Industrial Cybersecurity Insider cover art

Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

By: Industrial Cybersecurity Insider
Listen for free

About this listen

Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!Copyright 2026 Industrial Cybersecurity Insider Economics Management Management & Leadership Politics & Government
Episodes
  • The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook
    Mar 3 2026

    LuRae Lumpkin, Producer of Industrial Cybersecurity Insider, sits down with industrial cybersecurity expert Dino Busalachi to break down the 2026 World Economic Forum Global Cybersecurity Outlook Report and what it really means for manufacturers.

    While the report surveyed nearly a thousand CEOs, CIOs, and CISOs, Dino reveals a critical blind spot: industrial control systems and OT environments are being left dangerously exposed.

    They discuss how AI is becoming a double-edged sword for attackers and defenders, why supply chain vulnerabilities remain unaddressed, the shocking lack of cybersecurity skills on plant floors, and why most companies still aren't conducting incident response exercises.

    Dino shares real-world insights from working in nearly 2,000 plants over four decades, explaining why IT and OT remain disconnected, how remote access creates massive security gaps, and why outdated equipment with decades-old vulnerabilities sits unpatched in critical manufacturing environments.

    The conversation reveals that while enterprises focus on IT security, the plant floor—where revenue is actually generated—remains critically vulnerable, with potentially catastrophic consequences for businesses, supply chains, and even national GDP.

    Chapters:

    (00:00:00) - Introduction and Overview of WEF 2026 Cybersecurity Report

    (00:01:00) - Where Cybersecurity Funding Actually Goes: IT vs OT Reality

    (00:03:00) - The Myth of Disconnected Legacy Equipment (00:05:00) - AI as a Double-Edged Sword in Industrial Environments

    (00:08:00) - The Vulnerability Crisis: Thousands of Unpatched Systems

    (00:09:00) - Third-Party and Supply Chain Security Gaps

    (00:12:00) - Remote Access: The Hidden Attack Vector

    (00:14:00) - Critical Supplier Dependencies and Decentralized OT

    (00:15:00) - The Skills Gap: Why Industrial Cybersecurity Expertise is Scarce

    (00:19:00) - The Shocking Truth About Incident Response Exercises

    (00:22:00) - Real-World Impact: When Manufacturers Get Hit

    (00:24:00) - Getting All Stakeholders in the Same Room

    (00:28:00) - Insurance vs Prevention: The True Cost of Cyber Incidents

    (00:29:00) - Final Thoughts: Who Should Own OT Cybersecurity?

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on LinkedIn
    6. Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    Show More Show Less
    32 mins
  • IT SOC vs OT SOC How & Why They’re Different
    Feb 25 2026

    Craig and Dino tackle the critical differences between IT and OT Security Operations Centers, revealing why traditional IT-centric SOCs are failing to protect manufacturing environments.

    Drawing from real-world examples, including a global beverage company that discovered they were only monitoring one-third of their OT assets, the hosts expose the fundamental disconnect between IT security teams and operational technology environments.

    They discuss why IT SOCs struggle with OT visibility, the challenges of asset inventory in dynamic manufacturing environments, and the critical importance of localization in security operations.

    The conversation covers practical barriers like line changeovers, PLC modifications, remote access vulnerabilities, and the need for OT-specific incident response protocols.

    Craig and Dino emphasize that effective OT security requires IT teams to become embedded in plant operations, working collaboratively with OEMs and system integrators, and understanding the unique operational context of manufacturing assets.

    This episode is essential listening for CISOs, plant managers, and security professionals trying to bridge the IT-OT security gap.

    Chapters:

    1. (00:00:00) - The Two-Thirds Problem: When Your SOC Can't See Your Plant Floor
    2. (00:01:00) - The OT SOC Asset Visibility Problem: A Case Study
    3. (00:03:00) - Why IT SOCs Can't Manage OT Assets
    4. (00:05:00) - Line Changeovers and Operational Context
    5. (00:07:00) - First Responders and Incident Response Challenges
    6. (00:10:00) - The WannaCry Response Gap
    7. (00:12:00) - Asset Inventory and Baseline Challenges
    8. (00:15:00) - Incident Response and Phone Trees
    9. (00:17:00) - Organizational Accountability Problems
    10. (00:19:00) - Greenfield Opportunities and Standardization
    11. (00:22:00) - The IT-OT Collaboration Challenge
    12. (00:24:00) - Think Global, Act Local: Embedding IT in Plants

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on
    Show More Show Less
    26 mins
  • Your OT Cybersecurity Strategy Is Failing: Here's Why
    Feb 17 2026

    Dino and Craig reunite to tackle the shifts occuring in industrial cybersecurity in 2026.

    They discuss how OT-focused IDS software companies are shifting away from managed services to partner with systems integrators who understand the plant floor.

    The conversation explores the challenges manufacturers face—from aging infrastructure spanning decades to flat layer-2 networks that give remote vendors unrestricted access.

    They emphasize that IT departments cannot effectively manage OT assets they don't own or understand, especially when dealing with equipment older than their cybersecurity staff.

    The episode covers the pitfalls of penetration testing in live manufacturing environments, the reality of shadow IT versus shadow OT, and why EDR solutions struggle in control system environments.

    Dino and Craig stress the importance of treating cybersecurity as a marathon rather than a sprint, starting with basic asset inventory and microsegmentation.

    They call on manufacturing leaders to stop deferring to IT for OT security, attend industry-specific conferences like S4X26, and partner with systems integrators who have deep automation expertise.

    With threats mounting, the time for action is now—not next quarter.

    Chapters:

    1. (00:00:00) - Welcome & What We've Been Up To
    2. (00:00:48) - The Big Shift: Why OT IDS Companies Are Backing Away From Managed Services
    3. (00:03:00) - The Shelfware Problem: When Security Tools Sit Unused
    4. (00:04:12) - Why Pen Testing Can Be Disruptive (or Dangerous) in Manufacturing Environments
    5. (00:05:54) - The Reality of Legacy Infrastructure: Equipment Older Than Your Cybersecurity Team
    6. (00:07:43) - Who Can Actually Patch Your Control Systems?
    7. (00:09:04) - Supply Chain Vulnerabilities: You're Only as Strong as Your Weakest Link
    8. (00:11:01) - The Last Mile Challenge: Asset Inventory, Microsegmentation & Starting Small
    9. (00:13:55) - The Shelfware to Tool-Switching Problem: Why Companies Are Reconsidering Their First Choice
    10. (00:16:18) - Shadow IT vs. Shadow OT: Who Really Owns Plant Floor Security?
    11. (00:19:00) - Why EDR Struggles in Control System Environments
    12. (00:21:35) - Time to Step Up: Why Manufacturing Leaders Can't Defer to IT Anymore
    13. (00:23:00) - Where to Learn: S4, Automation Fair, and Why You Need to Attend Industry Conferences
    14. (00:25:00) - Finding the Right Partner: Systems Integrators Who Speak Automation and Cybersecurity
    15. (00:27:00) - Final Thoughts: The Time for Action Is Now

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    Show More Show Less
    30 mins
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.