the key component for anybody to get anywhere. (44:27)</li><li>You need to enjoy the work you do. (47:28)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/rickkaun/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">Rick Kaun on LinkedIn</a></p><p><a href="https://verveindustrial.com/" rel="noopener noreferrer" target="_blank">Verve Industrial Protection</a></p><p><a href="https://www.nait.ca/nait/home" rel="noopener noreferrer" target="_blank">Northern Alberta Institute of Technology (NAIT)</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">d7c99f4d-621e-4418-819e-7de882906faf</guid><itunes:image href="https://artwork.captivate.fm/83a3a2fe-967c-4bb7-ba91-6af21d8d6c7c/jlSv3vI2C2GmP-MnSwuY2dKN.jpg"/><pubDate>Tue, 29 Mar 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e203d38f-a48b-41a7-a17e-ad2160ce93a7/CS2AI-Rick-Kaun-Edited-Audio.mp3" length="47218480" type="audio/mpeg"/><itunes:duration>48:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode></item><item><title>31: Cyber Security Start Ups and Product Creation with Eric J. Byres</title><itunes:title>31: Cyber Security Start Ups and Product Creation with Eric J. Byres</itunes:title><description><![CDATA[<p>Today, Derek Harp is excited to interview Eric J. Byres, the Founder of and Chief Technology Officer of aDolus Technology Inc., in another episode of the Security Leaders series. Eric is a pioneer in industrial cyber security. He is a technologist, entrepreneur, author, inventor, outdoor enthusiast, and sailor.&nbsp;</p><p>Eric grew up in North Vancouver and later graduated with a Bachelor of Applied Science Degree from The University of British Columbia, focusing on geological engineering and mining operations. He is widely recognized as one of the world’s top experts in the SCADA security field. As the inventor of the Tofino Security technology, Eric and his partner Joann guided the product through its evolution from an academic research project and startup to a successful acquisition by Belden Inc (NYSE: BDC). Tofino received numerous industry awards and was licensed by industry giants such as Honeywell, Schneider Electric, and Caterpillar. Today it is probably the most widely deployed ICS-specific firewall in the world.&nbsp; &nbsp;</p><p>In this episode of the (CS)²AI Podcast, Eric shares his background and discusses his career trajectory. He also offers many gold nuggets of advice for listeners who would like to do a startup, launch a product, be useful for the industry later on, or use what they already have to add value to the cyber security industry.&nbsp;</p><p>This episode is one you will not want to miss if you are looking to start your career in cyber security or considering starting a company in the cyber security space.</p><p><strong>Show highlights:</strong></p><ul><li>Eric started his first business, making and selling root beer when he was about eight years old. He gained some valuable entrepreneurial experience doing that! (2:35)</li><li>His dad bought him a Digi-Comp 1 mechanical digital computer with three bits of memory when he was about eight years old. (5:31)</li><li>Eric's first job after graduating was with a small but prestigious consulting firm that designed mines. They shipped him off to Australia, South Africa, and Columbia. (7:09)</li><li>After three or four years, Eric got out of mining and imbedded himself into the data communications and industrial computer markets. (8:01)</li><li>Eric explains what went on in his early days in control systems. (10:36)</li><li>Writing a peer-reviewed paper for the IEEE on cyber security for control systems while he was at DCIT was a turning point in Eric’s career. (16:30)</li><li>Eric discusses the birth of Tofino Security. (20:35)</li><li>Eric talks about the challenges he faced and offers advice for listeners who would like to follow a similar career path. (22:35)</li><li>Why does he feel that startups have an advantage? (25:48)</li><li>Eric describes the Tofino firewall and explains what is. (26:39)</li><li>Eric talks about his mentors and the advisory roles he has been in. (33:50)</li><li>Eric explains how aDolus came into existence and discusses the complicated software supply chain. (36:40)</li><li>What is an S-bom? How does it differ from a D-bom? (46:02)</li><li>Some advice for listeners who want to start laying the tracks to be on the cutting edge of something or be of value to the cyber security industry. (52:17)&nbsp;</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/ericbyres/" rel="noopener noreferrer" target="_blank">Eric Byres on LinkedIn</a></p><p><a href="https://adolus.com/" rel="noopener noreferrer" target="_blank">aDolus Technology Inc.</a></p><p><strong>Books mentioned:</strong></p><p><a href="https://amzn.to/3ublrlQ" rel="noopener noreferrer" target="_blank">The Cuckoo’s Egg</a> by Cliff Stoll</p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is excited to interview Eric J. Byres, the Founder of and Chief Technology Officer of aDolus Technology Inc., in another episode of the Security Leaders series. Eric is a pioneer in industrial cyber security. He is a technologist, entrepreneur, author, inventor, outdoor enthusiast, and sailor.&nbsp;</p><p>Eric grew up in North Vancouver and later graduated with a Bachelor of Applied Science Degree from The University of British Columbia, focusing on geological engineering and mining operations. He is widely recognized as one of the world’s top experts in the SCADA security field. As the inventor of the Tofino Security technology, Eric and his partner Joann guided the product through its evolution from an academic research project and startup to a successful acquisition by Belden Inc (NYSE: BDC). Tofino received numerous industry awards and was licensed by industry giants such as Honeywell, Schneider Electric, and Caterpillar. Today it is probably the most widely deployed ICS-specific firewall in the world.&nbsp; &nbsp;</p><p>In this episode of the (CS)²AI Podcast, Eric shares his background and discusses his career trajectory. He also offers many gold nuggets of advice for listeners who would like to do a startup, launch a product, be useful for the industry later on, or use what they already have to add value to the cyber security industry.&nbsp;</p><p>This episode is one you will not want to miss if you are looking to start your career in cyber security or considering starting a company in the cyber security space.</p><p><strong>Show highlights:</strong></p><ul><li>Eric started his first business, making and selling root beer when he was about eight years old. He gained some valuable entrepreneurial experience doing that! (2:35)</li><li>His dad bought him a Digi-Comp 1 mechanical digital computer with three bits of memory when he was about eight years old. (5:31)</li><li>Eric's first job after graduating was with a small but prestigious consulting firm that designed mines. They shipped him off to Australia, South Africa, and Columbia. (7:09)</li><li>After three or four years, Eric got out of mining and imbedded himself into the data communications and industrial computer markets. (8:01)</li><li>Eric explains what went on in his early days in control systems. (10:36)</li><li>Writing a peer-reviewed paper for the IEEE on cyber security for control systems while he was at DCIT was a turning point in Eric’s career. (16:30)</li><li>Eric discusses the birth of Tofino Security. (20:35)</li><li>Eric talks about the challenges he faced and offers advice for listeners who would like to follow a similar career path. (22:35)</li><li>Why does he feel that startups have an advantage? (25:48)</li><li>Eric describes the Tofino firewall and explains what is. (26:39)</li><li>Eric talks about his mentors and the advisory roles he has been in. (33:50)</li><li>Eric explains how aDolus came into existence and discusses the complicated software supply chain. (36:40)</li><li>What is an S-bom? How does it differ from a D-bom? (46:02)</li><li>Some advice for listeners who want to start laying the tracks to be on the cutting edge of something or be of value to the cyber security industry. (52:17)&nbsp;</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/ericbyres/" rel="noopener noreferrer" target="_blank">Eric Byres on LinkedIn</a></p><p><a href="https://adolus.com/" rel="noopener noreferrer" target="_blank">aDolus Technology Inc.</a></p><p><strong>Books mentioned:</strong></p><p><a href="https://amzn.to/3ublrlQ" rel="noopener noreferrer" target="_blank">The Cuckoo’s Egg</a> by Cliff Stoll</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">500b2ed9-0ccf-4f78-88c6-aa4fa5140983</guid><itunes:image href="https://artwork.captivate.fm/118a23d0-391b-436f-8925-8f41378f1f58/FxDtuqJph3sQiY4WzeljLBKr.jpg"/><pubDate>Tue, 22 Mar 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3aed5a41-894d-4578-adbf-63b66f4101db/cs2ai-eric-byres-edited-audio.mp3" length="53350821" type="audio/mpeg"/><itunes:duration>55:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode></item><item><title>30: Engineers  Should Consider a Cybersecurity Career with Graham Speake</title><itunes:title>30: Engineers  Should Consider a Cybersecurity Career with Graham Speake</itunes:title><description><![CDATA[<p>Today, Derek Harp is excited to have Graham Speake, the Director of Industrial Security at Waterfall Security Solutions, joining him on the show! Graham started very early on as an engineer in control systems. He is an interesting and well-rounded individual with a long history in engineering.&nbsp;</p><p>Graham was born in Wales and moved to London when he started working. He has been living in America for the past twenty years. He is a senior Cyber Security professional with broad experience leading global Operational Technology (OT) and Information Technology (IT) cybersecurity programs for protecting mission-critical systems and infrastructure. He is an expert in developing and delivering security training courses and security awareness. He has subject-matter expertise in Industrial Control Systems (ICS) and SCADA cybersecurity, particularly in oil and gas majors, and for risk managing large capital value projects and architecting global solutions for Oil and Gas and Industrial Automation customers. He is a music lover, photographer, and world traveler who has recently become an RV traveler. He is also a husband, father, grandfather, and raspberry pie enthusiast!</p><p>In this episode of the (CS)²AI Podcast, Graham talks about his background and career journey and discusses what led him to where he is today. He also offers valuable nuggets of advice for listeners who would like to make a career in or transition into cyber security.</p><p>This is one episode you will not want to miss if you are looking to make a career in the cyber security space or are an engineer and would like to add cyber security to your career path. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Graham's early experiences inspired him to do electrical/ electronic engineering at college and then move into working with electronics and electricity in an industrial setting. (3:13)</li><li>The benefits of having an engineering background. (8:05)</li><li>Graham shares his recommendations for engineers who would like to add cyber security to their professional path. (9:08)</li><li>The US government offers free security training through the Idaho National Laboratory (INL). (10:22)</li><li>Graham talks about the mentorship he received and offers advice for finding a mentor and doing a mentorship exchange. (12:07)</li><li>Security only intersected with his journey much later in his career. (17:16)</li><li>9/11 was a pivot- point in his career. (20:08)</li><li>Graham talks about various types of industrial proprietary communication protocols. (26:04)</li><li>Graham talks about how he got into his interesting role at Yokogawa and how it differed from what he did at BP. (29:58)</li><li>Graham discusses what happened in the security space after being invited to be part of a training course and certification program in 2011. (36:58)</li><li>Learning the basic working vocabulary and terminology is a way to build bridges and get teams from different industries to work together. (42:22)</li><li>Graham explains why he could not say no to working for Waterfall. (54:00)</li><li>Relationships you form early in your career in the security space end up being very powerful later on. (57:40)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://waterfall-security.com/" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a></p><p><a href="https://www.linkedin.com/search/results/all/?keywords=graham%2520speake&amp;origin=RICH_QUERY_SUGGESTION&amp;position=1&amp;searchId=94ecb726-8b32-41b5-bfdd-ee1a1fc451e5&amp;sid=W0p" rel="noopener noreferrer" target="_blank">Graham Speake on LinkedIn</a></p><p><a href="https://inl.gov/critical-infrastructure-protection-training/" rel="noopener noreferrer" target="_blank">INL Critical Infrastructure Protection Training</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is excited to have Graham Speake, the Director of Industrial Security at Waterfall Security Solutions, joining him on the show! Graham started very early on as an engineer in control systems. He is an interesting and well-rounded individual with a long history in engineering.&nbsp;</p><p>Graham was born in Wales and moved to London when he started working. He has been living in America for the past twenty years. He is a senior Cyber Security professional with broad experience leading global Operational Technology (OT) and Information Technology (IT) cybersecurity programs for protecting mission-critical systems and infrastructure. He is an expert in developing and delivering security training courses and security awareness. He has subject-matter expertise in Industrial Control Systems (ICS) and SCADA cybersecurity, particularly in oil and gas majors, and for risk managing large capital value projects and architecting global solutions for Oil and Gas and Industrial Automation customers. He is a music lover, photographer, and world traveler who has recently become an RV traveler. He is also a husband, father, grandfather, and raspberry pie enthusiast!</p><p>In this episode of the (CS)²AI Podcast, Graham talks about his background and career journey and discusses what led him to where he is today. He also offers valuable nuggets of advice for listeners who would like to make a career in or transition into cyber security.</p><p>This is one episode you will not want to miss if you are looking to make a career in the cyber security space or are an engineer and would like to add cyber security to your career path. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Graham's early experiences inspired him to do electrical/ electronic engineering at college and then move into working with electronics and electricity in an industrial setting. (3:13)</li><li>The benefits of having an engineering background. (8:05)</li><li>Graham shares his recommendations for engineers who would like to add cyber security to their professional path. (9:08)</li><li>The US government offers free security training through the Idaho National Laboratory (INL). (10:22)</li><li>Graham talks about the mentorship he received and offers advice for finding a mentor and doing a mentorship exchange. (12:07)</li><li>Security only intersected with his journey much later in his career. (17:16)</li><li>9/11 was a pivot- point in his career. (20:08)</li><li>Graham talks about various types of industrial proprietary communication protocols. (26:04)</li><li>Graham talks about how he got into his interesting role at Yokogawa and how it differed from what he did at BP. (29:58)</li><li>Graham discusses what happened in the security space after being invited to be part of a training course and certification program in 2011. (36:58)</li><li>Learning the basic working vocabulary and terminology is a way to build bridges and get teams from different industries to work together. (42:22)</li><li>Graham explains why he could not say no to working for Waterfall. (54:00)</li><li>Relationships you form early in your career in the security space end up being very powerful later on. (57:40)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://waterfall-security.com/" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a></p><p><a href="https://www.linkedin.com/search/results/all/?keywords=graham%2520speake&amp;origin=RICH_QUERY_SUGGESTION&amp;position=1&amp;searchId=94ecb726-8b32-41b5-bfdd-ee1a1fc451e5&amp;sid=W0p" rel="noopener noreferrer" target="_blank">Graham Speake on LinkedIn</a></p><p><a href="https://inl.gov/critical-infrastructure-protection-training/" rel="noopener noreferrer" target="_blank">INL Critical Infrastructure Protection Training</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">a8cb4f5f-3dc2-4de0-bd77-a732b247f234</guid><itunes:image href="https://artwork.captivate.fm/b8f30ec9-ce4f-4057-af55-0cad68f1040f/HbHUvBAH7ZaBr0LwW7H1yoJi.jpg"/><pubDate>Tue, 15 Mar 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/df6dd6f1-715c-4443-b96d-f13390767b98/cs2ai-graham-speake-edited-audio-revised.mp3" length="61468987" type="audio/mpeg"/><itunes:duration>01:03:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>30</itunes:episode><podcast:episode>30</podcast:episode></item><item><title>29: How to Be a Good CISO Even in the Face of Challenges with Mark Weatherford</title><itunes:title>29: How to Be a Good CISO Even in the Face of Challenges with Mark Weatherford</itunes:title><description><![CDATA[<p>Derek Harp is happy to have Mark Weatherford, the CSO at AlertEnterprise, and the Chief Strategy Officer at the National Cybersecurity Center, joining him today for another episode in the series of security leader interviews!</p><p>Mark grew up on a farm in an agricultural community in Northern California and left the farming life to embark on a career in the Navy and travel the world as a technologist, helping companies in cyberspace. Throughout his career, he always planned to get back into ranching. Apart from being a well-known security leader, Mark is a military veteran, technologist, beekeeper, hunter, pilot, and a soon-to-be rancher and gardener. He is also a husband and father.</p><p>Mark has had various executive-level cybersecurity roles, including Global Information Security Strategist at Booking Holdings, Chief Cybersecurity Strategist at vArmour, a Principal at The Chertoff Group, Chief Security Officer at the North American Electric Reliability Corporation, and Chief Information Security Officer for the state of Colorado. He was appointed in 2008 by Governor Arnold Schwarzenegger to serve as California’s first Chief Information Security Officer. In 2011, he got appointed by the Obama Administration as the Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security.&nbsp;</p><p>Mark is a well-rounded individual who does a variety of interesting things. In this episode of the (CS)²AI Podcast, he shares his backstory and describes his career journey. He talks about the challenge CISOs face today, explains why relationships are vital, and discusses what it takes to be a good CISO today. He also offers some valuable nuggets of career advice for listeners.</p><p>You will not want to miss this episode if you are in a first-time CISO role or considering making a career in cybersecurity. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Growing up, Mark was always playing around with electricity, wiring up motors and lights, and often overloading circuits and blowing breakers. (3:20)</li><li>Mark became a cryptologic technician in the Navy and focused on signals intelligence. (4:50)</li><li>In 1994, Mark wrote his grad school thesis on information security. That changed his life and set the stage for his future. (7:59)</li><li>Mark created the Navy’s first operational red team. (10:14)</li><li>Mark explains why a CISO cannot be an expert today. (12:20)</li><li>Mark got hired as the first CISO for the state of Colorado. It was a great learning experience! (15:06)</li><li>Why is becoming a CISO is all about developing relationships? (19:47)</li><li>Mentoring others is one of the most satisfying things Mark has ever done. (25:28)</li><li>Mark had a lot of influence in his role at DHS. (32:01)</li><li>Some advice for people thinking of taking on CISO roles. (35:34)</li><li>What do you need to focus on and learn if you are aiming for a senior CISO position? (38:24)</li><li>What do people in advisory board roles do? (46:08)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/maweatherford/" rel="noopener noreferrer" target="_blank">Mark Weatherford on LinkedIn</a></p><p><a href="https://alertenterprise.com/" rel="noopener noreferrer" target="_blank">AlertEnterprise</a></p><p><a href="https://cyber-center.org/" rel="noopener noreferrer" target="_blank">National Cybersecurity Center</a></p>]]></description><content:encoded><![CDATA[<p>Derek Harp is happy to have Mark Weatherford, the CSO at AlertEnterprise, and the Chief Strategy Officer at the National Cybersecurity Center, joining him today for another episode in the series of security leader interviews!</p><p>Mark grew up on a farm in an agricultural community in Northern California and left the farming life to embark on a career in the Navy and travel the world as a technologist, helping companies in cyberspace. Throughout his career, he always planned to get back into ranching. Apart from being a well-known security leader, Mark is a military veteran, technologist, beekeeper, hunter, pilot, and a soon-to-be rancher and gardener. He is also a husband and father.</p><p>Mark has had various executive-level cybersecurity roles, including Global Information Security Strategist at Booking Holdings, Chief Cybersecurity Strategist at vArmour, a Principal at The Chertoff Group, Chief Security Officer at the North American Electric Reliability Corporation, and Chief Information Security Officer for the state of Colorado. He was appointed in 2008 by Governor Arnold Schwarzenegger to serve as California’s first Chief Information Security Officer. In 2011, he got appointed by the Obama Administration as the Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security.&nbsp;</p><p>Mark is a well-rounded individual who does a variety of interesting things. In this episode of the (CS)²AI Podcast, he shares his backstory and describes his career journey. He talks about the challenge CISOs face today, explains why relationships are vital, and discusses what it takes to be a good CISO today. He also offers some valuable nuggets of career advice for listeners.</p><p>You will not want to miss this episode if you are in a first-time CISO role or considering making a career in cybersecurity. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Growing up, Mark was always playing around with electricity, wiring up motors and lights, and often overloading circuits and blowing breakers. (3:20)</li><li>Mark became a cryptologic technician in the Navy and focused on signals intelligence. (4:50)</li><li>In 1994, Mark wrote his grad school thesis on information security. That changed his life and set the stage for his future. (7:59)</li><li>Mark created the Navy’s first operational red team. (10:14)</li><li>Mark explains why a CISO cannot be an expert today. (12:20)</li><li>Mark got hired as the first CISO for the state of Colorado. It was a great learning experience! (15:06)</li><li>Why is becoming a CISO is all about developing relationships? (19:47)</li><li>Mentoring others is one of the most satisfying things Mark has ever done. (25:28)</li><li>Mark had a lot of influence in his role at DHS. (32:01)</li><li>Some advice for people thinking of taking on CISO roles. (35:34)</li><li>What do you need to focus on and learn if you are aiming for a senior CISO position? (38:24)</li><li>What do people in advisory board roles do? (46:08)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/maweatherford/" rel="noopener noreferrer" target="_blank">Mark Weatherford on LinkedIn</a></p><p><a href="https://alertenterprise.com/" rel="noopener noreferrer" target="_blank">AlertEnterprise</a></p><p><a href="https://cyber-center.org/" rel="noopener noreferrer" target="_blank">National Cybersecurity Center</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">73657ac2-a995-4857-bb34-972791d72c58</guid><itunes:image href="https://artwork.captivate.fm/0fa37275-565b-479e-be01-a44683ac44cb/klnA_TL4gWGmQarTzaUVuU_c.jpg"/><pubDate>Tue, 08 Mar 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/68f3477e-b48d-4531-ab8e-048fd9d0609b/cs2ai-mark-weatherford-edited-audio.mp3" length="26520034" type="audio/mpeg"/><itunes:duration>54:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode></item><item><title>28: Threat Hunting and Other Headline Making Cyber Security Careers with Mark Bristow</title><itunes:title>28: Threat Hunting and Other Headline Making Cyber Security Careers with Mark Bristow</itunes:title><description><![CDATA[<p>Today, Derek Harp is excited to have Mark Bristow joining him for another episode in the interview series on security leaders! Mark is well-known in the cyber security industry. He is the Branch Chief for Cyber Defense Coordination and Operations for threat hunting at the Department of Homeland Security.</p><p>Mark found his first bug in an ISV system when he was ten years old. As a teenager, he was passionate about technology and spent much of his time discovering what he could do with his computer and the nascent internet. He later earned a Computer Engineering degree from Penn State.&nbsp;</p><p>Mark has been at the forefront of headline-making incident response efforts like the attack on the Ukrainian power grid, intrusions into U.S. election infrastructure, and Russian attempts to gain access to the U.S. power grid. He often does talks on worldwide industrial control systems security issues. He enjoys sharing his knowledge about the protection of critical infrastructure and using his real-life experience to help students relate the information to scenarios in the field. He is also a pilot-in-training and a scuba diver!&nbsp;</p><p>Mark had access to control systems as a young child, and as a result, he developed a breaker mindset quite early on. In this episode, he tells his story, talks about his background and career, and shares his unique perspective on cyber security. He talks about working for the government and offers some nuggets of career advice for people thinking of making a career in cyber security or those currently doing development in systems design and would like to specialize in cyber security.&nbsp;</p><p>If you are thinking of making a career in cyber security, you will learn a lot from today’s interview with Mark Bristow! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The role Mark’s father played in him becoming an early adopter of technology (3:11)</li><li>How he found a bug in an ISV system at the age of ten. (5:14)</li><li>Mark figured out how to bypass the safety controls and make the computer drop the space shuttle's engines before they were supposed to. (8:14)</li><li>How Mark transitioned from doing programming to doing cyber security professionally. (11:25)</li><li>Mark explains how programming mattered and helped him in his career journey. (13:23)</li><li>Some nuggets of advice for programmers who want to add something to their career path by specializing in cyber security. (16:02)</li><li>A nugget of advice for what you should do when you receive a job offer. (19:48)</li><li>The mentors and people who opened doors for Mark along his career path. (23:21)</li><li>What is it like working for the government? (24:37)</li><li>Mark explains why he pivoted to become a federal employee. (30:40)</li><li>Everyone in the cyber security industry is open to helping each other and offering advice. (35:51)</li><li>What you can do right now to become sought-after and successful in five to ten years. (37:29)</li><li>Mark explains his job title and talks about what he does. (45:29)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/markbristow/" rel="noopener noreferrer" target="_blank">Mark Bristow on LinkedIn</a></p><p><a href="https://www.cisa.gov/" rel="noopener noreferrer" target="_blank">CISA</a></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is excited to have Mark Bristow joining him for another episode in the interview series on security leaders! Mark is well-known in the cyber security industry. He is the Branch Chief for Cyber Defense Coordination and Operations for threat hunting at the Department of Homeland Security.</p><p>Mark found his first bug in an ISV system when he was ten years old. As a teenager, he was passionate about technology and spent much of his time discovering what he could do with his computer and the nascent internet. He later earned a Computer Engineering degree from Penn State.&nbsp;</p><p>Mark has been at the forefront of headline-making incident response efforts like the attack on the Ukrainian power grid, intrusions into U.S. election infrastructure, and Russian attempts to gain access to the U.S. power grid. He often does talks on worldwide industrial control systems security issues. He enjoys sharing his knowledge about the protection of critical infrastructure and using his real-life experience to help students relate the information to scenarios in the field. He is also a pilot-in-training and a scuba diver!&nbsp;</p><p>Mark had access to control systems as a young child, and as a result, he developed a breaker mindset quite early on. In this episode, he tells his story, talks about his background and career, and shares his unique perspective on cyber security. He talks about working for the government and offers some nuggets of career advice for people thinking of making a career in cyber security or those currently doing development in systems design and would like to specialize in cyber security.&nbsp;</p><p>If you are thinking of making a career in cyber security, you will learn a lot from today’s interview with Mark Bristow! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The role Mark’s father played in him becoming an early adopter of technology (3:11)</li><li>How he found a bug in an ISV system at the age of ten. (5:14)</li><li>Mark figured out how to bypass the safety controls and make the computer drop the space shuttle's engines before they were supposed to. (8:14)</li><li>How Mark transitioned from doing programming to doing cyber security professionally. (11:25)</li><li>Mark explains how programming mattered and helped him in his career journey. (13:23)</li><li>Some nuggets of advice for programmers who want to add something to their career path by specializing in cyber security. (16:02)</li><li>A nugget of advice for what you should do when you receive a job offer. (19:48)</li><li>The mentors and people who opened doors for Mark along his career path. (23:21)</li><li>What is it like working for the government? (24:37)</li><li>Mark explains why he pivoted to become a federal employee. (30:40)</li><li>Everyone in the cyber security industry is open to helping each other and offering advice. (35:51)</li><li>What you can do right now to become sought-after and successful in five to ten years. (37:29)</li><li>Mark explains his job title and talks about what he does. (45:29)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/markbristow/" rel="noopener noreferrer" target="_blank">Mark Bristow on LinkedIn</a></p><p><a href="https://www.cisa.gov/" rel="noopener noreferrer" target="_blank">CISA</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">8fbcd9b3-0313-4ef3-a937-81f80a87b8ea</guid><itunes:image href="https://artwork.captivate.fm/b2c26d63-c10c-49f2-b7bd-58dd48fad583/FNfkKbeZatVkeNUhYHr_Nk4b.jpg"/><pubDate>Tue, 01 Mar 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7cecd5e5-ec83-4085-ae2f-31cc1ee8cd32/cs2ai-mark-bristol-edited-audio.mp3" length="25165127" type="audio/mpeg"/><itunes:duration>51:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode></item><item><title>27: The Fundamentals of Building a Cyber Security Business with Jeff Hussey</title><itunes:title>27: The Fundamentals of Building a Cyber Security Business with Jeff Hussey</itunes:title><description><![CDATA[<p>Today, Jeff Hussey joins Derek Harp for another podcast in the Security Leader interview series.&nbsp;</p><p>Jeff is the Co-Founder, President, and CEO of Tempered. He is a serial entrepreneur who has accomplished a lot throughout his career. He founded and co-founded several companies, including the well-known F5 Networks. He is a professional board member of various businesses- both for-profit and not-for-profit. He has worked hard to make the internet more resilient, hardened, and secure, bring clean water to underprivileged countries, and enrich his community through the arts. He has also been funding and broadening technology innovation and cultivating better living standards for coffee growers in Latin America. Jeff is also a speaker, mountain climber, wine-maker, father, and lover of all things tech!</p><p>Starting from a very young age, Jeff has always been passionate about technology and communications! In this episode of the (CS)²AI Podcast, he talks about his background, his love of tech, the various businesses he started, and founding Tempered. He shares nuggets of advice around getting down to the fundamentals of what you are studying, dealing with customers, and networking, and offers some valuable tips for moving forward in the cyber security industry.&nbsp;&nbsp;</p><p>You won’t want to miss this episode if you are starting a career in cyber security or if you are in a similar field and considering a career change! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Jeff explains why he creates his own jobs. (3:53)</li><li>Jeff talks about his passion for tech and communications. (4:33)</li><li>How the first company Jeff started became the first internet service provider in Honolulu. (9:28)</li><li>The increasing internet traffic inspired Jeff to start his next business in 1996. (10:29)</li><li>Jeff discusses his initial foray into security and explains how the security paradigm changed after that. (12:25)</li><li>How his dad used to advise and help him early in his career. (16:30)</li><li>What he did to deepen his knowledge and become more effective in his career role. (18:01)</li><li>Jeff offers some excellent advice for dealing efficiently and effectively with customers. (22:05)</li><li>Jeff talks about his company, Tempered. (25:53)</li><li>Jeff explains what the host identity protocol does and how his company, Tempered, approaches it to create a hyper-secure network. (30:42)</li><li>Jeff shares his views on corporate culture. (34:16)</li><li>Jeff explains what excites him about the Airwall Solution that Tempered brought to market. (42:50)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/jeff-hussey-a6628a7/" rel="noopener noreferrer" target="_blank">Jeff Hussey on LinkedIn</a></p><p><a href="https://www.tempered.io/" rel="noopener noreferrer" target="_blank">Tempered</a></p><p><strong>Books mentioned in the show:</strong></p><p>Steven’s TCP/IP Illustrated Volumes 1 and 2</p>]]></description><content:encoded><![CDATA[<p>Today, Jeff Hussey joins Derek Harp for another podcast in the Security Leader interview series.&nbsp;</p><p>Jeff is the Co-Founder, President, and CEO of Tempered. He is a serial entrepreneur who has accomplished a lot throughout his career. He founded and co-founded several companies, including the well-known F5 Networks. He is a professional board member of various businesses- both for-profit and not-for-profit. He has worked hard to make the internet more resilient, hardened, and secure, bring clean water to underprivileged countries, and enrich his community through the arts. He has also been funding and broadening technology innovation and cultivating better living standards for coffee growers in Latin America. Jeff is also a speaker, mountain climber, wine-maker, father, and lover of all things tech!</p><p>Starting from a very young age, Jeff has always been passionate about technology and communications! In this episode of the (CS)²AI Podcast, he talks about his background, his love of tech, the various businesses he started, and founding Tempered. He shares nuggets of advice around getting down to the fundamentals of what you are studying, dealing with customers, and networking, and offers some valuable tips for moving forward in the cyber security industry.&nbsp;&nbsp;</p><p>You won’t want to miss this episode if you are starting a career in cyber security or if you are in a similar field and considering a career change! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Jeff explains why he creates his own jobs. (3:53)</li><li>Jeff talks about his passion for tech and communications. (4:33)</li><li>How the first company Jeff started became the first internet service provider in Honolulu. (9:28)</li><li>The increasing internet traffic inspired Jeff to start his next business in 1996. (10:29)</li><li>Jeff discusses his initial foray into security and explains how the security paradigm changed after that. (12:25)</li><li>How his dad used to advise and help him early in his career. (16:30)</li><li>What he did to deepen his knowledge and become more effective in his career role. (18:01)</li><li>Jeff offers some excellent advice for dealing efficiently and effectively with customers. (22:05)</li><li>Jeff talks about his company, Tempered. (25:53)</li><li>Jeff explains what the host identity protocol does and how his company, Tempered, approaches it to create a hyper-secure network. (30:42)</li><li>Jeff shares his views on corporate culture. (34:16)</li><li>Jeff explains what excites him about the Airwall Solution that Tempered brought to market. (42:50)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a></p><p><a href="https://www.linkedin.com/in/jeff-hussey-a6628a7/" rel="noopener noreferrer" target="_blank">Jeff Hussey on LinkedIn</a></p><p><a href="https://www.tempered.io/" rel="noopener noreferrer" target="_blank">Tempered</a></p><p><strong>Books mentioned in the show:</strong></p><p>Steven’s TCP/IP Illustrated Volumes 1 and 2</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">a9b60a2c-83a8-45ea-af28-70ac7d4a9821</guid><itunes:image href="https://artwork.captivate.fm/536ee70e-c7d1-46ac-bb79-a62009d05a8c/q7U8HBd1WDqNANUzbEnlck3b.jpg"/><pubDate>Tue, 22 Feb 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ee84eb4f-caa9-454c-a3ed-6da340c62fde/cs2ai-jeff-hussey-edited-audio.mp3" length="18916665" type="audio/mpeg"/><itunes:duration>38:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode></item><item><title>26: Starting Your Own Cyber  Security Business with Albert Rooyakkers</title><itunes:title>26: Starting Your Own Cyber  Security Business with Albert Rooyakkers</itunes:title><description><![CDATA[<p>Albert Rooyakkers, the CEO and Founder of Bedrock Automation, joins Derek Harp today for another episode in the Security Leaders series. Albert is a well-known technologist in the cyber security industry. He is also an inventor, a motorhead, and a keen outdoorsman.&nbsp;</p><p>Albert was born and raised in Canada. After finishing high school, he went to the Southern Alberta Institute of Technology to learn about instrumentation and process control. After completing his studies, he spent sixteen years working at Foxboro, where he went from Sales to Applications to Projects and eventually into management. Foxboro later became Invensys and sent Albert to the Middle East. He loved that because the Middle East is a fascinating place!</p><p>Albert once described himself as a future enthusiast because the future excites him so much! In this episode of the (CS)²AI Podcast, he discusses his background, education, and career path. He talks about his early work experiences, dives into the founding of Bedrock Automation, and discusses the exciting transition to run Bedrock. He also shares some nuggets of advice for getting ahead in your career and talks about the exciting changes we can look forward to seeing in the future.</p><p>If you have spent most of your career working for one or two companies and are thinking about starting a business of your own, you are sure to gain a lot from today’s inspiring conversation with Albert Rooyakkers. Listen in to hear more!</p><p><strong>Show highlights:</strong></p><ul><li>Albert worked on big projects while at Foxboro and often traveled internationally. (3:01)</li><li>Albert grew up with family businesses, so he knew starting a business would involve a lot of hard work. (4:10)</li><li>Why did he become a young workaholic while working in their family businesses in Canada? (5:29)</li><li>Albert talks about the best and most rewarding years of his life while starting Bedrock. (7:35)</li><li>What Albert believes is the most comprehensive learning experience imaginable. (8:55)</li><li>Jumping from Invensys to Maxim and then jumping from Maxim to Bedrock. (9:28)</li><li>Some advice for actualizing an idea or design that relates to the company you are in. (13:18)</li><li>Cyber violates the premise of automation. Albert explains how we can solve that right here in the USA. (18:29)</li><li>Building and maintaining relationships is vital. (25:14)</li><li>Great technology moves beyond technology and becomes art. When presented in the right way, that inspires people to use it. (28:31)</li><li>Some advice for overcoming challenges, growing, and evolving along your career journey. (32:57)</li><li>What excites Albert about the future? (38:51)</li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Albert Rooyakkers, the CEO and Founder of Bedrock Automation, joins Derek Harp today for another episode in the Security Leaders series. Albert is a well-known technologist in the cyber security industry. He is also an inventor, a motorhead, and a keen outdoorsman.&nbsp;</p><p>Albert was born and raised in Canada. After finishing high school, he went to the Southern Alberta Institute of Technology to learn about instrumentation and process control. After completing his studies, he spent sixteen years working at Foxboro, where he went from Sales to Applications to Projects and eventually into management. Foxboro later became Invensys and sent Albert to the Middle East. He loved that because the Middle East is a fascinating place!</p><p>Albert once described himself as a future enthusiast because the future excites him so much! In this episode of the (CS)²AI Podcast, he discusses his background, education, and career path. He talks about his early work experiences, dives into the founding of Bedrock Automation, and discusses the exciting transition to run Bedrock. He also shares some nuggets of advice for getting ahead in your career and talks about the exciting changes we can look forward to seeing in the future.</p><p>If you have spent most of your career working for one or two companies and are thinking about starting a business of your own, you are sure to gain a lot from today’s inspiring conversation with Albert Rooyakkers. Listen in to hear more!</p><p><strong>Show highlights:</strong></p><ul><li>Albert worked on big projects while at Foxboro and often traveled internationally. (3:01)</li><li>Albert grew up with family businesses, so he knew starting a business would involve a lot of hard work. (4:10)</li><li>Why did he become a young workaholic while working in their family businesses in Canada? (5:29)</li><li>Albert talks about the best and most rewarding years of his life while starting Bedrock. (7:35)</li><li>What Albert believes is the most comprehensive learning experience imaginable. (8:55)</li><li>Jumping from Invensys to Maxim and then jumping from Maxim to Bedrock. (9:28)</li><li>Some advice for actualizing an idea or design that relates to the company you are in. (13:18)</li><li>Cyber violates the premise of automation. Albert explains how we can solve that right here in the USA. (18:29)</li><li>Building and maintaining relationships is vital. (25:14)</li><li>Great technology moves beyond technology and becomes art. When presented in the right way, that inspires people to use it. (28:31)</li><li>Some advice for overcoming challenges, growing, and evolving along your career journey. (32:57)</li><li>What excites Albert about the future? (38:51)</li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">efd608bc-0fa2-4c7a-929c-87a7d18e219c</guid><itunes:image href="https://artwork.captivate.fm/13ec2089-1e70-4ddc-8bed-a138a8b14a73/EappYAJGil7G-ZwP3nW7N_ul.jpg"/><pubDate>Tue, 15 Feb 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cda3cc4c-459e-4929-bbc8-36e2d67e465e/cs2ai-albert-rooyakkers-edited-audio.mp3" length="22934972" type="audio/mpeg"/><itunes:duration>47:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode></item><item><title>25: Exploring Careers in the Cybersecurity Controls Niche with Fred Gordy</title><itunes:title>25: Exploring Careers in the Cybersecurity Controls Niche with Fred Gordy</itunes:title><description><![CDATA[<p>Today, Derek Harp interviews Fred Gordy in another episode in the Security Leaders series. Fred is the Director of Cyber Security at Intelligent Buildings.</p><p>Fred hails from Atlanta, Georgia. He is an author, musician, woodworker, technologist, travel enthusiast, and grandfather. He is also well-known as an evangelist around cyber security for building control systems and building management.</p><p>Fred has worked with electronics, computers, IT, and even robotics along his career path. He had his first computer experience back in the days of basic programming in the mid-1980s when he did electronic engineering technology at college. Although his direction as an electronic engineer in technology should have been to get in on a board level, he was always more fascinated with the computer part.</p><p>In this episode of the (CS)²AI Podcast, Fred tells his story, discusses his career trajectory, and talks about the highlights of his career. He shares his insights and experience and offers some helpful nuggets of advice for listeners considering a career in the controls space. If you are at the entry-level of our industry and wondering where to go next, you will not want to miss this episode! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Fred had the opportunity to experience control systems when doing an internship while in college. (5:01)</li><li>How Fred inadvertently got exposed to computer control systems early on in his career. (6:27)</li><li>Having had a computer background before moving into the world of control systems allowed him to speak both languages. It helped him a lot in his career. (8:15)</li><li>Fred sees a career role emerging that will require individuals to know the full range of IT and OT. They need to understand computers and control systems. (9:01)</li><li>Fred discusses the work that Intelligent Buildings does in the commercial real estate industry. (13:03)</li><li>How buildings intersected with his career path. (14:22)</li><li>For Fred, there is nothing quite as exhilarating as having the power, capability, and know-how to make a massive piece of equipment work in concert with hundreds of other devices. (15:55)</li><li>Everything Fred has done in his life has in some way built upon itself. It's why he encourages listeners to draw on all their experiences, no matter how small they might seem. (17:40)</li><li>Fred talks about overcoming challenges. (21:40)</li><li>When he started his career, he knew little about what he was doing. He attributes his success to the mentors who helped him, encouraged him, and ignited his inner fire. (28:00)</li><li>Fred discusses ways to get people in different areas of the building-control space to work better together. (36:18)</li><li>Fred believes that the path for people in the controls industry will become easier now, since the advent of the MSI (Master System Integrator). (44:38)</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp interviews Fred Gordy in another episode in the Security Leaders series. Fred is the Director of Cyber Security at Intelligent Buildings.</p><p>Fred hails from Atlanta, Georgia. He is an author, musician, woodworker, technologist, travel enthusiast, and grandfather. He is also well-known as an evangelist around cyber security for building control systems and building management.</p><p>Fred has worked with electronics, computers, IT, and even robotics along his career path. He had his first computer experience back in the days of basic programming in the mid-1980s when he did electronic engineering technology at college. Although his direction as an electronic engineer in technology should have been to get in on a board level, he was always more fascinated with the computer part.</p><p>In this episode of the (CS)²AI Podcast, Fred tells his story, discusses his career trajectory, and talks about the highlights of his career. He shares his insights and experience and offers some helpful nuggets of advice for listeners considering a career in the controls space. If you are at the entry-level of our industry and wondering where to go next, you will not want to miss this episode! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Fred had the opportunity to experience control systems when doing an internship while in college. (5:01)</li><li>How Fred inadvertently got exposed to computer control systems early on in his career. (6:27)</li><li>Having had a computer background before moving into the world of control systems allowed him to speak both languages. It helped him a lot in his career. (8:15)</li><li>Fred sees a career role emerging that will require individuals to know the full range of IT and OT. They need to understand computers and control systems. (9:01)</li><li>Fred discusses the work that Intelligent Buildings does in the commercial real estate industry. (13:03)</li><li>How buildings intersected with his career path. (14:22)</li><li>For Fred, there is nothing quite as exhilarating as having the power, capability, and know-how to make a massive piece of equipment work in concert with hundreds of other devices. (15:55)</li><li>Everything Fred has done in his life has in some way built upon itself. It's why he encourages listeners to draw on all their experiences, no matter how small they might seem. (17:40)</li><li>Fred talks about overcoming challenges. (21:40)</li><li>When he started his career, he knew little about what he was doing. He attributes his success to the mentors who helped him, encouraged him, and ignited his inner fire. (28:00)</li><li>Fred discusses ways to get people in different areas of the building-control space to work better together. (36:18)</li><li>Fred believes that the path for people in the controls industry will become easier now, since the advent of the MSI (Master System Integrator). (44:38)</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">94b5fb6f-8ca9-4130-8d0e-ca2e3341d58b</guid><itunes:image href="https://artwork.captivate.fm/b8073d7f-c935-4199-8dbc-a8da5c7feac2/LQA99WK9vc1NsdcBbT1JG2v3.jpg"/><pubDate>Tue, 08 Feb 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8e8bfb8a-3d36-4310-b054-125525567bad/cs2ai-fred-gordy-edited-audio.mp3" length="46677437" type="audio/mpeg"/><itunes:duration>48:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode></item><item><title>24: Cybersecurity Careers in Real Estate and Other Niches with Bayron Lopez</title><itunes:title>24: Cybersecurity Careers in Real Estate and Other Niches with Bayron Lopez</itunes:title><description><![CDATA[<p>Bayron Lopez joins Derek Harp today for another podcast episode in the Security Leader series. Bayron is the Manager of Operational Technology at Kilroy Realty Corporation, a real estate investment trust company specializing in developing, acquiring, and managing real estate assets, primarily in Seattle, San Francisco, LA, and San Diego. Those four strategic areas encompass about fourteen million Class A commercial real estates. Bayron is responsible for the operational technology and security of those estates.&nbsp;</p><p>Bayron was born in El Salvador and grew up in South Central Los Angeles. While in high school, he had an excellent teacher and mentors who were designing aircraft and large buildings. They exposed him to multiple areas of engineering, including electrical, mechanical, civil, and aerospace. Bayron was very lucky to have that exposure because it was unusual for kids from the South Central Los Angeles neighborhood to get introduced to the world of engineering.</p><p>Bayron likes to see an objective outlined and then get things done. He has a degree in engineering and is a keen technologist. He is also a soccer fan and dreamer who likes to look ahead at what is coming up just beyond the horizon. In this episode of the (CS)²AI Podcast, he talks about his background and discusses his educational journey. He explains why he chose to work for a real estate company after graduating and talks about his current position at Kilroy. He also shares some valuable nuggets for people starting in cyber security or those who would like to get involved in the space.</p><p>Cyber security is going to become a cornerstone for buildings in the future. If you are thinking about getting into the field, you will gain a lot from this episode! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>When he was in high school, Bayron decided to become an engineer and find something in that space that worked for him. He talks about the study program he chose. (3:58)</li><li>Bayron explains why he went to work for a real estate company after he graduated. (6:41)</li><li>How the idea of having an Operational Technology Manager came in at Kilroy. (8:45)</li><li>Bayron talks about the challenges he has faced since becoming Kilroy’s Operational Technology Manager. (10:28)</li><li>A strategy for creating a valuable security solution. (13:04)</li><li>Bayron discusses the day-to-day operations in his current position at Kilroy. (15:50)</li><li>The luxury of new builds versus retrofitting onto existing buildings. (19:44)</li><li>Some advice from Bayron for his younger self. (21:23)</li><li>A way in and some words of wisdom for individuals wanting to get into the security of building control systems. ( 22:38)</li><li>There are currently many different opportunities for specializing in the cyber security industry as it pertains to building systems. (26:38)</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Bayron Lopez joins Derek Harp today for another podcast episode in the Security Leader series. Bayron is the Manager of Operational Technology at Kilroy Realty Corporation, a real estate investment trust company specializing in developing, acquiring, and managing real estate assets, primarily in Seattle, San Francisco, LA, and San Diego. Those four strategic areas encompass about fourteen million Class A commercial real estates. Bayron is responsible for the operational technology and security of those estates.&nbsp;</p><p>Bayron was born in El Salvador and grew up in South Central Los Angeles. While in high school, he had an excellent teacher and mentors who were designing aircraft and large buildings. They exposed him to multiple areas of engineering, including electrical, mechanical, civil, and aerospace. Bayron was very lucky to have that exposure because it was unusual for kids from the South Central Los Angeles neighborhood to get introduced to the world of engineering.</p><p>Bayron likes to see an objective outlined and then get things done. He has a degree in engineering and is a keen technologist. He is also a soccer fan and dreamer who likes to look ahead at what is coming up just beyond the horizon. In this episode of the (CS)²AI Podcast, he talks about his background and discusses his educational journey. He explains why he chose to work for a real estate company after graduating and talks about his current position at Kilroy. He also shares some valuable nuggets for people starting in cyber security or those who would like to get involved in the space.</p><p>Cyber security is going to become a cornerstone for buildings in the future. If you are thinking about getting into the field, you will gain a lot from this episode! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>When he was in high school, Bayron decided to become an engineer and find something in that space that worked for him. He talks about the study program he chose. (3:58)</li><li>Bayron explains why he went to work for a real estate company after he graduated. (6:41)</li><li>How the idea of having an Operational Technology Manager came in at Kilroy. (8:45)</li><li>Bayron talks about the challenges he has faced since becoming Kilroy’s Operational Technology Manager. (10:28)</li><li>A strategy for creating a valuable security solution. (13:04)</li><li>Bayron discusses the day-to-day operations in his current position at Kilroy. (15:50)</li><li>The luxury of new builds versus retrofitting onto existing buildings. (19:44)</li><li>Some advice from Bayron for his younger self. (21:23)</li><li>A way in and some words of wisdom for individuals wanting to get into the security of building control systems. ( 22:38)</li><li>There are currently many different opportunities for specializing in the cyber security industry as it pertains to building systems. (26:38)</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">57be914e-65fd-4b9b-b6d9-bee718077324</guid><itunes:image href="https://artwork.captivate.fm/d30d8025-0b5c-4791-ae53-08b686639cee/IIcc48NdV4jO65t8TB3XoVdZ.jpg"/><pubDate>Tue, 01 Feb 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f1ff51d1-4e49-4620-bc54-daf44fd2b5a4/cs2ai-bayron-lopez-edited-vaudio.mp3" length="31936390" type="audio/mpeg"/><itunes:duration>33:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode></item><item><title>23: Transitioning from IT to OT to Cybersecurity with Bryan Singer</title><itunes:title>23: Transitioning from IT to OT to Cybersecurity with Bryan Singer</itunes:title><description><![CDATA[<p>Derek Harp is excited to have Bryan Singer join him today for an episode in the Security Leader interview series!&nbsp;</p><p>Bryan is a true pioneer in the cyber security space! He has an extensive background in several industries, including manufacturing, DoD, and healthcare. His proven professional skills include system architecture and design, software project management, application development, system administration, network administration, database design and administration, and multi-tier support. Currently, he is Principal Director of Security Innovation at Accenture.</p><p>Bryan was born in Mountain Home, Idaho. His father was a pilot in the air force, so they lived in many different places across the country while he was growing up. He spent most of his childhood in Alabama, and he remembers being the coolest kid on the street because he had an Apple 2 Plus computer with two five-and-a-quarter-inch floppy drives. Watching WarGames inspired him to become a hacker, but he soon realized that hacking was not quite what it appeared to be on television!</p><p>In this episode of the (CS)²AI Podcast, Bryan shares his superhero backstory, talks about his career journey, and discusses the valuable lessons he learned early on that he could apply later in his career. He also shares some helpful nuggets for people either considering a career in cyber security or crossing over from other areas in IT or OT. If you are interested in cyber security, stay tuned. You will not want to miss this informative episode!</p><p><strong>Show highlights:</strong></p><ul><li>Bryan talks about when he first got an itch for hacking. (1:23)</li><li>Immediately after high school, he joined the army. He worked in Intelligence and got exposed to computer and network security, now known as cyber security. (3:40)</li><li>Bryan started his career doing software development. (4:58)</li><li>Bryan describes his first experience of dealing with a compromise. (7:00)</li><li>Having a deep systems background has been helpful when diagnosing other problems later in his career. (8:43)</li><li>What Bryan tells people when they ask him how he got involved in cyber security. (9:34)</li><li>How he ended up being Chairman of the ISA-99 Security Committee. (12:34)</li><li>Bryan discusses mentorship and explains how he managed to connect with mentors in the world of industrial safety. (17:12)</li><li>How to get involved in the standards bodies early on in your career. (21:51)</li><li>The advice Bryan would give to his younger self. (29:34)</li><li>Some helpful advice for facing challenges. (33:14)</li><li>The impact of the pandemic on the cyber security industry. (34:01)</li><li>Bryan discusses the things he chose to do in his career, outside of what his job required. (35:52)</li><li>Bryan co-authored two books. (36:14)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p><a href="https://www.accenture.com/us-en" rel="noopener noreferrer" target="_blank">Accenture</a></p><p>Bryan L Singer on&nbsp;<a href="https://www.linkedin.com/in/bryanlsinger/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><strong>Resources:</strong></p><p>The books Bryan co-authored:&nbsp;</p><p><a href="https://www.amazon.com/-/es/gp/product/B0071ART60/ref=dbs_a_def_rwt_hsch_vapi_tkin_p1_i1" rel="noopener noreferrer" target="_blank">Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS</a></p><p><a href="https://www.amazon.com/-/es/gp/product/B01L4UGJKE/ref=dbs_a_def_rwt_hsch_vapi_tkin_p1_i0" rel="noopener noreferrer" target="_blank">Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets &amp; Solutions</a></p>]]></description><content:encoded><![CDATA[<p>Derek Harp is excited to have Bryan Singer join him today for an episode in the Security Leader interview series!&nbsp;</p><p>Bryan is a true pioneer in the cyber security space! He has an extensive background in several industries, including manufacturing, DoD, and healthcare. His proven professional skills include system architecture and design, software project management, application development, system administration, network administration, database design and administration, and multi-tier support. Currently, he is Principal Director of Security Innovation at Accenture.</p><p>Bryan was born in Mountain Home, Idaho. His father was a pilot in the air force, so they lived in many different places across the country while he was growing up. He spent most of his childhood in Alabama, and he remembers being the coolest kid on the street because he had an Apple 2 Plus computer with two five-and-a-quarter-inch floppy drives. Watching WarGames inspired him to become a hacker, but he soon realized that hacking was not quite what it appeared to be on television!</p><p>In this episode of the (CS)²AI Podcast, Bryan shares his superhero backstory, talks about his career journey, and discusses the valuable lessons he learned early on that he could apply later in his career. He also shares some helpful nuggets for people either considering a career in cyber security or crossing over from other areas in IT or OT. If you are interested in cyber security, stay tuned. You will not want to miss this informative episode!</p><p><strong>Show highlights:</strong></p><ul><li>Bryan talks about when he first got an itch for hacking. (1:23)</li><li>Immediately after high school, he joined the army. He worked in Intelligence and got exposed to computer and network security, now known as cyber security. (3:40)</li><li>Bryan started his career doing software development. (4:58)</li><li>Bryan describes his first experience of dealing with a compromise. (7:00)</li><li>Having a deep systems background has been helpful when diagnosing other problems later in his career. (8:43)</li><li>What Bryan tells people when they ask him how he got involved in cyber security. (9:34)</li><li>How he ended up being Chairman of the ISA-99 Security Committee. (12:34)</li><li>Bryan discusses mentorship and explains how he managed to connect with mentors in the world of industrial safety. (17:12)</li><li>How to get involved in the standards bodies early on in your career. (21:51)</li><li>The advice Bryan would give to his younger self. (29:34)</li><li>Some helpful advice for facing challenges. (33:14)</li><li>The impact of the pandemic on the cyber security industry. (34:01)</li><li>Bryan discusses the things he chose to do in his career, outside of what his job required. (35:52)</li><li>Bryan co-authored two books. (36:14)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a>&nbsp;</p><p><a href="https://www.accenture.com/us-en" rel="noopener noreferrer" target="_blank">Accenture</a></p><p>Bryan L Singer on&nbsp;<a href="https://www.linkedin.com/in/bryanlsinger/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><strong>Resources:</strong></p><p>The books Bryan co-authored:&nbsp;</p><p><a href="https://www.amazon.com/-/es/gp/product/B0071ART60/ref=dbs_a_def_rwt_hsch_vapi_tkin_p1_i1" rel="noopener noreferrer" target="_blank">Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS</a></p><p><a href="https://www.amazon.com/-/es/gp/product/B01L4UGJKE/ref=dbs_a_def_rwt_hsch_vapi_tkin_p1_i0" rel="noopener noreferrer" target="_blank">Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets &amp; Solutions</a></p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">da669dc2-a3fe-4ba1-81b0-baf4082c00e9</guid><itunes:image href="https://artwork.captivate.fm/4a2380ff-05c5-4443-8254-a39516af6890/zAC8QEV_mx5-7PxdS2tp2WXN.jpg"/><pubDate>Tue, 25 Jan 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b17db6fc-bbb8-4f00-9d8c-326f7134a3e0/cs2ai-bryan-singer-edited-audio.mp3" length="42451371" type="audio/mpeg"/><itunes:duration>43:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode></item><item><title>22: Niching Down Within the CyberSecurity Industry with Daryl Haegley</title><itunes:title>22: Niching Down Within the CyberSecurity Industry with Daryl Haegley</itunes:title><description><![CDATA[<p>Today, Daryl Haegley joins Derek Harp for another episode in the Security Leader interview series! Daryl was a military officer and then became a civilian in DOD (Department of Defense) operations. He is now the Director of Mission Assurance and Cyber Deterrence for the DOD.&nbsp;</p><p>Daryl has always been fascinated with technology. He links his fascination to the intrigue he felt when watching Star Trek episodes with his father and brothers as a child and seeing how much simpler technology can make people’s lives.&nbsp;</p><p>Even though Daryl became one of the early cyber security pioneers, technology did not lead him to where he finds himself today.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Daryl tells his story, talks about his journey, discusses his choices, and explains how his career path led him to where he is today. He discusses some of the practices he employed along his career path that could be valuable when selecting a specific line of work. He also talks about how individuals in the military can increase their value to the outside world and explains where people can get formal or informal security training.&nbsp;</p><p>You will not want to miss this episode if you are leaning toward a career in the cyber security field, so stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The path leading Daryl to where he is today did not proceed through technology. (4:42)</li><li>After completing his RTC in the Navy, Daryl thought he was done with school, but he went on to get three master’s degrees. (6:36)</li><li>Daryl talks about crossing over from college RTC to become a cryptologist. (7:45)</li><li>An important lesson he learned from history is about defense. (9:01)</li><li>Today, Daryl still references some of the lessons he learned from his early experiences in his naval career. (11:44)</li><li>Some advice for how individuals who are still in military service can strengthen their resumes and increase their value to the outside world. (14:24)</li><li>Daryl discusses some areas where individuals can get either formal or informal security training. (15:53)</li><li>Daryl talks about control systems and explains how they first intersected with his career. (16:55)</li><li>Daryl shares some highlights of his career and discusses some of the things he would do differently today. (20:19)</li><li>How mentorship has played out on his career path. (24:01)</li><li>Daryl talks about the sharing of information between government entities and non-government entities. (28:32)</li><li>Daryl discusses his involvement in the cyber security certification model being rolled out. (29:43)</li><li>There are engineering classes at Georgetown University and George Mason University that include courses for individuals who want to study cyber security. (33:22)</li><li>The career areas within cyber security that Daryl believes will be in demand five years from now. (35:17)</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Daryl Haegley joins Derek Harp for another episode in the Security Leader interview series! Daryl was a military officer and then became a civilian in DOD (Department of Defense) operations. He is now the Director of Mission Assurance and Cyber Deterrence for the DOD.&nbsp;</p><p>Daryl has always been fascinated with technology. He links his fascination to the intrigue he felt when watching Star Trek episodes with his father and brothers as a child and seeing how much simpler technology can make people’s lives.&nbsp;</p><p>Even though Daryl became one of the early cyber security pioneers, technology did not lead him to where he finds himself today.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Daryl tells his story, talks about his journey, discusses his choices, and explains how his career path led him to where he is today. He discusses some of the practices he employed along his career path that could be valuable when selecting a specific line of work. He also talks about how individuals in the military can increase their value to the outside world and explains where people can get formal or informal security training.&nbsp;</p><p>You will not want to miss this episode if you are leaning toward a career in the cyber security field, so stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>The path leading Daryl to where he is today did not proceed through technology. (4:42)</li><li>After completing his RTC in the Navy, Daryl thought he was done with school, but he went on to get three master’s degrees. (6:36)</li><li>Daryl talks about crossing over from college RTC to become a cryptologist. (7:45)</li><li>An important lesson he learned from history is about defense. (9:01)</li><li>Today, Daryl still references some of the lessons he learned from his early experiences in his naval career. (11:44)</li><li>Some advice for how individuals who are still in military service can strengthen their resumes and increase their value to the outside world. (14:24)</li><li>Daryl discusses some areas where individuals can get either formal or informal security training. (15:53)</li><li>Daryl talks about control systems and explains how they first intersected with his career. (16:55)</li><li>Daryl shares some highlights of his career and discusses some of the things he would do differently today. (20:19)</li><li>How mentorship has played out on his career path. (24:01)</li><li>Daryl talks about the sharing of information between government entities and non-government entities. (28:32)</li><li>Daryl discusses his involvement in the cyber security certification model being rolled out. (29:43)</li><li>There are engineering classes at Georgetown University and George Mason University that include courses for individuals who want to study cyber security. (33:22)</li><li>The career areas within cyber security that Daryl believes will be in demand five years from now. (35:17)</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">2796fb1a-bc08-4e26-9aec-feed2e12aa5b</guid><itunes:image href="https://artwork.captivate.fm/e9a27c70-be97-4ab0-8efd-266c9e7cab67/c8LK57eTEfr2HCbIP2Bvoq6_.jpg"/><pubDate>Tue, 18 Jan 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2d61d672-44e3-4ca7-853e-2efb49df90f4/cs2ai-daryl-haegley-edited-audio.mp3" length="36408495" type="audio/mpeg"/><itunes:duration>37:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode></item><item><title>21: A Non-Linear But Rewarding Career Path In Cybersecurity with Chris Blask</title><itunes:title>21: A Non-Linear But Rewarding Career Path In Cybersecurity with Chris Blask</itunes:title><description><![CDATA[<p>Today, we have another podcast in the Security Leaders interview series. In this episode, Derek Harp talks to Chris Blask, the Global Director of Industrial and IoT Security at Unisys. Chris is a man of many talents! He is an entrepreneur, an inventor, an evangelist, and a visionary. He has been involved in many different projects for work, for fun, and sometimes a mix of both.&nbsp;</p><p>Chris was the inventor of one of the first firewall products. In addition, he built a multibillion-dollar firewall business at Cisco System, co-founded an early SIEM vendor, wrote the first book on SIEM, founded an information-sharing center for critical infrastructures, and advised both public and private organizations across the world in every sector. In his role at Unisys, Chris created the Operational Technology and IoT security practices, which he also leads. He also invented the Digital Bill of Materials (DBoM) structure and established the Unisys Marine Living Research Center. He currently chairs a range of non-profit cybersecurity organizations and contributes to a wide range of global security efforts.</p><p>Chris is very well known, and his resume is outstanding! He has been involved in many different projects and initiatives. In this episode of the (CS)²AI Podcast, he shares some valuable nuggets from his vast experience! He tells his superhero origin story, talks about the non-linear way he got to where he is today, sheds light on his current role as a leader in the cybersecurity industry, and discusses his philosophy around problem-solving.&nbsp;</p><p>Chris frequently changed course throughout his career journey. If you are in the early part of your career and thinking of making some changes down the line, you really won’t want to miss this episode! Be sure to stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Technology was a thread that ran all along Chris’s career path. (5:51)</li><li>While growing up, Chris always loved taking things apart to figure out how they worked. (8:16)</li><li>Moving on after every change he made in his life and education. (10:57)</li><li>The history and appreciation of art have had as much to do with Chris’s success as learning to program in Cobol. (12:46)</li><li>Chris explains how he started teaching people about different aspects of technology and how that led to his first job in OT with General Electric. (13:16)</li><li>Chris enabled himself to do mobile video conferencing to save his company millions of dollars. (15:28)</li><li>Chris explains how the security aspect of his career came into play. (21:00)</li><li>Creating and releasing the BorderWare Firewall Server. (25:46)</li><li>History has proved that there will always be a point in the future when every problem will get solved. (27:24)</li><li>Chris has been into cybersecurity for the last 28 years. He talks about all the companies with which he was involved. (31:56)</li><li>Chris talks about the genesis of firewalls. (34:05)</li><li>Learning to talk the right language, to move up in the world of technology. (39:17)</li><li>How mentorship has played out in Chris’s career. (43:20)</li><li>Chris shares a strategy for anyone currently in OT or cybersecurity. (51:34)</li><li>Chris talks about the changes he sees happening with OT and cybersecurity in the future. (58:37)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a> &nbsp;</p><p><a href="https://www.unisys.com/" rel="noopener noreferrer" target="_blank">Unisys</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Today, we have another podcast in the Security Leaders interview series. In this episode, Derek Harp talks to Chris Blask, the Global Director of Industrial and IoT Security at Unisys. Chris is a man of many talents! He is an entrepreneur, an inventor, an evangelist, and a visionary. He has been involved in many different projects for work, for fun, and sometimes a mix of both.&nbsp;</p><p>Chris was the inventor of one of the first firewall products. In addition, he built a multibillion-dollar firewall business at Cisco System, co-founded an early SIEM vendor, wrote the first book on SIEM, founded an information-sharing center for critical infrastructures, and advised both public and private organizations across the world in every sector. In his role at Unisys, Chris created the Operational Technology and IoT security practices, which he also leads. He also invented the Digital Bill of Materials (DBoM) structure and established the Unisys Marine Living Research Center. He currently chairs a range of non-profit cybersecurity organizations and contributes to a wide range of global security efforts.</p><p>Chris is very well known, and his resume is outstanding! He has been involved in many different projects and initiatives. In this episode of the (CS)²AI Podcast, he shares some valuable nuggets from his vast experience! He tells his superhero origin story, talks about the non-linear way he got to where he is today, sheds light on his current role as a leader in the cybersecurity industry, and discusses his philosophy around problem-solving.&nbsp;</p><p>Chris frequently changed course throughout his career journey. If you are in the early part of your career and thinking of making some changes down the line, you really won’t want to miss this episode! Be sure to stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Technology was a thread that ran all along Chris’s career path. (5:51)</li><li>While growing up, Chris always loved taking things apart to figure out how they worked. (8:16)</li><li>Moving on after every change he made in his life and education. (10:57)</li><li>The history and appreciation of art have had as much to do with Chris’s success as learning to program in Cobol. (12:46)</li><li>Chris explains how he started teaching people about different aspects of technology and how that led to his first job in OT with General Electric. (13:16)</li><li>Chris enabled himself to do mobile video conferencing to save his company millions of dollars. (15:28)</li><li>Chris explains how the security aspect of his career came into play. (21:00)</li><li>Creating and releasing the BorderWare Firewall Server. (25:46)</li><li>History has proved that there will always be a point in the future when every problem will get solved. (27:24)</li><li>Chris has been into cybersecurity for the last 28 years. He talks about all the companies with which he was involved. (31:56)</li><li>Chris talks about the genesis of firewalls. (34:05)</li><li>Learning to talk the right language, to move up in the world of technology. (39:17)</li><li>How mentorship has played out in Chris’s career. (43:20)</li><li>Chris shares a strategy for anyone currently in OT or cybersecurity. (51:34)</li><li>Chris talks about the changes he sees happening with OT and cybersecurity in the future. (58:37)</li></ul><br/><p><strong>Links:</strong></p><p><a href="https://www.cs2ai.org/" rel="noopener noreferrer" target="_blank">(CS)²AI</a> &nbsp;</p><p><a href="https://www.unisys.com/" rel="noopener noreferrer" target="_blank">Unisys</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">0da72024-ee07-4bd9-a106-ab4426c5ab81</guid><itunes:image href="https://artwork.captivate.fm/a8692e4c-0aae-46c0-b70a-0dc86e0b1fb5/hQxuZstXjg9QRxaAJJEEmiy1.jpg"/><pubDate>Wed, 12 Jan 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ace63f0e-7077-49a8-a32b-2d0674e41c9a/cs2ai-podcast-chris-blask-edited-audio.mp3" length="52916114" type="audio/mpeg"/><itunes:duration>54:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode></item><item><title>20: Design and Produce Resilient, High-Quality Security Systems with Paul Forney</title><itunes:title>20: Design and Produce Resilient, High-Quality Security Systems with Paul Forney</itunes:title><description><![CDATA[<p>Today, Derek Harp is happy to welcome Paul Forney, the Chief Security Architect for Schneider Electric, as his guest for another episode in the (CS)2AI podcast series on security leaders. Paul is a true pioneer in the industry of securing industrial control systems.</p><p>Paul traveled the world while growing up because his dad was a cryptographer working for Military Intelligence. His dad was serious about his job, and although he could not talk to Paul about what he did at work, he explained all the basics of encryption and taught him how to protect documents and information.&nbsp;</p><p>In his first year of college, Paul joined a band. The band got a record deal, so Paul left home and college and traveled the world as a rock and roll bass player. He always wanted to learn about technology, however. So after finally returning to college, he graduated as an electrical engineer in 1990 and went into industrial control systems. Paul still plays music in a small band for fun and to raise money for various children’s causes.&nbsp;</p><p>Security is a journey that is always changing! The threat-scape and the way we think about security are constantly evolving. In this episode of the (CS)²AI Podcast, Paul shares some valuable nuggets of information around the best approach to take and the right processes to design and produce resilient, high-quality security systems. He explains how to get involved with industry standards bodies, talks about how experts from across the world should take a leaf out of the book of the World Health Organization to collaborate to solve industry problems a whole lot faster, and offers his ideas for future careers. He also tells his story, talks about various elements in his professional journey, and discusses his way of bringing balance into his life.&nbsp;&nbsp;</p><p>If you are interested in making a career in the field of cybersecurity, this is a conversation you won’t want to miss! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Paul plays bass in a group called The Jazz Execs. They are a consortium of musicians who raise money for children’s causes. (4:42)</li><li>In 1969, Paul started college as an electrical engineer. (8:06)</li><li>Paul went straight into industrial control systems after graduating from the University of South Florida, in Tampa, with a degree in Electrical Engineering. He eventually moved into designing security for internet portals and communications systems. (9:34)</li><li>Paul finds that many aspects of control systems are similar to orchestras. (10:16)</li><li>Some of the patents that Paul came up with are for technology to look for events happening on offshore oil platforms. That kind of work still excites him! (13:49)</li><li>He was always involved with communications in the early part of his career. (15:25)</li><li>It was 9/11 that brought Paul into the world of cybersecurity. (17:30)</li><li>As a security architect, Paul always has to look at the bigger picture to see how data moves around a system to design resilient ways to protect those systems. (22:05)</li><li>Paul talks about looking at the bigger picture to see how data moves around a system to design resilient ways to protect the system. (22:05)</li><li>You need to have processes, procedures, and technology to design and produce a quality security product. (24:59)</li><li>Paul has always sought to learn from those who think outside of the box in the control system world, like his late friend and mentor, Michael Assante. (29:14)</li><li>Young people can gain a lot of value from mentorship and getting involved with today’s standards bodies. (32:19)</li><li>New technologies, like blockchain, have great value and potential for future careers. (46:27)</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is happy to welcome Paul Forney, the Chief Security Architect for Schneider Electric, as his guest for another episode in the (CS)2AI podcast series on security leaders. Paul is a true pioneer in the industry of securing industrial control systems.</p><p>Paul traveled the world while growing up because his dad was a cryptographer working for Military Intelligence. His dad was serious about his job, and although he could not talk to Paul about what he did at work, he explained all the basics of encryption and taught him how to protect documents and information.&nbsp;</p><p>In his first year of college, Paul joined a band. The band got a record deal, so Paul left home and college and traveled the world as a rock and roll bass player. He always wanted to learn about technology, however. So after finally returning to college, he graduated as an electrical engineer in 1990 and went into industrial control systems. Paul still plays music in a small band for fun and to raise money for various children’s causes.&nbsp;</p><p>Security is a journey that is always changing! The threat-scape and the way we think about security are constantly evolving. In this episode of the (CS)²AI Podcast, Paul shares some valuable nuggets of information around the best approach to take and the right processes to design and produce resilient, high-quality security systems. He explains how to get involved with industry standards bodies, talks about how experts from across the world should take a leaf out of the book of the World Health Organization to collaborate to solve industry problems a whole lot faster, and offers his ideas for future careers. He also tells his story, talks about various elements in his professional journey, and discusses his way of bringing balance into his life.&nbsp;&nbsp;</p><p>If you are interested in making a career in the field of cybersecurity, this is a conversation you won’t want to miss! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Paul plays bass in a group called The Jazz Execs. They are a consortium of musicians who raise money for children’s causes. (4:42)</li><li>In 1969, Paul started college as an electrical engineer. (8:06)</li><li>Paul went straight into industrial control systems after graduating from the University of South Florida, in Tampa, with a degree in Electrical Engineering. He eventually moved into designing security for internet portals and communications systems. (9:34)</li><li>Paul finds that many aspects of control systems are similar to orchestras. (10:16)</li><li>Some of the patents that Paul came up with are for technology to look for events happening on offshore oil platforms. That kind of work still excites him! (13:49)</li><li>He was always involved with communications in the early part of his career. (15:25)</li><li>It was 9/11 that brought Paul into the world of cybersecurity. (17:30)</li><li>As a security architect, Paul always has to look at the bigger picture to see how data moves around a system to design resilient ways to protect those systems. (22:05)</li><li>Paul talks about looking at the bigger picture to see how data moves around a system to design resilient ways to protect the system. (22:05)</li><li>You need to have processes, procedures, and technology to design and produce a quality security product. (24:59)</li><li>Paul has always sought to learn from those who think outside of the box in the control system world, like his late friend and mentor, Michael Assante. (29:14)</li><li>Young people can gain a lot of value from mentorship and getting involved with today’s standards bodies. (32:19)</li><li>New technologies, like blockchain, have great value and potential for future careers. (46:27)</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">2119dd6e-c78d-4f5b-9bcf-9ce4618fb42b</guid><itunes:image href="https://artwork.captivate.fm/d4a7cab9-7221-46fb-b9b1-64cb4f217549/H4l4Y8cof6onoK6l9g_cENZ7.jpg"/><pubDate>Tue, 04 Jan 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b192ff2f-74e7-4ddf-88b5-209973b6d706/cs2ai-paul-forney-edited-audio.mp3" length="54494539" type="audio/mpeg"/><itunes:duration>56:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode></item><item><title>19: Internships and Specialties In the Cybersecurity Industry with John Cusimano</title><itunes:title>19: Internships and Specialties In the Cybersecurity Industry with John Cusimano</itunes:title><description><![CDATA[<p>Today, Derek Harp is happy to welcome John Cusimano, Vice President of Industrial Security at Deloitte (The industrial cybersecurity division of aeSolutions’ was acquired by Deloitte in Aug. of 2021), as his guest for another episode in the Security Leader series.</p><p>John leads their industrial cybersecurity practice team, comprised of about twenty dedicated subject matter experts who mostly came from automation, IT security, or a blend of the two in the earlier parts of their careers.&nbsp;</p><p>John hails from Upstate, New York. While in high school, he played guitar in a band and loved using guitar effects. He wanted to become an audio engineer, so he was motivated to go into the engineering field. After graduating from high school, he went to Clarkson University in Upstate New York and did a combined electrical and computer engineering degree. John picked Clarkson specifically because it was the first school in the entire country to give every new freshman a computer.</p><p>In this episode of the (CS)²AI Podcast, John joins Derek to share his superhero origin story, talk about how he became a leader in the cybersecurity industry, and share the valuable lessons he learned along the way. He talks about the benefits of gaining practical experience from doing internships and specializing in your career. He also offers some gold nuggets of advice for people thinking of starting a career in the world of cybersecurity.</p><p>If you are entering the workforce or in the mid-level part of your career and want to move up within your corporation or step out and start a business of your own, you will learn a lot from today’s episode, so be sure to stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>John talks about how he got to where he is at AE Solutions. (1:15)</li><li>John’s first encounter with technology happened before he was even in high school. (2:18)</li><li>John discusses how his practical experience from summer internships helped him land his first job. (6:09)</li><li>John shares an excellent way to bolster your career. (8:32)</li><li>How John found the niche of safety, and then later in his career, saw the connection between safety and cybersecurity, and started digging into cybersecurity. (11:23)</li><li>John talks about the people who mentored him and influenced his career path. (13:51)</li><li>John shares some nuggets to help engineers dive deeper into the world of cybersecurity. (17:39)</li><li>Overcoming the challenges in his career. (20:29)</li><li>There is value in being obsessive and eventually becoming an expert on a particular topic. (22:36)</li><li>John took a huge risk in starting an industrial cybersecurity practice before the technology got known to be a real thing. (24:33)</li><li>John talks about the areas within the cybersecurity industry that could start exploding with new opportunities over the next few years. (27:23)</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is happy to welcome John Cusimano, Vice President of Industrial Security at Deloitte (The industrial cybersecurity division of aeSolutions’ was acquired by Deloitte in Aug. of 2021), as his guest for another episode in the Security Leader series.</p><p>John leads their industrial cybersecurity practice team, comprised of about twenty dedicated subject matter experts who mostly came from automation, IT security, or a blend of the two in the earlier parts of their careers.&nbsp;</p><p>John hails from Upstate, New York. While in high school, he played guitar in a band and loved using guitar effects. He wanted to become an audio engineer, so he was motivated to go into the engineering field. After graduating from high school, he went to Clarkson University in Upstate New York and did a combined electrical and computer engineering degree. John picked Clarkson specifically because it was the first school in the entire country to give every new freshman a computer.</p><p>In this episode of the (CS)²AI Podcast, John joins Derek to share his superhero origin story, talk about how he became a leader in the cybersecurity industry, and share the valuable lessons he learned along the way. He talks about the benefits of gaining practical experience from doing internships and specializing in your career. He also offers some gold nuggets of advice for people thinking of starting a career in the world of cybersecurity.</p><p>If you are entering the workforce or in the mid-level part of your career and want to move up within your corporation or step out and start a business of your own, you will learn a lot from today’s episode, so be sure to stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>John talks about how he got to where he is at AE Solutions. (1:15)</li><li>John’s first encounter with technology happened before he was even in high school. (2:18)</li><li>John discusses how his practical experience from summer internships helped him land his first job. (6:09)</li><li>John shares an excellent way to bolster your career. (8:32)</li><li>How John found the niche of safety, and then later in his career, saw the connection between safety and cybersecurity, and started digging into cybersecurity. (11:23)</li><li>John talks about the people who mentored him and influenced his career path. (13:51)</li><li>John shares some nuggets to help engineers dive deeper into the world of cybersecurity. (17:39)</li><li>Overcoming the challenges in his career. (20:29)</li><li>There is value in being obsessive and eventually becoming an expert on a particular topic. (22:36)</li><li>John took a huge risk in starting an industrial cybersecurity practice before the technology got known to be a real thing. (24:33)</li><li>John talks about the areas within the cybersecurity industry that could start exploding with new opportunities over the next few years. (27:23)</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">4099b5a0-c94e-4494-ac56-c9202d5ce738</guid><itunes:image href="https://artwork.captivate.fm/bbb151f2-d0f3-41af-a0e3-666d90e5e436/PBQHEw_hws6J_HGlDoe4_h2N.jpg"/><pubDate>Tue, 28 Dec 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/38a34907-e685-4bd5-84cb-e9df31a2e185/cs2ai-john-cusimano-edited-video-01.mp3" length="27829962" type="audio/mpeg"/><itunes:duration>28:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode></item><item><title>18: Changing Careers to Leverage Cybersecurity Opportunities with Jaco Benadie</title><itunes:title>18: Changing Careers to Leverage Cybersecurity Opportunities with Jaco Benadie</itunes:title><description><![CDATA[<p>Today, Derek Harp is excited to have Jaco Benadie, the Executive Director of KPMG Malaysia, joining him on the show for another episode in the series on Security Leaders.&nbsp;</p><p>Jaco is a well-known leader and problem-solver in the world of cybersecurity. He has a great attitude and is always willing to do whatever he can to make things happen. He is a barbeque and sports fanatic who loves watching the Rugby World Cup!</p><p>With over fifteen years of experience in the cybersecurity field, in both Information Technology and Operational Technology, Jaco leverages his IT and engineering skills and experiences to design, develop and implement controls to support the protection of critical computing systems from cyber threats.</p><p>Jaco has become an expert in dealing with every level of customer management in OT, IT, and cyber security. He has often worked as a subject matter specialist for complex remediation activities. He has also acted as a mediator to resolve tensions between IT and OT.</p><p>In this episode, Jaco tells his superhero story. He peels back the layers to let us in on the personal side of his life and career. He talks about his different work experiences after graduating from university and explains how hard he had to study to move into cybersecurity. He also talks about guidance and mentorship and explains what motivated him to leave KPMG to do rigorous safety training with Shell.</p><p>Jaco encourages anyone considering a career change to go ahead and do it, regardless of how old you are! You will not want to miss this episode if you are thinking about breaking into the field of cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>As a young boy, Jaco spent the best years of his life in Namibia with his grandfather, who was a farmer. (2:40)</li><li>Although he graduated with a B.Com degree in marketing, Jaco has never worked in that field. (4:52)</li><li>Jaco shares one of the most valuable career lessons he learned while working as a door-to-door salesman. (7:55)</li><li>While on a working holiday in the UK, Jaco was offered a permanent position as a Physical Security Manager. That was where he got introduced to the world of cybersecurity for the first time. (10:14)</li><li>Jaco did not have a technical background, so starting his journey into cybersecurity involved a steep learning curve. (14:09)</li><li>Jaco talks about how hard he had to study to break into the cybersecurity industry. (17:48)</li><li>The kind of guidance, mentorship, and exposure Jaco would have liked to have while breaking into the cybersecurity industry. (21:18)</li><li>What he does to encourage the junior associates in his team to engage with him and ask questions. (24:22)</li><li>Jaco explains why you don’t have to be a technical expert to have a key role in cybersecurity programs. (26:33)</li><li>How he got introduced to KPMG, took a side-step, and started working there as an assistant manager. (30:58)</li><li>Jaco talks about what he learned from the rigorous safety training he did with Shell before returning to KPMG. (36:05)</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is excited to have Jaco Benadie, the Executive Director of KPMG Malaysia, joining him on the show for another episode in the series on Security Leaders.&nbsp;</p><p>Jaco is a well-known leader and problem-solver in the world of cybersecurity. He has a great attitude and is always willing to do whatever he can to make things happen. He is a barbeque and sports fanatic who loves watching the Rugby World Cup!</p><p>With over fifteen years of experience in the cybersecurity field, in both Information Technology and Operational Technology, Jaco leverages his IT and engineering skills and experiences to design, develop and implement controls to support the protection of critical computing systems from cyber threats.</p><p>Jaco has become an expert in dealing with every level of customer management in OT, IT, and cyber security. He has often worked as a subject matter specialist for complex remediation activities. He has also acted as a mediator to resolve tensions between IT and OT.</p><p>In this episode, Jaco tells his superhero story. He peels back the layers to let us in on the personal side of his life and career. He talks about his different work experiences after graduating from university and explains how hard he had to study to move into cybersecurity. He also talks about guidance and mentorship and explains what motivated him to leave KPMG to do rigorous safety training with Shell.</p><p>Jaco encourages anyone considering a career change to go ahead and do it, regardless of how old you are! You will not want to miss this episode if you are thinking about breaking into the field of cybersecurity!</p><p><strong>Show highlights:</strong></p><ul><li>As a young boy, Jaco spent the best years of his life in Namibia with his grandfather, who was a farmer. (2:40)</li><li>Although he graduated with a B.Com degree in marketing, Jaco has never worked in that field. (4:52)</li><li>Jaco shares one of the most valuable career lessons he learned while working as a door-to-door salesman. (7:55)</li><li>While on a working holiday in the UK, Jaco was offered a permanent position as a Physical Security Manager. That was where he got introduced to the world of cybersecurity for the first time. (10:14)</li><li>Jaco did not have a technical background, so starting his journey into cybersecurity involved a steep learning curve. (14:09)</li><li>Jaco talks about how hard he had to study to break into the cybersecurity industry. (17:48)</li><li>The kind of guidance, mentorship, and exposure Jaco would have liked to have while breaking into the cybersecurity industry. (21:18)</li><li>What he does to encourage the junior associates in his team to engage with him and ask questions. (24:22)</li><li>Jaco explains why you don’t have to be a technical expert to have a key role in cybersecurity programs. (26:33)</li><li>How he got introduced to KPMG, took a side-step, and started working there as an assistant manager. (30:58)</li><li>Jaco talks about what he learned from the rigorous safety training he did with Shell before returning to KPMG. (36:05)</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">a9369e50-d6c6-4f6a-9f15-73e6453e950e</guid><itunes:image href="https://artwork.captivate.fm/b36b1ea8-3b62-4500-9af2-be53a9425966/ASspINKVZz0vvp7A43G2ZOA5.jpg"/><pubDate>Tue, 21 Dec 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b9385bdb-2c9d-4447-ab24-83fb4cfc63d8/jaco-benadie-edited-audio.mp3" length="47254386" type="audio/mpeg"/><itunes:duration>49:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode></item><item><title>17: Practical Applications of the Theoretical Work of Academic Research with Robin Berthier</title><itunes:title>17: Practical Applications of the Theoretical Work of Academic Research with Robin Berthier</itunes:title><description><![CDATA[<p>Today, Derek Harp is happy to have Robin Berthier, the CEO, and Co-founder of Network Perception, joining him as his guest for this episode in the Security Leaders series!&nbsp;</p><p>Robin took a piece of technology out of a university research study and, together with some others, built a company around it. Network Perception is a startup committed to designing and developing highly-usable network audit solutions.</p><p>Robin grew up in Brittany, in the North-West region of France. He attended the first French school dedicated to cybersecurity. In addition to being an entrepreneur, Robin is also a researcher, technologist, and problem-solver. In his free time, he enjoys rock climbing and movies. He has even tried his hand at producing and directing movies!&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Robin shares his backstory and discusses his career journey. He talks about becoming a research scientist, designing specification-based intrusion detection systems for smart energy delivery systems, and transitioning from a researcher to an entrepreneur. He also talks about mentorship and offers some nuggets of advice for entrepreneurs.</p><p>You won’t want to miss this episode if you are interested in finding out about the practical applications of the theoretical work done in academic research. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Robin talks about where his passion for breaking and protecting systems began. (1:37)</li><li>The more Robin worked with computers, the more he became fascinated with the notion of feeling the universe. (2:33)</li><li>In the early 2000s, the French government created the resources to train the next-generation workforce in computers and cybersecurity. (3:30)</li><li>Robin discusses his first dedicated open-source project. (7:51)</li><li>In addition to cybersecurity, Robin was also interested in information visualization. (9:41)</li><li>How he moved from doing post-doctoral work to becoming a research scientist. (11:12)</li><li>How Robin got into designing specification-based intrusion detection systems for smart energy delivery systems. (15:07)</li><li>Recognizing an opportunity for university-based research to become a company. (17:46)</li><li>Transitioning from being a researcher to becoming an entrepreneur and the challenges that went along with that. (23:18)</li><li>What Robin would do differently if he had to start his entrepreneurial journey over. (28:58)</li><li>Some advice for entrepreneurs. (31:20)</li><li>Why you should never burn bridges or feel afraid of reaching out to others. (36:55)</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is happy to have Robin Berthier, the CEO, and Co-founder of Network Perception, joining him as his guest for this episode in the Security Leaders series!&nbsp;</p><p>Robin took a piece of technology out of a university research study and, together with some others, built a company around it. Network Perception is a startup committed to designing and developing highly-usable network audit solutions.</p><p>Robin grew up in Brittany, in the North-West region of France. He attended the first French school dedicated to cybersecurity. In addition to being an entrepreneur, Robin is also a researcher, technologist, and problem-solver. In his free time, he enjoys rock climbing and movies. He has even tried his hand at producing and directing movies!&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Robin shares his backstory and discusses his career journey. He talks about becoming a research scientist, designing specification-based intrusion detection systems for smart energy delivery systems, and transitioning from a researcher to an entrepreneur. He also talks about mentorship and offers some nuggets of advice for entrepreneurs.</p><p>You won’t want to miss this episode if you are interested in finding out about the practical applications of the theoretical work done in academic research. Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Robin talks about where his passion for breaking and protecting systems began. (1:37)</li><li>The more Robin worked with computers, the more he became fascinated with the notion of feeling the universe. (2:33)</li><li>In the early 2000s, the French government created the resources to train the next-generation workforce in computers and cybersecurity. (3:30)</li><li>Robin discusses his first dedicated open-source project. (7:51)</li><li>In addition to cybersecurity, Robin was also interested in information visualization. (9:41)</li><li>How he moved from doing post-doctoral work to becoming a research scientist. (11:12)</li><li>How Robin got into designing specification-based intrusion detection systems for smart energy delivery systems. (15:07)</li><li>Recognizing an opportunity for university-based research to become a company. (17:46)</li><li>Transitioning from being a researcher to becoming an entrepreneur and the challenges that went along with that. (23:18)</li><li>What Robin would do differently if he had to start his entrepreneurial journey over. (28:58)</li><li>Some advice for entrepreneurs. (31:20)</li><li>Why you should never burn bridges or feel afraid of reaching out to others. (36:55)</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">26bd85ad-8223-4846-b9dc-12ee2f380bb9</guid><itunes:image href="https://artwork.captivate.fm/6e35cd21-35c3-4630-add1-e503a7f49b88/DObRecgE0aZpIKdslwBP6XMn.jpg"/><pubDate>Tue, 14 Dec 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/15e60f50-93dc-439e-8fc3-d32bd526f77d/cs2ai-podcast-robin-berthier.mp3" length="55713742" type="audio/mpeg"/><itunes:duration>57:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode></item><item><title>16:  Transitioning from the Military to a Career in Cybersecurity  with Ernest Wohnig</title><itunes:title>16:  Transitioning from the Military to a Career in Cybersecurity  with Ernest Wohnig</itunes:title><description><![CDATA[<p>Derek Harp is happy to have Ernest Wohnig joining him as his guest for today’s show!&nbsp;</p><p>Ernest has performed a variety of different roles. Currently, he serves as the Senior Vice President of CISO Advisory in CIP and ICS services at System 1, a specialized cybersecurity consulting firm. In addition to that, he also serves on the Thomas Edison State University (TESU) Cybersecurity Program Advisory Board and chairs the global advisory board of the Control System Cyber Security Association International (CS2AI). Before that, he served as a Deputy CISO and Senior Global Cybersecurity Advisor for a Fortune 200 energy company, leading the coordination of cybersecurity activities across their global operations.</p><p>Ernest is recognized internationally as a cybersecurity executive. He is a sought-after strategic adviser to the senior leadership of global firms, national government agencies, and corporate and non-profit directors. His main areas of interest and experience include integrating cyber risk as a key component of business risk and opportunity, the effects of cyber risk on critical infrastructure from both operations and national infrastructure governance perspectives, and the threat and promise of Artificial Intelligence as an enabler in the cybersphere.</p><p>In the 1990s, Ernest served as an Air Force Intelligence officer and an Information Warfare advisor for the US Government. He also has significant experience, directing the development and delivery of cyber security consulting services for large and boutique global consulting firms.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Ernest shares his superhero origin story. He discusses his early interest in the impact of technology on national security, his introduction to information warfare and cybersecurity while in the military, and the skills he needed when he joined the DIA after leaving the Air Force. He also talks about mentorship and offers suggestions for finding the right niche early in your career and developing additional non-technical career skills.&nbsp;</p><p>Ernest is proof that you don’t have to have a degree in computer science or engineering to do cybersecurity. Tune in today to hear his fascinating story! You won’t want to miss this episode if you are entering the market after the military or thinking of transitioning into the cybersecurity space.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>As a talkative young lieutenant in the Air Force, Ernest often spoke to his colonel about the book, Third Wave by Alvin Toffler. That resulted in him becoming a liaison to the first Information Warfare Squadron. (2:39)</li><li>Technology fascinated Ernest, but he focused more on how people use technology and how technology impacts national security. (4:30)</li><li>You don’t need any specific formal education to get into the cybersecurity space. (5:16)</li><li>Ernest got introduced to cybersecurity after joining the military. (7:27)</li><li>We have forgotten some of the security problems that Ernest addressed in the late 1990s. They have resurfaced again, however, and caused some concern in the last four or five years. (11:20)</li><li>Ernest spent a year-and-a-half with the DIA after leaving the military. He talks about the skill sets that he needed there. (14:10)</li><li>Reaching the level in his career where he had to dial down the technical aspect and dial up the people aspect. (15:36)</li><li>We have come a long way with cybersecurity. It has grown a lot, and many subdivisions have formed since the time it was known as information security. (19:48)</li><li>Find the right niche early on in your career. (20:58)&nbsp;</li><li>Ernest talks about mentorship and discusses ways of developing additional skills. (24:47)</li><li>Some practical advice for connecting with potential mentors in the industry sector you would like to join. (34:48)</li><li>What you could gain from taking career-broadening tours. (44:52)</li><li>Tips for...]]></description><content:encoded><![CDATA[<p>Derek Harp is happy to have Ernest Wohnig joining him as his guest for today’s show!&nbsp;</p><p>Ernest has performed a variety of different roles. Currently, he serves as the Senior Vice President of CISO Advisory in CIP and ICS services at System 1, a specialized cybersecurity consulting firm. In addition to that, he also serves on the Thomas Edison State University (TESU) Cybersecurity Program Advisory Board and chairs the global advisory board of the Control System Cyber Security Association International (CS2AI). Before that, he served as a Deputy CISO and Senior Global Cybersecurity Advisor for a Fortune 200 energy company, leading the coordination of cybersecurity activities across their global operations.</p><p>Ernest is recognized internationally as a cybersecurity executive. He is a sought-after strategic adviser to the senior leadership of global firms, national government agencies, and corporate and non-profit directors. His main areas of interest and experience include integrating cyber risk as a key component of business risk and opportunity, the effects of cyber risk on critical infrastructure from both operations and national infrastructure governance perspectives, and the threat and promise of Artificial Intelligence as an enabler in the cybersphere.</p><p>In the 1990s, Ernest served as an Air Force Intelligence officer and an Information Warfare advisor for the US Government. He also has significant experience, directing the development and delivery of cyber security consulting services for large and boutique global consulting firms.&nbsp;</p><p>In this episode of the (CS)²AI Podcast, Ernest shares his superhero origin story. He discusses his early interest in the impact of technology on national security, his introduction to information warfare and cybersecurity while in the military, and the skills he needed when he joined the DIA after leaving the Air Force. He also talks about mentorship and offers suggestions for finding the right niche early in your career and developing additional non-technical career skills.&nbsp;</p><p>Ernest is proof that you don’t have to have a degree in computer science or engineering to do cybersecurity. Tune in today to hear his fascinating story! You won’t want to miss this episode if you are entering the market after the military or thinking of transitioning into the cybersecurity space.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>As a talkative young lieutenant in the Air Force, Ernest often spoke to his colonel about the book, Third Wave by Alvin Toffler. That resulted in him becoming a liaison to the first Information Warfare Squadron. (2:39)</li><li>Technology fascinated Ernest, but he focused more on how people use technology and how technology impacts national security. (4:30)</li><li>You don’t need any specific formal education to get into the cybersecurity space. (5:16)</li><li>Ernest got introduced to cybersecurity after joining the military. (7:27)</li><li>We have forgotten some of the security problems that Ernest addressed in the late 1990s. They have resurfaced again, however, and caused some concern in the last four or five years. (11:20)</li><li>Ernest spent a year-and-a-half with the DIA after leaving the military. He talks about the skill sets that he needed there. (14:10)</li><li>Reaching the level in his career where he had to dial down the technical aspect and dial up the people aspect. (15:36)</li><li>We have come a long way with cybersecurity. It has grown a lot, and many subdivisions have formed since the time it was known as information security. (19:48)</li><li>Find the right niche early on in your career. (20:58)&nbsp;</li><li>Ernest talks about mentorship and discusses ways of developing additional skills. (24:47)</li><li>Some practical advice for connecting with potential mentors in the industry sector you would like to join. (34:48)</li><li>What you could gain from taking career-broadening tours. (44:52)</li><li>Tips for increasing your amount of influence. (47:36)</li><li>We will see some scary and exciting opportunities arise with cutting-edge AI technology in the future! (55:17)</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">b5e786d9-6f60-45fc-b950-539ecf73ae9d</guid><itunes:image href="https://artwork.captivate.fm/407e5946-61cb-47b3-be5b-9a86795aee53/bHJQVw24WJu8nQhfR8_Y3K1I.jpg"/><pubDate>Tue, 07 Dec 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b0344b35-4b3a-4dbf-85de-6232fddaff6a/cs2ai-podcast-ernest-w-audio.mp3" length="55577815" type="audio/mpeg"/><itunes:duration>57:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode></item><item><title>15: Running a Successful Cyber Security Company with Clint Bodungen</title><itunes:title>15: Running a Successful Cyber Security Company with Clint Bodungen</itunes:title><description><![CDATA[<p>Today, Derek Harp is excited to have Clint Bodungen, the Founder and CEO of ThreatGEN, joining him for an episode of the Security Leader interview series. Clint is an inspiring and creative individual who has been working in the cybersecurity industry for more than 25 years. He is a founder, entrepreneur, gamer, game designer, teacher, researcher, professor, martial artist, and father.&nbsp;</p><p>Clint Bodungen is the lead author of&nbsp;<em>Hacking Exposed: Industrial Control Systems</em>&nbsp;and creator of the ThreatGEN® Red vs. Blue cybersecurity gamification platform. He is a United States Air Force veteran and an active part of the cybersecurity community. Since 2003, his focus has been exclusively on ICS/OT cybersecurity, and he has helped many of the world's largest energy companies. Clint has worked for Symantec, Kaspersky Lab, and Industrial Defender and has published many technical papers and training courses on ICS/OT cybersecurity vulnerability assessment, penetration testing, and risk management.</p><p>While growing up, Clint was both technically inclined and artistic. He wanted to study commercial art and graphic design but started studying theatre and movie special effects instead. After a while, he switched to studying art, and soon after that, he quit his studies to join the Air Force. While in the military, he was allowed to learn about computers and computer security.&nbsp;</p><p>In today’s episode of the (CS)²AI Podcast, Clint tells his inspiring story and shares some great nuggets of advice for getting ahead in your career, finding opportunities, and running a successful company! He talks about his love of gaming and other interests while growing up. He discusses his studies, joining the Air Force, mentorship, the turning point in his career when he learned about industrial systems for the first time, and the process of writing his book,&nbsp;<em>Hacking Exposed: Industrial Control Systems</em>.&nbsp;</p><p>Stay tuned! You won't want to miss this nugget-filled and inspiring episode!&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Clint’s love of games and technology started when his family got an Atari in the early 1980s. (5:28)</li><li>His mom introduced him to one of her co-workers, a programmer. That got him interested in programming. (6:54)</li><li>Deciding to quit studying art and join the Air Force. (10:23)</li><li>What made Clint decide to join the military? (12:13)</li><li>Clint got the opportunity to start working on internet networks and learn about computers and computer security in 1995, while in the military. (15:26)</li><li>Clint and his colleague became interested in hacking in the mid-1990s. (16:27)</li><li>Clint talks about what prompted him to leave the military and discusses what he would have done differently today. (18:38)</li><li>Clint shares some nuggets of advice for anyone considering a career in computer security or technology. (22:45)</li><li>Much of what we learn comes from experience rather than books or classrooms. (25:40)</li><li>Clint talks about mentorship and how he got mentored by a hacker. (29:05)</li><li>The turning point in Clint’s career was when he got the opportunity to cross-train and write intrusion detection system codes with some of the developers at Symantec. (38:34)</li><li>When Clint learned about industrial systems for the first time. (42:00)</li><li>Writing papers and sharing his knowledge gave Clint a lot of exposure and the opportunity to give something back to his community. (47:53)</li><li>Clint talks about the process of writing his book,&nbsp;<em>Hacking Exposed: Industrial Control Systems.</em>&nbsp;(52:02)</li><li>Clint shares some of the nuggets he learned along the way in his career. (1:03:38)</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is excited to have Clint Bodungen, the Founder and CEO of ThreatGEN, joining him for an episode of the Security Leader interview series. Clint is an inspiring and creative individual who has been working in the cybersecurity industry for more than 25 years. He is a founder, entrepreneur, gamer, game designer, teacher, researcher, professor, martial artist, and father.&nbsp;</p><p>Clint Bodungen is the lead author of&nbsp;<em>Hacking Exposed: Industrial Control Systems</em>&nbsp;and creator of the ThreatGEN® Red vs. Blue cybersecurity gamification platform. He is a United States Air Force veteran and an active part of the cybersecurity community. Since 2003, his focus has been exclusively on ICS/OT cybersecurity, and he has helped many of the world's largest energy companies. Clint has worked for Symantec, Kaspersky Lab, and Industrial Defender and has published many technical papers and training courses on ICS/OT cybersecurity vulnerability assessment, penetration testing, and risk management.</p><p>While growing up, Clint was both technically inclined and artistic. He wanted to study commercial art and graphic design but started studying theatre and movie special effects instead. After a while, he switched to studying art, and soon after that, he quit his studies to join the Air Force. While in the military, he was allowed to learn about computers and computer security.&nbsp;</p><p>In today’s episode of the (CS)²AI Podcast, Clint tells his inspiring story and shares some great nuggets of advice for getting ahead in your career, finding opportunities, and running a successful company! He talks about his love of gaming and other interests while growing up. He discusses his studies, joining the Air Force, mentorship, the turning point in his career when he learned about industrial systems for the first time, and the process of writing his book,&nbsp;<em>Hacking Exposed: Industrial Control Systems</em>.&nbsp;</p><p>Stay tuned! You won't want to miss this nugget-filled and inspiring episode!&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Clint’s love of games and technology started when his family got an Atari in the early 1980s. (5:28)</li><li>His mom introduced him to one of her co-workers, a programmer. That got him interested in programming. (6:54)</li><li>Deciding to quit studying art and join the Air Force. (10:23)</li><li>What made Clint decide to join the military? (12:13)</li><li>Clint got the opportunity to start working on internet networks and learn about computers and computer security in 1995, while in the military. (15:26)</li><li>Clint and his colleague became interested in hacking in the mid-1990s. (16:27)</li><li>Clint talks about what prompted him to leave the military and discusses what he would have done differently today. (18:38)</li><li>Clint shares some nuggets of advice for anyone considering a career in computer security or technology. (22:45)</li><li>Much of what we learn comes from experience rather than books or classrooms. (25:40)</li><li>Clint talks about mentorship and how he got mentored by a hacker. (29:05)</li><li>The turning point in Clint’s career was when he got the opportunity to cross-train and write intrusion detection system codes with some of the developers at Symantec. (38:34)</li><li>When Clint learned about industrial systems for the first time. (42:00)</li><li>Writing papers and sharing his knowledge gave Clint a lot of exposure and the opportunity to give something back to his community. (47:53)</li><li>Clint talks about the process of writing his book,&nbsp;<em>Hacking Exposed: Industrial Control Systems.</em>&nbsp;(52:02)</li><li>Clint shares some of the nuggets he learned along the way in his career. (1:03:38)</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">c657ae3d-d66c-4055-8489-46fbdcaba038</guid><itunes:image href="https://artwork.captivate.fm/467f8bad-6ef4-4e0f-868d-81dbfb048642/dwT3Z9WeMg2eEPikbokvqm8Z.jpg"/><pubDate>Tue, 30 Nov 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/da11ae24-8401-4104-8929-ea40964abedc/cs2ai-podcast-clint-b-01.mp3" length="66961751" type="audio/mpeg"/><itunes:duration>01:09:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode></item><item><title>14: Consequence-Driven, Cyber-Informed Engineering (CCE) with Sara Freeman and Andy Bochman</title><itunes:title>14: Consequence-Driven, Cyber-Informed Engineering (CCE) with Sara Freeman and Andy Bochman</itunes:title><description><![CDATA[<p>Today, Derek Harp, the host of (CS)²AI Podcast, shares an episode of the Author Spotlight that features practitioners and contributors who do great work and write books about new modalities, new systems of organization, and new thought processes.&nbsp;</p><p>In this episode, Andy Bochman and Sarah Freeman, authors of&nbsp;<em>Countering Cyber Sabotage- Introducing Consequence-Driven Cyber-Informed Engineering,&nbsp;</em>join Derek to talk about their book.&nbsp;</p><p>Sarah has been an Industrial Control Systems Cyber Security Analyst at The Idaho National Laboratory (The Lab) for the past eight years. She did not get there through the traditional computer or cyber security background, however. Sarah studied Intelligence and Security Studies, focusing on terrorism in Graduate School, and came into cyber security through Language Services by assisting with certain investigations and operations on the language side. That eventually transitioned into industrial control systems when she joined The Lab.&nbsp;</p><p>Sarah has a unique understanding of different kinds of threat actors from some of the work she has done in the past. The Lab focuses on bringing in people with different backgrounds, like cyber security researchers, malware reverse engineers, and engineers. That is invaluable when talking about attacks specifically leveled against industrial control systems because some things translate well between traditional IT attacks while others are completely different. Bringing in different groups helps with much of their work.&nbsp;</p><p>One of the first companies Andy ever worked for was an applications security company that eventually got bought by IBM. He was also involved in some startups and some consulting. At IBM, Andy matched his cyber security day job with his night job, moonlighting as a blogger on the DOD Energy Blog and the Smart Grid Security Blog. While at IBM, he asked if he could cover energy from a cyber point of view, and they agreed. From that point, it became clear that he would eventually end up at the Idaho National Laboratory, where he has been for the last seven years.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Sarah is valuable to the community because of her knowledge of the spoken and written languages used in certain parts of the world. (4:28)&nbsp;</li><li>The genesis of their book and the philosophy behind it. (7:51)</li><li>From about 2003-2004, Idaho National Laboratory has focused on electric grid security. (16:16)</li><li>Whatever first hits the people on the street and then ripples up to the people on The Hill brings about a new level of awareness. (19:37)</li><li>Critical infrastructure is sure to be targeted, and once something has been targeted it will be compromised. (20:40)</li><li>Putting security into the design stage is a different approach that is now evolving out of The Lab. (24:23)</li><li>Many opportunities exist for adversaries to get in and turn things to their advantage after a new software product has been deployed and begins to interact with other networks. (29:49)</li><li>What initially prompted Andy to write the book before Sarah came on board. (30:35)</li><li>How Andy came up with the title of the book. (36:43)</li><li>When espionage turns into sabotage. (39:04)</li><li>How you can use the book. (40:25)</li><li>A partner program and another version of the book, known as “Bootcamp” or “Partner Training” are also available. (41:13)</li><li>People are tired of the status quo and would be willing to explore a new way. (44:43)</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp, the host of (CS)²AI Podcast, shares an episode of the Author Spotlight that features practitioners and contributors who do great work and write books about new modalities, new systems of organization, and new thought processes.&nbsp;</p><p>In this episode, Andy Bochman and Sarah Freeman, authors of&nbsp;<em>Countering Cyber Sabotage- Introducing Consequence-Driven Cyber-Informed Engineering,&nbsp;</em>join Derek to talk about their book.&nbsp;</p><p>Sarah has been an Industrial Control Systems Cyber Security Analyst at The Idaho National Laboratory (The Lab) for the past eight years. She did not get there through the traditional computer or cyber security background, however. Sarah studied Intelligence and Security Studies, focusing on terrorism in Graduate School, and came into cyber security through Language Services by assisting with certain investigations and operations on the language side. That eventually transitioned into industrial control systems when she joined The Lab.&nbsp;</p><p>Sarah has a unique understanding of different kinds of threat actors from some of the work she has done in the past. The Lab focuses on bringing in people with different backgrounds, like cyber security researchers, malware reverse engineers, and engineers. That is invaluable when talking about attacks specifically leveled against industrial control systems because some things translate well between traditional IT attacks while others are completely different. Bringing in different groups helps with much of their work.&nbsp;</p><p>One of the first companies Andy ever worked for was an applications security company that eventually got bought by IBM. He was also involved in some startups and some consulting. At IBM, Andy matched his cyber security day job with his night job, moonlighting as a blogger on the DOD Energy Blog and the Smart Grid Security Blog. While at IBM, he asked if he could cover energy from a cyber point of view, and they agreed. From that point, it became clear that he would eventually end up at the Idaho National Laboratory, where he has been for the last seven years.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Sarah is valuable to the community because of her knowledge of the spoken and written languages used in certain parts of the world. (4:28)&nbsp;</li><li>The genesis of their book and the philosophy behind it. (7:51)</li><li>From about 2003-2004, Idaho National Laboratory has focused on electric grid security. (16:16)</li><li>Whatever first hits the people on the street and then ripples up to the people on The Hill brings about a new level of awareness. (19:37)</li><li>Critical infrastructure is sure to be targeted, and once something has been targeted it will be compromised. (20:40)</li><li>Putting security into the design stage is a different approach that is now evolving out of The Lab. (24:23)</li><li>Many opportunities exist for adversaries to get in and turn things to their advantage after a new software product has been deployed and begins to interact with other networks. (29:49)</li><li>What initially prompted Andy to write the book before Sarah came on board. (30:35)</li><li>How Andy came up with the title of the book. (36:43)</li><li>When espionage turns into sabotage. (39:04)</li><li>How you can use the book. (40:25)</li><li>A partner program and another version of the book, known as “Bootcamp” or “Partner Training” are also available. (41:13)</li><li>People are tired of the status quo and would be willing to explore a new way. (44:43)</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">16c8fd5d-2f32-4b1b-a85f-24405c58d9ba</guid><itunes:image href="https://artwork.captivate.fm/c895a8b6-ad30-4357-b3ff-50d24591943d/paVEWNrgBl8tmTGNN-ryXg8U.png"/><pubDate>Tue, 23 Nov 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2e526243-d863-42d4-9500-7889c2135784/cs2ai-podcast-andy-bochman-sarah-freeman-01.mp3" length="45729571" type="audio/mpeg"/><itunes:duration>47:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode></item><item><title>13: What You Need to Know Before You Consider a Cybersecurity Career with Brad Raiford</title><itunes:title>13: What You Need to Know Before You Consider a Cybersecurity Career with Brad Raiford</itunes:title><description><![CDATA[<p><strong>(CS)²AI- Security Leaders – Brad Raiford</strong></p><p>Derek Harp is excited to have Brad Raiford joining him on the show today! Brad is a Director in the Cybersecurity Services Practice at KPMG. His primary focus is divided between operational technology, ICS, data, the expanding industrial world of the internet of things, the internet of everything, and how the impact of 5G will change the course of manufacturing and production systems.</p><p>Brad was born in Galveston, Texas, and spent most of his childhood in Saudi Arabia because his dad worked for Ramco. He has a degree in Computer Information Systems from Texas A&amp;M University and a Master’s in Computer Engineering from Johns Hopkins University.&nbsp;</p><p>Brad was introduced to technology very early on because his dad loved trying out the latest technology. They got linked to the internet at the beginning of the 1990s. From there, Brad’s interest in technology continued to grow. When he was ten or eleven years old, he and his brother started building computers, and they even designed their entire home network a couple of years later.</p><p>In today’s episode of the (CS)²AI Podcast, Brad talks about how he developed an interest in technology as a young boy and how he got introduced to internet security. He also shares some nuggets about how you need to think and what you need to understand if you are interested in making a career in the technology or cyber security space.</p><p>Be sure to stay tuned for more! You definitely won’t want to miss this episode!</p><p><strong>Show highlights:</strong></p><ul><li>How Brad first got introduced to technology. (2:50)</li><li>How he started learning about internet security and firewalls (6:38)</li><li>Why Brad has always viewed cyber as a lens through which to digest technology. (7:24)</li><li>A simple question that Brad always likes to ask new hires or people interested in the technology space. (10:07)</li><li>How the industrial part of cyber security intersected with his career path. (15:48)</li><li>What you would need to have in place to join an OT team at KPMG. (18:38)</li><li>Where industrial control systems came into Brad’s career. (22:59)</li><li>The three mentors Brad has had in his life. (26:35)&nbsp;</li><li>The biggest challenges he has experienced in his career. (31:30)</li><li>Knowing how and when to say “no”. (34:09)</li><li>The greatest single skill anyone can have. (35:38)</li><li>Staying abreast of new things. (41:16)</li></ul><br/>]]></description><content:encoded><![CDATA[<p><strong>(CS)²AI- Security Leaders – Brad Raiford</strong></p><p>Derek Harp is excited to have Brad Raiford joining him on the show today! Brad is a Director in the Cybersecurity Services Practice at KPMG. His primary focus is divided between operational technology, ICS, data, the expanding industrial world of the internet of things, the internet of everything, and how the impact of 5G will change the course of manufacturing and production systems.</p><p>Brad was born in Galveston, Texas, and spent most of his childhood in Saudi Arabia because his dad worked for Ramco. He has a degree in Computer Information Systems from Texas A&amp;M University and a Master’s in Computer Engineering from Johns Hopkins University.&nbsp;</p><p>Brad was introduced to technology very early on because his dad loved trying out the latest technology. They got linked to the internet at the beginning of the 1990s. From there, Brad’s interest in technology continued to grow. When he was ten or eleven years old, he and his brother started building computers, and they even designed their entire home network a couple of years later.</p><p>In today’s episode of the (CS)²AI Podcast, Brad talks about how he developed an interest in technology as a young boy and how he got introduced to internet security. He also shares some nuggets about how you need to think and what you need to understand if you are interested in making a career in the technology or cyber security space.</p><p>Be sure to stay tuned for more! You definitely won’t want to miss this episode!</p><p><strong>Show highlights:</strong></p><ul><li>How Brad first got introduced to technology. (2:50)</li><li>How he started learning about internet security and firewalls (6:38)</li><li>Why Brad has always viewed cyber as a lens through which to digest technology. (7:24)</li><li>A simple question that Brad always likes to ask new hires or people interested in the technology space. (10:07)</li><li>How the industrial part of cyber security intersected with his career path. (15:48)</li><li>What you would need to have in place to join an OT team at KPMG. (18:38)</li><li>Where industrial control systems came into Brad’s career. (22:59)</li><li>The three mentors Brad has had in his life. (26:35)&nbsp;</li><li>The biggest challenges he has experienced in his career. (31:30)</li><li>Knowing how and when to say “no”. (34:09)</li><li>The greatest single skill anyone can have. (35:38)</li><li>Staying abreast of new things. (41:16)</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">34ba813d-33b3-4fa7-a219-9fca330c495d</guid><itunes:image href="https://artwork.captivate.fm/f90a9739-cd77-46b4-a76b-d19066f9947b/w5gg5nPcQDSSqu0vhs48Fzxk.jpg"/><pubDate>Tue, 16 Nov 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6ab02305-a11c-4ebf-b34a-5e4074e62559/cs2ai-podcast-brad-raiford.mp3" length="39341935" type="audio/mpeg"/><itunes:duration>40:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode></item><item><title>12: Using Writing Skills to Unlock Careers in Cybersecurity with Andrew Ginter</title><itunes:title>12: Using Writing Skills to Unlock Careers in Cybersecurity with Andrew Ginter</itunes:title><description><![CDATA[<p>Today, Andrew Ginter, a pioneer in the cyber security space, joins Derek Harp. Andrew is the VP of Industrial Security at Waterfall Solutions. He is an author, a podcast host, and a well-known cyber security expert with multiple credentials in the industry.&nbsp;</p><p>Andrew was raised on a farm outside of Calgary and has remained there ever since. Where ever he worked early on in his career, Andrew would always step up and volunteer to do anything important that needed to get done. So he often wound up doing the things no one else wanted to do. That mostly involved doing maintenance because everyone else in the computer field wanted to do development. Andrew found that going with whatever was important and executing it well got him promoted and afforded him better opportunities.</p><p>In this episode of (CS)²AI Podcast, Andrew discusses his journey into cyber security. He shares his insights and offers advice for those who want to use their writing skills to open up new opportunities. This is an episode you won’t want to miss if you are interested in starting a career in the industrial security space!</p><p><strong>Show highlights:</strong></p><ul><li>Andrew shares his background. (2:00)</li><li>How Andrew got pulled into doing SCADA security. (5:06)</li><li>Where technology first intersected with Andrew’s life. (7:05)</li><li>How Andrew wound up doing maintenance on 100,000 lines of assembly code. (10:15)</li><li>The helpful role mentorship played in Andrew’s career. (12:24)</li><li>Andrew talks about the control system product he developed. (17:54)</li><li>How Andrew’s writing skills opened up opportunities for him. (19:55)</li><li>What got highlighted for Andrew as a result of him writing a controversial book. (28:02)</li><li>Some practical advice for where writing skills could get developed and applied to the cyber security industry. (34:36)</li><li>Andrew shares some great advice about researching while working on a Master’s Degree to get a Ph.D. (37:46)</li><li>What you need to know if you are starting in the industrial security space. (43:26)</li></ul><br/><p>Resources:</p><p><a href="https://amzn.to/3bWAcjP" rel="noopener noreferrer" target="_blank">Practical Cryptography</a> by Bruce Schneier</p>]]></description><content:encoded><![CDATA[<p>Today, Andrew Ginter, a pioneer in the cyber security space, joins Derek Harp. Andrew is the VP of Industrial Security at Waterfall Solutions. He is an author, a podcast host, and a well-known cyber security expert with multiple credentials in the industry.&nbsp;</p><p>Andrew was raised on a farm outside of Calgary and has remained there ever since. Where ever he worked early on in his career, Andrew would always step up and volunteer to do anything important that needed to get done. So he often wound up doing the things no one else wanted to do. That mostly involved doing maintenance because everyone else in the computer field wanted to do development. Andrew found that going with whatever was important and executing it well got him promoted and afforded him better opportunities.</p><p>In this episode of (CS)²AI Podcast, Andrew discusses his journey into cyber security. He shares his insights and offers advice for those who want to use their writing skills to open up new opportunities. This is an episode you won’t want to miss if you are interested in starting a career in the industrial security space!</p><p><strong>Show highlights:</strong></p><ul><li>Andrew shares his background. (2:00)</li><li>How Andrew got pulled into doing SCADA security. (5:06)</li><li>Where technology first intersected with Andrew’s life. (7:05)</li><li>How Andrew wound up doing maintenance on 100,000 lines of assembly code. (10:15)</li><li>The helpful role mentorship played in Andrew’s career. (12:24)</li><li>Andrew talks about the control system product he developed. (17:54)</li><li>How Andrew’s writing skills opened up opportunities for him. (19:55)</li><li>What got highlighted for Andrew as a result of him writing a controversial book. (28:02)</li><li>Some practical advice for where writing skills could get developed and applied to the cyber security industry. (34:36)</li><li>Andrew shares some great advice about researching while working on a Master’s Degree to get a Ph.D. (37:46)</li><li>What you need to know if you are starting in the industrial security space. (43:26)</li></ul><br/><p>Resources:</p><p><a href="https://amzn.to/3bWAcjP" rel="noopener noreferrer" target="_blank">Practical Cryptography</a> by Bruce Schneier</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">7ffe43d4-2453-4212-bbb2-03bdf6e929fb</guid><itunes:image href="https://artwork.captivate.fm/5f797f51-b681-48b7-9656-34474cdf10ec/LOXw0DlU7h9HVghUSrRxBZ9b.jpg"/><pubDate>Tue, 09 Nov 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1d77aa79-f2e4-490e-a13b-fbe2afe54fa2/cs2ai-andrew-ginter-edited-audio.mp3" length="40944134" type="audio/mpeg"/><itunes:duration>42:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode></item><item><title>11: Career Advancement in Information Security Services with Bill Malik</title><itunes:title>11: Career Advancement in Information Security Services with Bill Malik</itunes:title><description><![CDATA[<p>Today, Bill Malik, the Vice President for Infrastructure Strategies at Trend Micro, joins Derek Harp. Bill is a well-rounded individual who has been involved in the security industry for quite some time. He has tons of experience in many different areas and has a long list of career milestones. Bill is a well-known writer, analyst, and speaker. He is a former programmer who still enjoys dabbling for fun! He is also a father and grandfather, an explorer of ideas, a chef, a wine connoisseur- and was even once a DJ!</p><p>In this episode of the (CS)²AI Podcast, Bill gives an inside view into his career journey. He discusses his interesting career and explains how he got involved in developing an information security service. He also shares some gold nuggets of advice for those individuals who would like to get to the next level in their organization by bettering their communication skills and offers excellent advice for those starting in their careers.&nbsp;&nbsp;</p><p>This is a great conversation full of nuggets that you won’t want to miss! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Bill talks about his background. (10:15)</li><li>When technology first came into play in Bill’s life. (13:08)</li><li>Bill discusses MIT’s involvement in developing a secure system for time-sharing, which led to his first intersection with cookies and security. (14:12)</li><li>Bill talks about the event that led to his first information security moment as an app developer. (19:39)</li><li>One of the biggest bits of programming Bill has ever done. (21:03)</li><li>Leaving IBM to join Gartner. (24:42)</li><li>How Bill got into developing an information security service during his time at Gartner. (26:05)</li><li>Bill shares some nuggets for those who want to better their communication skills and get to the next level in any organization. (29:39)</li><li>How Bill transitioned to KPMG. (33:12)</li><li>Where Bill first encountered industrial control systems. (36:03)</li><li>Why we are fortunate to be living in this age, in human history. (38:45)</li><li>Bill talks about mentorship and shares some valuable advice for people starting in training positions. (39:35)</li><li>The advice Bill would give to his younger self. (45:56)</li><li>Bill shares his advice regarding potential future careers. (47:40)</li><li>Why Bill sees no significant productive application in the future of blockchain. (51:12)</li></ul><br/><p><strong>Links and resources:</strong></p><p>Recommended video:&nbsp;<a href="https://www.youtube.com/watch?v=j7zzQpvoYcQ" rel="noopener noreferrer" target="_blank">The Last Lecture</a>&nbsp;by Randy Pausch</p>]]></description><content:encoded><![CDATA[<p>Today, Bill Malik, the Vice President for Infrastructure Strategies at Trend Micro, joins Derek Harp. Bill is a well-rounded individual who has been involved in the security industry for quite some time. He has tons of experience in many different areas and has a long list of career milestones. Bill is a well-known writer, analyst, and speaker. He is a former programmer who still enjoys dabbling for fun! He is also a father and grandfather, an explorer of ideas, a chef, a wine connoisseur- and was even once a DJ!</p><p>In this episode of the (CS)²AI Podcast, Bill gives an inside view into his career journey. He discusses his interesting career and explains how he got involved in developing an information security service. He also shares some gold nuggets of advice for those individuals who would like to get to the next level in their organization by bettering their communication skills and offers excellent advice for those starting in their careers.&nbsp;&nbsp;</p><p>This is a great conversation full of nuggets that you won’t want to miss! Stay tuned for more!</p><p><strong>Show highlights:</strong></p><ul><li>Bill talks about his background. (10:15)</li><li>When technology first came into play in Bill’s life. (13:08)</li><li>Bill discusses MIT’s involvement in developing a secure system for time-sharing, which led to his first intersection with cookies and security. (14:12)</li><li>Bill talks about the event that led to his first information security moment as an app developer. (19:39)</li><li>One of the biggest bits of programming Bill has ever done. (21:03)</li><li>Leaving IBM to join Gartner. (24:42)</li><li>How Bill got into developing an information security service during his time at Gartner. (26:05)</li><li>Bill shares some nuggets for those who want to better their communication skills and get to the next level in any organization. (29:39)</li><li>How Bill transitioned to KPMG. (33:12)</li><li>Where Bill first encountered industrial control systems. (36:03)</li><li>Why we are fortunate to be living in this age, in human history. (38:45)</li><li>Bill talks about mentorship and shares some valuable advice for people starting in training positions. (39:35)</li><li>The advice Bill would give to his younger self. (45:56)</li><li>Bill shares his advice regarding potential future careers. (47:40)</li><li>Why Bill sees no significant productive application in the future of blockchain. (51:12)</li></ul><br/><p><strong>Links and resources:</strong></p><p>Recommended video:&nbsp;<a href="https://www.youtube.com/watch?v=j7zzQpvoYcQ" rel="noopener noreferrer" target="_blank">The Last Lecture</a>&nbsp;by Randy Pausch</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">d97ccccd-bbc8-403d-baa4-b1616aebc68f</guid><itunes:image href="https://artwork.captivate.fm/6babc628-6e67-4caa-af0d-13d653490a91/G6xUJWUivFEYQHBHjfB1MiOg.jpg"/><pubDate>Tue, 02 Nov 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c1e3d2e8-a5d4-4b19-8906-b79d1dd6caff/cs2ai-podcast-bill-malik-edited-audio.mp3" length="45446349" type="audio/mpeg"/><itunes:duration>47:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode></item><item><title>10: A Non-Traditional Path of Curiosity &amp; Cybersecurity with Jim McGlone</title><itunes:title>10: A Non-Traditional Path of Curiosity &amp; Cybersecurity with Jim McGlone</itunes:title><description><![CDATA[<p>In today’s episode of (CS)²AI Podcast, Derek Harp is joined by Jim McGlone. Jim is from Kenexis. He is an industry veteran working on control systems, safety, and security. Jim was born in Baltimore, Maryland. His dad worked for government contractors, so Jim was taken all over the world as a child. He remembers living in Germany, where his dad was responsible for all the control systems, and targeting mechanisms on cold war nuclear missiles pointed at Russia. His life was a little stressful and strange back then because his family took some weird vacations to places in Switzerland which Jim, only in his fifties, learned were safe houses. Later, when he was in grade school, their family moved back to a small town in Ohio where Jim grew up amongst some interesting people living on the edge of Amish country.&nbsp;</p><p>After graduating from high school, Jim went to the University of Akron intending to get a double E Degree. He did not do well, unfortunately, and dropped out after three years. He later graduated from the University of New York, with honors, with degrees in computer technology, nuclear technologies, and physics. Then, ten years later, he earned his MBA.&nbsp;</p><p>Jim is a multi-talented individual! What really sets him apart from others is his insatiable curiosity. He is constantly changing and evolving. In this episode, he talks about his career and how the unusual education choices he made early on later influenced his career path. He did not follow the expected order of things, preferring to do it in his own time. Later in his career, he went back and completed much of what had earlier been expected of him. You will not want to miss this episode if you’re curious, like Jim, and always striving to grow and develop.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Jim’s children get upset with him because he is unable to tell his grandchildren what he does in his career because it is too complicated. (13:45)</li><li>Jim just did several safety courses and is preparing to get some certifications for process safety, like risk analysis. (14:46)</li><li>How education in the military differs from other education. (15:15)</li><li>Where industrial controls and systems intersected with Jim’s journey. (16:00)</li><li>Jim’s career journey just after he got out of the navy. (17:59)</li><li>The point at which Jim’s life became all about computers and software. (21:58)</li><li>Meeting Bryan Singer and traveling with him, doing sustainability and security summits. (25:31)</li><li>Jim went to work for Honeywell. (28:00)</li><li>When Jim got ahead of the curve with the software he created. (31:10)</li><li>Some circuits are so critical that we need to rethink what they get hooked up to. (35:05)</li><li>Jim is coming up with standard language around cyber security. (45:35)</li><li>Some of the challenges Jim has faced in his career: Good advice for anyone who’s looking to get into cybersecurity as a career (47:00)</li><li>How mentorship has played a part in Jim’s life. (57:24)</li></ul><br/><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></description><content:encoded><![CDATA[<p>In today’s episode of (CS)²AI Podcast, Derek Harp is joined by Jim McGlone. Jim is from Kenexis. He is an industry veteran working on control systems, safety, and security. Jim was born in Baltimore, Maryland. His dad worked for government contractors, so Jim was taken all over the world as a child. He remembers living in Germany, where his dad was responsible for all the control systems, and targeting mechanisms on cold war nuclear missiles pointed at Russia. His life was a little stressful and strange back then because his family took some weird vacations to places in Switzerland which Jim, only in his fifties, learned were safe houses. Later, when he was in grade school, their family moved back to a small town in Ohio where Jim grew up amongst some interesting people living on the edge of Amish country.&nbsp;</p><p>After graduating from high school, Jim went to the University of Akron intending to get a double E Degree. He did not do well, unfortunately, and dropped out after three years. He later graduated from the University of New York, with honors, with degrees in computer technology, nuclear technologies, and physics. Then, ten years later, he earned his MBA.&nbsp;</p><p>Jim is a multi-talented individual! What really sets him apart from others is his insatiable curiosity. He is constantly changing and evolving. In this episode, he talks about his career and how the unusual education choices he made early on later influenced his career path. He did not follow the expected order of things, preferring to do it in his own time. Later in his career, he went back and completed much of what had earlier been expected of him. You will not want to miss this episode if you’re curious, like Jim, and always striving to grow and develop.&nbsp;</p><p><strong>Show highlights:</strong></p><ul><li>Jim’s children get upset with him because he is unable to tell his grandchildren what he does in his career because it is too complicated. (13:45)</li><li>Jim just did several safety courses and is preparing to get some certifications for process safety, like risk analysis. (14:46)</li><li>How education in the military differs from other education. (15:15)</li><li>Where industrial controls and systems intersected with Jim’s journey. (16:00)</li><li>Jim’s career journey just after he got out of the navy. (17:59)</li><li>The point at which Jim’s life became all about computers and software. (21:58)</li><li>Meeting Bryan Singer and traveling with him, doing sustainability and security summits. (25:31)</li><li>Jim went to work for Honeywell. (28:00)</li><li>When Jim got ahead of the curve with the software he created. (31:10)</li><li>Some circuits are so critical that we need to rethink what they get hooked up to. (35:05)</li><li>Jim is coming up with standard language around cyber security. (45:35)</li><li>Some of the challenges Jim has faced in his career: Good advice for anyone who’s looking to get into cybersecurity as a career (47:00)</li><li>How mentorship has played a part in Jim’s life. (57:24)</li></ul><br/><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">a36b0f41-962f-4a19-9502-62ab39d54075</guid><itunes:image href="https://artwork.captivate.fm/e0404d2b-713c-4ece-8a08-526d39b09236/ix2UKcn2VDRi_M0l-leaXOw.jpg"/><pubDate>Tue, 26 Oct 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b3755dde-beed-4df6-a9ea-2b76d307a0dc/cs2ai-1.mp3" length="81663610" type="audio/mpeg"/><itunes:duration>56:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode></item><item><title>09: Mentorship for Cyber Security Career Development with Rick Peters</title><itunes:title>09: Mentorship for Cyber Security Career Development with Rick Peters</itunes:title><description><![CDATA[<p>Today, Rick Peters joins Derek Harp. Rick has a long history in the world of cyber security. He is currently the CISO for Operational Technology, North America for Fortinet.&nbsp;</p><p>Rick was born and raised on the east coast and was always involved with the community there. That involvement afforded him some wonderful opportunities, both before and after he graduated from college with a Double E degree.&nbsp;</p><p>In high school, Rick never thought he would end up with a career in math and the sciences. He dabbled in architecture for a while but soon realized he was not cut out for it. Then, he looked into engineering and found he had an aptitude for it and was a natural fit for that world. He found his niche specifically in the digital aspect of engineering.</p><p>In this episode of (CS)²AI Podcast, Rick tells his story. He talks about the awesome opportunities he had for growth while working as an engineer at the NSA and discusses the time he spent overseas with US Air Force Europe, working with industrial control systems and SCADA technology. He also explains why mentorship is vital and shares some sterling advice for getting ahead in your career and for those thinking about moving from working for the government to working in the private sector. Tune in to hear more!</p><p><strong>Show highlights:</strong></p><ul><li>How Rick found his niche. (3:01)</li><li>The fantastic opportunities Rick had for growth while working as an engineer at the NSA. (6:35)</li><li>The questions you need to ask yourself as a career professional. (6:50)</li><li>Spending five years with the US Air Force in Europe as NSA’s Liaison. (8:45)</li><li>Raising the bar for security in the US Air Force. (12:37)</li><li>Working with operational technology- or industrial control systems and SCADA technology. (14:35)</li><li>Thinking about security from the inside out. (20:00)</li><li>Rick talks about his career path. (24:35)&nbsp;</li><li>Some advice for those considering moving from working for the government to working in the private sector. (26:52)</li><li>The career advice Rick would give to his younger self. (34:02)</li></ul><br/><p><strong>Resources:</strong></p><p><a href="https://fortinet.com" rel="noopener noreferrer" target="_blank">Fortinet Website</a></p><p><a href="https://cs2ai.org" rel="noopener noreferrer" target="_blank">CS2AI Website</a></p><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></description><content:encoded><![CDATA[<p>Today, Rick Peters joins Derek Harp. Rick has a long history in the world of cyber security. He is currently the CISO for Operational Technology, North America for Fortinet.&nbsp;</p><p>Rick was born and raised on the east coast and was always involved with the community there. That involvement afforded him some wonderful opportunities, both before and after he graduated from college with a Double E degree.&nbsp;</p><p>In high school, Rick never thought he would end up with a career in math and the sciences. He dabbled in architecture for a while but soon realized he was not cut out for it. Then, he looked into engineering and found he had an aptitude for it and was a natural fit for that world. He found his niche specifically in the digital aspect of engineering.</p><p>In this episode of (CS)²AI Podcast, Rick tells his story. He talks about the awesome opportunities he had for growth while working as an engineer at the NSA and discusses the time he spent overseas with US Air Force Europe, working with industrial control systems and SCADA technology. He also explains why mentorship is vital and shares some sterling advice for getting ahead in your career and for those thinking about moving from working for the government to working in the private sector. Tune in to hear more!</p><p><strong>Show highlights:</strong></p><ul><li>How Rick found his niche. (3:01)</li><li>The fantastic opportunities Rick had for growth while working as an engineer at the NSA. (6:35)</li><li>The questions you need to ask yourself as a career professional. (6:50)</li><li>Spending five years with the US Air Force in Europe as NSA’s Liaison. (8:45)</li><li>Raising the bar for security in the US Air Force. (12:37)</li><li>Working with operational technology- or industrial control systems and SCADA technology. (14:35)</li><li>Thinking about security from the inside out. (20:00)</li><li>Rick talks about his career path. (24:35)&nbsp;</li><li>Some advice for those considering moving from working for the government to working in the private sector. (26:52)</li><li>The career advice Rick would give to his younger self. (34:02)</li></ul><br/><p><strong>Resources:</strong></p><p><a href="https://fortinet.com" rel="noopener noreferrer" target="_blank">Fortinet Website</a></p><p><a href="https://cs2ai.org" rel="noopener noreferrer" target="_blank">CS2AI Website</a></p><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">e10a914c-d80b-42d7-b72a-1d74924fc210</guid><itunes:image href="https://artwork.captivate.fm/cca42594-b7c9-4937-9c5f-1dffcadcde1b/RzIdOT7NqIVWs5p5gNb2aBym.jpg"/><pubDate>Tue, 19 Oct 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/32a3cf06-0cb4-4050-b858-c93b289bcd12/cs2ai-rickpeters-final.mp3" length="17118854" type="audio/mpeg"/><itunes:duration>35:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode></item><item><title>08: Creating a Business Around a Great Idea That Solves Problems with Lior Frenkel</title><itunes:title>08: Creating a Business Around a Great Idea That Solves Problems with Lior Frenkel</itunes:title><description><![CDATA[<p>Today, Derek Harp is joined by Lior Frenkel, the CEO, and Founder of Waterfall Security Solutions. Lior is a man of many talents! He is an entrepreneur and a business executive. He is also a problem-solver, father, off-road adventurer, competitive shooter, and cooking enthusiast! He has created multiple companies, and he was involved in developing many different products, both commercially and for the military.</p><p>Lior was born and raised in Israel. He had his first encounter with technology at eight years old when his parents bought a computer for his brother. He got hooked immediately, and since then, he has never left the keyboard! It has always excited Lior to see something tangible happen after writing a few lines of code, and he loves to see people using his technology to solve something meaningful!&nbsp;</p><p>In this episode of (CS)²AI Podcast, Lior shares his captivating story. He talks about how he taught himself to code at a very young age, the software he developed while in high school, his capacity for solving problems, and why he chose to make a career in the field of cyber security. Stay tuned today to hear about Lior’s journey, and find out how to create a successful business around a great idea or solution.</p><p><strong>Show highlights:</strong></p><ul><li>Lior shares his background and origin story. (20:48)</li><li>Learning through his real-life experience and from others with more knowledge. (25:55)</li><li>Finding ways to solve problems has always been most important for Lior. (29:02)</li><li>How Lior started his career while still in high school, selling the educational software he developed. (35:15)</li><li>Lior talks about his incredible experience in the Israeli Air Force and starting his first business as an adult. (37:29)</li><li>He knew nothing about business when he started focusing on building technologies for computer/information warfare. (42:19)</li><li>What Lior started to worry about when he never failed to get in through the perimeter security or firewalls of his targets. (46:13)</li><li>Lior explains why security became the focus of his life. (50:25)</li><li>How to start a successful business around a great idea for a new solution. (55:48)</li><li>Lior shares his vision for the future. (1:06:54)</li></ul><br/><p><strong>Resources:</strong></p><p><a href="https://waterfall-security.com" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a></p><p><a href="https://CS2AI.org" rel="noopener noreferrer" target="_blank">CS2AI.org</a></p><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is joined by Lior Frenkel, the CEO, and Founder of Waterfall Security Solutions. Lior is a man of many talents! He is an entrepreneur and a business executive. He is also a problem-solver, father, off-road adventurer, competitive shooter, and cooking enthusiast! He has created multiple companies, and he was involved in developing many different products, both commercially and for the military.</p><p>Lior was born and raised in Israel. He had his first encounter with technology at eight years old when his parents bought a computer for his brother. He got hooked immediately, and since then, he has never left the keyboard! It has always excited Lior to see something tangible happen after writing a few lines of code, and he loves to see people using his technology to solve something meaningful!&nbsp;</p><p>In this episode of (CS)²AI Podcast, Lior shares his captivating story. He talks about how he taught himself to code at a very young age, the software he developed while in high school, his capacity for solving problems, and why he chose to make a career in the field of cyber security. Stay tuned today to hear about Lior’s journey, and find out how to create a successful business around a great idea or solution.</p><p><strong>Show highlights:</strong></p><ul><li>Lior shares his background and origin story. (20:48)</li><li>Learning through his real-life experience and from others with more knowledge. (25:55)</li><li>Finding ways to solve problems has always been most important for Lior. (29:02)</li><li>How Lior started his career while still in high school, selling the educational software he developed. (35:15)</li><li>Lior talks about his incredible experience in the Israeli Air Force and starting his first business as an adult. (37:29)</li><li>He knew nothing about business when he started focusing on building technologies for computer/information warfare. (42:19)</li><li>What Lior started to worry about when he never failed to get in through the perimeter security or firewalls of his targets. (46:13)</li><li>Lior explains why security became the focus of his life. (50:25)</li><li>How to start a successful business around a great idea for a new solution. (55:48)</li><li>Lior shares his vision for the future. (1:06:54)</li></ul><br/><p><strong>Resources:</strong></p><p><a href="https://waterfall-security.com" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a></p><p><a href="https://CS2AI.org" rel="noopener noreferrer" target="_blank">CS2AI.org</a></p><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">63a9b01a-f096-4638-b084-f8400833baa4</guid><itunes:image href="https://artwork.captivate.fm/f3448f37-362d-42f0-98d7-9196f3dec8a0/4FYWWhq3uHnStpVm2ymPaxCm.jpg"/><pubDate>Tue, 12 Oct 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ba23cce1-f834-4115-bc6b-e26b233a598e/cs2ai-ep-liorfrenkel-final.mp3" length="18798593" type="audio/mpeg"/><itunes:duration>39:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode></item><item><title>07: Becoming an Effective Leader in Technology Control Systems with Jim Crowley</title><itunes:title>07: Becoming an Effective Leader in Technology Control Systems with Jim Crowley</itunes:title><description><![CDATA[<p>Today, Derek Harp is joined by Jim Crowley, the Chief Executer Officer of Industrial Defender. Jim is a well-known sales expert who has held many different sales positions. He started out in the world of technology in the late 1970s, loading data into an IBM system via a punch-card loader to run a statistics program. He got to know the industrial space from the bottom up at an early age, taking machines apart, putting in packing, and being on the plant floor. Jim is an extroverted family man who loves the outdoors and doing competitive saltwater fishing on the weekends.</p><p>In today’s episode of the (CS)²AI Podcast, Jim shares his fascinating journey into the world of cyber security. He explains how well his past sales roles in IT fit together with the development of Industrial Defender and talks about the ingredients that contributed to Industrial Defender becoming a leader in the cybersecurity space. Jim also talks about collaboration and mentorship and offers advice about some intangible elements, other than technology, that can make a startup company successful. Stay tuned today to hear Jim’s engaging story, get some great advice, and learn what it takes to become an effective leader in the technology control systems space.</p><p><strong>Show highlights:</strong></p><ul><li>Jim shares his backstory. (2:12)</li><li>The early days, when industrial component systems intersected with Jim’s career. (6:25)&nbsp;</li><li>What it takes to become a leader in the cyber security space. (9:22)</li><li>Jim shares some tips for overcoming challenges. (13:40)</li><li>The intangible elements that can help make a startup company successful. (14:21)</li><li>Jim offers some advice to facilitate collaboration. (16:38)</li><li>Jim talks about how things have changed at Industrial Defender since he returned after leaving and becoming an entrepreneur. (19:12)</li><li>The role that mentorship has played in Jim’s journey. (21:32)</li><li>Becoming more valuable in the cyber security space and knowing when it is time to move on. (24:57)</li><li>Some advice for skilled IT practitioners who want to branch into the technology control systems space. (35:07)</li><li>Jim talks about what it will take to be successful in the OT world in the future. (36:52)</li></ul><br/><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></description><content:encoded><![CDATA[<p>Today, Derek Harp is joined by Jim Crowley, the Chief Executer Officer of Industrial Defender. Jim is a well-known sales expert who has held many different sales positions. He started out in the world of technology in the late 1970s, loading data into an IBM system via a punch-card loader to run a statistics program. He got to know the industrial space from the bottom up at an early age, taking machines apart, putting in packing, and being on the plant floor. Jim is an extroverted family man who loves the outdoors and doing competitive saltwater fishing on the weekends.</p><p>In today’s episode of the (CS)²AI Podcast, Jim shares his fascinating journey into the world of cyber security. He explains how well his past sales roles in IT fit together with the development of Industrial Defender and talks about the ingredients that contributed to Industrial Defender becoming a leader in the cybersecurity space. Jim also talks about collaboration and mentorship and offers advice about some intangible elements, other than technology, that can make a startup company successful. Stay tuned today to hear Jim’s engaging story, get some great advice, and learn what it takes to become an effective leader in the technology control systems space.</p><p><strong>Show highlights:</strong></p><ul><li>Jim shares his backstory. (2:12)</li><li>The early days, when industrial component systems intersected with Jim’s career. (6:25)&nbsp;</li><li>What it takes to become a leader in the cyber security space. (9:22)</li><li>Jim shares some tips for overcoming challenges. (13:40)</li><li>The intangible elements that can help make a startup company successful. (14:21)</li><li>Jim offers some advice to facilitate collaboration. (16:38)</li><li>Jim talks about how things have changed at Industrial Defender since he returned after leaving and becoming an entrepreneur. (19:12)</li><li>The role that mentorship has played in Jim’s journey. (21:32)</li><li>Becoming more valuable in the cyber security space and knowing when it is time to move on. (24:57)</li><li>Some advice for skilled IT practitioners who want to branch into the technology control systems space. (35:07)</li><li>Jim talks about what it will take to be successful in the OT world in the future. (36:52)</li></ul><br/><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">57acde36-bafd-4567-a04f-4258ef159815</guid><itunes:image href="https://artwork.captivate.fm/c1f68d26-a387-4762-a8f3-031572d40e34/twNA9OYSjlPEHDLkEX5V3Vh-.jpg"/><pubDate>Tue, 05 Oct 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c31f438a-4fe8-420c-b21f-01a96fa60be5/cs2ai-ep-7-edited-final.mp3" length="17271733" type="audio/mpeg"/><itunes:duration>35:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode></item><item><title>06: The Continuous Adaptability and Improvement of Cybersecurity with Professor Harry Wingo</title><itunes:title>06: The Continuous Adaptability and Improvement of Cybersecurity with Professor Harry Wingo</itunes:title><description><![CDATA[<p>In today’s episode of (CS)²AI Podcast, Derek Harp is joined by Professor Harry Wingo, a full-time faculty member at the National Defense University in Washington, D.C., U.S., where he serves as Chair of the Cyber Studies Department within NDU’s College of Information and Cyberspace. He has more than 25 years of government and corporate leadership experience, including 15 years focused on information and communications technology law and policy.&nbsp;</p><p>Harry has served as President and CEO of the D.C. Chamber of Commerce, Senior Policy Counsel at Google, Counsel to the Senate Committee on Science, Commerce &amp; Transportation, Special Counsel to the General Counsel of the Federal Communications Commission and an Associate with the law firm of Skadden, Arps, Slate, Meagher &amp; Flom. Before his career in law and technology, he served for more than six years as a Navy SEAL officer.&nbsp;</p><p>Harry will share the incredible journey of how he got into cybersecurity and his insights and views regarding the talent shortage in the industry, the importance of diversity and inclusion for the future workforce, national cybersecurity defense in an ever-changing environment, and the overall challenges the industry continually faces. If you’re really interested in cybersecurity like Derek and Harry are, this is one episode you won’t wanna miss.</p><p><strong>Show Highlights:</strong></p><ul><li>Starting out as a Navy SEAL and transitioning into law and technology which led him towards specializing in cybersecurity (01:20)</li><li>Growing up as a nerd with an interest in some of the earliest computers that were there (05:10)</li><li>The boxing coach who facilitated his exposure to the SEALS as a possible career route (08:30)</li><li>How being in the SEALS enabled him to pursue his consistent interest in information and communications (11:00)</li><li>Working for the Federal Communications Commission as a special counsel to the general counsel, and being involved in the development of policy and legal frameworks around spyware and other cybersecurity issues (16:22)</li><li>Why and how the cognitive side of cybersecurity came crashing into the forefront (22:04)</li><li>Diving into how to protect networks, make sure they’re defended and how to conduct cyber warfare in consistency with international law (28:00)</li><li>The importance of finding champions/mentors who take an interest in us and never letting go (32:42)</li><li>Getting guidance on what your life purpose is through the Ikigai concept (35:05)</li><li>Automation and AI: Up-to-date advice for anyone who’s looking to get into cybersecurity as a career (42:47)</li></ul><br/><p><strong>Links and Resources:</strong></p><p><a href="https://cs2ai.org" rel="noopener noreferrer" target="_blank">More about (CS)²AI</a></p><p><a href="https://amzn.to/39GNGir" rel="noopener noreferrer" target="_blank">Rebooting AI By Gary Marcus and Ernest Davis</a></p><p><a href="https://amzn.to/2XVcWPb" rel="noopener noreferrer" target="_blank">Artificial Intelligence: A Guide for Thinking Humans</a> By Melanie Mitchell</p><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></description><content:encoded><![CDATA[<p>In today’s episode of (CS)²AI Podcast, Derek Harp is joined by Professor Harry Wingo, a full-time faculty member at the National Defense University in Washington, D.C., U.S., where he serves as Chair of the Cyber Studies Department within NDU’s College of Information and Cyberspace. He has more than 25 years of government and corporate leadership experience, including 15 years focused on information and communications technology law and policy.&nbsp;</p><p>Harry has served as President and CEO of the D.C. Chamber of Commerce, Senior Policy Counsel at Google, Counsel to the Senate Committee on Science, Commerce &amp; Transportation, Special Counsel to the General Counsel of the Federal Communications Commission and an Associate with the law firm of Skadden, Arps, Slate, Meagher &amp; Flom. Before his career in law and technology, he served for more than six years as a Navy SEAL officer.&nbsp;</p><p>Harry will share the incredible journey of how he got into cybersecurity and his insights and views regarding the talent shortage in the industry, the importance of diversity and inclusion for the future workforce, national cybersecurity defense in an ever-changing environment, and the overall challenges the industry continually faces. If you’re really interested in cybersecurity like Derek and Harry are, this is one episode you won’t wanna miss.</p><p><strong>Show Highlights:</strong></p><ul><li>Starting out as a Navy SEAL and transitioning into law and technology which led him towards specializing in cybersecurity (01:20)</li><li>Growing up as a nerd with an interest in some of the earliest computers that were there (05:10)</li><li>The boxing coach who facilitated his exposure to the SEALS as a possible career route (08:30)</li><li>How being in the SEALS enabled him to pursue his consistent interest in information and communications (11:00)</li><li>Working for the Federal Communications Commission as a special counsel to the general counsel, and being involved in the development of policy and legal frameworks around spyware and other cybersecurity issues (16:22)</li><li>Why and how the cognitive side of cybersecurity came crashing into the forefront (22:04)</li><li>Diving into how to protect networks, make sure they’re defended and how to conduct cyber warfare in consistency with international law (28:00)</li><li>The importance of finding champions/mentors who take an interest in us and never letting go (32:42)</li><li>Getting guidance on what your life purpose is through the Ikigai concept (35:05)</li><li>Automation and AI: Up-to-date advice for anyone who’s looking to get into cybersecurity as a career (42:47)</li></ul><br/><p><strong>Links and Resources:</strong></p><p><a href="https://cs2ai.org" rel="noopener noreferrer" target="_blank">More about (CS)²AI</a></p><p><a href="https://amzn.to/39GNGir" rel="noopener noreferrer" target="_blank">Rebooting AI By Gary Marcus and Ernest Davis</a></p><p><a href="https://amzn.to/2XVcWPb" rel="noopener noreferrer" target="_blank">Artificial Intelligence: A Guide for Thinking Humans</a> By Melanie Mitchell</p><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">dbf2244d-069a-4343-a830-bb330ddd2a4a</guid><itunes:image href="https://artwork.captivate.fm/5747acf7-a245-4d4e-bb56-3c5e79523447/m5gIKD8vK-cCAQt7fqtCxIVy.jpg"/><pubDate>Tue, 28 Sep 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/67b63efe-eb33-4e34-8c93-3d6cb0911ed9/cs2ai-ep5-final.mp3" length="22907488" type="audio/mpeg"/><itunes:duration>47:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode></item><item><title>05: Navigating the Modern Cybersecurity Landscape with Dr. Eric Cole</title><itunes:title>05: Navigating the Modern Cybersecurity Landscape with Dr. Eric Cole</itunes:title><description><![CDATA[<p>In today’s episode of (CS)²AI Podcast, Derek Harp is joined by Dr. Eric Cole, PhD, an industry-recognized security expert with over 20 years of hands-on experience in consulting, training, and public speaking. As the founder and CEO of <a href="https://secure-anchor.com/" rel="noopener noreferrer" target="_blank">Secure Anchor Consulting</a>, Dr. Cole focuses on helping customers prevent security breaches, detect network intrusions, and respond to advanced threats. In addition, he is a sought-after expert witness and a 2014 inductee to the InfoSecurity Hall of Fame.</p><p>Dr. Cole is the author of several books, including Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization; Hackers Beware: The Ultimate Guide to Network Security; and Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft; and Hiding in Plain Sight. With over 20 patent applications, he is on the cutting edge of cyber security research and development. Eric will share his incredible journey from interning for the CIA as a hacker to becoming a successful entrepreneur in the cybersecurity space, and share actionable tips about the practices that led him on the path to success and fulfilment while doing what he loves most.&nbsp;</p><p>From his cybersecurity wisdom, he will also help us understand how cybersecurity fits within this new landscape that we call life and how we can position ourselves and our businesses to take advantage of that. At the least, this episode will help you take an assessment of your inventory of skills and other resources so you can survive through the current challenging environment brought about by the Covid-19 pandemic, so stay tuned.</p><p><strong>Show Highlights</strong></p><ul><li>From being a professional hacker for the CIA to an entrepreneur in the cyber security space (01:58)</li><li>His constant love for technology, from a programming and functionality perspective, throughout his life (06:42)</li><li>Making the choice to work while going to school and how it equipped him with what he needed to succeed in life (11:42)</li><li>The importance of approaching people who can help you find opportunities and achieve goals (14:09)</li><li>How powerful old school methods of reaching out are, compared to the more modern methods like email (17:22)</li><li>Looking at challenges as opportunities to keep winning even in the most difficult of times (19:40)</li><li>The experience Eric has had with following his heart versus chasing money (22:14)</li><li>Helping people understand the actual issues that bring about cybersecurity breaches&nbsp; (30:20)</li><li>Reading widely, exercising and eating well to keep his performance at the highest level (32:03)</li></ul><br/><p><strong>Links and Resources</strong></p><ul><li><a href="http://cs2ai.org/" rel="noopener noreferrer" target="_blank">More about (CS)²AI</a></li><li><a href="https://secure-anchor.com/" rel="noopener noreferrer" target="_blank">Secure Anchor Consulting</a></li><li><a href="https://www.amazon.com/Online-Danger-Protect-Yourself-Internet/dp/1683505336" rel="noopener noreferrer" target="_blank">Online Danger By Dr. Eric Cole</a></li></ul><br/><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></description><content:encoded><![CDATA[<p>In today’s episode of (CS)²AI Podcast, Derek Harp is joined by Dr. Eric Cole, PhD, an industry-recognized security expert with over 20 years of hands-on experience in consulting, training, and public speaking. As the founder and CEO of <a href="https://secure-anchor.com/" rel="noopener noreferrer" target="_blank">Secure Anchor Consulting</a>, Dr. Cole focuses on helping customers prevent security breaches, detect network intrusions, and respond to advanced threats. In addition, he is a sought-after expert witness and a 2014 inductee to the InfoSecurity Hall of Fame.</p><p>Dr. Cole is the author of several books, including Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization; Hackers Beware: The Ultimate Guide to Network Security; and Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft; and Hiding in Plain Sight. With over 20 patent applications, he is on the cutting edge of cyber security research and development. Eric will share his incredible journey from interning for the CIA as a hacker to becoming a successful entrepreneur in the cybersecurity space, and share actionable tips about the practices that led him on the path to success and fulfilment while doing what he loves most.&nbsp;</p><p>From his cybersecurity wisdom, he will also help us understand how cybersecurity fits within this new landscape that we call life and how we can position ourselves and our businesses to take advantage of that. At the least, this episode will help you take an assessment of your inventory of skills and other resources so you can survive through the current challenging environment brought about by the Covid-19 pandemic, so stay tuned.</p><p><strong>Show Highlights</strong></p><ul><li>From being a professional hacker for the CIA to an entrepreneur in the cyber security space (01:58)</li><li>His constant love for technology, from a programming and functionality perspective, throughout his life (06:42)</li><li>Making the choice to work while going to school and how it equipped him with what he needed to succeed in life (11:42)</li><li>The importance of approaching people who can help you find opportunities and achieve goals (14:09)</li><li>How powerful old school methods of reaching out are, compared to the more modern methods like email (17:22)</li><li>Looking at challenges as opportunities to keep winning even in the most difficult of times (19:40)</li><li>The experience Eric has had with following his heart versus chasing money (22:14)</li><li>Helping people understand the actual issues that bring about cybersecurity breaches&nbsp; (30:20)</li><li>Reading widely, exercising and eating well to keep his performance at the highest level (32:03)</li></ul><br/><p><strong>Links and Resources</strong></p><ul><li><a href="http://cs2ai.org/" rel="noopener noreferrer" target="_blank">More about (CS)²AI</a></li><li><a href="https://secure-anchor.com/" rel="noopener noreferrer" target="_blank">Secure Anchor Consulting</a></li><li><a href="https://www.amazon.com/Online-Danger-Protect-Yourself-Internet/dp/1683505336" rel="noopener noreferrer" target="_blank">Online Danger By Dr. Eric Cole</a></li></ul><br/><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">d11a97ed-129a-4aa7-9d22-90e16ec8848b</guid><itunes:image href="https://artwork.captivate.fm/308b1921-eac0-4421-8fd2-6ad9ed9d63a9/TCtVmJneg0ABq3wksxrryiFi.jpg"/><pubDate>Tue, 21 Sep 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d26c426a-a8d6-4e37-a021-dada9789f759/cs2ai-ep-4-final.mp3" length="16578464" type="audio/mpeg"/><itunes:duration>34:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode></item><item><title>04: The Pros &amp; Cons of a Narrow Niche in Cybersecurity with Marty Edwards</title><itunes:title>04: The Pros &amp; Cons of a Narrow Niche in Cybersecurity with Marty Edwards</itunes:title><description><![CDATA[<p>There’s a lot more to cyber security than what meets the eye. While many opt for more traditional paths within the industry, there are unique and niche opportunities available. Todays guest, Marty Edwards, is the Vice President of Operational Technology for Tenable, former director of ISC/CERT, an amateur radio operator, and a jack of all trades in many fields.&nbsp;</p><p>Today Marty discusses his journey of moving through his career, the pro’s and con’s he’s seen from having a narrowed niche, what he’s learned along the way, and so much more. Tune into this episode to hear more about Marty’s journey, along with an array of insight into his career.&nbsp;</p><p><strong>Show Highlights:&nbsp;</strong></p><ul><li>Marty shares what his childhood on a ranch in Canada was like&nbsp;</li><li>How Marty’s education helped him get into his career now&nbsp;</li><li>What Marty’s career looked like directly out of college&nbsp;</li><li>How Marty got into the position he has now&nbsp;</li><li>What is INL and what do they do&nbsp;</li><li>Marty shares what his role as an “industry liaison” looked like&nbsp;</li><li>How Marty became a Federal Civil Servant&nbsp;</li><li>What led to going from being in charge of a sector to overseeing the whole program&nbsp;</li><li>How having mentors impacted Marty’s career&nbsp;</li><li>The pro’s and con’s of having a really specialized niche&nbsp;</li><li>The benefits of having industrialized experience&nbsp;</li><li>Why certifications may or may not help your resume&nbsp;</li><li>The importance of being present in conversation&nbsp;</li><li>What excites Marty in his career today&nbsp;</li><li>Doing a critical analysis to resolve the problem&nbsp;</li><li>The evolution and movement to cloud based technologies&nbsp;</li></ul><br/><p><strong>Resources:</strong></p><p><a href="https://tenable.com" rel="noopener noreferrer" target="_blank"><strong>Tenable</strong></a></p><p><a href="https:/cs2ai.org" rel="noopener noreferrer" target="_blank"><strong>CS2AI</strong></a></p><p><span class="ql-cursor">﻿</span>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></description><content:encoded><![CDATA[<p>There’s a lot more to cyber security than what meets the eye. While many opt for more traditional paths within the industry, there are unique and niche opportunities available. Todays guest, Marty Edwards, is the Vice President of Operational Technology for Tenable, former director of ISC/CERT, an amateur radio operator, and a jack of all trades in many fields.&nbsp;</p><p>Today Marty discusses his journey of moving through his career, the pro’s and con’s he’s seen from having a narrowed niche, what he’s learned along the way, and so much more. Tune into this episode to hear more about Marty’s journey, along with an array of insight into his career.&nbsp;</p><p><strong>Show Highlights:&nbsp;</strong></p><ul><li>Marty shares what his childhood on a ranch in Canada was like&nbsp;</li><li>How Marty’s education helped him get into his career now&nbsp;</li><li>What Marty’s career looked like directly out of college&nbsp;</li><li>How Marty got into the position he has now&nbsp;</li><li>What is INL and what do they do&nbsp;</li><li>Marty shares what his role as an “industry liaison” looked like&nbsp;</li><li>How Marty became a Federal Civil Servant&nbsp;</li><li>What led to going from being in charge of a sector to overseeing the whole program&nbsp;</li><li>How having mentors impacted Marty’s career&nbsp;</li><li>The pro’s and con’s of having a really specialized niche&nbsp;</li><li>The benefits of having industrialized experience&nbsp;</li><li>Why certifications may or may not help your resume&nbsp;</li><li>The importance of being present in conversation&nbsp;</li><li>What excites Marty in his career today&nbsp;</li><li>Doing a critical analysis to resolve the problem&nbsp;</li><li>The evolution and movement to cloud based technologies&nbsp;</li></ul><br/><p><strong>Resources:</strong></p><p><a href="https://tenable.com" rel="noopener noreferrer" target="_blank"><strong>Tenable</strong></a></p><p><a href="https:/cs2ai.org" rel="noopener noreferrer" target="_blank"><strong>CS2AI</strong></a></p><p><span class="ql-cursor">﻿</span>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">6361e3c8-3b6f-4745-b591-8992e9eec484</guid><itunes:image href="https://artwork.captivate.fm/80a5b800-6b2a-48c5-b42f-22c58252f244/x-gdVV32bhy-txB-pvp5RZ1N.jpg"/><pubDate>Tue, 14 Sep 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f84c45a9-6c46-466d-a811-8e6a5ff2f2da/cs1ai-ep3-final.mp3" length="21920586" type="audio/mpeg"/><itunes:duration>45:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode></item><item><title>03: Innovations and the Value of Teamwork in Cybersecurity with Katie Pehrson</title><itunes:title>03: Innovations and the Value of Teamwork in Cybersecurity with Katie Pehrson</itunes:title><description><![CDATA[<p>Being a woman in the engineering space can be a challenge, but also gives you a unique perspective and opportunities. Today’s guest, Katie Pehrson is the technical director and an engineer for Bechtel, an engineering, construction, and project management company. Katie shares what led her to the career she has today, and what propelled her into her 19 year position with Bechtel.&nbsp;</p><p>Katie discusses what it’s like to be a women in the industry, innovative advancements that are being made, and the value of teamwork within the workplace. Tune into this episode for some remarkable insight into the engineering world.&nbsp;</p><p><strong>Show Highlights:&nbsp;</strong></p><ul><li>Katie shares how she got to where she is in her career&nbsp;</li><li>The building blocks of what Katie studied&nbsp;</li><li>How Katie started her career directly out of college&nbsp;</li><li>What Katie’s responsibilities entailed in her first job&nbsp;</li><li>What project intersected cyber security into Katie’s career path&nbsp;</li><li>Katie shares how learning and training was initiated at Bechtel&nbsp;</li><li>Why you should reach out to people and get knowledge from others&nbsp;</li><li>How problems have shifted within engineering over the years&nbsp;</li><li>What it’s like to be a woman in engineering&nbsp;</li><li>Advice Katie would give her younger self&nbsp;</li><li>Bringing people together in the industry&nbsp;</li><li>How to help the engineering industry be more inviting for women&nbsp;</li><li>The biggest challenges within the industry&nbsp;</li><li>Exciting emerging technology&nbsp;</li><li>Why skills are more important than your background</li><li>Advances in the industry that Katie is excited about&nbsp;</li></ul><br/><p><strong>Resources:</strong></p><p><a href="Bechtel.com" rel="noopener noreferrer" target="_blank">Bechtel.com</a></p><p><a href="Cs2ai.org" rel="noopener noreferrer" target="_blank">Cs2ai.org</a></p><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></description><content:encoded><![CDATA[<p>Being a woman in the engineering space can be a challenge, but also gives you a unique perspective and opportunities. Today’s guest, Katie Pehrson is the technical director and an engineer for Bechtel, an engineering, construction, and project management company. Katie shares what led her to the career she has today, and what propelled her into her 19 year position with Bechtel.&nbsp;</p><p>Katie discusses what it’s like to be a women in the industry, innovative advancements that are being made, and the value of teamwork within the workplace. Tune into this episode for some remarkable insight into the engineering world.&nbsp;</p><p><strong>Show Highlights:&nbsp;</strong></p><ul><li>Katie shares how she got to where she is in her career&nbsp;</li><li>The building blocks of what Katie studied&nbsp;</li><li>How Katie started her career directly out of college&nbsp;</li><li>What Katie’s responsibilities entailed in her first job&nbsp;</li><li>What project intersected cyber security into Katie’s career path&nbsp;</li><li>Katie shares how learning and training was initiated at Bechtel&nbsp;</li><li>Why you should reach out to people and get knowledge from others&nbsp;</li><li>How problems have shifted within engineering over the years&nbsp;</li><li>What it’s like to be a woman in engineering&nbsp;</li><li>Advice Katie would give her younger self&nbsp;</li><li>Bringing people together in the industry&nbsp;</li><li>How to help the engineering industry be more inviting for women&nbsp;</li><li>The biggest challenges within the industry&nbsp;</li><li>Exciting emerging technology&nbsp;</li><li>Why skills are more important than your background</li><li>Advances in the industry that Katie is excited about&nbsp;</li></ul><br/><p><strong>Resources:</strong></p><p><a href="Bechtel.com" rel="noopener noreferrer" target="_blank">Bechtel.com</a></p><p><a href="Cs2ai.org" rel="noopener noreferrer" target="_blank">Cs2ai.org</a></p><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">d5fccac0-6748-4517-964e-8754619bb213</guid><itunes:image href="https://artwork.captivate.fm/56f75920-c9a8-4240-b7fa-fec244da4895/uDd2ESQ-EBIqDy4wZtyjR2PA.jpg"/><pubDate>Tue, 07 Sep 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/46f7661d-9977-4ca8-993f-2e0921505d3d/cs1ai-ep2-final.mp3" length="14734118" type="audio/mpeg"/><itunes:duration>30:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:season>1</podcast:season></item><item><title>02: Practical Takeaways from the Cyber Security Report with Walter Risi of KPMG</title><itunes:title>02: Practical Takeaways from the Cyber Security Report with Walter Risi of KPMG</itunes:title><description><![CDATA[<p>Welcome to (CS)²AI Podcast! Todays episode is hosted by Derek Harp and joined by Walter Risi, Global Cyber IT Leader and Cyber Security Consultant at KPMG. This conversation is an assessment of the (CS)²AI/KPMG Cybersecurity Report, a mass IT report that covers broad and interesting topics within the cybersecurity space.&nbsp;</p><p>Derek and Walter cover important topics within the report, such as the lack of resources the large-scale companies are facing, the cyber immaturity that is harming companies, and the importance of increasing sophisticated technology.&nbsp;</p><p>Join Derek in this interview to learn more about the challenges companies are facing and how you can increase your own cyber security.&nbsp;</p><p><strong>Show Highlights:&nbsp;</strong></p><ul><li>How the report was produced and made&nbsp;</li><li>Dispersion we see in risk assessments within the market place&nbsp;</li><li>Is cloud security a priority&nbsp;</li><li>The biggest problem in the workplace&nbsp;</li><li>The importance of company maturity and what happens as companies mature&nbsp;</li><li>Number two reasons people are using managed services&nbsp;</li><li>Why reducing operational disruptions is important&nbsp;</li><li>Ensuring people understanding both cyber security and IT&nbsp;</li><li>Why more companies spent financial increase on tax management as opposed to more qualified work force&nbsp;</li><li>Reasons you should upgrade your defenses before it’s too serious&nbsp;</li><li>Why you should leverage the time you have now&nbsp;</li></ul><br/><p><strong>Links and Resources:</strong></p><p>For more information about (CS)²AI visit: <a href="http://CS2AI.org" rel="noopener noreferrer" target="_blank">CS2AI.org</a></p><p>For more information about KPMG visit: <a href="https://home.kpmg/xx/en/home.html" rel="noopener noreferrer" target="_blank">KPMG</a></p><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></description><content:encoded><![CDATA[<p>Welcome to (CS)²AI Podcast! Todays episode is hosted by Derek Harp and joined by Walter Risi, Global Cyber IT Leader and Cyber Security Consultant at KPMG. This conversation is an assessment of the (CS)²AI/KPMG Cybersecurity Report, a mass IT report that covers broad and interesting topics within the cybersecurity space.&nbsp;</p><p>Derek and Walter cover important topics within the report, such as the lack of resources the large-scale companies are facing, the cyber immaturity that is harming companies, and the importance of increasing sophisticated technology.&nbsp;</p><p>Join Derek in this interview to learn more about the challenges companies are facing and how you can increase your own cyber security.&nbsp;</p><p><strong>Show Highlights:&nbsp;</strong></p><ul><li>How the report was produced and made&nbsp;</li><li>Dispersion we see in risk assessments within the market place&nbsp;</li><li>Is cloud security a priority&nbsp;</li><li>The biggest problem in the workplace&nbsp;</li><li>The importance of company maturity and what happens as companies mature&nbsp;</li><li>Number two reasons people are using managed services&nbsp;</li><li>Why reducing operational disruptions is important&nbsp;</li><li>Ensuring people understanding both cyber security and IT&nbsp;</li><li>Why more companies spent financial increase on tax management as opposed to more qualified work force&nbsp;</li><li>Reasons you should upgrade your defenses before it’s too serious&nbsp;</li><li>Why you should leverage the time you have now&nbsp;</li></ul><br/><p><strong>Links and Resources:</strong></p><p>For more information about (CS)²AI visit: <a href="http://CS2AI.org" rel="noopener noreferrer" target="_blank">CS2AI.org</a></p><p>For more information about KPMG visit: <a href="https://home.kpmg/xx/en/home.html" rel="noopener noreferrer" target="_blank">KPMG</a></p><p>This podcast is brought to you by: <a href="https://www.cs2ai.org/sap/waterfall" rel="noopener noreferrer" target="_blank">Waterfall Security Solutions</a>, <a href="https://www.cs2ai.org/sap/fortinet" rel="noopener noreferrer" target="_blank">Fortinet</a>, <a href="https://www.cs2ai.org/sap/network-perception-" rel="noopener noreferrer" target="_blank">Network Perceptions</a>, <a href="https://www.cs2ai.org/sap/industrial--defender" rel="noopener noreferrer" target="_blank">Industrial Defender</a>, <a href="https://www.cs2ai.org/sap/tripwire" rel="noopener noreferrer" target="_blank">Tripwire</a> and <a href="https://www.cs2ai.org/sap/q-net" rel="noopener noreferrer" target="_blank">Q-Net Security</a>.</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast/episode/4db9bb34/01-practical-takeaways-from-the-cyber-security-report-with-walter-risi-of-kpmg]]></link><guid isPermaLink="false">b4bccc65-d1b9-4a9b-9ed0-e3fbbeecce5f</guid><itunes:image href="https://artwork.captivate.fm/0b12acf5-12c0-41e0-8fe8-a978f171ee08/zW9bH8u4TlI8-XVogPiyS1xt.jpg"/><pubDate>Mon, 03 May 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e07c5e0b-9ab6-4be9-ae14-59f658f4f0de/cs1ai-ep1-final.mp3" length="14625648" type="audio/mpeg"/><itunes:duration>30:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:season>1</podcast:season></item><item><title>01: Introducing the (CS)²AI Podcast</title><itunes:title>01: Introducing the (CS)²AI Podcast</itunes:title><description><![CDATA[<p>In this episode, you'll meet your host, Derek Harp, as he shares the vision for the podcast. The podcast has been in the works for quite a while and we're excited to bring you some of the biggest names in the cyber security industry.</p><p>We're very thankful for the sponsors of the podcast. We couldn't do it without them, and you can find them linked on the <a href="(CS)²AI website" rel="noopener noreferrer" target="_blank">(CS)²AI website</a>. </p><p>There are so many exciting things planned for season 1, and we'd love to get your feedback on the show, as well as any suggestions you may have about the type of content you'd like to see.</p><p>We can't wait for all that we have in store for you - it's an exciting time to be in our industry!</p>]]></description><content:encoded><![CDATA[<p>In this episode, you'll meet your host, Derek Harp, as he shares the vision for the podcast. The podcast has been in the works for quite a while and we're excited to bring you some of the biggest names in the cyber security industry.</p><p>We're very thankful for the sponsors of the podcast. We couldn't do it without them, and you can find them linked on the <a href="(CS)²AI website" rel="noopener noreferrer" target="_blank">(CS)²AI website</a>. </p><p>There are so many exciting things planned for season 1, and we'd love to get your feedback on the show, as well as any suggestions you may have about the type of content you'd like to see.</p><p>We can't wait for all that we have in store for you - it's an exciting time to be in our industry!</p>]]></content:encoded><link><![CDATA[https://www.cs2ai.org/podcast]]></link><guid isPermaLink="false">5886ef21-239a-4095-b08d-cd4744654087</guid><itunes:image href="https://artwork.captivate.fm/a646b1e7-5520-4b2a-97ae-87af1f63be55/SI8vqQ-VSQkafbTHh5wUWYW3.jpg"/><pubDate>Sun, 02 May 2021 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6e1ad4be-33d6-46cf-bf12-878a4367b83c/cs2ai-intro-podcast-edited.mp3" length="3415159" type="audio/mpeg"/><itunes:duration>04:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season></item></channel></rss>