<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/iTYwWFdE" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>Hack the Plant</title>
    <description>Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our interconnectivity is also a significant source of risk. Hack the Plant walks through the world of hackers working on the front lines of cyber security and public safety to protect the systems you rely upon every day. 

Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.

ICS Village is a nonprofit that equips industry experts and policymakers with the tools to better defend our critical infrastructure. We educate people on critical infrastructure security with hands-on examples, not just nerd stuff. Catch us at an event near you! www.icsvillage.com.

The Institute for Security and Technology is a nonprofit think tank with the mission to bridge gaps between technology and policy leaders to help solve these emerging security problems together. Learn more at securityandtechnology.org.</description>
    <copyright>2023 ICS Village</copyright>
    <language>en</language>
    <pubDate>Wed, 18 Mar 2026 16:00:00 +0000</pubDate>
    <lastBuildDate>Wed, 18 Mar 2026 17:57:35 +0000</lastBuildDate>
    <image>
      <link>https://hack-the-plant.simplecast.com</link>
      <title>Hack the Plant</title>
      <url>https://image.simplecastcdn.com/images/44dfd49f-238c-414f-a5a3-ca89aae41118/93b896d8-03c6-4bec-a05c-62f75415f3bd/3000x3000/hack-the-planet-godzilla-3000x3000-72ppi.jpg?aid=rss_feed</url>
    </image>
    <link>https://hack-the-plant.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our interconnectivity is also a significant source of risk. Hack the Plant walks through the world of hackers working on the front lines of cyber security and public safety to protect the systems you rely upon every day. 

Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.

ICS Village is a nonprofit that equips industry experts and policymakers with the tools to better defend our critical infrastructure. We educate people on critical infrastructure security with hands-on examples, not just nerd stuff. Catch us at an event near you! www.icsvillage.com.

The Institute for Security and Technology is a nonprofit think tank with the mission to bridge gaps between technology and policy leaders to help solve these emerging security problems together. Learn more at securityandtechnology.org.</itunes:summary>
    <itunes:author>Bryson Bort</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/44dfd49f-238c-414f-a5a3-ca89aae41118/93b896d8-03c6-4bec-a05c-62f75415f3bd/3000x3000/hack-the-planet-godzilla-3000x3000-72ppi.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/iTYwWFdE</itunes:new-feed-url>
    <itunes:keywords>clean energy, energy innovation, energy, water, electricity, finance, cyber security, cybersecurity, hacking, national security, think tank</itunes:keywords>
    <itunes:owner>
      <itunes:name>ICS Village</itunes:name>
      <itunes:email>tyler@returnonideas.co</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Science"/>
    <itunes:category text="Government"/>
    <item>
      <guid isPermaLink="false">407bfa24-a7ba-4000-824d-55345003f730</guid>
      <title>Cyber-Informed Engineering: Moving Beyond the Firewall</title>
      <description><![CDATA[<p>For the last episode of season 5, host Bryson Bort sat down with Andrew Ohrt, Resilience Director at West Yost Associates. A civil engineer specializing in water infrastructure, Andrew bridges the gap between traditional engineering and digital risk. Andrew walks us through the "invisible" nature of water systems, the impact of data centers on utility resilience, and how Cyber-Informed Engineering (CIE) protects our most essential resource.</p>
<p>How did a drive under a rebuilt bridge in Minneapolis pivot Andrew’s career toward critical infrastructure? Why did a single wastewater release shut down Waikiki Beach for an entire week? And what happens when a cybersecurity team finds a client’s PLC exposed on the open internet?</p>
<p>“To me, the integration of understanding cyber or digital risk in our critical infrastructure, the engineers picking that understanding up, building awareness, building skill sets, figuring out how to manage that risk, is one of the most important things that we've been working on,” he said.</p>
<p>Join us for this and more on this episode of Hack the Plan[e]t. </p>
<p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p>
<p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></description>
      <pubDate>Wed, 18 Mar 2026 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Andrew Ohrt, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/cyber-informed-engineering-moving-beyond-the-firewall-c31KWDXm</link>
      <content:encoded><![CDATA[<p>For the last episode of season 5, host Bryson Bort sat down with Andrew Ohrt, Resilience Director at West Yost Associates. A civil engineer specializing in water infrastructure, Andrew bridges the gap between traditional engineering and digital risk. Andrew walks us through the "invisible" nature of water systems, the impact of data centers on utility resilience, and how Cyber-Informed Engineering (CIE) protects our most essential resource.</p>
<p>How did a drive under a rebuilt bridge in Minneapolis pivot Andrew’s career toward critical infrastructure? Why did a single wastewater release shut down Waikiki Beach for an entire week? And what happens when a cybersecurity team finds a client’s PLC exposed on the open internet?</p>
<p>“To me, the integration of understanding cyber or digital risk in our critical infrastructure, the engineers picking that understanding up, building awareness, building skill sets, figuring out how to manage that risk, is one of the most important things that we've been working on,” he said.</p>
<p>Join us for this and more on this episode of Hack the Plan[e]t. </p>
<p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p>
<p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></content:encoded>
      <enclosure length="41498457" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/419526ab-ed25-4c69-86ca-2a856e0a4067/9193113e-9824-4707-94c5-96b5f57c1396/episodes/audio/group/a8155771-80dc-4145-bbf9-8df2f056ecbe/group-item/ee303c0d-f015-44b1-8805-cc3f854ef257/128_default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Cyber-Informed Engineering: Moving Beyond the Firewall</itunes:title>
      <itunes:author>Andrew Ohrt, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/59541438-31dc-45db-a5a0-0974041a6ed0/3000x3000/episode_51_cover.jpg?aid=rss_feed"/>
      <itunes:duration>00:43:07</itunes:duration>
      <itunes:summary>“The fundamentals of cybersecurity are the fundamentals of good engineering and operations.” - Andrew Ohrt </itunes:summary>
      <itunes:subtitle>“The fundamentals of cybersecurity are the fundamentals of good engineering and operations.” - Andrew Ohrt </itunes:subtitle>
      <itunes:keywords>cybersecurity, cyber, cyber-informed engineering, cie, cyber defense, engineering</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">99081b2f-9f0b-45ec-91ea-fd0984f8d066</guid>
      <title>Systems Engineering for Survival: A Physician&apos;s Guide to Emergency Management</title>
      <description><![CDATA[<p>Our host Bryson Bort welcomes Dr. Natalie Sullivan, Medical Director of the Emergency Response Medical Group and an emergency medicine physician at a D.C. area hospital. Trained in EMS and disaster and operational medicine, Natalie turned her attention to the critical intersection of clinical medicine, patient safety, and cybersecurity resilience after experiencing a prolonged ransomware attack on a major hospital. Dr. Sullivan lays out the disaster preparedness cycle, and the many vectors of risks for hospitals. </p><p>How does a cyberattack on one hospital lead to increased cardiac arrest mortality at the hospital three blocks away? Why is a generation of "digital native" doctors a hidden vulnerability in an analog emergency? And what happens when a hospital's reliance on these "tightly coupled" systems—like water, power, and the Medical IoT—collapses during a ransomware event?</p><p>“We are critical infrastructure, but we're deeply, deeply dependent on the surrounding critical infrastructure,” Dr. Sullivan said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></description>
      <pubDate>Tue, 17 Feb 2026 17:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Dr. Natalie Sullivan, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/systems-engineering-for-survival-a-physicians-guide-to-emergency-management-A_gZuzA4</link>
      <content:encoded><![CDATA[<p>Our host Bryson Bort welcomes Dr. Natalie Sullivan, Medical Director of the Emergency Response Medical Group and an emergency medicine physician at a D.C. area hospital. Trained in EMS and disaster and operational medicine, Natalie turned her attention to the critical intersection of clinical medicine, patient safety, and cybersecurity resilience after experiencing a prolonged ransomware attack on a major hospital. Dr. Sullivan lays out the disaster preparedness cycle, and the many vectors of risks for hospitals. </p><p>How does a cyberattack on one hospital lead to increased cardiac arrest mortality at the hospital three blocks away? Why is a generation of "digital native" doctors a hidden vulnerability in an analog emergency? And what happens when a hospital's reliance on these "tightly coupled" systems—like water, power, and the Medical IoT—collapses during a ransomware event?</p><p>“We are critical infrastructure, but we're deeply, deeply dependent on the surrounding critical infrastructure,” Dr. Sullivan said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></content:encoded>
      <enclosure length="29306042" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/e0531ccf-fa09-447e-8042-272fee270497/audio/24695bfc-4cdd-48f6-9c87-dd094beff78d/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Systems Engineering for Survival: A Physician&apos;s Guide to Emergency Management</itunes:title>
      <itunes:author>Dr. Natalie Sullivan, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/3e5f5b51-190c-47dd-94ca-4cfa947484b7/3000x3000/hacktheplant-episode50.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:26</itunes:duration>
      <itunes:summary>“I think it really opened my eyes to how tightly coupled our system is and how vulnerable we are to these cascading failures.” - Natalie Sullivan</itunes:summary>
      <itunes:subtitle>“I think it really opened my eyes to how tightly coupled our system is and how vulnerable we are to these cascading failures.” - Natalie Sullivan</itunes:subtitle>
      <itunes:keywords>critical infrastructure, natalie sullivan, emergency management, systems engineering</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dbd5c39a-f8d8-49da-bbac-8d69c143789e</guid>
      <title>Bridging the IT/OT Divide in Oil &amp; Gas</title>
      <description><![CDATA[<p>Bryson Bort is joined by Dd Budiharto, Microsoft’s Customer Security Officer for the Oil, Gas, and Energy sectors, to share her experience bridging the IT/OT divide in the energy sector. Drawing on her background as a former CISO and industry veteran with decades of experience starting security programs at giants like Halliburton and Marathon Oil, Dd breaks down IT vs OT auditing, the cultural divide in oil and gas, and what cybersecurity looks like in the energy sector.   </p><p>How did an early mistake involving a patch reboot change Dd's career forever? What is preventing private companies and the FBI from working together? Why is basic hygiene—like disabling terminated accounts—still the biggest "unsolved" problem in billion-dollar industries? </p><p>“If you want to upgrade your home, to modernize it, the foundation still needs to be fixed first,” Dd said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></description>
      <pubDate>Tue, 20 Jan 2026 17:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Dd Budiharto, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/bridging-the-it-ot-divide-in-oil-gas-t0_KHUGk</link>
      <content:encoded><![CDATA[<p>Bryson Bort is joined by Dd Budiharto, Microsoft’s Customer Security Officer for the Oil, Gas, and Energy sectors, to share her experience bridging the IT/OT divide in the energy sector. Drawing on her background as a former CISO and industry veteran with decades of experience starting security programs at giants like Halliburton and Marathon Oil, Dd breaks down IT vs OT auditing, the cultural divide in oil and gas, and what cybersecurity looks like in the energy sector.   </p><p>How did an early mistake involving a patch reboot change Dd's career forever? What is preventing private companies and the FBI from working together? Why is basic hygiene—like disabling terminated accounts—still the biggest "unsolved" problem in billion-dollar industries? </p><p>“If you want to upgrade your home, to modernize it, the foundation still needs to be fixed first,” Dd said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></content:encoded>
      <enclosure length="37762334" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/20e313f8-ff22-4280-ae89-8aa159a3c4ad/audio/1d359903-f48c-4fc9-8024-618614562b23/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Bridging the IT/OT Divide in Oil &amp; Gas</itunes:title>
      <itunes:author>Dd Budiharto, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/c3adf59a-d69e-4ddb-8e09-bd9fa5ee0253/3000x3000/hacktheplant-episode49cover.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:15</itunes:duration>
      <itunes:summary>“Within the [cybersecurity] community, that&apos;s why it&apos;s so small. We establish that trust. Okay, I know you&apos;ve always provided this information to us, what can we do to help you? Things like that is the human factor that cannot be eliminated.”- Dd Budiharto
</itunes:summary>
      <itunes:subtitle>“Within the [cybersecurity] community, that&apos;s why it&apos;s so small. We establish that trust. Okay, I know you&apos;ve always provided this information to us, what can we do to help you? Things like that is the human factor that cannot be eliminated.”- Dd Budiharto
</itunes:subtitle>
      <itunes:keywords>critical infrastructure security, critical infrastructure, oil, gas, secruity, dd budiharto</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5189a94d-d804-4202-98c9-bc2633235990</guid>
      <title>AI and the Future of Maritime Cybersecurity</title>
      <description><![CDATA[<p>In this episode, host Bryson Bort sits down with Gary Kessler, retired cybersecurity professor and co-founder and director of the Maritime Hacking Village. As a maritime cybersecurity researcher, consultant, and practitioner with nearly fifty years of experience, Gary walks us through the ins and outs of cybersecurity at sea, automated identification systems (AIS), and AI’s current and future role in maritime operations. </p><p>What is AIS spoofing, and why is it dangerous? What are the unique challenges posed by cybersecurity at sea? Is the maritime industry ready for artificial intelligence integrations? </p><p>“AI is going to [present] really incredible opportunities for us moving forward. I think however, it is a tool that is not well understood in general by people who are not specialists. And particularly in the maritime industry, we're going to have to get a lot better at understanding the capabilities and the pitfalls,” Gary said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></description>
      <pubDate>Tue, 16 Dec 2025 17:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Gary Kessler, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/ai-and-the-future-of-maritime-cybersecurity-AWgO_cqJ</link>
      <content:encoded><![CDATA[<p>In this episode, host Bryson Bort sits down with Gary Kessler, retired cybersecurity professor and co-founder and director of the Maritime Hacking Village. As a maritime cybersecurity researcher, consultant, and practitioner with nearly fifty years of experience, Gary walks us through the ins and outs of cybersecurity at sea, automated identification systems (AIS), and AI’s current and future role in maritime operations. </p><p>What is AIS spoofing, and why is it dangerous? What are the unique challenges posed by cybersecurity at sea? Is the maritime industry ready for artificial intelligence integrations? </p><p>“AI is going to [present] really incredible opportunities for us moving forward. I think however, it is a tool that is not well understood in general by people who are not specialists. And particularly in the maritime industry, we're going to have to get a lot better at understanding the capabilities and the pitfalls,” Gary said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></content:encoded>
      <enclosure length="39398227" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/563ab0a3-dfb7-4cd1-8464-87b336db9e26/audio/26ddec7f-ad44-4e36-8a90-a67d8cedd8fb/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>AI and the Future of Maritime Cybersecurity</itunes:title>
      <itunes:author>Gary Kessler, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/fecdc289-bd40-4777-82ed-13d10f324dce/3000x3000/hacktheplant-episode48cover.jpg?aid=rss_feed"/>
      <itunes:duration>00:40:57</itunes:duration>
      <itunes:summary>“We&apos;re gonna be able to optimize ship operations. We&apos;re gonna be able to optimize cargo coming on and off ships. We&apos;re gonna be able to optimize routing so that we take the least amount of time we can avoid weather…[but] now another way for me to hack a ship is going to be by poisoning the data sources.” - Gary Kessler </itunes:summary>
      <itunes:subtitle>“We&apos;re gonna be able to optimize ship operations. We&apos;re gonna be able to optimize cargo coming on and off ships. We&apos;re gonna be able to optimize routing so that we take the least amount of time we can avoid weather…[but] now another way for me to hack a ship is going to be by poisoning the data sources.” - Gary Kessler </itunes:subtitle>
      <itunes:keywords>cybersecurity, maritime, hack the plant, maritime cybersecurity, maritime hacking village, cyber</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">69bea137-ad25-451a-b747-fd6977da49e1</guid>
      <title>Creating a Cyber Aware Culture for Local Water Utilities</title>
      <description><![CDATA[<p>Deputy Managing Director at the Cyber Readiness Institute Lessie Skiba joins host Bryson Bort to discuss the CRI’s new program connecting small- and medium-sized water utilities with cyber coaches to strengthen their resilience.</p><p>What if the most effective cybersecurity solution isn't a new piece of technology, but a human connection? How can we empower small businesses to tackle cyber threats, even with limited resources? And if Lessie could wave a magic, air-gapped wand, what is one fundamental change she would make to our digital landscape?</p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></description>
      <pubDate>Tue, 9 Sep 2025 18:18:01 +0000</pubDate>
      <author>tyler@returnonideas.co (Lessie Skiba, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/creating-a-cyber-aware-culture-for-local-water-utilities-r8NDxoUT</link>
      <content:encoded><![CDATA[<p>Deputy Managing Director at the Cyber Readiness Institute Lessie Skiba joins host Bryson Bort to discuss the CRI’s new program connecting small- and medium-sized water utilities with cyber coaches to strengthen their resilience.</p><p>What if the most effective cybersecurity solution isn't a new piece of technology, but a human connection? How can we empower small businesses to tackle cyber threats, even with limited resources? And if Lessie could wave a magic, air-gapped wand, what is one fundamental change she would make to our digital landscape?</p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></content:encoded>
      <enclosure length="26721915" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/6fe3d4e9-c6f6-4b71-b449-31b1e9bf3fcc/audio/fa56eda7-da59-4f17-9cec-788d824ac257/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Creating a Cyber Aware Culture for Local Water Utilities</itunes:title>
      <itunes:author>Lessie Skiba, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/d6ac0190-3137-460b-9ae1-facc73ea9399/3000x3000/hacktheplant-episode47cover-final.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:50</itunes:duration>
      <itunes:summary>“A majority of the water utilities that we&apos;re targeting are small systems. They have limited resources and technical capabilities…so often, people talk about how they are interested in learning about cyber because they know it&apos;s important, but they don&apos;t really know where to start. That’s where [we] plug in.” - Lessie Skiba</itunes:summary>
      <itunes:subtitle>“A majority of the water utilities that we&apos;re targeting are small systems. They have limited resources and technical capabilities…so often, people talk about how they are interested in learning about cyber because they know it&apos;s important, but they don&apos;t really know where to start. That’s where [we] plug in.” - Lessie Skiba</itunes:subtitle>
      <itunes:keywords>cybersecurity, water utilities, cyber readiness institute, bryson bort, cyber, lessie skiba</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cd2657ec-528f-406a-88d6-e9a14bcd7a4d</guid>
      <title>Local Infrastructure is Critical Infrastructure</title>
      <description><![CDATA[<p>Our host Bryson sits down with Colin Ahern and Kirk Herath, two of the only cybersecurity experts working in Governors’ offices in the United States. Colin was appointed Chief Cyber Officer of the State of New York by Governor Kathy Hochul in June 2022, and Kirk stepped into his role as Cybersecurity Strategic Advisor to Ohio Governor Mike DeWine and Lt. Governor Jon Husted the same year. In their positions, Colin and Kirk are responsible for coordinating their states’ cybersecurity capabilities, overseeing threat assessment and response, working with local governments to prepare for and remediate cyber attacks, and more.  </p><p>What were the critical lessons learned in building statewide cybersecurity programs from the ground up? How do states navigate the shifting landscape of federal support? And what are the biggest challenges and opportunities on the horizon for cyber czars and strategic advisors across the country? </p><p>“You can't replicate these shared services unless you're doing it together. You just can't. We can either succeed together or we can fail separately. There's really not a middle ground where we can all have exactly everything we want all the time. Because like we've said, this is a risk management exercise in a world of limited resources,” Colin explained. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></description>
      <pubDate>Wed, 13 Aug 2025 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Colin Ahern, Kirk Herath, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/local-infrastructure-is-critical-infrastructure-53Dr08qo</link>
      <content:encoded><![CDATA[<p>Our host Bryson sits down with Colin Ahern and Kirk Herath, two of the only cybersecurity experts working in Governors’ offices in the United States. Colin was appointed Chief Cyber Officer of the State of New York by Governor Kathy Hochul in June 2022, and Kirk stepped into his role as Cybersecurity Strategic Advisor to Ohio Governor Mike DeWine and Lt. Governor Jon Husted the same year. In their positions, Colin and Kirk are responsible for coordinating their states’ cybersecurity capabilities, overseeing threat assessment and response, working with local governments to prepare for and remediate cyber attacks, and more.  </p><p>What were the critical lessons learned in building statewide cybersecurity programs from the ground up? How do states navigate the shifting landscape of federal support? And what are the biggest challenges and opportunities on the horizon for cyber czars and strategic advisors across the country? </p><p>“You can't replicate these shared services unless you're doing it together. You just can't. We can either succeed together or we can fail separately. There's really not a middle ground where we can all have exactly everything we want all the time. Because like we've said, this is a risk management exercise in a world of limited resources,” Colin explained. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></content:encoded>
      <enclosure length="49105290" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/e508decc-ffc0-4b84-b549-87c82b3b90d4/audio/b1af922c-ac31-4680-a33a-c9b909da5141/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Local Infrastructure is Critical Infrastructure</itunes:title>
      <itunes:author>Colin Ahern, Kirk Herath, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/337b92b8-6e06-4739-8e88-f712a1f19424/3000x3000/hacktheplant-episode46cover-20-1.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:05</itunes:duration>
      <itunes:summary>“When we have our crisis—and we will eventually—I hope it&apos;s small enough and not impactful enough that it doesn&apos;t harm too many people, and it wakes people up.” - Kirk Herath</itunes:summary>
      <itunes:subtitle>“When we have our crisis—and we will eventually—I hope it&apos;s small enough and not impactful enough that it doesn&apos;t harm too many people, and it wakes people up.” - Kirk Herath</itunes:subtitle>
      <itunes:keywords>cybersecurity, critical infrastructure, cyber defense, local infrastructure</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">71a70034-e984-4121-9f1c-aa6419ba7731</guid>
      <title>Old Systems, New Threats</title>
      <description><![CDATA[<p>Bryson Bort is joined by Jim Montgomery, Director, Industrial Cybersecurity Solutions at TXOne Networks. TXOne provides network-based and endpoint-based products to tackle security vulnerabilities across industrial environments. With decades of IT security experience, Jim now leads TXOne’s work protecting Operational Technology environments across critical sectors like automotive, oil and gas, pharma, manufacturing, and semiconductors.</p><p>How can we defend against threats that are already embedded within our systems? What are the most immediate and significant risks facing our critical infrastructure today? And how can operators begin to secure their networks? </p><p>“Let's start with the basics. Let's start with understanding. Let's start with making it hard to get into your environment, and let's start discouraging that type of behavior from attacking your environment,” Jim said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></description>
      <pubDate>Tue, 10 Jun 2025 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (jim montgomery, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/old-systems-new-threats-QITtsCD3</link>
      <content:encoded><![CDATA[<p>Bryson Bort is joined by Jim Montgomery, Director, Industrial Cybersecurity Solutions at TXOne Networks. TXOne provides network-based and endpoint-based products to tackle security vulnerabilities across industrial environments. With decades of IT security experience, Jim now leads TXOne’s work protecting Operational Technology environments across critical sectors like automotive, oil and gas, pharma, manufacturing, and semiconductors.</p><p>How can we defend against threats that are already embedded within our systems? What are the most immediate and significant risks facing our critical infrastructure today? And how can operators begin to secure their networks? </p><p>“Let's start with the basics. Let's start with understanding. Let's start with making it hard to get into your environment, and let's start discouraging that type of behavior from attacking your environment,” Jim said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></content:encoded>
      <enclosure length="29977915" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/75fe82ce-5604-40ba-a082-12b60f3fcd38/audio/71bcb186-aa9b-438e-9b8b-8b2212617196/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Old Systems, New Threats</itunes:title>
      <itunes:author>jim montgomery, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/479e45dd-8ee8-4125-ad3f-917c90d08fc6/3000x3000/jim-20m-20htp.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:09</itunes:duration>
      <itunes:summary>“When I talk to people and they ask me, ‘well, where do I start?’ Well, you start with understanding your environment first. What do you have? What do you need to protect? This piece of equipment goes down. What happens to your environment?” - Jim Montgomery
</itunes:summary>
      <itunes:subtitle>“When I talk to people and they ask me, ‘well, where do I start?’ Well, you start with understanding your environment first. What do you have? What do you need to protect? This piece of equipment goes down. What happens to your environment?” - Jim Montgomery
</itunes:subtitle>
      <itunes:keywords>jim montgomery, remote access security, cyber attack prevention, nation-state hacking, critical infrastructure security, ot security, semiconductor security, cybersecurity threats, industrial control systems, bryson bort, nist csf, supply chain cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a6184c95-fc62-4b1a-b4f4-f5d6db2674ff</guid>
      <title>The Truth About OT Vulnerabilities</title>
      <description><![CDATA[<p>Bryson Bort sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, to pull back the curtain on OT threat research. With a background in electrical engineering, Adam’s first job in cybersecurity was at an IT help desk. He now leads a team dedicated to identifying, analyzing, and mitigating cyber threats targeting Operational Technology (OT) environments.</p><p>What are the top threats Adam is seeing in OT attacks? Why is manufacturing such a vulnerable sector? And if he could wave a magic, non-Internet connected wand, what would he change? </p><p>“I really would love to have more experts in OT,” Adam said. “The more knowledge…and the more experts we have, it will fasten this process [of innovation].” </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></description>
      <pubDate>Tue, 13 May 2025 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Adam Robbie, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/the-truth-about-ot-vulnerabilities-rx0fVfas</link>
      <content:encoded><![CDATA[<p>Bryson Bort sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, to pull back the curtain on OT threat research. With a background in electrical engineering, Adam’s first job in cybersecurity was at an IT help desk. He now leads a team dedicated to identifying, analyzing, and mitigating cyber threats targeting Operational Technology (OT) environments.</p><p>What are the top threats Adam is seeing in OT attacks? Why is manufacturing such a vulnerable sector? And if he could wave a magic, non-Internet connected wand, what would he change? </p><p>“I really would love to have more experts in OT,” Adam said. “The more knowledge…and the more experts we have, it will fasten this process [of innovation].” </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></content:encoded>
      <enclosure length="32251427" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/88dd482b-4db7-4eec-b897-0c7c42f3e0c2/audio/c2e3eecd-191c-4415-909d-4416182f10c2/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>The Truth About OT Vulnerabilities</itunes:title>
      <itunes:author>Adam Robbie, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/b40c91cd-bacb-432b-a777-a71eea9bedb4/3000x3000/adam-20robbie-20htp.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:32</itunes:duration>
      <itunes:summary>“Threat research is an umbrella that covers the way that we try to find threats on systems, and identify threats, and try to inform the industry and our client about these threats ahead of time.” - Adam Robbie
</itunes:summary>
      <itunes:subtitle>“Threat research is an umbrella that covers the way that we try to find threats on systems, and identify threats, and try to inform the industry and our client about these threats ahead of time.” - Adam Robbie
</itunes:subtitle>
      <itunes:keywords>cybersecurity, threat research, palo alto networks, ot vulnerabilities, adam robbie, bryson bort, ot threat research, ics village</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8daade25-04b9-402a-b9f1-21281bf4a615</guid>
      <title>Bridging the Cybersecurity Resource Gap</title>
      <description><![CDATA[<p>Bryson Bort welcomes Sarah Powazek, Program Director of Public Interest Cybersecurity at the UC Berkeley Center for Long-Term Cybersecurity, to discuss the organization’s work providing cybersecurity resources for the public, and CyberCAN, a project to connect cities and nonprofits providing critical services.  </p><p>How can cities play a larger role in protecting their communities? What are the biggest cybersecurity challenges facing nonprofits? What innovative solutions are being developed to address the cybersecurity resource gap? </p><p>“It's never going to be enough to have one federal agency help every single organization in a country. We're just too large,” Sarah said. “I think the solution is to create more infrastructure at the state, local, and regional level.”</p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plan[e]t is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></description>
      <pubDate>Tue, 8 Apr 2025 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Sarah Powazek, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/bridging-the-cybersecurity-resource-gap-SVm6xQ5e</link>
      <content:encoded><![CDATA[<p>Bryson Bort welcomes Sarah Powazek, Program Director of Public Interest Cybersecurity at the UC Berkeley Center for Long-Term Cybersecurity, to discuss the organization’s work providing cybersecurity resources for the public, and CyberCAN, a project to connect cities and nonprofits providing critical services.  </p><p>How can cities play a larger role in protecting their communities? What are the biggest cybersecurity challenges facing nonprofits? What innovative solutions are being developed to address the cybersecurity resource gap? </p><p>“It's never going to be enough to have one federal agency help every single organization in a country. We're just too large,” Sarah said. “I think the solution is to create more infrastructure at the state, local, and regional level.”</p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plan[e]t is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></content:encoded>
      <enclosure length="32440770" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/25314997-0b0d-4334-ae46-2a51d348ba02/audio/12d7ecc5-ec6b-462c-8cb8-9ece8fe1dc55/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Bridging the Cybersecurity Resource Gap</itunes:title>
      <itunes:author>Sarah Powazek, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/a695eec0-1e2d-4e9f-87dd-c2074e135ce8/3000x3000/hack-20the-20plant-20sarah.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:43</itunes:duration>
      <itunes:summary>“I&apos;d say this is a project about nonprofit cybersecurity…but it&apos;s also about how cities can better protect infrastructure that isn&apos;t their own, and how cities can actually play a much bigger role in the cyber defense of their own communities.” - Sarah Powazek</itunes:summary>
      <itunes:subtitle>“I&apos;d say this is a project about nonprofit cybersecurity…but it&apos;s also about how cities can better protect infrastructure that isn&apos;t their own, and how cities can actually play a much bigger role in the cyber defense of their own communities.” - Sarah Powazek</itunes:subtitle>
      <itunes:keywords>cybersecurity, center for long-term cybersecurity, cybercan, hack the plant, critical infrastructure</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0d086913-fc52-4021-b264-4c0fd511427a</guid>
      <title>Preparing for Unnatural Disasters</title>
      <description><![CDATA[<p>Welcome to season 5! Our host Bryson Bort sits down with Institute for Security and Technology (IST) Executive in Residence for Public Safety & Security Josh Corman. Josh previously joined us on season 1, episode 2 to discuss his experience founding I Am The Cavalry, a grassroots organization focused on the intersection of digital security, public safety, and human life. </p><p>Today, Josh walks us through his Cyber Civil Defense initiative UnDisruptable27 and his work to bolster the resilience of local critical infrastructure systems. </p><p>What role can you play in making our communities more resilient? What risks do we face from a hybrid conflict? How can we better prepare for disruptions to critical infrastructure? </p><p>“You inform, influence, inspire. You make sure people aren't blindsided, and even if they can't stop the natural disaster, they can at least prepare for it and make informed decisions and innovate locally,” Josh said. “And unlike natural disasters, where we only have a couple hurricanes a year, we may have concurrent unnatural disasters on plural U.S. infrastructure sites across the country with finite resources to respond and recover.”</p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plan[e]t is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></description>
      <pubDate>Tue, 11 Mar 2025 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Josh Corman, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/preparing-for-unnatural-disasters-JQfojasY</link>
      <content:encoded><![CDATA[<p>Welcome to season 5! Our host Bryson Bort sits down with Institute for Security and Technology (IST) Executive in Residence for Public Safety & Security Josh Corman. Josh previously joined us on season 1, episode 2 to discuss his experience founding I Am The Cavalry, a grassroots organization focused on the intersection of digital security, public safety, and human life. </p><p>Today, Josh walks us through his Cyber Civil Defense initiative UnDisruptable27 and his work to bolster the resilience of local critical infrastructure systems. </p><p>What role can you play in making our communities more resilient? What risks do we face from a hybrid conflict? How can we better prepare for disruptions to critical infrastructure? </p><p>“You inform, influence, inspire. You make sure people aren't blindsided, and even if they can't stop the natural disaster, they can at least prepare for it and make informed decisions and innovate locally,” Josh said. “And unlike natural disasters, where we only have a couple hurricanes a year, we may have concurrent unnatural disasters on plural U.S. infrastructure sites across the country with finite resources to respond and recover.”</p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plan[e]t is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></content:encoded>
      <enclosure length="38611461" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/50fcafcf-858d-4906-a742-1fa3c62bab48/audio/01b6b895-4543-47dc-af9e-4426f7ccdf2c/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Preparing for Unnatural Disasters</itunes:title>
      <itunes:author>Josh Corman, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/ca766cb4-53f1-4aa6-a1b6-81149b45a4a2/3000x3000/htp-20josh-20.jpg?aid=rss_feed"/>
      <itunes:duration>00:40:09</itunes:duration>
      <itunes:summary>“When everything is critical, nothing is critical.” - Josh Corman

For the premiere of season 5, Bryson Bort welcomes back season one guest Josh Corman to discuss his Cyber Civil Defense initiative UnDisruptable27, and the four lifeline infrastructure systems we’ll be focusing on this season: electricity, healthcare, food, and water. 
</itunes:summary>
      <itunes:subtitle>“When everything is critical, nothing is critical.” - Josh Corman

For the premiere of season 5, Bryson Bort welcomes back season one guest Josh Corman to discuss his Cyber Civil Defense initiative UnDisruptable27, and the four lifeline infrastructure systems we’ll be focusing on this season: electricity, healthcare, food, and water. 
</itunes:subtitle>
      <itunes:keywords>cybersecurity, undisruptable27, hack the plant, critical infrastructure, bryson bort, cyber, cyber defense, ics village</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e2677363-03d9-4fb3-a73b-b79bf24cc9cb</guid>
      <title>From the Archives</title>
      <description><![CDATA[<p>For the final episode of the season, our host Bryson Bort reflects on four years and forty episodes of Hack the Plan[e]t, and picks a few favorites. </p><p>Episode 8, DoD and Critical Infrastructure: <a href="https://hack-the-plant.simplecast.com/episodes/dod-and-critical-infrastructure">https://hack-the-plant.simplecast.com/episodes/dod-and-critical-infrastructure</a></p><p>Episode 10, The Congressman, The Commission and Our Critical Infrastructure: <a href="https://hack-the-plant.simplecast.com/episodes/the-congressman-the-commission-and-our-critical-infrastructure">https://hack-the-plant.simplecast.com/episodes/the-congressman-the-commission-and-our-critical-infrastructure</a></p><p>Episode 27, Managing Incident Responses to Critical Infrastructure Attacks: <a href="https://hack-the-plant.simplecast.com/episodes/managing-incident-responses-to-critical-infrastructure-attacks">https://hack-the-plant.simplecast.com/episodes/managing-incident-responses-to-critical-infrastructure-attacks</a></p><p>Episode 28, Cyber Threat Intelligence Over the Past 25 Years: <a href="https://hack-the-plant.simplecast.com/episodes/cyber-threat-intelligence-over-the-past-25-years">https://hack-the-plant.simplecast.com/episodes/cyber-threat-intelligence-over-the-past-25-years</a></p><p>Episode 36, Supporting Ukrainian Electrical Grid Resilience in Wartime: <a href="https://hack-the-plant.simplecast.com/episodes/supporting-ukrainian-electrical-grid-resilience-in-wartime-mxxhn2g3">https://hack-the-plant.simplecast.com/episodes/supporting-ukrainian-electrical-grid-resilience-in-wartime-mxxhn2g3</a></p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></description>
      <pubDate>Fri, 28 Feb 2025 17:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Erica Mitchell, Mike Gallagher, Jason Healy, Lesley Carhart, Bryson Bort, Joe Marshall)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/recap-_sotaE_L</link>
      <content:encoded><![CDATA[<p>For the final episode of the season, our host Bryson Bort reflects on four years and forty episodes of Hack the Plan[e]t, and picks a few favorites. </p><p>Episode 8, DoD and Critical Infrastructure: <a href="https://hack-the-plant.simplecast.com/episodes/dod-and-critical-infrastructure">https://hack-the-plant.simplecast.com/episodes/dod-and-critical-infrastructure</a></p><p>Episode 10, The Congressman, The Commission and Our Critical Infrastructure: <a href="https://hack-the-plant.simplecast.com/episodes/the-congressman-the-commission-and-our-critical-infrastructure">https://hack-the-plant.simplecast.com/episodes/the-congressman-the-commission-and-our-critical-infrastructure</a></p><p>Episode 27, Managing Incident Responses to Critical Infrastructure Attacks: <a href="https://hack-the-plant.simplecast.com/episodes/managing-incident-responses-to-critical-infrastructure-attacks">https://hack-the-plant.simplecast.com/episodes/managing-incident-responses-to-critical-infrastructure-attacks</a></p><p>Episode 28, Cyber Threat Intelligence Over the Past 25 Years: <a href="https://hack-the-plant.simplecast.com/episodes/cyber-threat-intelligence-over-the-past-25-years">https://hack-the-plant.simplecast.com/episodes/cyber-threat-intelligence-over-the-past-25-years</a></p><p>Episode 36, Supporting Ukrainian Electrical Grid Resilience in Wartime: <a href="https://hack-the-plant.simplecast.com/episodes/supporting-ukrainian-electrical-grid-resilience-in-wartime-mxxhn2g3">https://hack-the-plant.simplecast.com/episodes/supporting-ukrainian-electrical-grid-resilience-in-wartime-mxxhn2g3</a></p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></content:encoded>
      <enclosure length="22244918" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/df4680fc-922c-412e-ab6b-32cf3769bd12/audio/a049dc1e-c128-4399-93e3-92cdcc0d087a/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>From the Archives</itunes:title>
      <itunes:author>Erica Mitchell, Mike Gallagher, Jason Healy, Lesley Carhart, Bryson Bort, Joe Marshall</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/fa523afc-da11-43de-bd70-72ac6927d314/3000x3000/hack-20the-20plant-20from-20the-20archives-20.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:07</itunes:duration>
      <itunes:summary>“I started Hack the Plant in August 2020, driven by a deep conviction that we need to do something about the problem of critical infrastructure assurance: from education to action. Over 4 years and 40 episodes, we’ve hosted industry giants and practitioners, members of Congress and policymakers, and hackers and scientists; because with technology it’s the people, those on the front-lines that are making the difference.” - Bryson Bort

Bryson closes out season four with a look back at the work we’ve done so far.
</itunes:summary>
      <itunes:subtitle>“I started Hack the Plant in August 2020, driven by a deep conviction that we need to do something about the problem of critical infrastructure assurance: from education to action. Over 4 years and 40 episodes, we’ve hosted industry giants and practitioners, members of Congress and policymakers, and hackers and scientists; because with technology it’s the people, those on the front-lines that are making the difference.” - Bryson Bort

Bryson closes out season four with a look back at the work we’ve done so far.
</itunes:subtitle>
      <itunes:keywords>cyber policy, critical infrastructure, icident response</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9ace262b-38f1-453f-816e-e9b7faa09005</guid>
      <title>Protecting Critical Infrastructure for Rural Electric Cooperatives</title>
      <description><![CDATA[<p>Bryson is joined by Carter Manucy, Director of Cybersecurity at the National Rural Electric Cooperative Association to discuss rural electric cooperatives, the importance of collaboration, and the state of cybersecurity in the energy sector. With over two decades of experience in the sector, Carter was recently awarded E-ISAC’s prestigious Michael J. Assante Award for his leadership on initiatives to protect the grid and electric co-ops. </p><p>How are cooperatives fostering a stronger cybersecurity culture? What are the unique challenges faced by rural electric cooperatives in the cybersecurity landscape? And what does Carter see in his crystal ball for the future of cybersecurity in the energy sector?</p><p>“I think as a country, we’ve really got to pull together or else we're going to be behind the eight ball in a few years, and that could really look bad for everybody...power runs all of our lives,” Carter said. “If I had that magic wand, I think I would get rid of a lot of the politics that are there so that we can focus on getting funding to help in the areas that it really is needed, and move that needle forward.” </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></description>
      <pubDate>Mon, 3 Feb 2025 17:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Carter Manucy, Rob Lee, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/protecting-critical-infrastructure-for-rural-electric-cooperatives-72Jtazx_</link>
      <content:encoded><![CDATA[<p>Bryson is joined by Carter Manucy, Director of Cybersecurity at the National Rural Electric Cooperative Association to discuss rural electric cooperatives, the importance of collaboration, and the state of cybersecurity in the energy sector. With over two decades of experience in the sector, Carter was recently awarded E-ISAC’s prestigious Michael J. Assante Award for his leadership on initiatives to protect the grid and electric co-ops. </p><p>How are cooperatives fostering a stronger cybersecurity culture? What are the unique challenges faced by rural electric cooperatives in the cybersecurity landscape? And what does Carter see in his crystal ball for the future of cybersecurity in the energy sector?</p><p>“I think as a country, we’ve really got to pull together or else we're going to be behind the eight ball in a few years, and that could really look bad for everybody...power runs all of our lives,” Carter said. “If I had that magic wand, I think I would get rid of a lot of the politics that are there so that we can focus on getting funding to help in the areas that it really is needed, and move that needle forward.” </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></content:encoded>
      <enclosure length="29964563" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/53d6adb6-8ba7-4788-9e0f-d539a7462125/audio/b42ce5f4-ba1e-43e9-a3fb-227343723a78/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Protecting Critical Infrastructure for Rural Electric Cooperatives</itunes:title>
      <itunes:author>Carter Manucy, Rob Lee, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/d4bff5e0-2f28-4a71-9282-1fa6ab3ffb0f/3000x3000/carter-20headshot-20.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:09</itunes:duration>
      <itunes:summary>“NRECA is focused on our members. So we have a series of programs or funding that we try to bring to our co-ops to help them improve their cybersecurity. That&apos;s the bottom line. That&apos;s really what we&apos;re trying to do is find out how to meet our cooperatives, where they are, improve their cybersecurity, improve their awareness, and do that through a number of different funding mechanisms that we have.” - Carter Manucy

Carter sits down with Bryson to cover the National Rural Electric Cooperative Association, his work as cybersecurity director, and how we can better combat the cyber threats facing our energy infrastructure.  
</itunes:summary>
      <itunes:subtitle>“NRECA is focused on our members. So we have a series of programs or funding that we try to bring to our co-ops to help them improve their cybersecurity. That&apos;s the bottom line. That&apos;s really what we&apos;re trying to do is find out how to meet our cooperatives, where they are, improve their cybersecurity, improve their awareness, and do that through a number of different funding mechanisms that we have.” - Carter Manucy

Carter sits down with Bryson to cover the National Rural Electric Cooperative Association, his work as cybersecurity director, and how we can better combat the cyber threats facing our energy infrastructure.  
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0481e311-2c6b-49b2-a7c3-4e039079b389</guid>
      <title>Reliability and Risks of the North American Power Grid</title>
      <description><![CDATA[<p>Bryson is joined by Sara Patrick, President and CEO at the Midwest Reliability Organization (MRO) to discuss cyber threats, mitigation strategies, and the United States energy infrastructure system. A lawyer by training, Sara led MRO’s enforcement group and compliance monitoring team for 16 years before stepping into her position as CEO. </p><p>What risks does AI pose to maintaining a reliable grid? How does MRO build resilience into the Northeast bulk power grid? What do smaller organizations need to be able to mitigate threats? </p><p>“When we think about operations, we're a lot of times focused on the bigger organizations. But from a cyber perspective, it really doesn't matter the size of your organization. You're all susceptible,” Sara explained. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></description>
      <pubDate>Tue, 26 Nov 2024 17:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Sara Patrick, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/reliability-and-risks-of-the-north-american-power-grid-uRacbGft</link>
      <content:encoded><![CDATA[<p>Bryson is joined by Sara Patrick, President and CEO at the Midwest Reliability Organization (MRO) to discuss cyber threats, mitigation strategies, and the United States energy infrastructure system. A lawyer by training, Sara led MRO’s enforcement group and compliance monitoring team for 16 years before stepping into her position as CEO. </p><p>What risks does AI pose to maintaining a reliable grid? How does MRO build resilience into the Northeast bulk power grid? What do smaller organizations need to be able to mitigate threats? </p><p>“When we think about operations, we're a lot of times focused on the bigger organizations. But from a cyber perspective, it really doesn't matter the size of your organization. You're all susceptible,” Sara explained. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></content:encoded>
      <enclosure length="27034295" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/1b552d28-5bf1-4ef4-b79c-30786b15532a/audio/9a4cdd74-5e9d-466a-b12f-cd105c0135f1/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Reliability and Risks of the North American Power Grid</itunes:title>
      <itunes:author>Sara Patrick, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/0fd3d248-6b7a-49dc-a9bd-47fead29e1fb/3000x3000/hack-20the-20plant-20sara.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:06</itunes:duration>
      <itunes:summary>“Compliance and enforcement are necessary tools in our toolkit, but we have a much broader vision and mission that&apos;s really focused on a highly reliable and secure North American bulk power system. And those standards are the floor, but there&apos;s so much more we can do. And the biggest tool in our toolkit is outreach and education.” - Sara Patrick

Bryson interviews Sara on her work leading the Midwest Reliability Organization to identify, prioritize and assure effective and efficient mitigation of risks to the security of the North American bulk power system.
</itunes:summary>
      <itunes:subtitle>“Compliance and enforcement are necessary tools in our toolkit, but we have a much broader vision and mission that&apos;s really focused on a highly reliable and secure North American bulk power system. And those standards are the floor, but there&apos;s so much more we can do. And the biggest tool in our toolkit is outreach and education.” - Sara Patrick

Bryson interviews Sara on her work leading the Midwest Reliability Organization to identify, prioritize and assure effective and efficient mitigation of risks to the security of the North American bulk power system.
</itunes:subtitle>
      <itunes:keywords>cybersecurity, sara patrick, energy reliability, critical infrastructure, supply chain compromise, bryson bort, mro, power grid security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7263cb38-7f98-4424-bdaf-ecb369a494e9</guid>
      <title>Securing Embedded Systems</title>
      <description><![CDATA[<p>In this episode, Bryson sits down with MITRE EMB3D co-founder Niyo Little Thunder Pearson. For nearly 20 years, Niyo has been at the forefront of protecting critical infrastructure systems. He previously led incident response for American Express, directing the company’s Security Operations Center during the LulzSec and Anonymous attacks, and worked to develop an adversarial cyber defense program for the nation’s third largest gas utility at ONE Gas Oklahoma. Now, Niyo has co-founded MITRE EMB3D, a groundbreaking global threat network aimed at enhancing the security of embedded devices. </p><p>What is MITRE EMB3D? Who is the intended audience? What problems is it trying to solve? </p><p>“There is such a gap that exists today on what we understand and how risk averse these [embedded] devices are. They do well and they operate well. They're built for what they're doing in a safety context, but the security was never brought forward with it,” Niyo said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></description>
      <pubDate>Wed, 25 Sep 2024 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Niyo Little Thunder Pearson, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/securing-embedded-systems-fsDzzDOV</link>
      <content:encoded><![CDATA[<p>In this episode, Bryson sits down with MITRE EMB3D co-founder Niyo Little Thunder Pearson. For nearly 20 years, Niyo has been at the forefront of protecting critical infrastructure systems. He previously led incident response for American Express, directing the company’s Security Operations Center during the LulzSec and Anonymous attacks, and worked to develop an adversarial cyber defense program for the nation’s third largest gas utility at ONE Gas Oklahoma. Now, Niyo has co-founded MITRE EMB3D, a groundbreaking global threat network aimed at enhancing the security of embedded devices. </p><p>What is MITRE EMB3D? Who is the intended audience? What problems is it trying to solve? </p><p>“There is such a gap that exists today on what we understand and how risk averse these [embedded] devices are. They do well and they operate well. They're built for what they're doing in a safety context, but the security was never brought forward with it,” Niyo said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></content:encoded>
      <enclosure length="30121766" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/692b72f1-e5e8-4ffb-ba9f-943963d22c2c/audio/d8acd98f-b016-46cf-a63e-bf5dc7664e84/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Securing Embedded Systems</itunes:title>
      <itunes:author>Niyo Little Thunder Pearson, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/90be15e3-88ae-41cf-8630-25b81cdfa1ad/3000x3000/htp-e38-headshot.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:20</itunes:duration>
      <itunes:summary>“MITRE EMB3D is a global threat framework. It&apos;s a new one that is focused on embedded systems in critical infrastructure spaces, such as rail, oil, natural gas, water, wastewater, aerospace, autonomous, UAS. So everybody&apos;s familiar with MITRE attack and MITRE attack for ICS. Those only actually record observed adversarial threats. That&apos;s it. MITRE EMB3D follows everything from a theoretical [threat], which is academic and theoretical to proof of concept, proof of exploit, to then CWE.” - Niyo Little Thunder Pearson

In this episode, Bryson and Niyo discuss Niyo’s project MITRE EMB3D, the problems it’s trying to solve, and how the industry is responding to this groundbreaking framework. 
</itunes:summary>
      <itunes:subtitle>“MITRE EMB3D is a global threat framework. It&apos;s a new one that is focused on embedded systems in critical infrastructure spaces, such as rail, oil, natural gas, water, wastewater, aerospace, autonomous, UAS. So everybody&apos;s familiar with MITRE attack and MITRE attack for ICS. Those only actually record observed adversarial threats. That&apos;s it. MITRE EMB3D follows everything from a theoretical [threat], which is academic and theoretical to proof of concept, proof of exploit, to then CWE.” - Niyo Little Thunder Pearson

In this episode, Bryson and Niyo discuss Niyo’s project MITRE EMB3D, the problems it’s trying to solve, and how the industry is responding to this groundbreaking framework. 
</itunes:subtitle>
      <itunes:keywords>mitre emb3d, niyo little thunder pearson, embedded systems</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">94226e01-e82f-4523-bb1f-48071a8297b6</guid>
      <title>The Case For A Cyber Force</title>
      <description><![CDATA[<p>In this episode, Bryson sits down with Mark Montgomery, Senior Director at the Foundation for Defense of Democracies. For three years, Mark served as Executive Director of the Cyberspace Solarium Commission, created by congressional mandate to develop strategic approaches to defending against cyber attacks. Now, he directs CSC 2.0, an initiative that works to implement the recommendations of the Commission. </p><p>What were the key recommendations of the Cyberspace Solarium Commission? What are the politics of cybersecurity? How do we ensure that our international partners have the same level of resiliency and recovery that we have domestically? </p><p>“We'd like to fight our adversaries overseas. That means we have to fight with and through our allies and partners. So they have to have strong critical infrastructure as our forces arrive and execute their missions,” Mark said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></description>
      <pubDate>Tue, 23 Jul 2024 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/the-case-for-a-cyber-force-Roy__F9m</link>
      <content:encoded><![CDATA[<p>In this episode, Bryson sits down with Mark Montgomery, Senior Director at the Foundation for Defense of Democracies. For three years, Mark served as Executive Director of the Cyberspace Solarium Commission, created by congressional mandate to develop strategic approaches to defending against cyber attacks. Now, he directs CSC 2.0, an initiative that works to implement the recommendations of the Commission. </p><p>What were the key recommendations of the Cyberspace Solarium Commission? What are the politics of cybersecurity? How do we ensure that our international partners have the same level of resiliency and recovery that we have domestically? </p><p>“We'd like to fight our adversaries overseas. That means we have to fight with and through our allies and partners. So they have to have strong critical infrastructure as our forces arrive and execute their missions,” Mark said. </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></content:encoded>
      <enclosure length="40284213" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/b2523aec-ec1b-4502-aec4-100cb75e3706/audio/07585bf8-ccc8-4b46-aa34-d04958dd6aa5/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>The Case For A Cyber Force</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/0d007ab9-80d4-4a5f-b615-aae455c2a5a4/3000x3000/mark-montgomery-htp.jpg?aid=rss_feed"/>
      <itunes:duration>00:41:55</itunes:duration>
      <itunes:summary>“But the problem we have here is, the people you&apos;re trying to recruit for cyber, those kind of people are not the same people you need in infantry armor units, and flying F-22s, right? Force generation is just one of these things that most people don&apos;t look at. Except, if you don&apos;t start with the building blocks at step one, there&apos;s no way you have a stable high rise at step ten.” - Mark Montgomery

In this episode, Bryson and Mark talk about Mark’s time at the Cyberspace Solarium Commission, his pitch for a Cyber Force, and the politics of cybersecurity and the latest cyber policy.
</itunes:summary>
      <itunes:subtitle>“But the problem we have here is, the people you&apos;re trying to recruit for cyber, those kind of people are not the same people you need in infantry armor units, and flying F-22s, right? Force generation is just one of these things that most people don&apos;t look at. Except, if you don&apos;t start with the building blocks at step one, there&apos;s no way you have a stable high rise at step ten.” - Mark Montgomery

In this episode, Bryson and Mark talk about Mark’s time at the Cyberspace Solarium Commission, his pitch for a Cyber Force, and the politics of cybersecurity and the latest cyber policy.
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0b8bde55-0eb7-4bd3-9ef0-d81b722dedeb</guid>
      <title>Supporting Ukrainian Electrical Grid Resilience in Wartime</title>
      <description><![CDATA[<p>Joe Marshall is a Senior IoT Security Strategist at Cisco Talos Intelligence Group. When Russia invaded Ukraine in 2022, Joe helped coordinate a multinational, multi-company coalition of volunteers and experts to find a technological solution. </p><p>Bryson and Joe sat down to discuss his efforts in Ukraine, how he got the go-ahead from Cisco leadership, and more. </p><p>“They were like, yeah, we can't even get accurate timing to work on our transmission grid because of jamming that is interrupting GPS communications,” Joe explains. “A week later I was sitting in my office and I went, ‘I wonder if we have something inside of Cisco that can actually help with this.’” </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></description>
      <pubDate>Fri, 21 Jun 2024 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Bryson Bort, Joe Marshall)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/supporting-ukrainian-electrical-grid-resilience-in-wartime-mxxhn2g3-se0ke03L</link>
      <content:encoded><![CDATA[<p>Joe Marshall is a Senior IoT Security Strategist at Cisco Talos Intelligence Group. When Russia invaded Ukraine in 2022, Joe helped coordinate a multinational, multi-company coalition of volunteers and experts to find a technological solution. </p><p>Bryson and Joe sat down to discuss his efforts in Ukraine, how he got the go-ahead from Cisco leadership, and more. </p><p>“They were like, yeah, we can't even get accurate timing to work on our transmission grid because of jamming that is interrupting GPS communications,” Joe explains. “A week later I was sitting in my office and I went, ‘I wonder if we have something inside of Cisco that can actually help with this.’” </p><p>Join us for this and more on this episode of Hack the Plan[e]t. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></content:encoded>
      <enclosure length="31059440" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/94e12cdd-46c6-4613-82d6-5303e902065a/audio/c11e858b-45d8-49cc-87f6-0f2a5fd4bada/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Supporting Ukrainian Electrical Grid Resilience in Wartime</itunes:title>
      <itunes:author>Bryson Bort, Joe Marshall</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/77ffd5e8-6215-45e4-8d8f-752caab962f8/3000x3000/joe-marshall-htp-v2.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:19</itunes:duration>
      <itunes:summary>“We want to see them safe, happy, and living fulfilling lives. And we&apos;re going to do whatever the hell we can, whenever the hell we can, to help people like the Ukrainians because they deserve a peaceful, good life. And we have not lost a single ounce of steam,” reflects Joe Marshall, Senior IoT Security Strategist at Cisco Talos.  - Joe Marshall

In this episode of Hack the Plan[e]t, Bryson and Joe discuss Cisco’s efforts in the Ukraine war. 
</itunes:summary>
      <itunes:subtitle>“We want to see them safe, happy, and living fulfilling lives. And we&apos;re going to do whatever the hell we can, whenever the hell we can, to help people like the Ukrainians because they deserve a peaceful, good life. And we have not lost a single ounce of steam,” reflects Joe Marshall, Senior IoT Security Strategist at Cisco Talos.  - Joe Marshall

In this episode of Hack the Plan[e]t, Bryson and Joe discuss Cisco’s efforts in the Ukraine war. 
</itunes:subtitle>
      <itunes:keywords>talos, joe marshall, russia, electrical grid, gps, ukraine</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">14cf2f25-5d86-41eb-895b-1c1a32e22e23</guid>
      <title>Preparing for the potential worst day</title>
      <description><![CDATA[<p>In this episode, Bryson Bort is joined by Paul Shaver, Global OT Security Practice Lead at Mandiant / Google Cloud to discuss the cyber threat landscape. How did Paul’s military background play a role in his decision to start working with control systems? What is the difference between an advanced persistent threat and a regular threat? What does Paul think is the best way to protect against documented threats from nation-state actors?</p><p>“I think if we're not doing a better job of protecting critical infrastructure, protecting our assets, any one of the nation state actors could cause that level of mass scale outage or destruction of capability. It comes down to being better prepared to protect these environments,” Paul said. </p><p>Join us for this and more on this episode of Hack the Plant. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></description>
      <pubDate>Tue, 21 May 2024 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Paul Shaver, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/preparing-for-the-potential-worst-day-uKeds5pi</link>
      <content:encoded><![CDATA[<p>In this episode, Bryson Bort is joined by Paul Shaver, Global OT Security Practice Lead at Mandiant / Google Cloud to discuss the cyber threat landscape. How did Paul’s military background play a role in his decision to start working with control systems? What is the difference between an advanced persistent threat and a regular threat? What does Paul think is the best way to protect against documented threats from nation-state actors?</p><p>“I think if we're not doing a better job of protecting critical infrastructure, protecting our assets, any one of the nation state actors could cause that level of mass scale outage or destruction of capability. It comes down to being better prepared to protect these environments,” Paul said. </p><p>Join us for this and more on this episode of Hack the Plant. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></content:encoded>
      <enclosure length="29409390" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/00ad56db-6f9d-41e2-be32-1330ad491d6e/audio/1b240b87-74d5-43fd-b873-a16a215c9d71/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Preparing for the potential worst day</itunes:title>
      <itunes:author>Paul Shaver, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/55c8c4df-c028-46b7-a4a1-a2096b34a6f2/3000x3000/htp-paul-shaver.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:36</itunes:duration>
      <itunes:summary>“From an architecture standpoint, from a resilience standpoint, from a capabilities standpoint, I think everybody&apos;s kind of facing the same problems, and I think there&apos;s not enough resiliency baked into these systems,” says Paul Shaver. 

Paul Shaver is Global OT Security Practice Lead at Mandiant / Google Cloud. In this episode, Bryson and Paul discuss Paul’s military background, the difference between persistent threats and regular threats, and more. 
</itunes:summary>
      <itunes:subtitle>“From an architecture standpoint, from a resilience standpoint, from a capabilities standpoint, I think everybody&apos;s kind of facing the same problems, and I think there&apos;s not enough resiliency baked into these systems,” says Paul Shaver. 

Paul Shaver is Global OT Security Practice Lead at Mandiant / Google Cloud. In this episode, Bryson and Paul discuss Paul’s military background, the difference between persistent threats and regular threats, and more. 
</itunes:subtitle>
      <itunes:keywords>google cloud, mandiant, ot security, ics, critical infrastructure, paul shaver</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">065f7cac-9e3c-43cf-aacc-a5f06901fe11</guid>
      <title>The ICS Hacker</title>
      <description><![CDATA[<p>Claroty is a cybersecurity company that helps organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). </p><p>In this episode, Bryson Bort sits down with Claroty director of research and industrial control system (ICS) vulnerability expert Sharon Brizinov to discuss everything ICS.</p><p>What are the most common vulnerabilities threatening ICS security? What’s the impact of cybersecurity controls standardization? And if he could wave a magic wand, what is one thing he’d change in the ICS industry? </p><p>“Don't expose ICS equipment over the Internet,” Sharon said. “That's my wish. To eliminate all the ICS Internet-exposed devices.”</p><p>Join us for this and more on this episode of Hack the Plant. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></description>
      <pubDate>Tue, 23 Apr 2024 10:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/the-ics-hacker-1XVfy4J3</link>
      <content:encoded><![CDATA[<p>Claroty is a cybersecurity company that helps organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). </p><p>In this episode, Bryson Bort sits down with Claroty director of research and industrial control system (ICS) vulnerability expert Sharon Brizinov to discuss everything ICS.</p><p>What are the most common vulnerabilities threatening ICS security? What’s the impact of cybersecurity controls standardization? And if he could wave a magic wand, what is one thing he’d change in the ICS industry? </p><p>“Don't expose ICS equipment over the Internet,” Sharon said. “That's my wish. To eliminate all the ICS Internet-exposed devices.”</p><p>Join us for this and more on this episode of Hack the Plant. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. </p>
]]></content:encoded>
      <enclosure length="32537657" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/e1e0b3a1-0190-40fa-9a04-1bef6d23d4f2/audio/c0692040-04fc-491b-94ee-a474e40d549c/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>The ICS Hacker</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/2ca7d7fd-810e-458e-8645-5a13f0d13343/3000x3000/htp-e34.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:51</itunes:duration>
      <itunes:summary>“So our main product in Claroty is an idea solution. And in order for an idea solution to work properly, it needs to have a really good understanding and visibility into the protocols, to the network traffic. And so I started in Claroty as a protocol researcher, meaning I was trying to understand how industrial protocols operate, and this means I had to research a lot of ICS equipment to really understand what types of data, different components in the ICS network, exchange, how do they operate? What are the different protocols and how can we understand what they mean?” - Sharon Brizinov

Sharon Brizinov is director of research at Claroty, a cybersecurity company focused on protecting industrial control system. In this episode, Bryson and Sharon cover Sharon’s career, his experience in the ICS industry, and more. </itunes:summary>
      <itunes:subtitle>“So our main product in Claroty is an idea solution. And in order for an idea solution to work properly, it needs to have a really good understanding and visibility into the protocols, to the network traffic. And so I started in Claroty as a protocol researcher, meaning I was trying to understand how industrial protocols operate, and this means I had to research a lot of ICS equipment to really understand what types of data, different components in the ICS network, exchange, how do they operate? What are the different protocols and how can we understand what they mean?” - Sharon Brizinov

Sharon Brizinov is director of research at Claroty, a cybersecurity company focused on protecting industrial control system. In this episode, Bryson and Sharon cover Sharon’s career, his experience in the ICS industry, and more. </itunes:subtitle>
      <itunes:keywords>sharon brizinov, claroty, ics, hacker</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d996125d-8e70-4f8f-97fd-e0208f1922ad</guid>
      <title>Securing, Defending, and Bringing Resilience to Infrastructure</title>
      <description><![CDATA[<p>Psymetis creates Operational Technology (OT) security solutions that quickly and prevent electric grid outages and catastrophic infrastructure failures. Psymetis’ Werewolf system provides condition monitoring and threat mitigation for the power grid, detecting cyberattacks, equipment failures, and physical damage in real-time. </p><p>In this episode of Hack the Plant, Bryson sits down with Psymetis CEO Robert Shaughnessy to discuss his work with Psymetis, challenges to innovation in the private sector, and the role of government in developing new technologies. </p><p>What ecosystem problem is Psymetis solving? How is the federal government involved? What threats do our critical infrastructure systems face? How is China involved?</p><p>“We're not talking about shooting wars, we're talking about wars where adversaries–to include economic adversaries–can have advantage,”  Shaughnessy said. “As we're looking out over the next couple of years… there's a lot of frightening indicators that want us to plan for these events, knowing the capabilities of our tier one adversaries.” </p><p>Join us for this and more on this episode of Hack the Plant. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></description>
      <pubDate>Wed, 28 Feb 2024 11:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Robert Shaughnessy, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/securing-defending-and-bringing-resilience-to-infrastructure-vwk50Jae</link>
      <content:encoded><![CDATA[<p>Psymetis creates Operational Technology (OT) security solutions that quickly and prevent electric grid outages and catastrophic infrastructure failures. Psymetis’ Werewolf system provides condition monitoring and threat mitigation for the power grid, detecting cyberattacks, equipment failures, and physical damage in real-time. </p><p>In this episode of Hack the Plant, Bryson sits down with Psymetis CEO Robert Shaughnessy to discuss his work with Psymetis, challenges to innovation in the private sector, and the role of government in developing new technologies. </p><p>What ecosystem problem is Psymetis solving? How is the federal government involved? What threats do our critical infrastructure systems face? How is China involved?</p><p>“We're not talking about shooting wars, we're talking about wars where adversaries–to include economic adversaries–can have advantage,”  Shaughnessy said. “As we're looking out over the next couple of years… there's a lot of frightening indicators that want us to plan for these events, knowing the capabilities of our tier one adversaries.” </p><p>Join us for this and more on this episode of Hack the Plant. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></content:encoded>
      <enclosure length="35237558" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/0bec51d5-9019-4842-a4ad-a0cd28a9a0ad/audio/d7e85fca-ebeb-46b0-a631-e0d3f59fc7b6/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Securing, Defending, and Bringing Resilience to Infrastructure</itunes:title>
      <itunes:author>Robert Shaughnessy, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/c4caa444-3b5d-4e53-b527-6a95784f79ae/3000x3000/s4e2-robert-shaughnessy.jpg?aid=rss_feed"/>
      <itunes:duration>00:36:41</itunes:duration>
      <itunes:summary>“If something is going to take a couple of billion dollars to develop and there&apos;s not a known, validated commercial return associated with it, why would any private industry take that on? It&apos;s really the role of government.”
-Robert Shaughnessy

Robert Shaughnessy, CEO of operational technology security company Psymetis, joins us for this episode of Hack the Plant. We discuss his work with Psymetis, challenges to innovation in the private sector, and the role of government in developing new technologies. 
</itunes:summary>
      <itunes:subtitle>“If something is going to take a couple of billion dollars to develop and there&apos;s not a known, validated commercial return associated with it, why would any private industry take that on? It&apos;s really the role of government.”
-Robert Shaughnessy

Robert Shaughnessy, CEO of operational technology security company Psymetis, joins us for this episode of Hack the Plant. We discuss his work with Psymetis, challenges to innovation in the private sector, and the role of government in developing new technologies. 
</itunes:subtitle>
      <itunes:keywords>psymetis, bryson bort, cyber, robert shuaghnessy, operational technology, infrastructure</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c1937e0c-591b-4975-a331-de1bbe6d35bb</guid>
      <title>CISA’s Critical Infrastructure Protection Mission with Jen Easterly</title>
      <description><![CDATA[<p>As America’s Cyber Defense Agency and the National Coordinator for Critical Infrastructure Security and Resilience, the Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every day. </p><p>In this episode of Hack the Plant, Bryson sits down with CISA Director Jen Easterly to discuss her work on leading CISA’s critical infrastructure mission, implementing efforts to make products Secure by Design, and working with private companies to combat ransomware.</p><p>How has CISA’s role evolved since 2018? How do they advance critical infrastructure protection and cyber defense? What are Director Easterly’s priorities for 2024? And if she could wave a magic wand, what is one thing she would change? </p><p>“We need transparency so that we can all work together to protect the ecosystem, because the actors are not ever going to fight fair,” Easterly said. “We need all the collective strength of the community to keep Americans safe and secure.”</p><p>Join us for this and more on this episode of Hack the Plant. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></description>
      <pubDate>Fri, 2 Feb 2024 14:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Jen Easterly, Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/cisas-critical-infrastructure-protection-mission-with-jen-easterly-nNzfS_HG</link>
      <content:encoded><![CDATA[<p>As America’s Cyber Defense Agency and the National Coordinator for Critical Infrastructure Security and Resilience, the Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every day. </p><p>In this episode of Hack the Plant, Bryson sits down with CISA Director Jen Easterly to discuss her work on leading CISA’s critical infrastructure mission, implementing efforts to make products Secure by Design, and working with private companies to combat ransomware.</p><p>How has CISA’s role evolved since 2018? How do they advance critical infrastructure protection and cyber defense? What are Director Easterly’s priorities for 2024? And if she could wave a magic wand, what is one thing she would change? </p><p>“We need transparency so that we can all work together to protect the ecosystem, because the actors are not ever going to fight fair,” Easterly said. “We need all the collective strength of the community to keep Americans safe and secure.”</p><p>Join us for this and more on this episode of Hack the Plant. </p><p>Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.</p>
]]></content:encoded>
      <enclosure length="48894216" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/3c9d457a-b894-4073-8103-c286e5322196/audio/61e104c3-35af-48bd-b111-f5afcf96e1a1/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>CISA’s Critical Infrastructure Protection Mission with Jen Easterly</itunes:title>
      <itunes:author>Jen Easterly, Bryson Bort</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/59968907-38cf-432b-9131-b2d167663ae1/a8046519-e17d-4384-a420-dc5e18be5e6b/3000x3000/hack-the-plant-social-w-picture.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:54</itunes:duration>
      <itunes:summary>&quot;Critical infrastructure is just how we get our water and our health care and our education and our transportation and our communication and how we get gas at the pump and money from the ATM. It really is the networks and the systems and the data that we rely upon every hour of every day and that power our lives.&quot;
- Jen Easterly 

Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA) joins us for this episode of Hack the Plant. We discuss her work on leading CISA’s critical infrastructure mission, implementing efforts to make products Secure by Design, and working with private companies to combat ransomware.</itunes:summary>
      <itunes:subtitle>&quot;Critical infrastructure is just how we get our water and our health care and our education and our transportation and our communication and how we get gas at the pump and money from the ATM. It really is the networks and the systems and the data that we rely upon every hour of every day and that power our lives.&quot;
- Jen Easterly 

Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA) joins us for this episode of Hack the Plant. We discuss her work on leading CISA’s critical infrastructure mission, implementing efforts to make products Secure by Design, and working with private companies to combat ransomware.</itunes:subtitle>
      <itunes:keywords>ransomware, security, critical infrastructure, cyber defense, cisa</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3efd3d63-7a4a-4a1f-876a-cc0cb63abd79</guid>
      <title>Ensuring Cybersecurity for Amtrak</title>
      <description><![CDATA[<p>I’m joined by Jesse Whaley, the Chief Information Security Officer at Amtrak, for this episode of Hack the Plant.  Amtrak is  the nation's largest passenger rail service provider and one of the most complex and critical transportation systems in the world. </p><p>We discuss what it takes to oversee Amtrak’s digital assets and infrastructure, and what it takes to keep them secure. </p><p>“The company had a safety culture. Before every meeting before every job site that workers went out to on the railroad to do work. They did safety briefings … I got alignment on hey, this should be our standard company safety and security briefing, but with a whole pillar of safety as being cybersecurity. Since I did that, before every meeting, before every crew goes out to a job site, before every activity, there is a safety and security briefing, and it follows this essential template which highlights and reinforces cybersecurity.”</p><p>We also cover the impressive talent pipeline and  team and workforce development programs Jesse put into place to staff Amtrak’s cybersecurity efforts. Join us to learn more.</p>
]]></description>
      <pubDate>Tue, 19 Dec 2023 19:57:22 +0000</pubDate>
      <author>tyler@returnonideas.co (Bryson Bort, Jesse Whaley)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/ensuring-cybersecurity-for-amtrak-zwGt7S4n</link>
      <content:encoded><![CDATA[<p>I’m joined by Jesse Whaley, the Chief Information Security Officer at Amtrak, for this episode of Hack the Plant.  Amtrak is  the nation's largest passenger rail service provider and one of the most complex and critical transportation systems in the world. </p><p>We discuss what it takes to oversee Amtrak’s digital assets and infrastructure, and what it takes to keep them secure. </p><p>“The company had a safety culture. Before every meeting before every job site that workers went out to on the railroad to do work. They did safety briefings … I got alignment on hey, this should be our standard company safety and security briefing, but with a whole pillar of safety as being cybersecurity. Since I did that, before every meeting, before every crew goes out to a job site, before every activity, there is a safety and security briefing, and it follows this essential template which highlights and reinforces cybersecurity.”</p><p>We also cover the impressive talent pipeline and  team and workforce development programs Jesse put into place to staff Amtrak’s cybersecurity efforts. Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="40869520" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/49816e44-8f7f-44e6-8fad-9647efdf0b29/audio/97d76624-703a-47b2-ae54-083b191ff865/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Ensuring Cybersecurity for Amtrak</itunes:title>
      <itunes:author>Bryson Bort, Jesse Whaley</itunes:author>
      <itunes:duration>00:42:29</itunes:duration>
      <itunes:summary> “My strategy was built around people, process, and technique … After about a year of working through that strategy, I realized something was missing. I wasn&apos;t getting the traction that I needed. And what I realized what was missing was the culture. The company didn&apos;t have the culture for cybersecurity, because it wasn&apos;t anything anybody thought of previously.”
-Jesse Whaley

Jesse Whaley, the Chief Information Security Officer at Amtrak joins us for this episode of Hack the Plant. We cover key aspects of keeping Amtrak’s digital assets and physical infrastructure secure. We discuss how Jesse has built up a diverse talent pipeline for the work cyber force, and the role that has played in staffing Amtrak’s cybersecurity. Join us to learn more.</itunes:summary>
      <itunes:subtitle> “My strategy was built around people, process, and technique … After about a year of working through that strategy, I realized something was missing. I wasn&apos;t getting the traction that I needed. And what I realized what was missing was the culture. The company didn&apos;t have the culture for cybersecurity, because it wasn&apos;t anything anybody thought of previously.”
-Jesse Whaley

Jesse Whaley, the Chief Information Security Officer at Amtrak joins us for this episode of Hack the Plant. We cover key aspects of keeping Amtrak’s digital assets and physical infrastructure secure. We discuss how Jesse has built up a diverse talent pipeline for the work cyber force, and the role that has played in staffing Amtrak’s cybersecurity. Join us to learn more.</itunes:subtitle>
      <itunes:keywords>trains, cyber training, cybersecurity, cyber workforce development, amtrak</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">01cb496d-e5bb-402f-9a30-e75a6ede4ab7</guid>
      <title>Open Source Data Visualization for Cyber Threats</title>
      <description><![CDATA[<p>I’m joined by Dan Ricci, founder of the <a href="https://www.icsadvisoryproject.com/">ICS Advisory Project</a>, for this episode of Hack the Plant.</p><p>The ICS Advisory Project is a free, open-source platform that helps asset owners across 16 critical infrastructure sectors stay secure by identifying threats in their environments.</p><p>“I saw a gap in the community. There's good data that's coming at us…but no one did anything to take and make that data more digestible through visualization. So I decided, okay, well, I'm just going to do it now. I’m going to take the the data that I have been cleaning up and monitoring for like the past two years, and I'm going to put it together and visualize it, trying to build a tool that's more practical and usable by that asset owner, who may not have a cybersecurity background.”</p><p>We discuss how data visualization translates into more accessible information for the ICS operators on the ground who need the information - and how the data in the platform is maintained.</p><p>Join us for an interesting - if technical - discussion about how data from CISA and other agencies can be utilized by asset owners through ICS Advisory’s platform.</p>
]]></description>
      <pubDate>Tue, 21 Nov 2023 00:08:04 +0000</pubDate>
      <author>tyler@returnonideas.co (Bryson Bort, Dan Ricci)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/open-source-data-visualization-for-cyber-threats-PUMpRheO</link>
      <content:encoded><![CDATA[<p>I’m joined by Dan Ricci, founder of the <a href="https://www.icsadvisoryproject.com/">ICS Advisory Project</a>, for this episode of Hack the Plant.</p><p>The ICS Advisory Project is a free, open-source platform that helps asset owners across 16 critical infrastructure sectors stay secure by identifying threats in their environments.</p><p>“I saw a gap in the community. There's good data that's coming at us…but no one did anything to take and make that data more digestible through visualization. So I decided, okay, well, I'm just going to do it now. I’m going to take the the data that I have been cleaning up and monitoring for like the past two years, and I'm going to put it together and visualize it, trying to build a tool that's more practical and usable by that asset owner, who may not have a cybersecurity background.”</p><p>We discuss how data visualization translates into more accessible information for the ICS operators on the ground who need the information - and how the data in the platform is maintained.</p><p>Join us for an interesting - if technical - discussion about how data from CISA and other agencies can be utilized by asset owners through ICS Advisory’s platform.</p>
]]></content:encoded>
      <enclosure length="37941139" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/9030b5ea-99e6-41f0-b3ec-de4b2a4a3c09/audio/a8ce4ca9-3156-442a-8bfa-fe351954e4cd/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Open Source Data Visualization for Cyber Threats</itunes:title>
      <itunes:author>Bryson Bort, Dan Ricci</itunes:author>
      <itunes:duration>00:39:24</itunes:duration>
      <itunes:summary>“Within the cybersecurity community, we build cybersecurity tools for other cybersecurity professionals. We don&apos;t really build cybersecurity tools designed or intuitive for the operators that need to use it. With ICS Advisory, I focused on how do we just put this in plain language that makes sense for them? Not over using overuse of acronyms, speaking plainly about the vulnerabilities, and really trying to do that with breaking out the common vulnerability scoring system.  
-Dan Ricci

Today’s episode focuses on the ICS Advisory Project, an open source platform that helps asset owners across sixteen critical infrastructure sectors stay secure. Dan Ricci, its founder, joins us to discuss how data visualization translates into more accessible information for the industrial control systems operators on the ground – and how they can use that information to identify weaknesses in their environments. Join us to learn more.
</itunes:summary>
      <itunes:subtitle>“Within the cybersecurity community, we build cybersecurity tools for other cybersecurity professionals. We don&apos;t really build cybersecurity tools designed or intuitive for the operators that need to use it. With ICS Advisory, I focused on how do we just put this in plain language that makes sense for them? Not over using overuse of acronyms, speaking plainly about the vulnerabilities, and really trying to do that with breaking out the common vulnerability scoring system.  
-Dan Ricci

Today’s episode focuses on the ICS Advisory Project, an open source platform that helps asset owners across sixteen critical infrastructure sectors stay secure. Dan Ricci, its founder, joins us to discuss how data visualization translates into more accessible information for the industrial control systems operators on the ground – and how they can use that information to identify weaknesses in their environments. Join us to learn more.
</itunes:subtitle>
      <itunes:keywords>industrial control systems operators, ot/ics threat analysis, ics advisory project, cybersecurity, cyber open source</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6daf172b-6018-4e7d-87da-1481665069af</guid>
      <title>Cyber Threat Intelligence Over the Past 25 Years</title>
      <description><![CDATA[<p>I’m joined by Jason Healey, a Senior Research Scholar at Columbia University’s School for International and Public Affairs, for this episode of Hack the Plant. Jason is a pioneer of cyber threat intelligence, with experience spanning fifteen years across the public and private sectors. </p><p>Today, we discuss a <a href="https://www.lawfaremedia.org/article/twenty-five-years-of-white-house-cyber-policies" target="_blank">recent article</a> Jason published at Lawfare, looking at 25 years of White House cyber policies, from the Clinton to the Biden administrations. We explore how regulatory policy has become more sophisticated over time, and the evolving nature of threats.</p><p>“One of the biggest debates right now amongst the international affairs community – is cyber really dangerous? You've got some people that look at how cyber capabilities have been used over the past two decades, how it's currently being used in Ukraine, and say, ‘it’s difficult to use this stuff, and frankly it’s not as dangerous as we think.' I tend to be on the more pessimistic side … if you're targeting things made of ones and zeros or things made of silicon, cyber can often not be that big a deal. But with smart grids, industrial control systems, and other things connected to the internet, it's not just things made of ones and zeros and silicon.  Cyber attacks can take down  things made of concrete and steel.”</p><p>To what extent is cyber necessary as part of a defense strategy? How has our regulatory approach changed over 25 years?  Join us to learn more.</p>
]]></description>
      <pubDate>Tue, 31 Oct 2023 21:17:40 +0000</pubDate>
      <author>tyler@returnonideas.co (Bryson Bort, Jason Healey)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/cyber-threat-intelligence-over-the-past-25-years-aMDbF2YQ</link>
      <content:encoded><![CDATA[<p>I’m joined by Jason Healey, a Senior Research Scholar at Columbia University’s School for International and Public Affairs, for this episode of Hack the Plant. Jason is a pioneer of cyber threat intelligence, with experience spanning fifteen years across the public and private sectors. </p><p>Today, we discuss a <a href="https://www.lawfaremedia.org/article/twenty-five-years-of-white-house-cyber-policies" target="_blank">recent article</a> Jason published at Lawfare, looking at 25 years of White House cyber policies, from the Clinton to the Biden administrations. We explore how regulatory policy has become more sophisticated over time, and the evolving nature of threats.</p><p>“One of the biggest debates right now amongst the international affairs community – is cyber really dangerous? You've got some people that look at how cyber capabilities have been used over the past two decades, how it's currently being used in Ukraine, and say, ‘it’s difficult to use this stuff, and frankly it’s not as dangerous as we think.' I tend to be on the more pessimistic side … if you're targeting things made of ones and zeros or things made of silicon, cyber can often not be that big a deal. But with smart grids, industrial control systems, and other things connected to the internet, it's not just things made of ones and zeros and silicon.  Cyber attacks can take down  things made of concrete and steel.”</p><p>To what extent is cyber necessary as part of a defense strategy? How has our regulatory approach changed over 25 years?  Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="47216813" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/e2ece2cd-e5f0-409a-b49d-07d6e39edee3/audio/d39ca49d-5142-411e-92e7-9b159408bc8c/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Cyber Threat Intelligence Over the Past 25 Years</itunes:title>
      <itunes:author>Bryson Bort, Jason Healey</itunes:author>
      <itunes:duration>00:49:05</itunes:duration>
      <itunes:summary>“The White House has been trying to get their arms around solutions for 25 years. If you look back at the very earliest White House document (Presidential Decision Directive 63), it came out in 1998. They&apos;re focused on critical infrastructure. They say, within five years, most of America’s critical infrastructure will be secure, as if it was a one off as if we could just get it right once, and then it would just be secure. But of course, we have intelligent adversaries, and we keep inventing new technology.”
-Jason Healey 

Jason Healey, a Senior Research Scholar at Columbia University’s School for International and Public Affairs, joins us for this episode of Hack the Plant. We discuss an article he recently published at the Lawfare Institute, looking at 25 years of White House cyber policies, from the Clinton to the Biden Administrations. What changes have we made in our regulatory approach over the past 25 years? What are current strengths - and threats - in our cyber defense systems?  Join us to learn more.</itunes:summary>
      <itunes:subtitle>“The White House has been trying to get their arms around solutions for 25 years. If you look back at the very earliest White House document (Presidential Decision Directive 63), it came out in 1998. They&apos;re focused on critical infrastructure. They say, within five years, most of America’s critical infrastructure will be secure, as if it was a one off as if we could just get it right once, and then it would just be secure. But of course, we have intelligent adversaries, and we keep inventing new technology.”
-Jason Healey 

Jason Healey, a Senior Research Scholar at Columbia University’s School for International and Public Affairs, joins us for this episode of Hack the Plant. We discuss an article he recently published at the Lawfare Institute, looking at 25 years of White House cyber policies, from the Clinton to the Biden Administrations. What changes have we made in our regulatory approach over the past 25 years? What are current strengths - and threats - in our cyber defense systems?  Join us to learn more.</itunes:subtitle>
      <itunes:keywords>white house cyber policy, cyber threat intelligence, cyber, critical infrastructure, cyber attacks</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">56fa4e91-dac0-4cb2-a1e1-ac1adb8fee6c</guid>
      <title>Architecting Threat Responses</title>
      <description><![CDATA[<p>I’m joined by David Patrick Emmerich, the Principal Cyber-Physical Range Architect at the University of Illinois, for this episode of Hack the Plant. </p><p>We’re here today to talk about RADICS, a DARPA project. RADICS stands for Rapid Attack Detection, Isolation and Characterization Systems.  We discuss David’s role in building automated data collection and set up simulations and testing, and how the process of doing vulnerability discovery for physical assets helps asset owners.</p><p>“  ‘These are ways that an attacker could get around it.’ ‘These are where your blind spots might be’ … We help them understand that so that they can better improve the security of their systems. Or go back to their boards or their management and say ‘these are the tools we need’ or ‘this is the equipment we need and this is why we need it to better improve our security posture.’ Their systems are already critical, but as they become even more critical.”  </p><p>We delve into challenges of securing operational technology (OT) for asset owners, different kinds of threats they face, and more technical projects that RADICS ignited.</p><p>Join us for an interesting - if technical - discussion to learn more about how physical systems interact with data to support real-time threat response.</p>
]]></description>
      <pubDate>Tue, 31 Oct 2023 21:15:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Bryson Bort, David Patrick Emmerich)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/architecting-threat-responses-1nTBA8xU</link>
      <content:encoded><![CDATA[<p>I’m joined by David Patrick Emmerich, the Principal Cyber-Physical Range Architect at the University of Illinois, for this episode of Hack the Plant. </p><p>We’re here today to talk about RADICS, a DARPA project. RADICS stands for Rapid Attack Detection, Isolation and Characterization Systems.  We discuss David’s role in building automated data collection and set up simulations and testing, and how the process of doing vulnerability discovery for physical assets helps asset owners.</p><p>“  ‘These are ways that an attacker could get around it.’ ‘These are where your blind spots might be’ … We help them understand that so that they can better improve the security of their systems. Or go back to their boards or their management and say ‘these are the tools we need’ or ‘this is the equipment we need and this is why we need it to better improve our security posture.’ Their systems are already critical, but as they become even more critical.”  </p><p>We delve into challenges of securing operational technology (OT) for asset owners, different kinds of threats they face, and more technical projects that RADICS ignited.</p><p>Join us for an interesting - if technical - discussion to learn more about how physical systems interact with data to support real-time threat response.</p>
]]></content:encoded>
      <enclosure length="45060896" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/200a1b05-c56f-467d-b4bd-1ba0b3f6b496/audio/8199ba95-e41d-4cbf-bba9-1989d812c9fd/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Architecting Threat Responses</itunes:title>
      <itunes:author>Bryson Bort, David Patrick Emmerich</itunes:author>
      <itunes:duration>00:46:52</itunes:duration>
      <itunes:summary>“You can simulate power. You can simulate the data that&apos;s on the network. You can replay information. That&apos;s a very controlled environment. But using the real equipment…it’s the little idiosyncrasies of the systems themselves that you don&apos;t get in a very extremely controlled environment. In what the RACICS program was, being able to test out these systems in a mostly controlled environment, but also having the small idiosyncrasies of hey that system doesn&apos;t work exactly the way we think it did”.   
-David Patrick Emmerich

 David Patrick Emmerich, the Principal Cyber-Physical Range Architect at the University of Illinois, joins us for this episode of Hack the Plant. We’re here to talk about RADICS, a DARPA project - for which David built automated data collection, and set up simulations and testing. What kind of incident response plan is needed for OT in an industrial environment? Join us to learn more.</itunes:summary>
      <itunes:subtitle>“You can simulate power. You can simulate the data that&apos;s on the network. You can replay information. That&apos;s a very controlled environment. But using the real equipment…it’s the little idiosyncrasies of the systems themselves that you don&apos;t get in a very extremely controlled environment. In what the RACICS program was, being able to test out these systems in a mostly controlled environment, but also having the small idiosyncrasies of hey that system doesn&apos;t work exactly the way we think it did”.   
-David Patrick Emmerich

 David Patrick Emmerich, the Principal Cyber-Physical Range Architect at the University of Illinois, joins us for this episode of Hack the Plant. We’re here to talk about RADICS, a DARPA project - for which David built automated data collection, and set up simulations and testing. What kind of incident response plan is needed for OT in an industrial environment? Join us to learn more.</itunes:subtitle>
      <itunes:keywords>ot threat response, radics, cyber</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0f251f47-f907-429c-8729-1d1f9a0c1126</guid>
      <title>Managing Incident Responses to Critical Infrastructure Attacks</title>
      <description><![CDATA[<p>For today’s episode, I’m joined by Lesley Carhart. Lesley is the Director of Incident Response for North America at the industrial cybersecurity company <a href="https://www.dragos.com/">Dragos, Inc</a>. She leads incident response and proactively hunts for threats in customers’ ICS environments. Lesley was the incident response team lead at Motorola Solutions, and retired from the United States Air Force. </p><p>Today, we dive into the kinds of active threats out there that incident response deals with:</p><p>“We see insider cases, both intentional and unintentional insider cases. We see a lot of crime ware. So crime actors are getting smarter about where they're doing things like ransomware attacks. They're less haphazard. There's probably less overall attacks now, but they're more smartly performed. So they're targeting more critical industries. They are targeting people who they think will have to pay…And then there's still adversary groups who are more state style, who are building their capabilities to launch attacks in the future. And conducting espionage, preparing to do sabotage. And that's still happening and they're getting better at it.” - Lesley Carhart<br /><br />We explore the challenges of securing operational technology (OT) for asset owners, different kinds of threats, and the process of doing vulnerability discovery for these physical assets.</p><p>What do asset owners in critical infrastructure need to secure in the first place - and why is this so challenging to stay on top of? What kind of incident response plan is needed for OT in an industrial environment? <br /><br />Join us to learn more.</p><p> </p>
]]></description>
      <pubDate>Mon, 3 Apr 2023 16:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Bryson Bort, Lesley Carhart)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/managing-incident-responses-to-critical-infrastructure-attacks-hAw1VFPD</link>
      <content:encoded><![CDATA[<p>For today’s episode, I’m joined by Lesley Carhart. Lesley is the Director of Incident Response for North America at the industrial cybersecurity company <a href="https://www.dragos.com/">Dragos, Inc</a>. She leads incident response and proactively hunts for threats in customers’ ICS environments. Lesley was the incident response team lead at Motorola Solutions, and retired from the United States Air Force. </p><p>Today, we dive into the kinds of active threats out there that incident response deals with:</p><p>“We see insider cases, both intentional and unintentional insider cases. We see a lot of crime ware. So crime actors are getting smarter about where they're doing things like ransomware attacks. They're less haphazard. There's probably less overall attacks now, but they're more smartly performed. So they're targeting more critical industries. They are targeting people who they think will have to pay…And then there's still adversary groups who are more state style, who are building their capabilities to launch attacks in the future. And conducting espionage, preparing to do sabotage. And that's still happening and they're getting better at it.” - Lesley Carhart<br /><br />We explore the challenges of securing operational technology (OT) for asset owners, different kinds of threats, and the process of doing vulnerability discovery for these physical assets.</p><p>What do asset owners in critical infrastructure need to secure in the first place - and why is this so challenging to stay on top of? What kind of incident response plan is needed for OT in an industrial environment? <br /><br />Join us to learn more.</p><p> </p>
]]></content:encoded>
      <enclosure length="41541960" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/ca30b694-5f17-4655-96a1-af57674c7cdc/audio/e7bb5903-c508-43e3-830c-a31ae19a40f5/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Managing Incident Responses to Critical Infrastructure Attacks</itunes:title>
      <itunes:author>Bryson Bort, Lesley Carhart</itunes:author>
      <itunes:duration>00:43:11</itunes:duration>
      <itunes:summary>“Understanding the environment that you&apos;re dealing with is a really important part of incident response. It&apos;s something that we don&apos;t talk about enough … You need to understand what operating systems are going to be in play. How are you going to access systems to get forensic data? Is there network connectivity? Can the incident responders access the log servers and the historians? Can they do that remotely? Do they need to be on site? … It&apos;s very helpful to understand what vulnerability landscape looks like, too, because it can help you pinpoint things in your timeline.” 
- Lesley Carhart
 
Lesley Carhart, of industrial cybersecurity company Dragos, Inc. joins this episode of Hack the Plan[e]t. Lesley is the Director of Incident Response for North America. Today, we dive into what’s involved in assessing vulnerability in industrial environments, and the painstaking process of securing operational technology (OT). What are emerging challenges for critical infrastructure asset owners? What kind of threats are out there - and what does a robust incident response look like? Join us to learn more.</itunes:summary>
      <itunes:subtitle>“Understanding the environment that you&apos;re dealing with is a really important part of incident response. It&apos;s something that we don&apos;t talk about enough … You need to understand what operating systems are going to be in play. How are you going to access systems to get forensic data? Is there network connectivity? Can the incident responders access the log servers and the historians? Can they do that remotely? Do they need to be on site? … It&apos;s very helpful to understand what vulnerability landscape looks like, too, because it can help you pinpoint things in your timeline.” 
- Lesley Carhart
 
Lesley Carhart, of industrial cybersecurity company Dragos, Inc. joins this episode of Hack the Plan[e]t. Lesley is the Director of Incident Response for North America. Today, we dive into what’s involved in assessing vulnerability in industrial environments, and the painstaking process of securing operational technology (OT). What are emerging challenges for critical infrastructure asset owners? What kind of threats are out there - and what does a robust incident response look like? Join us to learn more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5d1ea58d-6395-40ea-bb09-2367b48140b6</guid>
      <title>Idaho National Labs and the Next Generation of Critical Infrastructure Security</title>
      <description><![CDATA[<p>For today’s episode, I’m joined by Zach Tudor, the Associate Laboratory Director at <a href="https://inl.gov/">Idaho National Laboratory</a> (INL). INL is a Department of Energy national laboratory, is the nation's leading center for nuclear energy research and development. Zach is responsible for INL’s Nuclear Nonproliferation, Critical Infrastructure Protection and Defense Systems missions.</p><p>We discuss how INL partners with the private sector to test challenges to critical infrastructure, and the cutting edge work INL is doing to secure the next generation of critical infrastructure.</p><p>"Honeywell has been one of the big players that has been working with us for quite a while. And Hitashi. Schneider Electric.  They will provide us some of their systems that are critical in energy critical infrastructure, industrial control systems, and we will tear it down in a methodological process that we have developed here…[to] start building an understanding of where the risks are and the supply chain of our critical energy infrastructure." - Zach Tudor</p><p>Other topics we cover: What work is INL doing to secure the next generation of critical infrastructure?  How can we make our critical infrastructure systems more resilient?  How is data security managed with emerging technologies such as 5G, or self-driving cars? What strategies should the government and private industry use to categorize risk and mitigate it in a way that actually has measurable impact?  </p><p> Join us to learn more.</p>
]]></description>
      <pubDate>Mon, 6 Mar 2023 05:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Bryson Bort, Zachary Tudor)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/idaho-national-labs-and-the-next-generation-of-critical-infrastructure-security-wSAjJlSL</link>
      <content:encoded><![CDATA[<p>For today’s episode, I’m joined by Zach Tudor, the Associate Laboratory Director at <a href="https://inl.gov/">Idaho National Laboratory</a> (INL). INL is a Department of Energy national laboratory, is the nation's leading center for nuclear energy research and development. Zach is responsible for INL’s Nuclear Nonproliferation, Critical Infrastructure Protection and Defense Systems missions.</p><p>We discuss how INL partners with the private sector to test challenges to critical infrastructure, and the cutting edge work INL is doing to secure the next generation of critical infrastructure.</p><p>"Honeywell has been one of the big players that has been working with us for quite a while. And Hitashi. Schneider Electric.  They will provide us some of their systems that are critical in energy critical infrastructure, industrial control systems, and we will tear it down in a methodological process that we have developed here…[to] start building an understanding of where the risks are and the supply chain of our critical energy infrastructure." - Zach Tudor</p><p>Other topics we cover: What work is INL doing to secure the next generation of critical infrastructure?  How can we make our critical infrastructure systems more resilient?  How is data security managed with emerging technologies such as 5G, or self-driving cars? What strategies should the government and private industry use to categorize risk and mitigate it in a way that actually has measurable impact?  </p><p> Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="31118952" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/34883b60-cffe-4d8c-9e05-5529a305a105/audio/317a801c-8d51-4e86-ab42-074be79567f5/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Idaho National Labs and the Next Generation of Critical Infrastructure Security</itunes:title>
      <itunes:author>Bryson Bort, Zachary Tudor</itunes:author>
      <itunes:duration>00:32:20</itunes:duration>
      <itunes:summary>“So many times, with the amount of software that is in critical systems and critical IT systems, vulnerabilities will be discovered in various software that might be used in multiple locations. But you may not understand that you have that software in your environment, or you may not have the context to know whether or not it is actually vulnerable because of the new vulnerabilities that have been reported.” -Zach Tudor

Zach Tudor of Idaho National Laboratory (INL) joins this episode of Hack the Plan[e]t. INL is a Department of Energy National Laboratory, and is the nation&apos;s leading center for nuclear energy research and development.  In this episode, we discuss ways INL collaborates with other agencies and the private sector to keep our supply chain and critical infrastructure systems secure.  How does the government, through INL and other agencies, work with the private sector to understand and test risks to our infrastructure?  </itunes:summary>
      <itunes:subtitle>“So many times, with the amount of software that is in critical systems and critical IT systems, vulnerabilities will be discovered in various software that might be used in multiple locations. But you may not understand that you have that software in your environment, or you may not have the context to know whether or not it is actually vulnerable because of the new vulnerabilities that have been reported.” -Zach Tudor

Zach Tudor of Idaho National Laboratory (INL) joins this episode of Hack the Plan[e]t. INL is a Department of Energy National Laboratory, and is the nation&apos;s leading center for nuclear energy research and development.  In this episode, we discuss ways INL collaborates with other agencies and the private sector to keep our supply chain and critical infrastructure systems secure.  How does the government, through INL and other agencies, work with the private sector to understand and test risks to our infrastructure?  </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f60be100-cc8f-43b9-8e37-5b72f562d1b1</guid>
      <title>Resilience and Safety for Electric Co-Ops</title>
      <description><![CDATA[<p><br /> </p><p>“One of my favorite topics is disaster resilience. We do quite a bit of work on what mutual assistance looks like and how to improve mutual assistance, how to rebuild systems once they've been hit by something terrible. My more recent interesting example was when a tornado had gone through a co-op and they were looking for what to do when their data server was just plain missing. It was Dorothy essentially over to somewhere else and they were asking us: Is it a data breach?” </p><p>- Emma Stewart  </p><p>For today's episode, I'm joined by Emma Stewart, Ph.D., Chief Scientist at the  National Rural Electric Cooperative Association (NRECA). Electric coops are local, member-owned providers of affordable, reliable power. We discuss Dr. Stewart’s work supporting these co-ops in research, incident response, and managing the growing threat of ransomware attacks. What role do these electric co-ops play in our national energy supply? What core challenges do they have in staying resilient? Join us to learn more.</p>
]]></description>
      <pubDate>Mon, 5 Dec 2022 05:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Emma Stewart)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/reliance-and-safety-for-electric-co-ops-fyrGpYeA</link>
      <content:encoded><![CDATA[<p><br /> </p><p>“One of my favorite topics is disaster resilience. We do quite a bit of work on what mutual assistance looks like and how to improve mutual assistance, how to rebuild systems once they've been hit by something terrible. My more recent interesting example was when a tornado had gone through a co-op and they were looking for what to do when their data server was just plain missing. It was Dorothy essentially over to somewhere else and they were asking us: Is it a data breach?” </p><p>- Emma Stewart  </p><p>For today's episode, I'm joined by Emma Stewart, Ph.D., Chief Scientist at the  National Rural Electric Cooperative Association (NRECA). Electric coops are local, member-owned providers of affordable, reliable power. We discuss Dr. Stewart’s work supporting these co-ops in research, incident response, and managing the growing threat of ransomware attacks. What role do these electric co-ops play in our national energy supply? What core challenges do they have in staying resilient? Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="32392074" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/0d6cad1d-626e-4b7e-bfb7-803977ba225a/audio/8fa20d27-6c17-4632-b5dd-cc60205b1d71/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Resilience and Safety for Electric Co-Ops</itunes:title>
      <itunes:author>Emma Stewart</itunes:author>
      <itunes:duration>00:33:39</itunes:duration>
      <itunes:summary>Today&apos;s episode features Emma Stewart, Ph.D., Chief Scientist at the  National Rural Electric Cooperative Association (NRECA). Electric coops are local, member-owned providers of affordable, reliable power. We discuss Dr. Stewart’s work supporting these co-ops in research, incident response, and managing the growing threat of ransomware attacks. What role do these electric co-ops play in our national energy supply? What core challenges do they have in keeping their data secure?  </itunes:summary>
      <itunes:subtitle>Today&apos;s episode features Emma Stewart, Ph.D., Chief Scientist at the  National Rural Electric Cooperative Association (NRECA). Electric coops are local, member-owned providers of affordable, reliable power. We discuss Dr. Stewart’s work supporting these co-ops in research, incident response, and managing the growing threat of ransomware attacks. What role do these electric co-ops play in our national energy supply? What core challenges do they have in keeping their data secure?  </itunes:subtitle>
      <itunes:keywords>threat intelligence, cyber attack, nreca, disaster resilience, critical infrastructure, cybersecurity, regulation, electric co-op, rural electric cooperatives</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f6ab7a7e-370f-4328-a68b-110ade8b7f59</guid>
      <title>Threats to Industrial Control Systems</title>
      <description><![CDATA[<p>“What's been most concerning is the rise of wiper malware. Threat actors are no longer interested in hey we're going to lock up all of your data. We're going to encrypt everything and force you to pay a ransom and then maybe give you the decryption key. Now with wiper malware they're just completely wiping it. … This year there's been a total of 5 wiper malwares that has been targeting critical infrastructure. So I think everyone should be very aware of that.” -Roya Gordon </p><p>For today's episode, I'm joined by Roya Gordon and Danielle Jablanski of Nozomi Networks, a firm that does inventory and situational awareness for operational technology industrial control systems. We discuss Nozomi’s research, the key kinds of threat intelligence globally, and the kinds of regulation  that are needed in today’s landscape of emerging threats to critical infrastructure. What emerging kinds of cyber attacks are the most troublesome? Join us to learn more.</p>
]]></description>
      <pubDate>Mon, 7 Nov 2022 16:42:32 +0000</pubDate>
      <author>tyler@returnonideas.co (Roya Gordon, Danielle Jablanski)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/threats-to-industrial-control-systems-MQVcR01y</link>
      <content:encoded><![CDATA[<p>“What's been most concerning is the rise of wiper malware. Threat actors are no longer interested in hey we're going to lock up all of your data. We're going to encrypt everything and force you to pay a ransom and then maybe give you the decryption key. Now with wiper malware they're just completely wiping it. … This year there's been a total of 5 wiper malwares that has been targeting critical infrastructure. So I think everyone should be very aware of that.” -Roya Gordon </p><p>For today's episode, I'm joined by Roya Gordon and Danielle Jablanski of Nozomi Networks, a firm that does inventory and situational awareness for operational technology industrial control systems. We discuss Nozomi’s research, the key kinds of threat intelligence globally, and the kinds of regulation  that are needed in today’s landscape of emerging threats to critical infrastructure. What emerging kinds of cyber attacks are the most troublesome? Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="32197863" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/9954a41b-7cfc-44db-8721-2797f31b2eb4/audio/62fa68d2-667c-41af-a547-4c235b4bf6c0/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Threats to Industrial Control Systems</itunes:title>
      <itunes:author>Roya Gordon, Danielle Jablanski</itunes:author>
      <itunes:duration>00:33:27</itunes:duration>
      <itunes:summary>“What&apos;s been most concerning is the rise of wiper malware. Threat actors are no longer interested in hey we&apos;re going to lock up all of your data. We&apos;re going to encrypt everything and force you to pay a ransom and then maybe give you the decryption key. Now with wiper malware they&apos;re just completely wiping it. … This year there&apos;s been a total of 5 wiper malwares that has been targeting critical infrastructure. So I think everyone should be very aware of that.” -Roya Gordon 

For today&apos;s episode, I&apos;m joined by Roya Gordon and Danielle Jablanski of Nozomi Networks, a firm that does inventory and situational awareness for operational technology industrial control systems. We discuss Nozomi’s research, the key kinds of threat intelligence globally, and the kinds of regulation  that are needed in today’s landscape of emerging threats to critical infrastructure. What emerging kinds of cyber attacks are the most troublesome? Join us to learn more.</itunes:summary>
      <itunes:subtitle>“What&apos;s been most concerning is the rise of wiper malware. Threat actors are no longer interested in hey we&apos;re going to lock up all of your data. We&apos;re going to encrypt everything and force you to pay a ransom and then maybe give you the decryption key. Now with wiper malware they&apos;re just completely wiping it. … This year there&apos;s been a total of 5 wiper malwares that has been targeting critical infrastructure. So I think everyone should be very aware of that.” -Roya Gordon 

For today&apos;s episode, I&apos;m joined by Roya Gordon and Danielle Jablanski of Nozomi Networks, a firm that does inventory and situational awareness for operational technology industrial control systems. We discuss Nozomi’s research, the key kinds of threat intelligence globally, and the kinds of regulation  that are needed in today’s landscape of emerging threats to critical infrastructure. What emerging kinds of cyber attacks are the most troublesome? Join us to learn more.</itunes:subtitle>
      <itunes:keywords>technology, threat intelligence, cyber attack, critical infrastructure, cybersecurity, regulation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dd58c3cd-abbc-4fb3-bddc-f2b8172498ed</guid>
      <title>Accelerating Innovation in Electric &amp; Gas</title>
      <description><![CDATA[<p>“Most industrial economies only consume about 20% our total end use energy in the form of electricity. The rest, we consume by basically combusting fossil fuel … You could get all of your electricity from wind and solar and you've still only solved 20% of your carbon problem. A lot of the investments we've made at Energy Impact Partners are actually in electrification. Basically electrifying all that stuff that today is fueled directly by fossil fuel but in the future could be fueled by electricity.” - Andy Lubershane</p><p>In this episode of Hack the Plant, I’m joined by Andy Lubershane, Director of Research for Energy Impact Partners (EIP), a venture investment firm founded by a coalition of electricity and gas utilities. We discuss how energy companies themselves accelerate investments in clean energy such as electric, wind, and solar technologies - and the threats and challenges to this innovation from a cybersecurity perspective. </p><p>Join us to learn more.</p>
]]></description>
      <pubDate>Tue, 13 Sep 2022 13:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Andy Lubershane)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/accelerating-innovation-in-electric-gas-QAb43DyC</link>
      <content:encoded><![CDATA[<p>“Most industrial economies only consume about 20% our total end use energy in the form of electricity. The rest, we consume by basically combusting fossil fuel … You could get all of your electricity from wind and solar and you've still only solved 20% of your carbon problem. A lot of the investments we've made at Energy Impact Partners are actually in electrification. Basically electrifying all that stuff that today is fueled directly by fossil fuel but in the future could be fueled by electricity.” - Andy Lubershane</p><p>In this episode of Hack the Plant, I’m joined by Andy Lubershane, Director of Research for Energy Impact Partners (EIP), a venture investment firm founded by a coalition of electricity and gas utilities. We discuss how energy companies themselves accelerate investments in clean energy such as electric, wind, and solar technologies - and the threats and challenges to this innovation from a cybersecurity perspective. </p><p>Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="32373059" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/0bc378bf-5d22-4c55-b5de-9ef322b3f69b/audio/39670efc-fed7-4b9d-b772-558f3568e5e1/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Accelerating Innovation in Electric &amp; Gas</itunes:title>
      <itunes:author>Andy Lubershane</itunes:author>
      <itunes:duration>00:33:39</itunes:duration>
      <itunes:summary>“Most industrial economies only consume about 20% our total end use energy in the form of electricity. The rest, we consume by basically combusting fossil fuel … You could get all of your electricity from wind and solar and you&apos;ve still only solved 20% of your carbon problem. A lot of the investments we&apos;ve made at Energy Impact Partners are actually in electrification. Basically electrifying all that stuff that today is fueled directly by fossil fuel but in the future could be fueled by electricity.” - Andy Lubershane

In this episode of Hack the Plant, I’m joined by Andy Lubershane, Director of Research for Energy Impact Partners (EIP), a venture investment firm founded by a coalition of electricity and gas utilities. We discuss how energy companies themselves accelerate investments in clean energy such as electric, wind, and solar technologies - and the threats and challenges to this innovation from a cybersecurity perspective. 

Join us to learn more.</itunes:summary>
      <itunes:subtitle>“Most industrial economies only consume about 20% our total end use energy in the form of electricity. The rest, we consume by basically combusting fossil fuel … You could get all of your electricity from wind and solar and you&apos;ve still only solved 20% of your carbon problem. A lot of the investments we&apos;ve made at Energy Impact Partners are actually in electrification. Basically electrifying all that stuff that today is fueled directly by fossil fuel but in the future could be fueled by electricity.” - Andy Lubershane

In this episode of Hack the Plant, I’m joined by Andy Lubershane, Director of Research for Energy Impact Partners (EIP), a venture investment firm founded by a coalition of electricity and gas utilities. We discuss how energy companies themselves accelerate investments in clean energy such as electric, wind, and solar technologies - and the threats and challenges to this innovation from a cybersecurity perspective. 

Join us to learn more.</itunes:subtitle>
      <itunes:keywords>wind energy, gas, solar, energy, innovation, solar power, electricity, solar energy, wind, cybersecurity, wind power</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">44c1a20b-8769-4095-bdd0-fa9704e0c545</guid>
      <title>Cyber threats to agriculture and food production</title>
      <description><![CDATA[<p>“Agriculture and cybersecurity has just run under the radar. We're talking about something that's one fifth of the us economy right? This is this is a huge deal here in the US, and globally as well …  We can begin get the right expertise and collateral assembled so we're not the next ransomware victim or we have enough resiliency built into our operations that if we get we get hit and we get smoked our recovery will be easier and our our financial losses will be minimized.”  - Joe Marshall</p><p>In this episode of Hack the Plant, I’m joined by Joe Marshall, a security researcher for the Outreach Team at Cisco Talos, one of the largest commercial threat intelligence teams in the world. We discuss his work on cyber threats to agriculture, an industry which doesn’t have much information or training on cyber threat levels - and the likely cascading effects of the war in Ukraine for agricultural supply and food security worldwide. </p><p>Join us to learn more.</p>
]]></description>
      <pubDate>Tue, 13 Sep 2022 13:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co (Joe Marshall)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/cyber-threats-to-agriculture-and-food-production-iGu1ikVS</link>
      <content:encoded><![CDATA[<p>“Agriculture and cybersecurity has just run under the radar. We're talking about something that's one fifth of the us economy right? This is this is a huge deal here in the US, and globally as well …  We can begin get the right expertise and collateral assembled so we're not the next ransomware victim or we have enough resiliency built into our operations that if we get we get hit and we get smoked our recovery will be easier and our our financial losses will be minimized.”  - Joe Marshall</p><p>In this episode of Hack the Plant, I’m joined by Joe Marshall, a security researcher for the Outreach Team at Cisco Talos, one of the largest commercial threat intelligence teams in the world. We discuss his work on cyber threats to agriculture, an industry which doesn’t have much information or training on cyber threat levels - and the likely cascading effects of the war in Ukraine for agricultural supply and food security worldwide. </p><p>Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="33094984" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/92cfb7fa-1022-4d61-ade6-d8f2a78f1675/audio/3627ae31-efa6-43ac-97f0-7f862cc76ddd/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Cyber threats to agriculture and food production</itunes:title>
      <itunes:author>Joe Marshall</itunes:author>
      <itunes:duration>00:34:25</itunes:duration>
      <itunes:summary>“Agriculture and cybersecurity has just run under the radar. We&apos;re talking about something that&apos;s one fifth of the us economy right? This is this is a huge deal here in the US, and globally as well …  We can begin get the right expertise and collateral assembled so we&apos;re not the next ransomware victim or we have enough resiliency built into our operations that if we get we get hit and we get smoked our recovery will be easier and our our financial losses will be minimized.”  - Joe Marshall

In this episode of Hack the Plant, I’m joined by Joe Marshall, a security researcher for the Outreach Team at Cisco Talos, one of the largest commercial threat intelligence teams in the world. We discuss his work on cyber threats to agriculture, an industry which doesn’t have much information or training on cyber threat levels - and the likely cascading effects of the war in Ukraine for agricultural supply and food security worldwide. 

Join us to learn more.</itunes:summary>
      <itunes:subtitle>“Agriculture and cybersecurity has just run under the radar. We&apos;re talking about something that&apos;s one fifth of the us economy right? This is this is a huge deal here in the US, and globally as well …  We can begin get the right expertise and collateral assembled so we&apos;re not the next ransomware victim or we have enough resiliency built into our operations that if we get we get hit and we get smoked our recovery will be easier and our our financial losses will be minimized.”  - Joe Marshall

In this episode of Hack the Plant, I’m joined by Joe Marshall, a security researcher for the Outreach Team at Cisco Talos, one of the largest commercial threat intelligence teams in the world. We discuss his work on cyber threats to agriculture, an industry which doesn’t have much information or training on cyber threat levels - and the likely cascading effects of the war in Ukraine for agricultural supply and food security worldwide. 

Join us to learn more.</itunes:subtitle>
      <itunes:keywords>food production, agriculture, cyber, food security, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bf499803-1663-4cf7-b548-46456b81492e</guid>
      <title>Training the Cyber Workforce of the Future</title>
      <description><![CDATA[<p>“You can only cover about 65% of the cybersecurity workforce demand with the existing workforce today. So we need to do something to address that gap. We need to either build that workforce or re-skill existing individuals that are looking to get into new fields. That's the approach that we're taking. So the need is there. We know that cyber risk is there. We know that adversaries are constantly re-skilling and skilling up as well. And we need to build a protective workforce around that.” - John Ellis</p><p>In this episode of Hack the Plant, we feature John Ellis, who heads up the Industrial Cyber Alliances at Siemens Energy.  We discuss a new, industry-lead apprenticeship program he runs which focuses on critical infrastructure protection called CIISAp (short for: Cybersecurity & Industrial Infrastructure Security Apprenticeship Program). </p><p>ICS village is one of the partners of this program, which is tackling the gap between shortage of skilled employees and the workforce</p><p>How is the cohort designed? How can we encourage collaboration tech companies, service companies, academia, and government to train the cyber workforce of the future?</p><p>Join us to learn more.</p>
]]></description>
      <pubDate>Mon, 4 Apr 2022 13:37:19 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/training-the-cyber-workforce-of-the-future-_OXasurG</link>
      <content:encoded><![CDATA[<p>“You can only cover about 65% of the cybersecurity workforce demand with the existing workforce today. So we need to do something to address that gap. We need to either build that workforce or re-skill existing individuals that are looking to get into new fields. That's the approach that we're taking. So the need is there. We know that cyber risk is there. We know that adversaries are constantly re-skilling and skilling up as well. And we need to build a protective workforce around that.” - John Ellis</p><p>In this episode of Hack the Plant, we feature John Ellis, who heads up the Industrial Cyber Alliances at Siemens Energy.  We discuss a new, industry-lead apprenticeship program he runs which focuses on critical infrastructure protection called CIISAp (short for: Cybersecurity & Industrial Infrastructure Security Apprenticeship Program). </p><p>ICS village is one of the partners of this program, which is tackling the gap between shortage of skilled employees and the workforce</p><p>How is the cohort designed? How can we encourage collaboration tech companies, service companies, academia, and government to train the cyber workforce of the future?</p><p>Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="28249453" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/19f64182-ffe2-47ee-9a74-bee57a47d057/audio/c7bd0f10-318b-487e-beb5-0e2d02a3e894/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Training the Cyber Workforce of the Future</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:29:21</itunes:duration>
      <itunes:summary>“You can only cover about 65% of the cybersecurity workforce demand with the existing workforce today. So we need to do something to address that gap. We need to either build that workforce or re-skill existing individuals that are looking to get into new fields. That&apos;s the approach that we&apos;re taking. So the need is there. We know that cyber risk is there. We know that adversaries are constantly re-skilling and skilling up as well. And we need to build a protective workforce around that.” - John Ellis

In this episode of Hack the Plant, we feature John Ellis, who heads up the Industrial Cyber Alliances at Siemens Energy.  We discuss a new, industry-lead apprenticeship program he runs which focuses on critical infrastructure protection called CIISAp (short for: Cybersecurity &amp; Industrial Infrastructure Security Apprenticeship Program). T 

ICS village is one of the partners of this program, which is tackling the gap between shortage of skilled employees and the workforce

How is the cohort designed? How can we encourage collaboration tech companies, service companies, academia, and government to train the cyber workforce of the future?

Join us to learn more.</itunes:summary>
      <itunes:subtitle>“You can only cover about 65% of the cybersecurity workforce demand with the existing workforce today. So we need to do something to address that gap. We need to either build that workforce or re-skill existing individuals that are looking to get into new fields. That&apos;s the approach that we&apos;re taking. So the need is there. We know that cyber risk is there. We know that adversaries are constantly re-skilling and skilling up as well. And we need to build a protective workforce around that.” - John Ellis

In this episode of Hack the Plant, we feature John Ellis, who heads up the Industrial Cyber Alliances at Siemens Energy.  We discuss a new, industry-lead apprenticeship program he runs which focuses on critical infrastructure protection called CIISAp (short for: Cybersecurity &amp; Industrial Infrastructure Security Apprenticeship Program). T 

ICS village is one of the partners of this program, which is tackling the gap between shortage of skilled employees and the workforce

How is the cohort designed? How can we encourage collaboration tech companies, service companies, academia, and government to train the cyber workforce of the future?

Join us to learn more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fc982eef-9378-4a15-89e1-900453b6a83f</guid>
      <title>Diversity in Power Systems Distribution</title>
      <description><![CDATA[<p>“How do we talk about all the great things we're doing in our communities, in optimizing and trying to reduce carbon, and looking at new solutions and coming up with different technologies that can help advance to help keep prices down and keep reliability up. We're really spoiled at times in the US with how often we have our power. I've had to travel on all seven continents and had times where I didn't have power because the grid was down in other countries.” Dr. Noel Schulz</p><p>In this episode of Hack the Plant,  Dr. Noel Schulz of Washington State University joins us to talk about  innovations within the power industry. We discuss how our power systems (which we often take for granted) work, how to keep them secure, and innovations around the world in power supply. We also tackle the challenges of creating more diversity in harnessing carbon-neutral power sources…and the analogous issues of diversity and inclusion in industry.   </p><p>How can we increase access to reliable power while reducing our carbon footprint? Who</p><p>Join us as we discuss these questions, and more.</p>
]]></description>
      <pubDate>Mon, 28 Mar 2022 12:43:15 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/diversity-in-power-systems-distribution-6lBwUsNl</link>
      <content:encoded><![CDATA[<p>“How do we talk about all the great things we're doing in our communities, in optimizing and trying to reduce carbon, and looking at new solutions and coming up with different technologies that can help advance to help keep prices down and keep reliability up. We're really spoiled at times in the US with how often we have our power. I've had to travel on all seven continents and had times where I didn't have power because the grid was down in other countries.” Dr. Noel Schulz</p><p>In this episode of Hack the Plant,  Dr. Noel Schulz of Washington State University joins us to talk about  innovations within the power industry. We discuss how our power systems (which we often take for granted) work, how to keep them secure, and innovations around the world in power supply. We also tackle the challenges of creating more diversity in harnessing carbon-neutral power sources…and the analogous issues of diversity and inclusion in industry.   </p><p>How can we increase access to reliable power while reducing our carbon footprint? Who</p><p>Join us as we discuss these questions, and more.</p>
]]></content:encoded>
      <enclosure length="34992413" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/a33976cf-d9e7-47ff-99c8-0360a35e708a/audio/e424fb9f-4667-45cf-af14-b66b61773761/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Diversity in Power Systems Distribution</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:36:23</itunes:duration>
      <itunes:summary>“How do we talk about all the great things we&apos;re doing in our communities, in optimizing and trying to reduce carbon, and looking at new solutions and coming up with different technologies that can help advance to help keep prices down and keep reliability up. We&apos;re really spoiled at times in the US with how often we have our power. I&apos;ve had to travel on all seven continents and had times where I didn&apos;t have power because the grid was down in other countries.” Dr. Noel Schulz

In this episode of Hack the Plant,  Dr. Noel Schulz of Washington State University joins us to talk about  innovations within the power industry. We discuss how our power systems (which we often take for granted) work, how to keep them secure, and innovations around the world in power supply. We also tackle the challenges of creating more diversity in harnessing carbon-neutral power sources…and the analogous issues of diversity and inclusion in industry.   
How can we increase access to reliable power while reducing our carbon footprint? Who

Join us as we discuss these questions, and more.
</itunes:summary>
      <itunes:subtitle>“How do we talk about all the great things we&apos;re doing in our communities, in optimizing and trying to reduce carbon, and looking at new solutions and coming up with different technologies that can help advance to help keep prices down and keep reliability up. We&apos;re really spoiled at times in the US with how often we have our power. I&apos;ve had to travel on all seven continents and had times where I didn&apos;t have power because the grid was down in other countries.” Dr. Noel Schulz

In this episode of Hack the Plant,  Dr. Noel Schulz of Washington State University joins us to talk about  innovations within the power industry. We discuss how our power systems (which we often take for granted) work, how to keep them secure, and innovations around the world in power supply. We also tackle the challenges of creating more diversity in harnessing carbon-neutral power sources…and the analogous issues of diversity and inclusion in industry.   
How can we increase access to reliable power while reducing our carbon footprint? Who

Join us as we discuss these questions, and more.
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cdf0a0e6-c9dc-470f-b14f-8a75d4a69a84</guid>
      <title>The future of cybersecurity education?</title>
      <description><![CDATA[<p>“I've been educating now for about eight years within the college system and that hands-on experiential learning is critical. When I have students do something that's like a scenario based off of different security assessments I've done or just weaving in some real world stuff, they thrive. They really get excited. They walk away from it energized.” - Dennis Skarr</p><p>In this episode of Hack the Plant, Dennis Skarr of Everett Community College joins us to talk about an industrial cybersecurity program for students he has recently built. He describes the interactive element that helps students get excited about cybersecurity - in turn inspiring the next generation of cybersecurity professionals.</p><p>What success has this program had - and how, and why, should it be replicated across the country?</p><p>Join us as we discuss these questions, and more.</p>
]]></description>
      <pubDate>Tue, 1 Feb 2022 01:47:41 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/the-future-of-cybersecurity-education-X8WQX6GX</link>
      <content:encoded><![CDATA[<p>“I've been educating now for about eight years within the college system and that hands-on experiential learning is critical. When I have students do something that's like a scenario based off of different security assessments I've done or just weaving in some real world stuff, they thrive. They really get excited. They walk away from it energized.” - Dennis Skarr</p><p>In this episode of Hack the Plant, Dennis Skarr of Everett Community College joins us to talk about an industrial cybersecurity program for students he has recently built. He describes the interactive element that helps students get excited about cybersecurity - in turn inspiring the next generation of cybersecurity professionals.</p><p>What success has this program had - and how, and why, should it be replicated across the country?</p><p>Join us as we discuss these questions, and more.</p>
]]></content:encoded>
      <enclosure length="38493947" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/3aba2786-f529-4995-ba71-3346b791c0c0/audio/1a37e148-0aac-4302-a93d-c35505060a7b/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>The future of cybersecurity education?</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:40:01</itunes:duration>
      <itunes:summary>“I&apos;ve been educating now for about eight years within the college system and that hands-on experiential learning is critical. When I have students do something that&apos;s like a scenario based off of different security assessments I&apos;ve done or just weaving in some real world stuff, they thrive. They really get excited. They walk away from it energized.” - Dennis Skarr

In this episode of Hack the Plant, Dennis Skarr of Everett Community College joins us to talk about an industrial cybersecurity program for students he has recently built. He describes the interactive element that helps students get excited about cybersecurity - in turn inspiring the next generation of cybersecurity professionals.

What success has this program had - and how, and why, should it be replicated across the country?

Join us as we discuss these questions, and more.
</itunes:summary>
      <itunes:subtitle>“I&apos;ve been educating now for about eight years within the college system and that hands-on experiential learning is critical. When I have students do something that&apos;s like a scenario based off of different security assessments I&apos;ve done or just weaving in some real world stuff, they thrive. They really get excited. They walk away from it energized.” - Dennis Skarr

In this episode of Hack the Plant, Dennis Skarr of Everett Community College joins us to talk about an industrial cybersecurity program for students he has recently built. He describes the interactive element that helps students get excited about cybersecurity - in turn inspiring the next generation of cybersecurity professionals.

What success has this program had - and how, and why, should it be replicated across the country?

Join us as we discuss these questions, and more.
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a8bde0bc-a929-478e-8197-1cddd8d667ee</guid>
      <title>INL - Wind energy and cybersecurity challenges</title>
      <description><![CDATA[<p>Wind energy is one of the most rapidly growing energy generation sources in the US - how can these renewable systems stay resilient in the face of cyber attacks as the industry grows?</p><p>In this episode, we hear from Megan Culler and Keith Mecham of Idaho National Labs (or INL). Megan Culler is a Power Engineer and Researcher; Keith Mecham is a Critical Infrastructure Cybersecurity Engineer.</p><p>INL is a Federally funded research and development center (FFRDC): <a href="https://en.wikipedia.org/wiki/Public-private_partnership">public-private partnerships</a> which conduct <a href="https://en.wikipedia.org/wiki/Research_and_development">research and development</a> for the <a href="https://en.wikipedia.org/wiki/United_States_Government">United States Government</a>. They operate large infrastructure security programs that include wind, power, and telecommunication, as well as provide engineering and development support to the federal government.</p><p>How does wind fit into our broader energy infrastructure? What threats does cybersecurity present to renewable energy? How can industry work tougher for policymakers to keep our systems secure?</p><p>Join us as we discuss these questions, and more.</p><p>“A big risk is people just don't understand the risks with these types of systems. I think that's starting to change, as we have larger and larger energy companies that already understand cybersecurity jumping into wind. We have projects from Royal Dutch Shell and BP and other energy companies. They're setting up huge wind farms, especially offshore. They understand cybersecurity because of their refineries and pipeline systems, better than a startup does. And we hope we see more of that bring some maturity to the industry.”</p><p>-Keith Mecham</p>
]]></description>
      <pubDate>Tue, 7 Dec 2021 14:09:15 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/inl-wind-energy-and-cybersecurity-challenges-ie7PLCO3</link>
      <content:encoded><![CDATA[<p>Wind energy is one of the most rapidly growing energy generation sources in the US - how can these renewable systems stay resilient in the face of cyber attacks as the industry grows?</p><p>In this episode, we hear from Megan Culler and Keith Mecham of Idaho National Labs (or INL). Megan Culler is a Power Engineer and Researcher; Keith Mecham is a Critical Infrastructure Cybersecurity Engineer.</p><p>INL is a Federally funded research and development center (FFRDC): <a href="https://en.wikipedia.org/wiki/Public-private_partnership">public-private partnerships</a> which conduct <a href="https://en.wikipedia.org/wiki/Research_and_development">research and development</a> for the <a href="https://en.wikipedia.org/wiki/United_States_Government">United States Government</a>. They operate large infrastructure security programs that include wind, power, and telecommunication, as well as provide engineering and development support to the federal government.</p><p>How does wind fit into our broader energy infrastructure? What threats does cybersecurity present to renewable energy? How can industry work tougher for policymakers to keep our systems secure?</p><p>Join us as we discuss these questions, and more.</p><p>“A big risk is people just don't understand the risks with these types of systems. I think that's starting to change, as we have larger and larger energy companies that already understand cybersecurity jumping into wind. We have projects from Royal Dutch Shell and BP and other energy companies. They're setting up huge wind farms, especially offshore. They understand cybersecurity because of their refineries and pipeline systems, better than a startup does. And we hope we see more of that bring some maturity to the industry.”</p><p>-Keith Mecham</p>
]]></content:encoded>
      <enclosure length="39509594" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/eacbded3-4ed5-48e9-8aa5-331bcce8f028/audio/39105ba8-5b2e-4fd8-ae89-765a23d2004f/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>INL - Wind energy and cybersecurity challenges</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:41:06</itunes:duration>
      <itunes:summary>Wind energy is one of the most rapidly growing energy generation sources in the United States - how can these renewable systems stay resilient in the face of cyber attacks as the industry grows?

In this episode, we hear from Megan Culler and Keith Mecham of Idaho National Labs (or INL). Megan Culler is a Power Engineer and Researcher; Keith Mecham is a Critical Infrastructure Cybersecurity Engineer.

INL is a Federally funded research and development center (FFRDC): public-private partnerships which conduct research and development for the United States Government. They operate large infrastructure security programs that include wind, power, and telecommunication, as well as provide engineering and development support to the federal government.
 
How does wind fit into our broader energy infrastructure? What threats does cybersecurity present to renewable energy? How can industry work tougher for policymakers to keep our systems secure? Join us as we discuss these questions, and more.

“A big risk is people just don&apos;t understand the risks with these types of systems. I think that&apos;s starting to change, as we have larger and larger energy companies that already understand cybersecurity jumping into wind. We have projects from Royal Dutch Shell and BP and other energy companies. They&apos;re setting up huge wind farms, especially offshore. They understand cybersecurity because of their refineries and pipeline systems, better than a startup does. And we hope we see more of that bring some maturity to the industry.”
-Keith Mecham
</itunes:summary>
      <itunes:subtitle>Wind energy is one of the most rapidly growing energy generation sources in the United States - how can these renewable systems stay resilient in the face of cyber attacks as the industry grows?

In this episode, we hear from Megan Culler and Keith Mecham of Idaho National Labs (or INL). Megan Culler is a Power Engineer and Researcher; Keith Mecham is a Critical Infrastructure Cybersecurity Engineer.

INL is a Federally funded research and development center (FFRDC): public-private partnerships which conduct research and development for the United States Government. They operate large infrastructure security programs that include wind, power, and telecommunication, as well as provide engineering and development support to the federal government.
 
How does wind fit into our broader energy infrastructure? What threats does cybersecurity present to renewable energy? How can industry work tougher for policymakers to keep our systems secure? Join us as we discuss these questions, and more.

“A big risk is people just don&apos;t understand the risks with these types of systems. I think that&apos;s starting to change, as we have larger and larger energy companies that already understand cybersecurity jumping into wind. We have projects from Royal Dutch Shell and BP and other energy companies. They&apos;re setting up huge wind farms, especially offshore. They understand cybersecurity because of their refineries and pipeline systems, better than a startup does. And we hope we see more of that bring some maturity to the industry.”
-Keith Mecham
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6f3649fe-7dd8-435c-be09-5d41ede6e07c</guid>
      <title>Cyber Challenges to Securing Our Electric System - California and Beyond</title>
      <description><![CDATA[<p>“Initially it was looking at specific types of attacks and thinking how those could be utilized against our systems, but then it became more sophisticated in thinking of how these attacks could be coordinated together by larger actors? ….  I think that regulation's role is more to draw attention and provide you with a base minimum, and then from there, it's the responsibility of those industries of those actors to step up and design the systems and implement true security.” - David Coher</p><p>How can our electrical grid system anticipate cybersecurity attacks? What is the nature of its vulnerability to attack, and what role can regulation play in securing our future?</p><p>In this episode, we hear from David Coher, leader of Southern California Edison’s (SCE) Energy Contract Management team, which manages their long-term energy procurement contracts (approximately $4 billion, annually). David is an attorney, who moved from real estate litigation to SCE where he established programs for cybersecurity, participation in California’s Greenhouse Gas emissions Cap & Trade market, and Dodd-Frank compliance.</p><p>We discussed how the power grid works and the changing landscape of keeping our energy grids safe from cyber attacks. We also explored the challenges of establishing a regulatory compliance program - in particular how to anticipate cybersecurity threats.</p><p>What is next for SCE? What are some potential opportunities and threats on the horizon for the safety of our electric grid? Join us to learn more.</p>
]]></description>
      <pubDate>Mon, 1 Nov 2021 12:59:16 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/cyber-challenges-to-securing-our-electric-system-california-and-beyond-5YP1nAm8</link>
      <content:encoded><![CDATA[<p>“Initially it was looking at specific types of attacks and thinking how those could be utilized against our systems, but then it became more sophisticated in thinking of how these attacks could be coordinated together by larger actors? ….  I think that regulation's role is more to draw attention and provide you with a base minimum, and then from there, it's the responsibility of those industries of those actors to step up and design the systems and implement true security.” - David Coher</p><p>How can our electrical grid system anticipate cybersecurity attacks? What is the nature of its vulnerability to attack, and what role can regulation play in securing our future?</p><p>In this episode, we hear from David Coher, leader of Southern California Edison’s (SCE) Energy Contract Management team, which manages their long-term energy procurement contracts (approximately $4 billion, annually). David is an attorney, who moved from real estate litigation to SCE where he established programs for cybersecurity, participation in California’s Greenhouse Gas emissions Cap & Trade market, and Dodd-Frank compliance.</p><p>We discussed how the power grid works and the changing landscape of keeping our energy grids safe from cyber attacks. We also explored the challenges of establishing a regulatory compliance program - in particular how to anticipate cybersecurity threats.</p><p>What is next for SCE? What are some potential opportunities and threats on the horizon for the safety of our electric grid? Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="38493019" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/fa08df23-6f09-45a1-90fc-24ab74ce2f78/audio/25854259-3596-496d-afe5-140239e4af63/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Cyber Challenges to Securing Our Electric System - California and Beyond</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:40:01</itunes:duration>
      <itunes:summary>How can our electrical grid system anticipate cybersecurity attacks? What is the nature of its vulnerability to attack, and what role can regulation play in securing our future?

In this episode, we hear from David Coher, leader of Southern California Edison’s  (SCE) Energy Contract Management team, which manages their long-term energy procurement contracts (approximately $4 billion, annually). David is an attorney, who moved from real estate litigation to SCE where he established programs for cybersecurity, participation in California’s Greenhouse Gas emissions Cap &amp; Trade market, and Dodd-Frank compliance.

We discussed how the power grid works and the changing landscape of keeping our energy grids safe from cyber attacks. We also explored the challenges of establishing a regulatory compliance program - in particular how to anticipate cybersecurity threats.

What is next for SCE? What are some potential opportunities and threats on the horizon for the safety of our electric grid? Join us to learn more.</itunes:summary>
      <itunes:subtitle>How can our electrical grid system anticipate cybersecurity attacks? What is the nature of its vulnerability to attack, and what role can regulation play in securing our future?

In this episode, we hear from David Coher, leader of Southern California Edison’s  (SCE) Energy Contract Management team, which manages their long-term energy procurement contracts (approximately $4 billion, annually). David is an attorney, who moved from real estate litigation to SCE where he established programs for cybersecurity, participation in California’s Greenhouse Gas emissions Cap &amp; Trade market, and Dodd-Frank compliance.

We discussed how the power grid works and the changing landscape of keeping our energy grids safe from cyber attacks. We also explored the challenges of establishing a regulatory compliance program - in particular how to anticipate cybersecurity threats.

What is next for SCE? What are some potential opportunities and threats on the horizon for the safety of our electric grid? Join us to learn more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d9ff0ec5-96b0-4b14-93f7-88145f7e9b1b</guid>
      <title>Innovation in Critical Infrastructure</title>
      <description><![CDATA[<p>“We had to go out and talk to experts and just have the conversations and then be brutally honest about what those people were telling us about the problem. In many cases, we didn't even tell them what we were thinking about doing. We would call them up and say, "How are you securing your industrial control systems today?" and just listen.” - Joshua Steinman</p><p>“We really learned to go in, us. Instead of imposing what we thought the problem would be for other asset owners, really let them tell us what their problems were. So that was probably one of the biggest takeaways during the customer discovery. And it was also great to hear that a lot of people had, I would say, some similar problems across different industry verticals. And everyone knew that there needed to be some change and wanted to see change. So that was also very refreshing for me.” -Brandon Park</p><p>What are the biggest challenges in critical infrastructure cybersecurity? In this episode of Hack the Plant, we hear from two entrepreneurs, Joshua Steinman & Brandon Park, who just did a 7 month long customer discovery process trying to understand where the key problems are now to keep our ICS systems safe from cyber threats.</p><p>J​​oshua Steinman is a former naval officer, ICS cybersecurity startup founder, and cybersecurity policy senior director during the Trump administration.</p><p>Brandon Park formerly worked at Amazon as a Security Engineer focused on securing ICS at scale. Prior to Amazon, he supported Department of Defense and Department of Energy projects.</p><p>Their conversations spanned from ICS cybersecurity experts to operators to  executives at companies with large footprints in the space - and led to some surprising and unexpected insights that have led to the launch of something called Galvanick.</p><p>How can this make our ICS more safe, reliable, or cyber-resilient? Join us to learn more.</p>
]]></description>
      <pubDate>Mon, 4 Oct 2021 13:25:04 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/innovation-in-critical-infrastructure-LmCTPxQZ</link>
      <content:encoded><![CDATA[<p>“We had to go out and talk to experts and just have the conversations and then be brutally honest about what those people were telling us about the problem. In many cases, we didn't even tell them what we were thinking about doing. We would call them up and say, "How are you securing your industrial control systems today?" and just listen.” - Joshua Steinman</p><p>“We really learned to go in, us. Instead of imposing what we thought the problem would be for other asset owners, really let them tell us what their problems were. So that was probably one of the biggest takeaways during the customer discovery. And it was also great to hear that a lot of people had, I would say, some similar problems across different industry verticals. And everyone knew that there needed to be some change and wanted to see change. So that was also very refreshing for me.” -Brandon Park</p><p>What are the biggest challenges in critical infrastructure cybersecurity? In this episode of Hack the Plant, we hear from two entrepreneurs, Joshua Steinman & Brandon Park, who just did a 7 month long customer discovery process trying to understand where the key problems are now to keep our ICS systems safe from cyber threats.</p><p>J​​oshua Steinman is a former naval officer, ICS cybersecurity startup founder, and cybersecurity policy senior director during the Trump administration.</p><p>Brandon Park formerly worked at Amazon as a Security Engineer focused on securing ICS at scale. Prior to Amazon, he supported Department of Defense and Department of Energy projects.</p><p>Their conversations spanned from ICS cybersecurity experts to operators to  executives at companies with large footprints in the space - and led to some surprising and unexpected insights that have led to the launch of something called Galvanick.</p><p>How can this make our ICS more safe, reliable, or cyber-resilient? Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="49882603" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/2cc651d0-6ad1-4dc4-aa4a-6b267f11445d/audio/7e58a629-5dc5-45d0-bd64-30e5e7fff294/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Innovation in Critical Infrastructure</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:51:53</itunes:duration>
      <itunes:summary>“We had to go out and talk to experts and just have the conversations and then be brutally honest about what those people were telling us about the problem. In many cases, we didn&apos;t even tell them what we were thinking about doing. We would call them up and say, &quot;How are you securing your industrial control systems today?&quot; and just listen.” - Joshua Steinman

“We really learned to go in, us. Instead of imposing what we thought the problem would be for other asset owners, really let them tell us what their problems were. So that was probably one of the biggest takeaways during the customer discovery. And it was also great to hear that a lot of people had, I would say, some similar problems across different industry verticals. And everyone knew that there needed to be some change and wanted to see change. So that was also very refreshing for me.” -Brandon Park

What are the biggest challenges in critical infrastructure cybersecurity? In this episode of Hack the Plant, we hear from two entrepreneurs, Joshua Steinman &amp; Brandon Park, who just did a 7 month long customer discovery process trying to understand where the key problems are now to keep our ICS systems safe from cyber threats.

J​​oshua Steinman is a former naval officer, ICS cybersecurity startup founder, and cybersecurity policy senior director during the Trump administration.

Brandon Park formerly worked at Amazon as a Security Engineer focused on securing ICS at scale. Prior to Amazon, he supported Department of Defense and Department of Energy projects.

Their conversations spanned from ICS cybersecurity experts to operators to  executives at companies with large footprints in the space - and led to some surprising and unexpected insights that have led to the launch of something called Galvanick. 
  
How can this make our ICS more safe, reliable, or cyber-resilient? Join us to learn more.</itunes:summary>
      <itunes:subtitle>“We had to go out and talk to experts and just have the conversations and then be brutally honest about what those people were telling us about the problem. In many cases, we didn&apos;t even tell them what we were thinking about doing. We would call them up and say, &quot;How are you securing your industrial control systems today?&quot; and just listen.” - Joshua Steinman

“We really learned to go in, us. Instead of imposing what we thought the problem would be for other asset owners, really let them tell us what their problems were. So that was probably one of the biggest takeaways during the customer discovery. And it was also great to hear that a lot of people had, I would say, some similar problems across different industry verticals. And everyone knew that there needed to be some change and wanted to see change. So that was also very refreshing for me.” -Brandon Park

What are the biggest challenges in critical infrastructure cybersecurity? In this episode of Hack the Plant, we hear from two entrepreneurs, Joshua Steinman &amp; Brandon Park, who just did a 7 month long customer discovery process trying to understand where the key problems are now to keep our ICS systems safe from cyber threats.

J​​oshua Steinman is a former naval officer, ICS cybersecurity startup founder, and cybersecurity policy senior director during the Trump administration.

Brandon Park formerly worked at Amazon as a Security Engineer focused on securing ICS at scale. Prior to Amazon, he supported Department of Defense and Department of Energy projects.

Their conversations spanned from ICS cybersecurity experts to operators to  executives at companies with large footprints in the space - and led to some surprising and unexpected insights that have led to the launch of something called Galvanick. 
  
How can this make our ICS more safe, reliable, or cyber-resilient? Join us to learn more.</itunes:subtitle>
      <itunes:keywords>critical infrastructure, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b83290a5-fc00-4a9d-bcbf-e4187bbf0f3e</guid>
      <title>AI and Critical Infrastructure</title>
      <description><![CDATA[<p>When will hard infrastructure have machine learning capabilities? It might be sooner than you think. Ariel Stern, formerly an engineer in the Israeli Ministry of Defense and a civil infrastructure project manager, currently CEO of Ayyeka, which offers remote monitoring for industrial Internet of Things (IoT) systems. Ariel has a forward-looking approach to creating resilience in critical infrastructure…anticipating that we are entering a new era for critical infrastructure….from IoT data creation, management, and analysis to advanced Artificial Intelligence pattern recognition and prediction.</p><p>Is this science fiction? Join us to learn how the technology that can create resilient infrastructure for tomorrow is here - today.</p>
]]></description>
      <pubDate>Mon, 6 Sep 2021 14:03:17 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/ai-and-critical-infrastructure-Y3og5gxA</link>
      <content:encoded><![CDATA[<p>When will hard infrastructure have machine learning capabilities? It might be sooner than you think. Ariel Stern, formerly an engineer in the Israeli Ministry of Defense and a civil infrastructure project manager, currently CEO of Ayyeka, which offers remote monitoring for industrial Internet of Things (IoT) systems. Ariel has a forward-looking approach to creating resilience in critical infrastructure…anticipating that we are entering a new era for critical infrastructure….from IoT data creation, management, and analysis to advanced Artificial Intelligence pattern recognition and prediction.</p><p>Is this science fiction? Join us to learn how the technology that can create resilient infrastructure for tomorrow is here - today.</p>
]]></content:encoded>
      <enclosure length="27923479" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/93922b37-1487-48b1-8d5b-52cf7d11ce91/audio/761d7bad-37a4-4aec-b458-62d7824c0e6e/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>AI and Critical Infrastructure</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:29:05</itunes:duration>
      <itunes:summary>When will hard infrastructure have machine learning capabilities? It might be sooner than you think. Ariel Stern, formerly an engineer in the Israeli Ministry of Defense and a civil infrastructure project manager, currently CEO of Ayyeka, which offers remote monitoring for industrial Internet of Things (IoT) systems. Ariel has a forward-looking approach to creating resilience in critical infrastructure…anticipating that we are entering a new era for critical infrastructure….from IoT data creation, management, and analysis to advanced Artificial Intelligence pattern recognition and prediction.

Is this science fiction? Join us to learn how the technology that can create resilient infrastructure for tomorrow is here - today.</itunes:summary>
      <itunes:subtitle>When will hard infrastructure have machine learning capabilities? It might be sooner than you think. Ariel Stern, formerly an engineer in the Israeli Ministry of Defense and a civil infrastructure project manager, currently CEO of Ayyeka, which offers remote monitoring for industrial Internet of Things (IoT) systems. Ariel has a forward-looking approach to creating resilience in critical infrastructure…anticipating that we are entering a new era for critical infrastructure….from IoT data creation, management, and analysis to advanced Artificial Intelligence pattern recognition and prediction.

Is this science fiction? Join us to learn how the technology that can create resilient infrastructure for tomorrow is here - today.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5ec229f7-c57a-41d7-9b53-54ac39ad558c</guid>
      <title>Biden Admin&apos;s Cybersecurity Executive Order</title>
      <description><![CDATA[<p>On May 12, 2021, the Biden Administration issued an Executive Order “On Improving the Nation’s Cybersecurity.”  This came in the wake of  ransomware attacks drawing national attention: Solar Winds, Colonial Pipeline, and more.</p><p>We take a deep dive into the Executive Order, and what it means for public and private efforts to keep our critical infrastructure safe with two attorneys and cybersecurity experts.</p><p>Megan Brown is a Partner at Wiley Rein. She has deep expertise in cybersecurity and data privacy issues, working for national and global companies on cutting edge compliance and risk management.  </p><p>Liz Wharton the Chief of Staff at SCYTHE where she serves as a strategic advisor for the CEO and leadership team, building and maintaining cross-department relationships, crafting external initiatives, and driving day-to-day projects and tasks. Previously she was the Senior Assistant City Attorney with the City of Atlanta, where she served on the immediate incident response team for the City of Atlanta’s ransomware incident.  </p><p> </p>
]]></description>
      <pubDate>Tue, 27 Jul 2021 14:47:30 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/biden-admins-cybersecurity-executive-order-b5smJc9N</link>
      <content:encoded><![CDATA[<p>On May 12, 2021, the Biden Administration issued an Executive Order “On Improving the Nation’s Cybersecurity.”  This came in the wake of  ransomware attacks drawing national attention: Solar Winds, Colonial Pipeline, and more.</p><p>We take a deep dive into the Executive Order, and what it means for public and private efforts to keep our critical infrastructure safe with two attorneys and cybersecurity experts.</p><p>Megan Brown is a Partner at Wiley Rein. She has deep expertise in cybersecurity and data privacy issues, working for national and global companies on cutting edge compliance and risk management.  </p><p>Liz Wharton the Chief of Staff at SCYTHE where she serves as a strategic advisor for the CEO and leadership team, building and maintaining cross-department relationships, crafting external initiatives, and driving day-to-day projects and tasks. Previously she was the Senior Assistant City Attorney with the City of Atlanta, where she served on the immediate incident response team for the City of Atlanta’s ransomware incident.  </p><p> </p>
]]></content:encoded>
      <enclosure length="37821773" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/e07137f3-eb2a-43c1-80b6-3616c96ff945/audio/213abf1b-6b3e-4fc5-b916-744fe7ae53dd/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Biden Admin&apos;s Cybersecurity Executive Order</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:39:19</itunes:duration>
      <itunes:summary>In the wake of ransomware attacks drawing national attention, including Solar Winds, Colonial Pipeline and more, the Biden Administration issued an Executive Order “On Improving the Nation’s Cybersecurity.” 

We take a deep dive into the EO, and what it means for public and private efforts to keep our critical infrastructure safe with two attorneys and cybersecurity experts.

Megan Brown is a Partner at Wiley Rein. She has deep expertise in cybersecurity and data privacy issues, working for national and global companies on cutting edge compliance and risk management.  

Liz Wharton the Chief of Staff at SCYTHE where she serves as a strategic advisor for the CEO and leadership team, building and maintaining cross-department relationships, crafting external initiatives, and driving day-to-day projects and tasks. Previously she was the Senior Assistant City Attorney with the City of Atlanta, where she served on the immediate incident response team for the City of Atlanta’s ransomware incident.   
</itunes:summary>
      <itunes:subtitle>In the wake of ransomware attacks drawing national attention, including Solar Winds, Colonial Pipeline and more, the Biden Administration issued an Executive Order “On Improving the Nation’s Cybersecurity.” 

We take a deep dive into the EO, and what it means for public and private efforts to keep our critical infrastructure safe with two attorneys and cybersecurity experts.

Megan Brown is a Partner at Wiley Rein. She has deep expertise in cybersecurity and data privacy issues, working for national and global companies on cutting edge compliance and risk management.  

Liz Wharton the Chief of Staff at SCYTHE where she serves as a strategic advisor for the CEO and leadership team, building and maintaining cross-department relationships, crafting external initiatives, and driving day-to-day projects and tasks. Previously she was the Senior Assistant City Attorney with the City of Atlanta, where she served on the immediate incident response team for the City of Atlanta’s ransomware incident.   
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3d754ad9-e39a-4db2-af99-a3e4bc780d21</guid>
      <title>ERCOT and the Texas Power Outage</title>
      <description><![CDATA[<p>In February, severe winter storms and an electricity generation failure left almost 5 million people in Texas without power, leading to hundreds of deaths, and a shortage of heat, food and water. The Electric Reliability Council of Texas (ERCOT) manages the flow of electric power to more than 26 million Texas customers. How did the massive power failure happen? What does this power outage suggest about the resilience of our critical infrastructure?</p><p>Beth Garza, former director of ERCOT and senior fellow at the R Street Institute, answers these questions and more. Over the course of her 35-year career in the electric utility industry, Beth Garza has held a variety of leadership roles in generation and transmission planning, system operations, regulatory affairs and market design for both regulated and competitive entities.  </p><p><strong>Further information:</strong></p><ol><li>Watch: <a href="https://www.youtube.com/watch?v=xZGIkfKz3sE&feature=emb_title">Shedding light on the legislative response to the Texas blackouts. </a></li><li>Testimony: <a href="https://www.rstreet.org/wp-content/uploads/2021/03/Final-SST-Testimony_for-Editorial-review-Caroline-Kitchens.pdf">The House Committee on Science, Space and Technology hearing on "Lessons learned from the Texas blackouts: Research needs for a secure and resilient grid." </a></li></ol><p> </p>
]]></description>
      <pubDate>Mon, 28 Jun 2021 21:09:10 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/ercot-and-the-texas-power-outage-XWntP966</link>
      <content:encoded><![CDATA[<p>In February, severe winter storms and an electricity generation failure left almost 5 million people in Texas without power, leading to hundreds of deaths, and a shortage of heat, food and water. The Electric Reliability Council of Texas (ERCOT) manages the flow of electric power to more than 26 million Texas customers. How did the massive power failure happen? What does this power outage suggest about the resilience of our critical infrastructure?</p><p>Beth Garza, former director of ERCOT and senior fellow at the R Street Institute, answers these questions and more. Over the course of her 35-year career in the electric utility industry, Beth Garza has held a variety of leadership roles in generation and transmission planning, system operations, regulatory affairs and market design for both regulated and competitive entities.  </p><p><strong>Further information:</strong></p><ol><li>Watch: <a href="https://www.youtube.com/watch?v=xZGIkfKz3sE&feature=emb_title">Shedding light on the legislative response to the Texas blackouts. </a></li><li>Testimony: <a href="https://www.rstreet.org/wp-content/uploads/2021/03/Final-SST-Testimony_for-Editorial-review-Caroline-Kitchens.pdf">The House Committee on Science, Space and Technology hearing on "Lessons learned from the Texas blackouts: Research needs for a secure and resilient grid." </a></li></ol><p> </p>
]]></content:encoded>
      <enclosure length="31157299" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/94e1739b-736e-449b-bcca-c82980e91fae/audio/dde812e9-c032-4043-a131-89073f4e5b5d/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>ERCOT and the Texas Power Outage</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:32:23</itunes:duration>
      <itunes:summary>In February, severe winter storms and an electricity generation failure left almost 5 million people in Texas without power, leading to hundreds of deaths, and a shortage of heat, food and water. The Electric Reliability Council of Texas (ERCOT) manages the flow of electric power to more than 26 million Texas customers. How did the massive power failure happen? What does this power outage suggest about the resilience of our critical infrastructure? 

Beth Garza, former director of ERCOT and senior fellow at the R Street Institute, answers these questions and more. Over the course of her 35-year career in the electric utility industry, Beth Garza has held a variety of leadership roles in generation and transmission planning, system operations, regulatory affairs and market design for both regulated and competitive entities.  </itunes:summary>
      <itunes:subtitle>In February, severe winter storms and an electricity generation failure left almost 5 million people in Texas without power, leading to hundreds of deaths, and a shortage of heat, food and water. The Electric Reliability Council of Texas (ERCOT) manages the flow of electric power to more than 26 million Texas customers. How did the massive power failure happen? What does this power outage suggest about the resilience of our critical infrastructure? 

Beth Garza, former director of ERCOT and senior fellow at the R Street Institute, answers these questions and more. Over the course of her 35-year career in the electric utility industry, Beth Garza has held a variety of leadership roles in generation and transmission planning, system operations, regulatory affairs and market design for both regulated and competitive entities.  </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">95c5e627-55d3-4fd8-bd4a-a62321875b51</guid>
      <title>Department of Defense Policy and ICS Security</title>
      <description><![CDATA[<p>Daryl Haegley is the Director of Cyberspace Mission Assurance and Deterrence at the Department of Defense. Daryl oversees cybersecurity efforts to secure control systems (ICS) and operational technology (OT), and focuses on bringing awareness to the ever-increasing cyber threats. He has 30 years of military, civilian and commercial consulting experience. He has successfully advocated to change laws, DoD policy and standards, and academic curricula while initiating the first comprehensive facilities related control systems cybersecurity program of its kind within the federal government.</p><p>"We're going to see despite investments, despite technology, we're going to see some  ransomware on some of these critical infrastructure systems. And I think people are going to get hurt. Things are going to stop operating. Things are going to explode and there's going to be some serious consequences." </p>
]]></description>
      <pubDate>Mon, 31 May 2021 16:01:46 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/department-of-defense-policy-and-ics-security-pnzh1i8Z</link>
      <content:encoded><![CDATA[<p>Daryl Haegley is the Director of Cyberspace Mission Assurance and Deterrence at the Department of Defense. Daryl oversees cybersecurity efforts to secure control systems (ICS) and operational technology (OT), and focuses on bringing awareness to the ever-increasing cyber threats. He has 30 years of military, civilian and commercial consulting experience. He has successfully advocated to change laws, DoD policy and standards, and academic curricula while initiating the first comprehensive facilities related control systems cybersecurity program of its kind within the federal government.</p><p>"We're going to see despite investments, despite technology, we're going to see some  ransomware on some of these critical infrastructure systems. And I think people are going to get hurt. Things are going to stop operating. Things are going to explode and there's going to be some serious consequences." </p>
]]></content:encoded>
      <enclosure length="43304221" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/d9c88a26-f5a9-44c3-ad43-01fa8a34654c/audio/49ff4edd-56a3-4437-9b03-5a33fef5e838/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Department of Defense Policy and ICS Security</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:45:02</itunes:duration>
      <itunes:summary>Daryl Haegley is the Director of Cyberspace Mission Assurance and Deterrence at the Department of Defense. Daryl oversees cybersecurity efforts to secure control systems (ICS) and operational technology (OT), and focuses on bringing awareness to the ever-increasing cyber threats. He has 30 years of military, civilian and commercial consulting experience. He has successfully advocated to change laws, DoD policy and standards, and academic curricula while initiating the first comprehensive facilities related control systems cybersecurity program of its kind within the federal government.

&quot;We&apos;re going to see despite investments, despite technology, we&apos;re going to see some  ransomware on some of these critical infrastructure systems. And I think people are going to get hurt. Things are going to stop operating. Things are going to explode and there&apos;s going to be some serious consequences.&quot; </itunes:summary>
      <itunes:subtitle>Daryl Haegley is the Director of Cyberspace Mission Assurance and Deterrence at the Department of Defense. Daryl oversees cybersecurity efforts to secure control systems (ICS) and operational technology (OT), and focuses on bringing awareness to the ever-increasing cyber threats. He has 30 years of military, civilian and commercial consulting experience. He has successfully advocated to change laws, DoD policy and standards, and academic curricula while initiating the first comprehensive facilities related control systems cybersecurity program of its kind within the federal government.

&quot;We&apos;re going to see despite investments, despite technology, we&apos;re going to see some  ransomware on some of these critical infrastructure systems. And I think people are going to get hurt. Things are going to stop operating. Things are going to explode and there&apos;s going to be some serious consequences.&quot; </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9c27af03-c441-472b-8ff2-5f702093d7bd</guid>
      <title>The Congressman, The Commission, and Our Critical Infrastructure</title>
      <description><![CDATA[<blockquote><p>Congressman Mike Gallagher (R-Wis.) has been instrumental in setting up the Cyberspace Solarium Commission, a bipartisan, intragovernmental body whose goal is to help create a strategic approach to defending the United States from cyber attacks of significant consequence (and for listeners of this podcast, that definitely means attacks on our critical infrastructure). Congressman Gallagher's background in the Marines, and work in the public and private sectors, gives him a unique position to help create law around the intersection of national security and cybersecurity as the two become "kitchen table issues", as he tells his constituents. </p></blockquote>
]]></description>
      <pubDate>Mon, 26 Apr 2021 15:05:11 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/the-congressman-the-commission-and-our-critical-infrastructure-5lvhfg7K</link>
      <content:encoded><![CDATA[<blockquote><p>Congressman Mike Gallagher (R-Wis.) has been instrumental in setting up the Cyberspace Solarium Commission, a bipartisan, intragovernmental body whose goal is to help create a strategic approach to defending the United States from cyber attacks of significant consequence (and for listeners of this podcast, that definitely means attacks on our critical infrastructure). Congressman Gallagher's background in the Marines, and work in the public and private sectors, gives him a unique position to help create law around the intersection of national security and cybersecurity as the two become "kitchen table issues", as he tells his constituents. </p></blockquote>
]]></content:encoded>
      <enclosure length="54466391" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/817311dd-8c81-4a62-a73b-71af7f29ca7e/audio/b1334f27-f5aa-4faa-819c-2fd5bbe76bf5/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>The Congressman, The Commission, and Our Critical Infrastructure</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:56:38</itunes:duration>
      <itunes:summary>Congressman Mike Gallagher (R-Wis.) has been instrumental in setting up the Cyberspace Solarium Commission, a bipartisan, intragovernmental body whose goal is to help create a strategic approach to defending the United States from cyber attacks of significant consequence (and for listeners of this podcast, that definitely means attacks on our critical infrastructure). Congressman Gallagher&apos;s background in the Marines, and work in the public and private sectors, gives him a unique position to help create law around the intersection of national security and cybersecurity as the two become &quot;kitchen table issues&quot;, as he tells his constituents. </itunes:summary>
      <itunes:subtitle>Congressman Mike Gallagher (R-Wis.) has been instrumental in setting up the Cyberspace Solarium Commission, a bipartisan, intragovernmental body whose goal is to help create a strategic approach to defending the United States from cyber attacks of significant consequence (and for listeners of this podcast, that definitely means attacks on our critical infrastructure). Congressman Gallagher&apos;s background in the Marines, and work in the public and private sectors, gives him a unique position to help create law around the intersection of national security and cybersecurity as the two become &quot;kitchen table issues&quot;, as he tells his constituents. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">30c39158-f449-4ca5-888d-305376fc8263</guid>
      <title>On the Front Lines with Rob Lee</title>
      <description><![CDATA[<p>Rob Lee, the CEO and founder of the industrial cybersecurity company, Dragos, is a pioneer in the ICS threat intelligence and incident response community. Before Dragos, Rob served as a cyber operations officer in the U.S. Air Force tasked to the National Security Agency, helping protect industrial infrastructure - an issue that leaders around the world are now wrestling with. As he likes to put it, "The threat is worse than you realize but not as bad as you want to imagine."</p>
]]></description>
      <pubDate>Mon, 29 Mar 2021 18:21:22 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/on-the-front-lines-with-rob-lee-2_vNDvJ8</link>
      <content:encoded><![CDATA[<p>Rob Lee, the CEO and founder of the industrial cybersecurity company, Dragos, is a pioneer in the ICS threat intelligence and incident response community. Before Dragos, Rob served as a cyber operations officer in the U.S. Air Force tasked to the National Security Agency, helping protect industrial infrastructure - an issue that leaders around the world are now wrestling with. As he likes to put it, "The threat is worse than you realize but not as bad as you want to imagine."</p>
]]></content:encoded>
      <enclosure length="44188392" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/3bbd8005-755d-4473-b26b-1ed3a673b92b/audio/4d7fe7cd-334b-4543-adb7-dafdedfaa915/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>On the Front Lines with Rob Lee</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:45:57</itunes:duration>
      <itunes:summary>Rob Lee, the CEO and founder of the industrial cybersecurity company, Dragos, is a pioneer in the ICS threat intelligence and incident response community. Before Dragos, Rob served as a cyber operations officer in the U.S. Air Force tasked to the National Security Agency, helping protect industrial infrastructure - an issue that leaders around the world are now wrestling with. As he likes to put it, &quot;The threat is worse than you realize but not as bad as you want to imagine.&quot;</itunes:summary>
      <itunes:subtitle>Rob Lee, the CEO and founder of the industrial cybersecurity company, Dragos, is a pioneer in the ICS threat intelligence and incident response community. Before Dragos, Rob served as a cyber operations officer in the U.S. Air Force tasked to the National Security Agency, helping protect industrial infrastructure - an issue that leaders around the world are now wrestling with. As he likes to put it, &quot;The threat is worse than you realize but not as bad as you want to imagine.&quot;</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">950d5be7-c567-4382-85a1-5014da548be1</guid>
      <title>DoD and Critical Infrastructure</title>
      <description><![CDATA[<p>The Army Cyber Institute has been testing the cybersecurity preparedness of cities around the country in an experiment called Jack Voltaic. It is a major, multi-sector public private exercise aimed at understanding critical infrastructure dependencies on force deployment. We're joined by Lt. Col. Douglas Fletcher - chief data scientist - and Lt. Col Erica Mitchell - key resources research lead for critical infrastructure - to talk about their findings. </p>
]]></description>
      <pubDate>Mon, 22 Feb 2021 13:04:15 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/dod-and-critical-infrastructure-KQRCBZha</link>
      <content:encoded><![CDATA[<p>The Army Cyber Institute has been testing the cybersecurity preparedness of cities around the country in an experiment called Jack Voltaic. It is a major, multi-sector public private exercise aimed at understanding critical infrastructure dependencies on force deployment. We're joined by Lt. Col. Douglas Fletcher - chief data scientist - and Lt. Col Erica Mitchell - key resources research lead for critical infrastructure - to talk about their findings. </p>
]]></content:encoded>
      <enclosure length="40458198" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/41dc1fd3-365e-40e7-a5bb-ebca3ad3f07c/audio/fdd362a7-4250-4154-a331-700a71a7acbd/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>DoD and Critical Infrastructure</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:41:59</itunes:duration>
      <itunes:summary>The Army Cyber Institute has been testing the cybersecurity preparedness of cities around the country in an experiment called Jack Voltaic. It is a major, multi-sector public private exercise aimed at understanding critical infrastructure dependencies on force deployment. We&apos;re joined by Lt. Col. Douglas Fletcher - chief data scientist - and Lt. Col Erica Mitchell - key resources research lead for critical infrastructure - to talk about their findings. </itunes:summary>
      <itunes:subtitle>The Army Cyber Institute has been testing the cybersecurity preparedness of cities around the country in an experiment called Jack Voltaic. It is a major, multi-sector public private exercise aimed at understanding critical infrastructure dependencies on force deployment. We&apos;re joined by Lt. Col. Douglas Fletcher - chief data scientist - and Lt. Col Erica Mitchell - key resources research lead for critical infrastructure - to talk about their findings. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">479e5490-24b5-4039-9cc9-780e0187984f</guid>
      <title>Critical Infrastructure Protection &amp; ICS</title>
      <description><![CDATA[<p>For today's episode, I'm joined by Dale Peterson, who is on the leading edge of helping security conscious asset owners in a range of sectors effectively manage and reduce cyber risk to their Industrial Control Systems (known as an “ICS”). ICS is a computer system that monitors or controls a physical process. They  exist everywhere: power generation, water supply systems, transmission, product manufacturing. We talk today about some of the key cyber vulnerabilities in these systems, and the relationship between the government and the private sector, how CEOs and other decision makers should evaluate and deploy resources to deal with ICS cyber threats, and the importance of regulators developing metrics for improving cyber security relative to ICS systems.</p><p> </p>
]]></description>
      <pubDate>Tue, 26 Jan 2021 14:50:42 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/critical-infrastructure-protection-ics-YafBMqH_</link>
      <content:encoded><![CDATA[<p>For today's episode, I'm joined by Dale Peterson, who is on the leading edge of helping security conscious asset owners in a range of sectors effectively manage and reduce cyber risk to their Industrial Control Systems (known as an “ICS”). ICS is a computer system that monitors or controls a physical process. They  exist everywhere: power generation, water supply systems, transmission, product manufacturing. We talk today about some of the key cyber vulnerabilities in these systems, and the relationship between the government and the private sector, how CEOs and other decision makers should evaluate and deploy resources to deal with ICS cyber threats, and the importance of regulators developing metrics for improving cyber security relative to ICS systems.</p><p> </p>
]]></content:encoded>
      <enclosure length="38275599" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/4f89c387-424b-48c1-a1e7-bcd6b7f31b1d/audio/05d04635-fc35-4ebf-965b-e95bddabcec9/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Critical Infrastructure Protection &amp; ICS</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:39:30</itunes:duration>
      <itunes:summary>Dale Peterson is on the leading edge of helping security conscious asset owners in a range of sectors effectively manage and reduce cyber risk to their Industrial Control Systems (known as an “ICS”). ICS is a computer system that monitors or controls a physical process. They  exist everywhere: power generation, water supply systems, transmission, product manufacturing. We talk today about some of the key cyber vulnerabilities in these systems, and the relationship between the government and the private sector, how CEOs and other decision makers should evaluate and deploy resources to deal with ICS cyber threats, and the importance of regulators developing metrics for improving cyber security relative to ICS systems.
</itunes:summary>
      <itunes:subtitle>Dale Peterson is on the leading edge of helping security conscious asset owners in a range of sectors effectively manage and reduce cyber risk to their Industrial Control Systems (known as an “ICS”). ICS is a computer system that monitors or controls a physical process. They  exist everywhere: power generation, water supply systems, transmission, product manufacturing. We talk today about some of the key cyber vulnerabilities in these systems, and the relationship between the government and the private sector, how CEOs and other decision makers should evaluate and deploy resources to deal with ICS cyber threats, and the importance of regulators developing metrics for improving cyber security relative to ICS systems.
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d3ddb460-ab9a-429f-bf9d-51ec3200e957</guid>
      <title>Critical Response for Critical Infrastructure</title>
      <description><![CDATA[<blockquote><p>Megan Samford is the first woman Chief Product Security Officer in industrial control systems (ICS) manufacturing. She's spent time in both the private and public sectors, from Rockwell Automation and General Electric to serving two governors of Virginia and their offices of homeland security. She is also spearheading a project to develop a common language and framework for cyber security between governments, private sector and first responders in the space. Or, as she puts it: "I believe that every other type of responder in the world, whether you're a firefighter or a police officer, or a medic...there is a framework by which you could literally be picked up an airlifted and dropped into another organization or locality or state or government really, and you would seemingly know how to fall in line with the common framework to respond alongside your peers. But within cyber, it's very schizophrenic, it's very disparate, and it's largely based on the needs of individual companies."</p></blockquote>
]]></description>
      <pubDate>Mon, 28 Dec 2020 15:15:36 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/critical-response-for-critical-infrastructure-WmLbfS1W</link>
      <content:encoded><![CDATA[<blockquote><p>Megan Samford is the first woman Chief Product Security Officer in industrial control systems (ICS) manufacturing. She's spent time in both the private and public sectors, from Rockwell Automation and General Electric to serving two governors of Virginia and their offices of homeland security. She is also spearheading a project to develop a common language and framework for cyber security between governments, private sector and first responders in the space. Or, as she puts it: "I believe that every other type of responder in the world, whether you're a firefighter or a police officer, or a medic...there is a framework by which you could literally be picked up an airlifted and dropped into another organization or locality or state or government really, and you would seemingly know how to fall in line with the common framework to respond alongside your peers. But within cyber, it's very schizophrenic, it's very disparate, and it's largely based on the needs of individual companies."</p></blockquote>
]]></content:encoded>
      <enclosure length="33463304" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/fcaf9b23-f329-4c27-8155-d9328c3a0020/audio/6171590d-7dd8-4bd2-bf80-8864e2c74a08/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Critical Response for Critical Infrastructure</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:34:48</itunes:duration>
      <itunes:summary>Megan Samford is the first woman Chief Product Security Officer in industrial control systems (ICS) manufacturing. She&apos;s spent time in both the private and public sectors, from Rockwell Automation and General Electric to serving two governors of Virginia and their offices of homeland security. She is also spearheading a project to develop a common language and framework for cyber security between governments, private sector and first responders in the space. Or, as she puts it: &quot;I believe that every other type of responder in the world, whether you&apos;re a firefighter or a police officer, or a medic...there is a framework by which you could literally be picked up an airlifted and dropped into another organization or locality or state or government really, and you would seemingly know how to fall in line with the common framework to respond alongside your peers. But within cyber, it&apos;s very schizophrenic, it&apos;s very disparate, and it&apos;s largely based on the needs of individual companies.&quot;</itunes:summary>
      <itunes:subtitle>Megan Samford is the first woman Chief Product Security Officer in industrial control systems (ICS) manufacturing. She&apos;s spent time in both the private and public sectors, from Rockwell Automation and General Electric to serving two governors of Virginia and their offices of homeland security. She is also spearheading a project to develop a common language and framework for cyber security between governments, private sector and first responders in the space. Or, as she puts it: &quot;I believe that every other type of responder in the world, whether you&apos;re a firefighter or a police officer, or a medic...there is a framework by which you could literally be picked up an airlifted and dropped into another organization or locality or state or government really, and you would seemingly know how to fall in line with the common framework to respond alongside your peers. But within cyber, it&apos;s very schizophrenic, it&apos;s very disparate, and it&apos;s largely based on the needs of individual companies.&quot;</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b352e6fe-2cf5-468b-8b6e-a19f8814c9a2</guid>
      <title>BEER and Cyber</title>
      <description><![CDATA[<p>Patrick Miller sits at the intersection of cybersecurity and regulation because, as he likes to say, "those two don't fit well." Beyond his decades of work in the space, he also co-founded BEER-ISAC, a network of individuals who comprise the human component of critical infrastructure security. They share war stories, information, intelligence and - as the name says - drinks. In this episode, Patrick explains the difference between compliance and security in the evolving space defending critical infrastructure.</p>
]]></description>
      <pubDate>Tue, 1 Dec 2020 20:13:27 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/beer-and-cyber-A1SxSq8B</link>
      <content:encoded><![CDATA[<p>Patrick Miller sits at the intersection of cybersecurity and regulation because, as he likes to say, "those two don't fit well." Beyond his decades of work in the space, he also co-founded BEER-ISAC, a network of individuals who comprise the human component of critical infrastructure security. They share war stories, information, intelligence and - as the name says - drinks. In this episode, Patrick explains the difference between compliance and security in the evolving space defending critical infrastructure.</p>
]]></content:encoded>
      <enclosure length="35320868" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/5de834dc-18a5-4da4-8404-34595aa48a4a/audio/4c73a5d2-9158-464a-ac3e-f6a574e4f77a/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>BEER and Cyber</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:36:42</itunes:duration>
      <itunes:summary>Patrick Miller sits at the intersection of cybersecurity and regulation because, as he likes to say, &quot;those two don&apos;t fit well.&quot; Beyond his decades of work in the space, he also co-founded BEER-ISAC, a network of individuals who comprise the human component of critical infrastructure security. They share war stories, information, intelligence and - as the name says - drinks. In this episode, Patrick explains the difference between compliance and security in the evolving space defending critical infrastructure. </itunes:summary>
      <itunes:subtitle>Patrick Miller sits at the intersection of cybersecurity and regulation because, as he likes to say, &quot;those two don&apos;t fit well.&quot; Beyond his decades of work in the space, he also co-founded BEER-ISAC, a network of individuals who comprise the human component of critical infrastructure security. They share war stories, information, intelligence and - as the name says - drinks. In this episode, Patrick explains the difference between compliance and security in the evolving space defending critical infrastructure. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6791186f-586d-416e-8c02-5f1ba895cbdb</guid>
      <title>Oil, Gas and Cybersecurity in the Middle East</title>
      <description><![CDATA[<p>"Securing and having the right measures of cybersecurity relates to the national security of the whole country and our national income." Reem Al-Shammari is the chief information security officer for the Kuwait Oil Company. She sits at the intersection of a massive swath of her country's economy - oil and gas - and the need to secure it against emerging threats faster than government regulations can be established. Because Al-Shammari works within a global industry, she also has to help ensure cross-border information sharing frameworks and practices for the six Gulf countries to stay one step ahead of bad actors.</p>
]]></description>
      <pubDate>Mon, 26 Oct 2020 10:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/oil-gas-and-cybersecurity-yE_HUzAA</link>
      <content:encoded><![CDATA[<p>"Securing and having the right measures of cybersecurity relates to the national security of the whole country and our national income." Reem Al-Shammari is the chief information security officer for the Kuwait Oil Company. She sits at the intersection of a massive swath of her country's economy - oil and gas - and the need to secure it against emerging threats faster than government regulations can be established. Because Al-Shammari works within a global industry, she also has to help ensure cross-border information sharing frameworks and practices for the six Gulf countries to stay one step ahead of bad actors.</p>
]]></content:encoded>
      <enclosure length="41043679" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/24fe3375-2ba1-4dff-a8df-f53d1a95f373/audio/089a7edf-b30f-40bb-8619-37a948e7ff51/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Oil, Gas and Cybersecurity in the Middle East</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:42:40</itunes:duration>
      <itunes:summary>&quot;Securing and having the right measures of cybersecurity relates to the national security of the whole country and our national income.&quot; Reem Al-Shammari is the chief information security officer for the Kuwait Oil Company. She sits at the intersection of a massive swath of her country&apos;s economy - oil and gas - and the need to secure it against emerging threats faster than government regulations can be established. Because Al-Shammari works within a global industry, she also has to help ensure cross-border information sharing frameworks and practices for the six Gulf countries to stay one step ahead of bad actors.</itunes:summary>
      <itunes:subtitle>&quot;Securing and having the right measures of cybersecurity relates to the national security of the whole country and our national income.&quot; Reem Al-Shammari is the chief information security officer for the Kuwait Oil Company. She sits at the intersection of a massive swath of her country&apos;s economy - oil and gas - and the need to secure it against emerging threats faster than government regulations can be established. Because Al-Shammari works within a global industry, she also has to help ensure cross-border information sharing frameworks and practices for the six Gulf countries to stay one step ahead of bad actors.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1c40a024-f9e3-4bf5-81a0-67f502760915</guid>
      <title>The Nightmare: A Story by AI</title>
      <description><![CDATA[<p>The second half of our interview with author and strategist P.W. Singer. He discusses his latest book - Burn In - where he translates real-world research about Artificial Intelligence into a glimpse at a future we’re not too far away from if things go wrong and we do not protect ourselves.</p><p>"In our lifetime for the next year 10 or 20 years, artificial intelligence is not about a rebellion of the robots (a-la the Terminator). It's industrial revolution. It's a rewiring of business, military, the economy, our society with AI and automation in all its various forms...In these scenarios, AI is not just about prediction, it's also about influence."</p>
]]></description>
      <pubDate>Mon, 19 Oct 2020 09:00:00 +0000</pubDate>
      <author>tyler@returnonideas.co ( ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/the-nightmare-a-story-by-ai-kMYnHVZZ</link>
      <content:encoded><![CDATA[<p>The second half of our interview with author and strategist P.W. Singer. He discusses his latest book - Burn In - where he translates real-world research about Artificial Intelligence into a glimpse at a future we’re not too far away from if things go wrong and we do not protect ourselves.</p><p>"In our lifetime for the next year 10 or 20 years, artificial intelligence is not about a rebellion of the robots (a-la the Terminator). It's industrial revolution. It's a rewiring of business, military, the economy, our society with AI and automation in all its various forms...In these scenarios, AI is not just about prediction, it's also about influence."</p>
]]></content:encoded>
      <enclosure length="32809084" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/7b0b59c1-bcc1-4593-bb65-30cd3c023c30/audio/dab7be1f-7279-42fb-8b1c-e41bc03c1c70/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>The Nightmare: A Story by AI</itunes:title>
      <itunes:author> ICS Village</itunes:author>
      <itunes:duration>00:34:06</itunes:duration>
      <itunes:summary>The second half of our interview with author and strategist P.W. Singer. He discusses his latest book - Burn In - where he translates real-world research about Artificial Intelligence into a glimpse at a future we’re not too far away from if things go wrong and we do not protect ourselves.

&quot;In our lifetime for the next year 10 or 20 years, artificial intelligence is not about a rebellion of the robots (a-la the Terminator). It&apos;s industrial revolution. It&apos;s a rewiring of business, military, the economy, our society with AI and automation in all its various forms...In these scenarios, AI is not just about prediction, it&apos;s also about influence.&quot;</itunes:summary>
      <itunes:subtitle>The second half of our interview with author and strategist P.W. Singer. He discusses his latest book - Burn In - where he translates real-world research about Artificial Intelligence into a glimpse at a future we’re not too far away from if things go wrong and we do not protect ourselves.

&quot;In our lifetime for the next year 10 or 20 years, artificial intelligence is not about a rebellion of the robots (a-la the Terminator). It&apos;s industrial revolution. It&apos;s a rewiring of business, military, the economy, our society with AI and automation in all its various forms...In these scenarios, AI is not just about prediction, it&apos;s also about influence.&quot;</itunes:subtitle>
      <itunes:keywords>work, ai, industry, artificial intelligence</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4fe5a5c3-4792-434f-bd7c-6b56a45e0654</guid>
      <title>Where is the Cavalry?</title>
      <description><![CDATA[<p>Hackers may be our best, last hope as our dependence on connected technology is increasing faster than our ability to safeguard ourselves. This episode you will learn about I Am the Cavalry - a volunteer organization of cybersecurity experts devoted to improving the security of medical devices, transportation, connected homes, and infrastructure - and its co-founder, Joshua Corman, who serves as an ambassador between the security community and federal officials protecting us on the front lines. </p>
]]></description>
      <pubDate>Mon, 28 Sep 2020 09:00:13 +0000</pubDate>
      <author>tyler@returnonideas.co (ICS Village, R Street Institute)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/where-is-the-cavalry-PH7vEbR0</link>
      <content:encoded><![CDATA[<p>Hackers may be our best, last hope as our dependence on connected technology is increasing faster than our ability to safeguard ourselves. This episode you will learn about I Am the Cavalry - a volunteer organization of cybersecurity experts devoted to improving the security of medical devices, transportation, connected homes, and infrastructure - and its co-founder, Joshua Corman, who serves as an ambassador between the security community and federal officials protecting us on the front lines. </p>
]]></content:encoded>
      <enclosure length="47559006" type="audio/mpeg" url="https://cdn.simplecast.com/audio/9193113e-9824-4707-94c5-96b5f57c1396/episodes/dadf50c0-7f59-428f-ad8b-badb7d838ea5/audio/f765cfc9-3f89-4a2e-9040-dc1aac69a38e/default_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Where is the Cavalry?</itunes:title>
      <itunes:author>ICS Village, R Street Institute</itunes:author>
      <itunes:duration>00:49:27</itunes:duration>
      <itunes:summary>Hackers may be our best, last hope as our dependence on connected technology is increasing faster than our ability to safeguard ourselves. This episode you will learn about I Am the Cavalry - a volunteer organization of cybersecurity experts devoted to improving the security of medical devices, transportation, connected homes, and infrastructure - and its co-founder, Joshua Corman, who serves as an ambassador between the security community and federal officials protecting us on the front lines. </itunes:summary>
      <itunes:subtitle>Hackers may be our best, last hope as our dependence on connected technology is increasing faster than our ability to safeguard ourselves. This episode you will learn about I Am the Cavalry - a volunteer organization of cybersecurity experts devoted to improving the security of medical devices, transportation, connected homes, and infrastructure - and its co-founder, Joshua Corman, who serves as an ambassador between the security community and federal officials protecting us on the front lines. </itunes:subtitle>
      <itunes:keywords>medical devices, hackers, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">77db736f-9833-4bc6-83e6-64290244b442</guid>
      <title>The Future of War with P.W. Singer</title>
      <description><![CDATA[<p>“Our dependence on connected technology is growing faster than our ability to secure it, especially in areas affecting public safety and human life.” Author and strategist P.W. Singer examines the future of war, and explains the difficulty in securing critical infrastructure against cyber attacks and technologies that are cheaper and easier for foreign and non-state actors to acquire. He also discusses how he uses the "technothriller" novel type to communicate his nonfiction research to more audiences.</p><p>---</p><p>Learn more about the R Street Institute at <a href="www.rstreet.org">www.rstreet.org</a> and follow them on Twitter <a href="www.twitter.com/rsi">@RSI</a>. </p><p>Learn more about ICS Village at <a href="https://www.icsvillage.com/">www.icsvillage.com</a> and follow them on Twitter <a href="www.twitter.com/ICS_Village">@ICS_Village</a>.  </p><p>Learn more about P.W. Singer at <a href="https://www.pwsinger.com/">www.pwsinger.com</a> and follow him on Twitter <a href="https://twitter.com/peterwsinger">@peterwsinger</a>. He is strategist and senior fellow at New America and the author of several books including <i>Ghost Fleet, Burn-in, LikeWar, Wired for War, Corporate Warriors, </i>and others. </p>
]]></description>
      <pubDate>Mon, 31 Aug 2020 19:00:17 +0000</pubDate>
      <author>tyler@returnonideas.co (R Street Institute, ICS Village)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/the-future-of-war-with-pw-singer-r4UDxW7O</link>
      <content:encoded><![CDATA[<p>“Our dependence on connected technology is growing faster than our ability to secure it, especially in areas affecting public safety and human life.” Author and strategist P.W. Singer examines the future of war, and explains the difficulty in securing critical infrastructure against cyber attacks and technologies that are cheaper and easier for foreign and non-state actors to acquire. He also discusses how he uses the "technothriller" novel type to communicate his nonfiction research to more audiences.</p><p>---</p><p>Learn more about the R Street Institute at <a href="www.rstreet.org">www.rstreet.org</a> and follow them on Twitter <a href="www.twitter.com/rsi">@RSI</a>. </p><p>Learn more about ICS Village at <a href="https://www.icsvillage.com/">www.icsvillage.com</a> and follow them on Twitter <a href="www.twitter.com/ICS_Village">@ICS_Village</a>.  </p><p>Learn more about P.W. Singer at <a href="https://www.pwsinger.com/">www.pwsinger.com</a> and follow him on Twitter <a href="https://twitter.com/peterwsinger">@peterwsinger</a>. He is strategist and senior fellow at New America and the author of several books including <i>Ghost Fleet, Burn-in, LikeWar, Wired for War, Corporate Warriors, </i>and others. </p>
]]></content:encoded>
      <enclosure length="37322889" type="audio/mpeg" url="https://cdn.simplecast.com/audio/919311/9193113e-9824-4707-94c5-96b5f57c1396/79a88944-d4dc-494f-a61e-4cd59f443f70/htp-pw-singer-pt-01-ghost-fleet-and-the-future-of-war-v02_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>The Future of War with P.W. Singer</itunes:title>
      <itunes:author>R Street Institute, ICS Village</itunes:author>
      <itunes:duration>00:38:47</itunes:duration>
      <itunes:summary>“Our dependence on connected technology is growing faster than our ability to secure it, especially in areas affecting public safety and human life.” Author and strategist P.W. Singer examines the future of war, and explains the difficulty in securing critical infrastructure against cyber attacks and technologies that are cheaper and easier for foreign and non-state actors to acquire. He also discusses how he uses the &quot;technothriller&quot; novel type to communicate his nonfiction research to more audiences.</itunes:summary>
      <itunes:subtitle>“Our dependence on connected technology is growing faster than our ability to secure it, especially in areas affecting public safety and human life.” Author and strategist P.W. Singer examines the future of war, and explains the difficulty in securing critical infrastructure against cyber attacks and technologies that are cheaper and easier for foreign and non-state actors to acquire. He also discusses how he uses the &quot;technothriller&quot; novel type to communicate his nonfiction research to more audiences.</itunes:subtitle>
      <itunes:keywords>cyberspace, technology, critical infrastructure, war, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1105f52a-3847-40cc-877c-8fbf662c3094</guid>
      <title>Trailer - Hack the Plant</title>
      <description><![CDATA[<p>Learn more about ICS village at <a href="https://www.icsvillage.com/">http://www.icsvillage.com</a>. </p><p>Learn more about the R Street Institute at <a href="www.rstreet.org/">http://www.rstreet.org</a>. </p><p>Follow Bryson Bort on Twitter <a href="https://twitter.com/brysonbort">@BrysonBort</a>. </p><p>Follow the R Street Institute on Twitter <a href="www.twitter.com/rsi">@RSI</a>.</p>
]]></description>
      <pubDate>Sat, 22 Aug 2020 14:07:43 +0000</pubDate>
      <author>tyler@returnonideas.co (Bryson Bort)</author>
      <link>https://hack-the-plant.simplecast.com/episodes/trailer-hack-the-plant-d51FF5UQ</link>
      <content:encoded><![CDATA[<p>Learn more about ICS village at <a href="https://www.icsvillage.com/">http://www.icsvillage.com</a>. </p><p>Learn more about the R Street Institute at <a href="www.rstreet.org/">http://www.rstreet.org</a>. </p><p>Follow Bryson Bort on Twitter <a href="https://twitter.com/brysonbort">@BrysonBort</a>. </p><p>Follow the R Street Institute on Twitter <a href="www.twitter.com/rsi">@RSI</a>.</p>
]]></content:encoded>
      <enclosure length="2214162" type="audio/mpeg" url="https://cdn.simplecast.com/audio/919311/9193113e-9824-4707-94c5-96b5f57c1396/039f7eaf-3d2f-4880-b433-8eefb8428f22/htp-brand-intro-v03_tc.mp3?aid=rss_feed&amp;feed=iTYwWFdE"/>
      <itunes:title>Trailer - Hack the Plant</itunes:title>
      <itunes:author>Bryson Bort</itunes:author>
      <itunes:duration>00:02:17</itunes:duration>
      <itunes:summary>Electricity.
Finance.
Transportation.
Our water supply.

We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function.

In Hack the Plan[e]t, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? 

Because an attack on our critical infrastructure, the degradation to the point that they can no longer support us, means that we go back to the stone age, literally overnight.

Hack the Plan[e]t is a podcast of the R Street Institute, a free market think tank in Washington D.C., and ICS Village, a nonprofit that equips industry experts and policymakers with the tools to better defend our critical infrastructure. It is hosted by veteran cybersecurity expert Bryson Bort.
</itunes:summary>
      <itunes:subtitle>Electricity.
Finance.
Transportation.
Our water supply.

We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function.

In Hack the Plan[e]t, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? 

Because an attack on our critical infrastructure, the degradation to the point that they can no longer support us, means that we go back to the stone age, literally overnight.

Hack the Plan[e]t is a podcast of the R Street Institute, a free market think tank in Washington D.C., and ICS Village, a nonprofit that equips industry experts and policymakers with the tools to better defend our critical infrastructure. It is hosted by veteran cybersecurity expert Bryson Bort.
</itunes:subtitle>
      <itunes:keywords>technology, r street institute, cyber security, critical infrastructure, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>