התחל במצב לא מקוון עם האפליקציה Player FM !
126: Shifting Left: Why Secure Software Starts at the Design Stage
Manage episode 464869931 series 2892013
In this episode of the (CS)²AI Podcast, host Derek Harp welcomes Mehdi Tarrit Mirakhorli, Associate Professor at the University of Hawaii and a Cybersecurity Expert, to discuss Secure by Design—a fundamental shift in how we develop and deploy software in industrial control systems (ICS) and operational technology (OT). With over 15 years of R&D experience for DARPA, the Air Force, and DHS, Mehdi shares why modern software is inherently vulnerable and how we can learn from aviation, medical, and safety-critical industries to build resilient systems from the ground up.
The conversation dives deep into the risks of insecure by design software, the challenges of implementing true security practices, and the role of government policies in shifting liability from users to vendors. Mehdi explains the importance of threat modeling, attack surface analysis, and secure architecture frameworks to mitigate cyber threats before they arise. He also highlights how software development must evolve beyond rapid deployment cycles to integrate security as a core design principle.
If you’re an ICS professional, cybersecurity engineer, or software developer, this episode provides actionable insights on reducing vulnerabilities at scale, implementing proactive security measures, and preparing for the future of cyber threats. Subscribe now and stay ahead in the ever-evolving world of industrial cybersecurity!
131 פרקים
Manage episode 464869931 series 2892013
In this episode of the (CS)²AI Podcast, host Derek Harp welcomes Mehdi Tarrit Mirakhorli, Associate Professor at the University of Hawaii and a Cybersecurity Expert, to discuss Secure by Design—a fundamental shift in how we develop and deploy software in industrial control systems (ICS) and operational technology (OT). With over 15 years of R&D experience for DARPA, the Air Force, and DHS, Mehdi shares why modern software is inherently vulnerable and how we can learn from aviation, medical, and safety-critical industries to build resilient systems from the ground up.
The conversation dives deep into the risks of insecure by design software, the challenges of implementing true security practices, and the role of government policies in shifting liability from users to vendors. Mehdi explains the importance of threat modeling, attack surface analysis, and secure architecture frameworks to mitigate cyber threats before they arise. He also highlights how software development must evolve beyond rapid deployment cycles to integrate security as a core design principle.
If you’re an ICS professional, cybersecurity engineer, or software developer, this episode provides actionable insights on reducing vulnerabilities at scale, implementing proactive security measures, and preparing for the future of cyber threats. Subscribe now and stay ahead in the ever-evolving world of industrial cybersecurity!
131 פרקים
כל הפרקים
×
1 129: Why OT Cybersecurity Isn't a One-Tool Problem: Insights to be discussed at Level Zero 14:48

1 128: From the Pentagon to Public Safety: Lucian Niemeyer’s Mission to Secure OT 28:24

1 127: Unlocking the Power of Asset Inventory in OT Cybersecurity with Roya Gordon 24:22

1 126: Shifting Left: Why Secure Software Starts at the Design Stage 35:00

1 125: Decoding SBOMs: Kyle McMillian on Cybersecurity and Supply Chain Transparency 27:24

1 124: Capture the Flag: Transforming Cybersecurity Training with Kenneth Warren 23:12

1 123: From Classroom to Crisis: Immersive Training for ICS Security Professionals 23:00

1 122: Securing the Future: Rob Shaughnessy on Innovation, Supply Chain, and Cyber Threats 33:13

1 121: From Farm to Fork: Kristin Demoranville on Food Safety and Cybersecurity 24:35

1 120: ResetCon and the Future of Cybersecurity: Insights from Jay Warne 22:26

1 119: Revealing the OT Threat Landscape: Remote Access, Supply Chain, and Lateral Movement 19:37

1 118: Preparing for Cyber Threats: A Strategic Discussion with Mark Montgomery on Securing Our Future 13:26

1 117: Rapid7’s Approach to ICS and OT Security: Lessons from the Field 24:45

1 116: Cyber Safety in the Age of OT Threats: Insights from Lucian Niemeyer 31:33

1 115: Cyber Informed Engineering: Protecting Critical Infrastructure with Ginger Wright 24:07

1 114: Hack the Capitol 7.0: Building Cybersecurity Connections with Bryson Bort & Tom Van Norman 17:08

1 113: Shaping the Future of OT Security with Dale Peterson 32:25

1 112: Breaking Barriers in Cybersecurity: Roya Gordon’s Transformative Journey and Expert Advice for Veterans 46:51

1 111: From Scrubbing Hard Drives to Securing the Future: Max's Journey in Cybersecurity 36:04

1 110: Global Cybersecurity Insights with Mike Holcomb 50:39

1 109: Teaser for the CNI Research Report with Chase Richardson 18:13

1 108: Mastering Data Complexity: Insights from Chase Richardson and Martin Riley on OT Integration 49:21

1 107: Keeping the Lights On: Carlos's Roadmap to Becoming an Energy Cybersecurity Pro 41:36

1 106: Top Gun Meets the Cloud: Ken's Guide to Keeping Your Airplanes (and Data) Safe 42:08

1 105: Beyond Boundaries: Unveiling the Multifaceted World of Michelle Balderson 46:37

1 104: Author Spotlight™ - An Interview with Andrew Ginter, Author of Engineering-Grade OT Security: A Guide for Managers 1:08:15

1 103: Diving into the Multifaceted World of Ron Fabela: From Cybersecurity Leadership to Goat Herding and Beyond 46:17

1 102: Unveiling the Multifaceted Brilliance: A Dive into the World of Bill Lawrence 44:27

1 101: Exploring the IoT and OT Cybersecurity World with Dr. Jesus Molina: An Expert's Insights and Experiences 1:01:29

1 100: Exploring OT Security and Cyber Practices with IBM's Rob Dyson 56:53
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.