Artwork

תוכן מסופק על ידי Derek Harp. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Derek Harp או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Player FM - אפליקציית פודקאסט
התחל במצב לא מקוון עם האפליקציה Player FM !

80: Robots, Rails, Bytes and Risk A Modern ICS Success Story with Brent Huston

1:11:24
 
שתפו
 

Manage episode 362801867 series 2892013
תוכן מסופק על ידי Derek Harp. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Derek Harp או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.

We have a special treat for you today! Our friend and colleague, Brent Huston, joins Derek for an online CS2AI session to explore the fascinating modern ICS success story of robots, rails, bytes, and risk.

Brent Huston is a cybersecurity expert who has been a business owner in this space for over three decades. He has a deep technical background but can explain complex concepts in a way that is easily understandable by everyone.

In the 30 years he has been in the technology business, Brent has worked on various projects involving automated warehousing, inventory control systems, and point-of-sale systems. He also has expertise in cybersecurity and industrial automation.

With his years of experience and expertise in the field, Brent will take us on a journey through the evolution of ICS security and share some valuable insights on achieving success in this constantly evolving landscape. Stay tuned for more!

Show highlights:

  • Why warehousing is becoming a hot area for disruption.
  • How robots move at high speeds and are user-programmable.
  • Were there any considerations given to EMF attacks or sonic attacks?
  • Brent dives into staffing with a team used to OT protocols.
  • Using NLP to parse documentation and generate inventory reports and configuration maps.
  • Creating an initial attack surface map.
  • Using machine learning to analyze the network data to build a network map.
  • Brent talks about moving the same techniques from automated warehousing into production environments.
  • When they first got the system, everyone on the team expected the robots to be smarter than they are.
  • How much automation is available today?
  • Were there any considerations given to EMF attacks or sonic attacks?
  • Brent shares his prediction for the future of cybersecurity.

Links and resources:

(CS)²AI

Derek Harp on LinkedIn

Brent Huston on LinkedIn

  continue reading

131 פרקים

Artwork
iconשתפו
 
Manage episode 362801867 series 2892013
תוכן מסופק על ידי Derek Harp. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Derek Harp או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.

We have a special treat for you today! Our friend and colleague, Brent Huston, joins Derek for an online CS2AI session to explore the fascinating modern ICS success story of robots, rails, bytes, and risk.

Brent Huston is a cybersecurity expert who has been a business owner in this space for over three decades. He has a deep technical background but can explain complex concepts in a way that is easily understandable by everyone.

In the 30 years he has been in the technology business, Brent has worked on various projects involving automated warehousing, inventory control systems, and point-of-sale systems. He also has expertise in cybersecurity and industrial automation.

With his years of experience and expertise in the field, Brent will take us on a journey through the evolution of ICS security and share some valuable insights on achieving success in this constantly evolving landscape. Stay tuned for more!

Show highlights:

  • Why warehousing is becoming a hot area for disruption.
  • How robots move at high speeds and are user-programmable.
  • Were there any considerations given to EMF attacks or sonic attacks?
  • Brent dives into staffing with a team used to OT protocols.
  • Using NLP to parse documentation and generate inventory reports and configuration maps.
  • Creating an initial attack surface map.
  • Using machine learning to analyze the network data to build a network map.
  • Brent talks about moving the same techniques from automated warehousing into production environments.
  • When they first got the system, everyone on the team expected the robots to be smarter than they are.
  • How much automation is available today?
  • Were there any considerations given to EMF attacks or sonic attacks?
  • Brent shares his prediction for the future of cybersecurity.

Links and resources:

(CS)²AI

Derek Harp on LinkedIn

Brent Huston on LinkedIn

  continue reading

131 פרקים

כל הפרקים

×
 
Loading …

ברוכים הבאים אל Player FM!

Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.

 

מדריך עזר מהיר

האזן לתוכנית הזו בזמן שאתה חוקר
הפעלה