• The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook
    Mar 3 2026

    LuRae Lumpkin, Producer of Industrial Cybersecurity Insider, sits down with industrial cybersecurity expert Dino Busalachi to break down the 2026 World Economic Forum Global Cybersecurity Outlook Report and what it really means for manufacturers.

    While the report surveyed nearly a thousand CEOs, CIOs, and CISOs, Dino reveals a critical blind spot: industrial control systems and OT environments are being left dangerously exposed.

    They discuss how AI is becoming a double-edged sword for attackers and defenders, why supply chain vulnerabilities remain unaddressed, the shocking lack of cybersecurity skills on plant floors, and why most companies still aren't conducting incident response exercises.

    Dino shares real-world insights from working in nearly 2,000 plants over four decades, explaining why IT and OT remain disconnected, how remote access creates massive security gaps, and why outdated equipment with decades-old vulnerabilities sits unpatched in critical manufacturing environments.

    The conversation reveals that while enterprises focus on IT security, the plant floor—where revenue is actually generated—remains critically vulnerable, with potentially catastrophic consequences for businesses, supply chains, and even national GDP.

    Chapters:

    (00:00:00) - Introduction and Overview of WEF 2026 Cybersecurity Report

    (00:01:00) - Where Cybersecurity Funding Actually Goes: IT vs OT Reality

    (00:03:00) - The Myth of Disconnected Legacy Equipment (00:05:00) - AI as a Double-Edged Sword in Industrial Environments

    (00:08:00) - The Vulnerability Crisis: Thousands of Unpatched Systems

    (00:09:00) - Third-Party and Supply Chain Security Gaps

    (00:12:00) - Remote Access: The Hidden Attack Vector

    (00:14:00) - Critical Supplier Dependencies and Decentralized OT

    (00:15:00) - The Skills Gap: Why Industrial Cybersecurity Expertise is Scarce

    (00:19:00) - The Shocking Truth About Incident Response Exercises

    (00:22:00) - Real-World Impact: When Manufacturers Get Hit

    (00:24:00) - Getting All Stakeholders in the Same Room

    (00:28:00) - Insurance vs Prevention: The True Cost of Cyber Incidents

    (00:29:00) - Final Thoughts: Who Should Own OT Cybersecurity?

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on LinkedIn
    6. Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

    Show More Show Less
    32 mins
  • IT SOC vs OT SOC How & Why They’re Different
    Feb 25 2026

    Craig and Dino tackle the critical differences between IT and OT Security Operations Centers, revealing why traditional IT-centric SOCs are failing to protect manufacturing environments.

    Drawing from real-world examples, including a global beverage company that discovered they were only monitoring one-third of their OT assets, the hosts expose the fundamental disconnect between IT security teams and operational technology environments.

    They discuss why IT SOCs struggle with OT visibility, the challenges of asset inventory in dynamic manufacturing environments, and the critical importance of localization in security operations.

    The conversation covers practical barriers like line changeovers, PLC modifications, remote access vulnerabilities, and the need for OT-specific incident response protocols.

    Craig and Dino emphasize that effective OT security requires IT teams to become embedded in plant operations, working collaboratively with OEMs and system integrators, and understanding the unique operational context of manufacturing assets.

    This episode is essential listening for CISOs, plant managers, and security professionals trying to bridge the IT-OT security gap.

    Chapters:

    1. (00:00:00) - The Two-Thirds Problem: When Your SOC Can't See Your Plant Floor
    2. (00:01:00) - The OT SOC Asset Visibility Problem: A Case Study
    3. (00:03:00) - Why IT SOCs Can't Manage OT Assets
    4. (00:05:00) - Line Changeovers and Operational Context
    5. (00:07:00) - First Responders and Incident Response Challenges
    6. (00:10:00) - The WannaCry Response Gap
    7. (00:12:00) - Asset Inventory and Baseline Challenges
    8. (00:15:00) - Incident Response and Phone Trees
    9. (00:17:00) - Organizational Accountability Problems
    10. (00:19:00) - Greenfield Opportunities and Standardization
    11. (00:22:00) - The IT-OT Collaboration Challenge
    12. (00:24:00) - Think Global, Act Local: Embedding IT in Plants

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on
    Show More Show Less
    26 mins
  • Your OT Cybersecurity Strategy Is Failing: Here's Why
    Feb 17 2026

    Dino and Craig reunite to tackle the shifts occuring in industrial cybersecurity in 2026.

    They discuss how OT-focused IDS software companies are shifting away from managed services to partner with systems integrators who understand the plant floor.

    The conversation explores the challenges manufacturers face—from aging infrastructure spanning decades to flat layer-2 networks that give remote vendors unrestricted access.

    They emphasize that IT departments cannot effectively manage OT assets they don't own or understand, especially when dealing with equipment older than their cybersecurity staff.

    The episode covers the pitfalls of penetration testing in live manufacturing environments, the reality of shadow IT versus shadow OT, and why EDR solutions struggle in control system environments.

    Dino and Craig stress the importance of treating cybersecurity as a marathon rather than a sprint, starting with basic asset inventory and microsegmentation.

    They call on manufacturing leaders to stop deferring to IT for OT security, attend industry-specific conferences like S4X26, and partner with systems integrators who have deep automation expertise.

    With threats mounting, the time for action is now—not next quarter.

    Chapters:

    1. (00:00:00) - Welcome & What We've Been Up To
    2. (00:00:48) - The Big Shift: Why OT IDS Companies Are Backing Away From Managed Services
    3. (00:03:00) - The Shelfware Problem: When Security Tools Sit Unused
    4. (00:04:12) - Why Pen Testing Can Be Disruptive (or Dangerous) in Manufacturing Environments
    5. (00:05:54) - The Reality of Legacy Infrastructure: Equipment Older Than Your Cybersecurity Team
    6. (00:07:43) - Who Can Actually Patch Your Control Systems?
    7. (00:09:04) - Supply Chain Vulnerabilities: You're Only as Strong as Your Weakest Link
    8. (00:11:01) - The Last Mile Challenge: Asset Inventory, Microsegmentation & Starting Small
    9. (00:13:55) - The Shelfware to Tool-Switching Problem: Why Companies Are Reconsidering Their First Choice
    10. (00:16:18) - Shadow IT vs. Shadow OT: Who Really Owns Plant Floor Security?
    11. (00:19:00) - Why EDR Struggles in Control System Environments
    12. (00:21:35) - Time to Step Up: Why Manufacturing Leaders Can't Defer to IT Anymore
    13. (00:23:00) - Where to Learn: S4, Automation Fair, and Why You Need to Attend Industry Conferences
    14. (00:25:00) - Finding the Right Partner: Systems Integrators Who Speak Automation and Cybersecurity
    15. (00:27:00) - Final Thoughts: The Time for Action Is Now

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    Show More Show Less
    30 mins
  • Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to Manufacturing
    Feb 10 2026

    Dino sits down with Dick Wilkinson, CTO and co-founder of Proof Labs, to explore the intersection of space technology and industrial cybersecurity.

    Dick shares his 20-year journey in the U.S. Army with the National Security Agency, transitioning from signals intelligence to becoming a CISO for critical infrastructure organizations, including New Mexico's Supreme Court and the Albuquerque water authority.

    The conversation dives deep into the challenges of securing satellite systems with onboard intrusion detection and the persistent gap between IT and OT security teams. We also explore why the "castle wall" perimeter security model is dangerously outdated.

    Dick reveals how AI is lowering the barrier to entry for both attackers and defenders, and discusses the real-world applications of satellite communications in oil and gas operations.

    He also introduces a revolutionary physical layer-one air gap device called Goldilock Secure, which could transform how we protect remote industrial assets.

    This episode is essential listening for CISOs, CTOs, and security leaders looking to understand emerging threats in space-based infrastructure and practical solutions for securing distributed industrial environments.

    Chapters:

    1. (00:00:00) - Dick's Journey: From NSA to Space Cybersecurity
    2. (00:04:32) - What is Proof Labs and Why Space Security Matters
    3. (00:08:15) - Satellites as OT Assets: Oil, Gas, and Critical Infrastructure
    4. (00:12:47) - How Onboard Intrusion Detection Works in Spacecraft
    5. (00:16:23) - The Castle Wall Problem: Moving Beyond Perimeter Security
    6. (00:19:41) - IT vs OT: Bridging the Gap in Manufacturing Cybersecurity
    7. (00:24:18) - AI's Impact: Lowering the Barrier for Attackers and Defenders
    8. (00:27:35) - The Visibility Challenge: Why Most Plants Don't Know Their Assets
    9. (00:30:12) - Goldilock Firebreak: A Physical Air Gap Device That Changes Everything
    10. (00:35:20) - Real-World Applications for Remote Industrial Asset Protection

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Dick Wilkinson on LinkedIn
    3. Proof Labs Website
    4. Industrial Cybersecurity Insider on LinkedIn
    5. Cybersecurity & Digital Safety on LinkedIn
    6. BW Design
    Show More Show Less
    34 mins
  • The IT-OT Knowledge Gap Costing Organizations Millions
    Feb 3 2026

    Dino sits down with Adeel Shaikh Muhammad, a Dubai-based cybersecurity expert and researcher with 16+ years in IT and OT security. They dive into why IT and OT teams still can't communicate effectively.

    The conversation reveals why most CISOs struggle to secure manufacturing environments. Adeel shares real-world insights from securing industrial systems across the Middle East, Africa, and Asia.

    They tackle the implementation gap in OT SOCs and why legacy systems remain vulnerable. The discussion covers third-party access risks, OEM warranty restrictions, and system integrator challenges.

    AI might finally solve IT-OT convergence by acting as a translator between these worlds. But first, organizations need to master the fundamentals: asset inventory, vulnerability management, and network segmentation.

    Most companies still haven't nailed these basics in their industrial environments. This conversation cuts through the hype to focus on what actually works.

    Chapters:

    1. (00:00:00) - 16 Years in Cybersecurity: Why CISOs Don't Know What a PLC Is
    2. (00:01:48) - Career Journey: From IT to OT Cybersecurity Focus
    3. (00:02:48) - Books on AI Transforming Security Operations Centers
    4. (00:04:44) - The Implementation Gap: Challenges Building OT SOCs
    5. (00:06:40) - The IT-OT Cultural Divide and Missing Communication
    6. (00:08:40) - Why the OT Ecosystem Must Proactively Bring Cybersecurity Tools
    7. (00:10:00) - Can IT-OT Convergence Actually Happen?
    8. (00:11:00) - AI as the Bridge: The Black Box Solution for IT-OT Communication
    9. (00:12:42) - Legacy Systems Reality: Windows 7 Running $5M Equipment
    10. (00:14:00) - OT Cybersecurity Conferences: S4, Intersec, and Rockwell Automation Fair
    11. (00:16:00) - Market Consolidation: Who's Been Acquired in OT Security
    12. (00:17:48) - Back to Basics: Asset Inventory, Vulnerabilities, and Network Segmentation
    13. (00:18:40) - Third-Party Access Control and OEM Warranty Restrictions
    14. (00:20:40) - Why We Can't Ignore Asset Inventory and Segmentation in OT Anymore

    Links And Resources:

    1. Adeel Shaikh Muhammad on LinkedIn
    2. Want to Sponsor an episode or be a Guest? Reach out here.
    3. Industrial Cybersecurity Insider on LinkedIn
    4. Cybersecurity & Digital Safety on
    Show More Show Less
    22 mins
  • The Patching Gap Putting Industrial Operations at Risk: IT vs OT
    Jan 27 2026

    Craig and Dino tackle one of industrial cybersecurity's most critical challenges in this Rewind episode: the massive gap between IT and OT patching strategies.

    IT organizations patch constantly—think Patch Tuesday. OT environments rarely patch at all, creating dangerous vulnerability gaps across connected networks.

    The hosts explore why this disconnect exists. Production floor downtime costs are astronomical, making patching a risky business decision.

    OEM restrictions complicate matters further. Many vendors won't support systems or warranties after unauthorized updates.

    Managing decades-old equipment alongside modern systems creates another layer of complexity. Legacy PLCs weren't designed with patching in mind.

    The consequences of not patching are mounting. Insurance companies are tightening requirements and regulatory pressures are intensifying.

    Craig and Dino offer practical solutions that don't require shutting down production lines. Virtual patching technologies can protect legacy control systems without traditional software updates.

    The hosts emphasize the urgent need for IT-OT collaboration. All stakeholders—including OEMs and system integrators—must be part of strategic cybersecurity conversations.

    This episode is essential listening for CISOs, plant managers, and anyone responsible for protecting industrial operations. The connected world isn't waiting for OT to catch up.

    Chapters:

    1. 00:00:00 - Introduction to Patching Challenges
    2. 00:01:08 - IT vs OT Patching: Key Differences
    3. 00:02:55 - Understanding the Cost of Downtime in OT
    4. 00:03:32 - Overcoming Challenges with Legacy Systems
    5. 00:05:21 - Navigating OEMs and Safety Concerns
    6. 00:06:45 - The Role of Safety in OT Patching
    7. 00:08:52 - Exploring Virtual Patching Solutions
    8. 00:13:11 - Enhancing Vendor Collaboration and Risk Management
    9. 00:16:48 - Impact of Mergers and Acquisitions on Cybersecurity
    10. 00:18:33 - Addressing Insurance and Compliance Issues
    11. 00:20:12 - Significant Consequences of Not Patching
    12. 00:23:14 - Building an Effective Collaborative Cybersecurity Strategy
    13. 00:24:03 - Conclusion and Actionable Insights

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    Show More Show Less
    26 mins
  • Four Distinct Companies & One Critical Gap—The Ownership Crisis in OT Security
    Jan 20 2026

    This compilation episode brings together the most critical insights from Industrial Cybersecurity Insider conversations about the fundamental challenges plaguing OT security implementation and management.

    Industry experts dissect why traditional IT security approaches fail catastrophically on the plant floor, revealing that the core issue isn't technology—it's ownership, collaboration, and understanding.

    From the dangers of deploying endpoint detection without vendor qualification to the millions lost in unplanned downtime, this episode exposes the gap between security theory and operational reality.

    Listeners will discover why cybersecurity tools are often shelfware, how the "have and have-not" world creates vulnerability gaps across manufacturing facilities, and what "left of boom" thinking means for preventing incidents before they happen.

    Featuring hard-won lessons about shutdown windows, cyber-informed engineering, and the critical importance of building relationships between IT teams and plant floor operations, this episode delivers actionable intelligence for CISOs, plant managers, and anyone responsible for securing industrial control systems.

    Chapters:

    1. (00:00:00) - Introduction: The Core Problem of Ownership in OT Security
    2. (00:01:45) - Why IT Security Approaches Fail on the Plant Floor
    3. (00:04:30) - The Cloud Analogy: Lessons for OT Implementation
    4. (00:07:15) - The Missing Conversation: Capital Plans and OEMs
    5. (00:10:20) - IT vs OT Networks: Different Purposes, Different Risks
    6. (00:13:35) - EDR in OT: The Aftermarket Parts Problem
    7. (00:16:10) - Cyber-Informed Engineering: Building Security into Design
    8. (00:19:45) - The Have and Have-Not World of Plant Security
    9. (00:23:20) - Left of Boom: Visibility Beyond Security
    10. (00:27:15) - Who Should Lead the OT Security Discussion

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on LinkedIn
    6. Craig Duckworth on
    Show More Show Less
    30 mins
  • Your New Equipment Just Shipped With Security Risks & Here's Why Your OEM Won't Fix Them
    Jan 13 2026

    In this episode, Dino and Craig tackle one of manufacturing's most pressing challenges: the OEM blockade. They explore why brand-new equipment often ships with hundreds of unpatched vulnerabilities, how the gap between IT and OT teams creates operational blind spots, and why manufacturers can't rely on traditional IT solutions to secure their plant floors.

    From the CrowdStrike incident that took down HMIs to the "ghost in the machine" causing unexplained downtime, they reveal why OT teams must take ownership of their cybersecurity posture and build partnerships with the right ecosystem of OT-focused service providers.

    If you've ever wondered why your million-dollar machine center is running Windows 7 or why your cybersecurity reports don't match reality, this episode provides the answers—and a path forward.

    Chapters:

    1. (00:00:00) - The OEM Blockade Problem
    2. (00:01:00) - Understanding OEM Software Lock and Remote Access
    3. (00:03:00) - The Reality of Unpatched Vulnerabilities in New Equipment
    4. (00:06:00) - The IT/OT Blockade and Convergence Challenges
    5. (00:09:00) - Why IT Disciplines Don't Translate to OT Environments
    6. (00:11:00) - The CrowdStrike Incident: What Really Happened on Plant Floors
    7. (00:13:00) - The Lack of Due Diligence in Manufacturing M&A
    8. (00:16:00) - Chasing the Ghost in the Machine
    9. (00:19:00) - Process Integrity vs. Cybersecurity Tools
    10. (00:22:00) - Why OT Teams Must Take Ownership and Build the Right Partnerships

    Links And Resources:

    1. Want to Sponsor an episode or be a Guest? Reach out here.
    2. Industrial Cybersecurity Insider on LinkedIn
    3. Cybersecurity & Digital Safety on LinkedIn
    4. BW Design Group Cybersecurity
    5. Dino Busalachi on LinkedIn
    6. Craig Duckworth on LinkedIn

    Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify,

    Show More Show Less
    27 mins