In this conversation, Bryson Bort discusses his background and the creation of Scythe, an offensive security platform. He also talks about the ICS Village and the Vulnerability Management Pavilion, as well as his collaboration with the Department of Energy on a vulnerability management research project. Bryson emphasizes the importance of prioritizing vulnerabilities in operational technology (OT) and understanding the risks in power plants. He also highlights the need to build trust with asset owners and gain leadership buy-in for cybersecurity initiatives. Finally, he discusses the importance of connecting technical expertise to business priorities. The conversation explores the importance of building trust and collaboration in the field of cybersecurity, particularly in the context of power utilities. It emphasizes the need for security professionals to be partners rather than adversaries, and highlights the role of organizations like the ICS Village in fostering collaboration and education. The conversation also delves into the concept of purple team exercises and the importance of starting small and growing in cybersecurity initiatives. Additionally, it discusses the significance of conversations with policymakers and the need for more cybersecurity professionals in the industry.
More About The Episode
Hosted by: Aaron Crow
Guest: Sevak Avakians
Connect with Bryson Bort:
- Website: scythe.io
- LinkedIn: https://www.linkedin.com/in/brysonbort/
Connect with Aaron Crow:
- Website: www.corvosec.com
- LinkedIn: https://www.linkedin.com/in/aaronccrow
Learn more about PrOTect IT All:
- Email: [email protected]
- Website: https://www.protectitall.co
- X: https://twitter.com/protectitall
- YouTube: https://www.youtube.com/@PrOTectITAll
- FaceBook: https://facebook.com/protectitallpodcast
To be a guest, or suggest a guest/episode please email us at [email protected]
—
Show notes by NMP.
Audio production by NMP. We hear you loud and clear.
03/14/24 • 42 min
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/protect-it-all-304111/securing-ot-strategies-for-prioritizing-vulnerabilities-46642252"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to securing ot: strategies for prioritizing vulnerabilities on goodpods" style="width: 225px" /> </a>
Copy