Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
PrOTect It All - Securing OT: Strategies for Prioritizing Vulnerabilities

Securing OT: Strategies for Prioritizing Vulnerabilities

PrOTect It All

03/14/24 • 42 min

plus icon
bookmark
Share icon

In this conversation, Bryson Bort discusses his background and the creation of Scythe, an offensive security platform. He also talks about the ICS Village and the Vulnerability Management Pavilion, as well as his collaboration with the Department of Energy on a vulnerability management research project. Bryson emphasizes the importance of prioritizing vulnerabilities in operational technology (OT) and understanding the risks in power plants. He also highlights the need to build trust with asset owners and gain leadership buy-in for cybersecurity initiatives. Finally, he discusses the importance of connecting technical expertise to business priorities. The conversation explores the importance of building trust and collaboration in the field of cybersecurity, particularly in the context of power utilities. It emphasizes the need for security professionals to be partners rather than adversaries, and highlights the role of organizations like the ICS Village in fostering collaboration and education. The conversation also delves into the concept of purple team exercises and the importance of starting small and growing in cybersecurity initiatives. Additionally, it discusses the significance of conversations with policymakers and the need for more cybersecurity professionals in the industry.

More About The Episode

Hosted by: Aaron Crow

Guest: Sevak Avakians

Connect with Bryson Bort:

Connect with Aaron Crow:

Learn more about PrOTect IT All:

  • Email: [email protected]
  • Website: https://www.protectitall.co
  • X: https://twitter.com/protectitall
  • YouTube: https://www.youtube.com/@PrOTectITAll
  • FaceBook: https://facebook.com/protectitallpodcast

To be a guest, or suggest a guest/episode please email us at [email protected]

Show notes by NMP.

Audio production by NMP. We hear you loud and clear.

03/14/24 • 42 min

plus icon
bookmark
Share icon

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/protect-it-all-304111/securing-ot-strategies-for-prioritizing-vulnerabilities-46642252"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to securing ot: strategies for prioritizing vulnerabilities on goodpods" style="width: 225px" /> </a>

Copy