Safety in industry

Four cybersecurity conversations shaping the future

The digitalization of industry has opened the door to innovation, efficiency gains and new business models. But with these opportunities come threats that require deep technical understanding and a well thought-out strategy.

Industrial control systems, OT environments and IIoT solutions are not only central to the heart of production - they are also critical targets for cyber threats. When an attack hits the right spot, it can take down entire operations, jeopardize security and have far-reaching economic consequences.

Podcast series on cybersecurity

In this series of podcast episodes, leading experts highlight the most pressing threats and innovative solutions in industrial cybersecurity. You'll hear about ransomware attacks affecting operational environments, the latest insights on OT hardening, how flexible security can be successfully implemented, and the truth about IoT solutions' vulnerabilities. The talks go beyond describing problems - they present practical strategies and forward-looking perspectives that inspire action.

Whether you're a security expert, engineer, or strategist, these episodes will give you new perspectives on how to protect industry's most valuable assets. Here's what you can expect to hear:

Podcasts:

  1. Attack and defense against industrial control systems
    In this episode, Josef Forsman talks to Kevin Widlund and Nicklas Keijser from Truesec about ransomware attacks, threat scenarios and effective countermeasures.
  2. A new approach to OT curing
    Lydia Söderlund discusses with Niklas Henningsson from Defensify why OT hardening is crucial, and how the right strategy both protects and creates business value.
  3. Configurable security has never been easier!
    Marcus Rickardsson and Axel Baur Siby from Phoenix Contact talk about flexible security circuits to meet modern requirements and avoid late changes.
  4. IIoT Security - The Myth, Truth, and Advice
    Nicole Safai joins Jiunn-Jer Sun from Phoenix Contact for a conversation about IoT vulnerabilities and strategies to secure IIoT-enabled systems.

 

Each episode offers not only knowledge but also action. Listen, learn and be inspired - because the future of security starts here and now.

In this article

Related content

Cyber security
Säkerhet i gränslandet mellan IT och OT
Cyber security
Remote access without risk
Read more
Cyber security
#65 Remote access without risk – how industry can meet future security requirements
Read more
Cyber security
Säkerhet i gränslandet mellan IT och OT
Read more
Cyber security
Remote access without risk
Read more
Cyber security
#65 Remote access without risk – how industry can meet future security requirements
Read more
Stay up to date

SUBSCRIBE to our newsletter