Episode 55 — Secure Industrial Control Systems and SCADA Without Breaking Safety Operations

 This episode teaches how to apply security architecture to industrial control environments where safety, uptime, and vendor constraints are dominant, a theme ISSAP often uses to test whether you can adapt controls to real operational limits. You’ll review how ICS and SCADA differ from typical IT systems, including long lifecycles, limited patch windows, specialized protocols, and a high cost of disruption, then design defenses that focus on segmentation, controlled remote access, monitoring, and rigorous change governance. We’ll cover practical examples such as isolating control zones, using jump hosts with strong authentication, limiting outbound pathways, and deploying passive monitoring to detect anomalies without adding fragile agents. Troubleshooting considerations include applying IT controls that destabilize processes, unmanaged vendor access that bypasses zones, incomplete inventories that make vulnerability management guesswork, and incident response actions that are technically correct in IT but unsafe in OT if they interrupt critical control functions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 55 — Secure Industrial Control Systems and SCADA Without Breaking Safety Operations
Broadcast by