Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
PrOTect It All

PrOTect It All

Aaron Crow

1 Creator

1 Creator

Welcome to "PrOTect It All," the podcast where we peel back the layers of cybersecurity to reveal the core strategies, challenges, and triumphs of protecting our digital and operational landscapes. We're thrilled to have you on board for an upcoming episode! Your insights and experiences are invaluable to our listeners who are eager to learn and engage with the leading minds in IT and OT security. As we gear up to dive into conversation, please feel free to share any specific topics or stories you'd like to discuss. Our audience appreciates both the technical deep-dives and the high-level overviews, so bring your unique perspective, and let's make cybersecurity accessible and engaging together. Thank you for joining us on this journey to foster a more secure future. We can't wait to hear your voice on the "PrOTect It All" podcast!
bookmark
Share icon

All episodes

Best episodes

Top 10 PrOTect It All Episodes

Goodpods has curated a list of the 10 best PrOTect It All episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to PrOTect It All for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite PrOTect It All episode by adding your comments to the episode page.

With a focus on the OT Cyber Security recruitment space James is the Talent Solutions Director at NDK Cyber. NDK Cyber work with high-growth businesses in the USA, UK & EMEA to provide completely tailored cybersecurity talent attraction solutions. Specialising in long-term talent acquisition and strategy, we have mastered a blend of data insights, the latest technology and our own personal network mastered over 20+ years to build 100s of cybersecurity teams across the globe.

Summary

Hosted by: Aaron Crow

Guest: James Morris, Director, Talent Solutions at NDK Cyber

In this conversation, Aaron Crow and James Morris discuss the transition happening in the field of OT security, with a growing need for dedicated OT security engineers and teams. They explore the challenges of budgeting for OT security and the importance of building trust and collaboration between IT and OT departments. They also emphasize the value of cross-disciplinary skills and the need for apprenticeships and on-the-job training to address the skills gap in OT security. The conversation highlights the importance of translating cybersecurity into business risk and the role of education and community in promoting OT security. The conversation covers various topics related to job descriptions, hiring challenges, helping people enter the OT space, companies being more open to training and transferable skills, excitement for the future of OT security, concerns about AI and ML in cybersecurity, and the importance of OT security in uncertain times.

Takeaways

  • There is a growing need for dedicated OT security engineers and teams.
  • Building trust and collaboration between IT and OT departments is crucial for effective OT security.
  • Cross-disciplinary skills and apprenticeships can help address the skills gap in OT security.
  • Translating cybersecurity into business risk is essential for gaining budget and buy-in for OT security initiatives. Job descriptions should be written in a way that encourages more people to apply, focusing on transferable skills and being more inclusive.
  • Companies should be open to training and developing employees who have the desire and raw skills needed for the job.
  • The OT security space is growing rapidly, and there are opportunities for individuals to enter the field and for companies to hire the right talent.
  • There is excitement about the future of OT security, but concerns exist about the potential risks associated with AI and ML in cybersecurity.
  • In uncertain times, it is crucial for companies to prioritize OT security and not cut back on investments in this area.

Connect with James:

Connect with Aaron Crow:

Learn more about PrOTect IT All:

  • Email: [email protected]
  • Website: www.protectitall.co
  • X: https://twitter.com/protectitall
  • YouTube: https://www.youtube.com/@PrOTectITAll
  • FaceBook: https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at [email protected]

Show notes by NMP.

Audio production by NMP. We hear you loud and clear.

bookmark
plus icon
share episode

Kyle Peters is a recovering building automation and HVAC technician and programmer who was drawn to the dark side of cybersecurity and never looked back. Today he is the senior consultant for OT Cybersecurity, focusing on building automation systems at Intelligent Buildings. If you’d like to geek out on such things, reach out to Kyle via LinkedIn or email [email protected].

In this conversation, Kyle discusses the world of building management systems and the importance of cybersecurity in this field. He highlights the diversity of building systems and the interconnectedness of various components. The conversation emphasizes the need for a risk-based approach to security and the importance of policies and standards. Kyle also emphasizes the value of understanding the system and planning ahead to mitigate risks. The conversation concludes with a discussion on securing remote access and implementing segmentation. The conversation explores the lack of cybersecurity preparedness in organizations, the need to translate cybersecurity risks to business risks, the likelihood of attacks and targeting, the challenge of selling likely risks, exciting technological advances in cybersecurity, concerns about AI and rapid technological changes, and closing thoughts and a call to action.

Takeaways

Building management systems encompass a wide range of components, including HVAC systems, fire alarms, and lighting.

A risk-based approach to security is crucial in building management, considering the diverse systems and potential vulnerabilities.

Policies and standards play a significant role in ensuring the security and reliability of building management systems.

Simple solutions, such as proper cable management and backup plans, can greatly enhance the security and availability of building systems.

Understanding the system and planning ahead are essential for effective risk mitigation in building management.

Securing remote access and implementing segmentation are key measures to protect building management systems from cyber threats. Many organizations are not adequately prepared for cybersecurity threats, either due to limited budgets or lack of expertise.

It is important to translate cybersecurity risks into business risks to help organizations understand the potential impact on their operations.

Cyber attacks can come from various sources, including nation-state actors, but also from simple human errors or system failures.

Selling the importance of cybersecurity can be challenging, as the most likely risks may not be as sensational as nation-state attacks.

Exciting technological advances in cybersecurity are on the horizon, but they also bring concerns about the potential risks and implications of AI and rapid technological changes.

Connect with Kyle:

Connect with Aaron Crow:

Learn more about PrOTect IT All:

  • Email: [email protected]
  • Website: www.protectitall.co
  • X: https://twitter.com/protectitall
  • YouTube: https://www.youtube.com/@PrOTectITAll
  • FaceBook: https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at [email protected]

Show notes by NMP.

Audio production by NMP. We hear you loud and clear.

bookmark
plus icon
share episode

Hosted by: Aaron Crow

Guest: Clint Bodungen

Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 25+ years of experience (focusing primarily on industrial cybersecurity, red teaming, and risk assessment). He is the author of two books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook. Clint is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, and Kaspersky Lab, and is currently the co-founder and CEO of a cybersecurity training startup, ThreatGEN. Renowned for his creative approach to cybersecurity education and training, he has been at the forefront of integrating gamification and AI applications into cybersecurity training, creating his flagship product, “ThreatGEN® Red vs. Blue”, the world's first online multiplayer computer designed to teach real-world cybersecurity. His latest innovation is AutoTableTop, which uses the latest generative AI technology to automate, simplify, and revolution IR tabletop exercises. As AI technology continues to evolve, so too does his pursuit to help revolutionize the cybersecurity industry using generative AI and large language models (LLM).

Summary

In this conversation, Clint and Aaron discuss the value of tabletop exercises in cybersecurity and the development of auto tabletop, an AI-based tool for facilitating incident response tabletop exercises. They highlight the limitations of traditional tabletops and the benefits of using AI to enhance engagement and flexibility. They address concerns about AI in cybersecurity, such as data privacy and security, and emphasize the use of local language models to mitigate risks. They also discuss the future of AI in the industry and the workforce, emphasizing the importance of learning generative AI and prompt engineering for future job prospects. In this conversation, Clint discusses the automation of tasks using AI and the benefits of using AI as a tool to enhance human creativity. He also explores the future of AI and its potential for accelerating technological advancement. Clint acknowledges the concerns about the potential misuse of AI but emphasizes the importance of using it for good. He highlights the role of AI in reducing barriers to innovation and its significance in cybersecurity. Overall, the conversation highlights the transformative power of AI and its impact on various industries.

Takeaways

  • Tabletop exercises are important for testing incident response plans and should be conducted regularly for maximum effectiveness.
  • AI-based tabletop exercises, such as auto tabletop, offer increased engagement and flexibility compared to traditional tabletops.
  • Concerns about data privacy and security can be addressed by using local language models and fine-tuning models for specific tasks.
  • AI has the potential to enhance productivity and efficiency in the industry, but proper understanding and implementation are crucial.
  • Learning generative AI and prompt engineering can increase job prospects in the future. AI can automate menial tasks, allowing humans to focus on more valuable work.
  • AI has the potential to enhance human creativity and accelerate technological advancement.
  • The responsible use of AI is crucial to prevent misuse and ensure positive outcomes.
  • AI can reduce barriers to innovation and empower individuals to bring their ideas to life.

Connect with Clint Bodungen:

Connect with Aaron Crow:

Learn more about PrOTect IT All:

  • Email: [email protected]
  • Website: https://www.protectitall.co
  • X: https://twitter.com/protectitall
  • YouTube: https://www.youtube.com/@PrOTectITAll
  • FaceBook: https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at [email protected]

Show notes by NMP.

Audio production by NMP. We hear you loud and clear.

bookmark
plus icon
share episode

In this conversation, Ted Gutierrez, the leader of Security Gate, discusses the challenges and strategies in implementing cybersecurity solutions in the critical infrastructure sector. He emphasizes the importance of common language and frameworks to bridge the gap between IT and OT. Ted also highlights the need for asset owners to start slow and focus on key controls, rather than aiming for maturity level 5 in all control frameworks. He discusses the challenges of scaling OT compared to IT and the need for consolidation in the market. Ted concludes by emphasizing the power of saying no and focusing on specific goals. In this conversation, Ted Gutierrez discusses his concerns and excitement for the future of cybersecurity. He expresses concern about the global state of conflict and its impact on cybersecurity. He also discusses the balance between order and freedom in the cyber industry. On the positive side, Gutierrez is excited about the increasing focus on the business side of cybersecurity and the growing understanding of cyber as a business problem. He emphasizes the importance of non-technical leaders understanding cybersecurity. Overall, Gutierrez is confident in the people working to protect the globe.

About Ted Gutierrez

Ted Gutierrez is the CEO and Co-Founder of SecurityGate, the provider of the leading SaaS Platform for OT cyber improvement. He is dedicated to protecting what matters across operational sectors and aligning industrial cyber teams on their cyber improvement journey. With an extensive background as a compliance and risk auditor for critical infrastructure, he understands the pain associated with effectively maturing organizational resilience in a decentralized ecosystem. A United States Military Academy graduate at West Point and a veteran of the US Army as a reconnaissance and surveillance expert.

Takeaways

  • Common language and frameworks are crucial for bridging the gap between IT and OT in implementing cybersecurity solutions.
  • Asset owners should start slow and focus on key controls rather than aiming for maturity level 5 in all control frameworks.
  • The challenges of scaling OT compared to IT require a shift in perspective and planning.
  • Consolidation in the market is needed to address the challenges and inflated expectations in the cybersecurity industry.
  • The power of saying no and focusing on specific goals is essential for success in implementing cybersecurity solutions. Global conflict can have an impact on cybersecurity, but it is important to consider the balance between order and freedom in the industry.
  • The focus on the business side of cybersecurity is increasing, and non-technical leaders are starting to understand its importance.
  • Cybersecurity is now seen as a business problem and is being discussed in boardrooms.
  • The cybersecurity community is filled with dedicated and passionate individuals who are working to protect the globe.

Hosted by: Aaron Crow

Guest: Ted Gutierrez

Connect with Ted Gutierrez:

Connect with Aaron Crow:

Learn more about PrOTect IT All:

  • Email: [email protected]
  • Website: https://www.protectitall.co
  • X: https://twitter.com/protectitall
  • YouTube: https://www.youtube.com/@PrOTectITAll
  • FaceBook: https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at [email protected]

Show notes by NMP.

Audio production by NMP. We hear you loud and clear.

bookmark
plus icon
share episode
PrOTect It All - The Future of AI: Determinism, Security, and Beyond
play

03/05/24 • 51 min

Sevak Avakians, CEO of Intelligent Artifacts, discusses the limitations of neural networks and the need for a new approach to artificial intelligence. He introduces Gaius, a platform that replaces underlying neural networks with a transparent and explainable technology. Avakians highlights the challenges of regulating AI and emphasizes the importance of deterministic systems in critical industries. He also discusses the potential applications of AI in cybersecurity and the need for human involvement in AI decision-making. Looking ahead, Avakians is excited about the possibilities of AI but also acknowledges the concerns and risks associated with its implementation. The conversation explores the concerns and potential risks associated with autonomous aircraft and the use of AI and ML in safety-critical systems. Adversarial attacks are discussed as a potential threat, highlighting the need for robust safety regulations. The application of safety standards, such as the DO178C standard, to AI and ML technologies is proposed as a solution. On the positive side, AI is seen as a tool to enhance human capabilities and improve efficiency. The importance of training and wargaming exercises using AI is emphasized. The conversation concludes by discussing the balance between the risks and benefits of AI and providing information on how to learn more about AI.

About Sevak Avakians

As the founder and CEO of Intelligent Artifacts, Inc., Sevak Avakians has been leading
the development and commercialization of a groundbreaking information processing and
AI/ML/R framework, GAIuS, since 2008. GAIuS is a deterministic, fully explainable, and
use-case agnostic symbolic connectionist AI solution that can be applied to mission and
safety-critical domains, such as defense, aerospace, healthcare, and law enforcement.

With a background in physics, telecommunications, information theory, cybersecurity,
and artificial intelligence, Sevak has a unique and comprehensive understanding of the
challenges and opportunities in the field of cognitive computing. He is passionate about
creating AI solutions that can act, interact, and adapt as information, goals, and
requirements evolve while providing full transparency and accountability for their
decisions and actions. Sevak's vision is to empower developers, customers, and end-
users with the ability to create, deploy, and maintain machine intelligence with ease,
efficiency, and confidence.

In 2010, Sevak founded Intelligent Artifacts initially as an R&D and consulting service for
cognitive computing. Over the years, he built the GAIuS Cognitive Computing Platform
as a commercial product launched in 2016. GAIuS Cognitive Computing Platform, allows
developers to rapidly create, test, deploy, and maintain machine intelligence, learning,
classification, predictions, analytics, etc. into their products.

In 2020, the team at Intelligent Artifacts built a reasoning engine into GAIuS, creating the
very first modular, repeatable, use-case agnostic, complete, Artificial Intelligence /
Machine Learning / Reasoning (AI/ML/R) platform that adheres to ExCITE AI principles.

GAIuS handles all the complexity of machine intelligence in 4 API calls. GAIuS agents
can be made and deployed in less than 3 minutes. Developers copy-and-paste a GAIuS
agent’s API URL into their application. GAIuS agents have DNA and evolve within their
environment, eliminating many of the hurdles to achieving true machine intelligence.

More About The Episode

Hosted by: Aaron Crow

Guest: Sevak Avakians

Connect with Sevak Avakians:

Connect with Aaron Crow:

Learn more about PrOTect IT All:

  • Email: [email protected]
  • Website: https://www.protectitall.co
  • X: https://twitter.com/protectitall
  • YouTube: https://www.youtube.com/@PrOTectITAll
  • FaceBook: https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at [email protected]

Show notes by NMP.

Audio production by NMP. We hear you loud and clear.

bookmark
plus icon
share episode

In this conversation, Bryson Bort discusses his background and the creation of Scythe, an offensive security platform. He also talks about the ICS Village and the Vulnerability Management Pavilion, as well as his collaboration with the Department of Energy on a vulnerability management research project. Bryson emphasizes the importance of prioritizing vulnerabilities in operational technology (OT) and understanding the risks in power plants. He also highlights the need to build trust with asset owners and gain leadership buy-in for cybersecurity initiatives. Finally, he discusses the importance of connecting technical expertise to business priorities. The conversation explores the importance of building trust and collaboration in the field of cybersecurity, particularly in the context of power utilities. It emphasizes the need for security professionals to be partners rather than adversaries, and highlights the role of organizations like the ICS Village in fostering collaboration and education. The conversation also delves into the concept of purple team exercises and the importance of starting small and growing in cybersecurity initiatives. Additionally, it discusses the significance of conversations with policymakers and the need for more cybersecurity professionals in the industry.

More About The Episode

Hosted by: Aaron Crow

Guest: Sevak Avakians

Connect with Bryson Bort:

Connect with Aaron Crow:

Learn more about PrOTect IT All:

  • Email: [email protected]
  • Website: https://www.protectitall.co
  • X: https://twitter.com/protectitall
  • YouTube: https://www.youtube.com/@PrOTectITAll
  • FaceBook: https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at [email protected]

Show notes by NMP.

Audio production by NMP. We hear you loud and clear.

bookmark
plus icon
share episode

Summary

The conversation covers various topics related to cybersecurity, including offensive security, IoT devices, hidden threats in cables, advanced hacking devices, privacy concerns with smart devices, cyber hygiene, securing personal data, risks of social media platforms, importance of cybersecurity education, government regulations, and trends in cybersecurity for 2024. The conversation explores the prevalence of social engineering attacks and the effectiveness of generative AI in social engineering. It discusses the challenges of detecting phishing emails generated by AI and the difficulty of defending against AI-powered attacks. The role of password managers and firewalls in defense is highlighted, as well as the importance of recognizing the limitations of human perception. The conversation emphasizes the need for cyber defense measures in organizations and the vulnerability of the weakest link in the chain. It also addresses the risks associated with third-party vendors and the impact of cyber attacks on critical infrastructure. The importance of cyber-informed engineering and designing with security in mind is discussed, along with the challenges of securing outdated OT systems. This conversation covers various topics related to securing OT networks, including the challenges of upgrading OT systems, the complexity of OT networks, and the use of OT firewalls. The discussion also explores the importance of understanding OT protocols and the security risks of unencrypted OT protocols. Additionally, the conversation delves into the impact of Active Directory issues and the role of AI in cybersecurity. The future of AI and quantum computing in cybersecurity is also discussed.

More About The Episode

Hosted by: Aaron Crow

Guest: Duane Laflotte

Connect with Duane Laflotte:

Connect with Aaron Crow:

Learn more about PrOTect IT All:

To be a guest, or suggest a guest/episode please email us at [email protected]

Audio production by NMP. We hear you loud and clear.

bookmark
plus icon
share episode

In Episode 10 of Protect It All, titled "Tools and Techniques for Better Network Visibility and Vulnerability Management with Kylie McClanahan," host Aaron Crow and guest Kylie McClanahan dive into the critical elements of enhancing cybersecurity through advanced tools and strategies. Kylie, CTO of a company specializing in this field, shares her insights on overcoming the challenges of consistent naming conventions, accurate vendor data, and breaking down silos for effective communication across teams.

They explore the utility of tools like Spartan and Network Perception in visualizing network vulnerabilities, mapping asset inventories, and planning effective patch management. They emphasize the importance of correlating vulnerabilities with business priorities rather than just CVSS scores and the need for a layered security approach.

The episode also discusses cybersecurity risks to non-technical stakeholders, highlighting the business implications. The duo discusses the evolving landscape in the power utility sector, the dual nature of physical and cyber threats, and the ever-present need for continuous adaptation.

Kylie shares her excitement about machine learning and graph neural networks for grid state estimation while expressing caution about AI tools' accuracy. Aaron and Kylie stress the importance of reliable data, automated processes, and vendor security advisories in maintaining effective asset management.

Key Moments:

03:47 Discussion focused on improving cybersecurity classifications and communication.

08:48 Compliance sometimes leads to minimum effort for benefit.

11:17 Vendor security advisories prioritize patch tracking.

14:46 Testing for security vulnerabilities and potential exploits.

17:20 Understanding and communicating cybersecurity risk to non-professionals.

20:50 Disagreement on consistent product naming causes confusion.

25:46 NVD website publishes overwhelming recent vulnerabilities.

27:07 Understanding the importance of asset management.

32:13 Challenges of tracking change management in organizations.

33:33 People, process, and technology are crucial investments.

37:34 Spartan takes any scan, offers change management.

39:55 Vision of the future: a dynamic ecosystem.

43:19 Vendors acknowledge changes in control systems effectiveness.

48:09 Equations useful, AI for optimization, caution with models.

49:28 Questioning truthfulness of AI in HR replacement.

53:01 Toyota and Lexus prioritize reliable, tested technology.

About the guest :

Kylie McClanahan is the Chief Technology Officer of Bastazo, Inc and a doctoral candidate in Computer Science at the University of Arkansas. She has nearly a decade of experience with cybersecurity in the electric industry, including both professional experience and frequent collaborations with industry as a graduate researcher. Her research explores the automation of vulnerability analysis and remediation using natural language processing and machine learning. She holds a GCIP certification from GIAC and speaks frequently about cybersecurity in industrial control systems.

How to connect Kylie:

https://www.linkedin.com/in/kyliemcclanahan/

https://www.bastazo.com

https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc

Connect With Aaron Crow:

Learn more about PrOTect IT All:

To be a guest or suggest a guest/episode, please email us at [email protected]

bookmark
plus icon
share episode

In this episode, host Aaron Crow interviews Kevin Walter, an expert in vehicle security, about the growing cybersecurity and safety risks in modern vehicles. Kevin, with a master’s degree in cybersecurity and extensive experience in vehicle systems like the CAN bus, shares his insights into the hidden vulnerabilities within today's cars.

The discussion covers key topics such as the challenges automakers face in updating vehicle software, the real-world implications of vehicle hacking—including the notorious 2014 Jeep hack—and the emerging threats from autonomous vehicles and AI systems. Kevin and Aaron explore how hackers can exploit architectural weaknesses and what measures can be taken to protect against these threats, from simple solutions like Faraday bags to advanced strategies like kill switches.

Whether you’re a cybersecurity enthusiast, a vehicle owner, or just intrigued by the intersection of technology and safety, this episode offers valuable insights into keeping modern vehicles secure. Join Aaron and Kevin for an engaging dive into automotive cybersecurity. Let’s get started!

Key Moments:

00:10 Vehicle network, OBD 2 standard, vehicle diagnostics.

07:22 Incident leads to upgrading car engine.

08:06 Programmed car transmission to work with engine.

13:34 Cars now require computer skills for repair.

14:25 Shop had to enable new battery in car.

18:50 Tire sensor vulnerabilities lead to serious risks.

20:55 Relying on sensors, lacking basic driving skills.

26:05 Greenberg upset about engine shutdown on highway. The jeep's brakes disabled in parking lot. Demonstrated vehicle vulnerability in 2014.

27:40 Potential security risk shutting down connected vehicles.

32:16 Harley dealership charged $100 to enable Spotify.

36:12 OBD2 standard needed for vehicle safety.

39:32 Tesla's automated driver assist misinterprets speed limit.

41:43 Keyless cars vulnerable to theft via tech.

46:13 Interconnected systems may lead to car hacking.

49:19 Balancing innovation with cybersecurity is crucial.

About the guest :

Kevin Walter is an experienced professional in the field of vehicle network and computer systems. He possesses a deep understanding of the more than 50 electronic control units typically found in these networks. Kevin is well-versed in the use of onboard diagnostics tools, specifically the OBD 2 standard, which has been a universal feature in vehicles since 1996. This standard is crucial for mechanics to diagnose and troubleshoot vehicle issues effectively. Kevin’s extensive background includes work as an independent transportation contractor, further solidifying his expertise in the automotive industry.

How to connect Kevin :

https://www.linkedin.com/in/kevin-w-942416211/

Watch a key fob replay attack video Kevin made with his vehicle.:

https://drive.proton.me/urls/3FJXK72NVG#lr_dL45TIogs

Connect With Aaron Crow:

Learn more about PrOTect IT All:

To be a guest or suggest a guest/episode, please email us at [email protected]

bookmark
plus icon
share episode
PrOTect It All - Welcome to PrOTect IT All
play

01/23/24 • 3 min

In this episode, Aaron discusses:

  • His background in IT, cybersecurity, and operational technology
  • The vision of bridging the gap between OT and IT
  • The importance of securing various environments, from industrial floors to cloud and back office enterprises
  • The focus of the podcast on cybersecurity trends, challenges, compliance, risk management, and cutting-edge technologies
  • Future episodes featuring industry experts, thought leaders, and cybersecurity warriors

Key Takeaways:

  • Understanding the convergence of IT and OT
  • Insights into compliance, risk management, and cybersecurity technologies
  • The importance of staying vigilant and secure in the digital and physical domains

Connect with Aaron Crow:

Learn more about PrOTect IT All:

To be a guest, or suggest a guest/episode please email us at [email protected]

Show notes by NMP.

Audio production by NMP. We hear you loud and clear.

NMeojTx5cKjy9dOiv9sV

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does PrOTect It All have?

PrOTect It All currently has 35 episodes available.

What topics does PrOTect It All cover?

The podcast is about Podcasts, Technology and Business.

What is the most popular episode on PrOTect It All?

The episode title 'Bridging the Gap: OT Cybersecurity in the Evolving Landscape of Industry and Recruitment' is the most popular.

What is the average episode length on PrOTect It All?

The average episode length on PrOTect It All is 49 minutes.

How often are episodes of PrOTect It All released?

Episodes of PrOTect It All are typically released every 7 days.

When was the first episode of PrOTect It All?

The first episode of PrOTect It All was released on Jan 23, 2024.

Show more FAQ

Toggle view more icon

Comments