Episodios

  • ื”ื›ื ืก ื”ืฉื ืชื™ 2024 ืฉืœ ืงื‘ื•ืฆืช ืื™ื ื˜ื ืกื™ื˜ื™ ื’ืœื•ื‘ืœ ื—ืœืง ื—ืœืง ืฉืœื™ืฉื™: ืจืื™ื™ืช

    ื”ืžื’ืŸ ืœืžืจื•ืช ื”ืื™ื•ืžื™ื ื”ืื™ืจื ื™ื ืœืื ืฉื™ ื”ืกื™ื™ื‘ืจ ื–ื• ืžืื™ืŸ ืฉื’ืจื”. ื“ืจื™ื›ื•ืช ื”ืžืชื ื” ื•ืฉื™ื•ืฃ ื”ื™ื›ื•ืœื•ืช ืขื•ื“ ื•ืขื•ื“

    ืžื ื—ื”: ื ื—ืฉื•ืŸ ืคื™ื ืงื• - ืื•ื•ื ื’ืœื™ืกื˜ ืกื™ื™ื‘ืจ ืกืžื ื›"ืœ ื‘ื›ื™ืจ ืœื™ืขื•ืฅ ื•ืฉืจื•ืชื™ ืžื•ืžื—ื™ื ื‘ื ื™ืื˜ืง ืกื™ื™ื‘ืจ ืกืงื™ื•ืจื˜ื™ ื‘ืข"ืž.

    ืžืฉืชืชืคื™ื: ืื‘ื™ื‘ื™ืช ืงื•ื˜ืœืจ: ืกื™ืกื• ื•ื“ื™.ืคื™.ืื• - ื‘ืฉืจื•ืชื™ ื‘ืจื™ืื•ืช ื›ืœืœื™ืช

    ื™ืขืจื” ืœื‘ื•ืŸ: ืกื™ืกื• โ€“ ืื™ืœื•ืŸ ื—ื‘ืจื” ืœื‘ื™ื˜ื•ื—

    ืืžื™ืจ ืืจื“: ืกื™ืกื• - ืชื ื•ื‘ื”

    ืขืจืŸ ืคืœื“: ื“ื™ืจืงื˜ื•ืจ ืžืขืจื›ื•ืช ืžื™ื“ืข ื’ืœื•ื‘ืœื™ โ€“ ื ื ื• ื“ื™ืžื ืฉืŸ

    ืจื•ื ื™ ืจื•ื™ื˜ืžืŸ - ืžื™ื™ืกื“ ืฉื•ืชืฃ ื•ืžื ื›"ืœ ืื™ื ื˜ื ืกื™ื˜ื™ ื’ืœื•ื‘ืœ

    Intensity Global Group's 2024 Annual Conference Part Three: The Defender's View Despite the Iranian threats, cyberpeople have an ordinary routine: vigilance, waiting, and honing their skills repeatedly.

    Moderator:

    Nachshon Pincu - cyber evangelist, SVP @Niatech Cyber Security Participants:

    Avivit Kotler: CISO & DPO at Clalit Health Services

    Yaara Lavon: CISO at Ayalon insurance company

    Amir Arad: CISO & Director of Cyber Security at Tnuva

    Eran Peled: Global IT Director at Nano Dimension

    Roni Roytman - Co-founder & CEO at Intensity Global

  • ื”ื›ื ืก ื”ืฉื ืชื™ 2024 ืฉืœ ืงื‘ื•ืฆืช ืื™ื ื˜ื ืกื™ื˜ื™ ื’ืœื•ื‘ืœ ื—ืœืง ื—ืœืง ืฉื ื™: ืจืื™ื™ืช ื”ืชื•ืงืฃ

    ืžื ื—ื”: ื ื—ืฉื•ืŸ ืคื™ื ืงื• - ืื•ื•ื ื’ืœื™ืกื˜ ืกื™ื™ื‘ืจ ืกืžื ื›"ืœ ื‘ื›ื™ืจ ืœื™ืขื•ืฅ ื•ืฉืจื•ืชื™ ืžื•ืžื—ื™ื ื‘ื ื™ืื˜ืง ืกื™ื™ื‘ืจ ืกืงื™ื•ืจื˜ื™ ื‘ืข"ืž.

    ืžืฉืชืชืคื™ื:

    ืืœื‘ืจื˜ื• (ื“ื˜ื•) ื—ืกื•ืŸ - ืกืžื ื›"ืœ CISO ื‘ ICL Group

    ื—ืŸ ื’ื™ืจืื˜ - CISO ื‘ื—ื‘ืจืช ื—ืฉืžืœ ืœื™ืฉืจืืœ

    ื ื™ืจ ืฆ'ืจื ื•ื‘ - ืœืฉืขื‘ืจ CISO ื‘ 8200 ื•ื–ื•ื›ื” ืคืจืก ื‘ื˜ื—ื•ืŸ ื™ืฉืจืืœ

    ื“ื ื™ืืœ ืกื•ื•ื™ืกื” - ืœืฉืขื‘ืจ ืจืืฉ ืžื“ื•ืจ ื‘ื™ื•ื ืื•ื™ื‘ ื‘ื—ื˜ื™ื‘ืช ื”ืกื™ื™ื‘ืจ

    ืจื•ื ื™ ืจื•ื™ื˜ืžืŸ - ืžื™ื™ืกื“ ืฉื•ืชืฃ ื•ืžื ื›"ืœ ืื™ื ื˜ื ืกื™ื˜ื™ ื’ืœื•ื‘ืœ

    Intensity Global Group's 2024 Annual Conference Part 2: The Cyber Attacker View

    Moderator: Nachshon Pincu - cyber evangelist, SVP @Niatech Cyber Security

    Participants:

    Alberto (Deto) Hasson - VP CISO @ICL Group

    Chen Girat - CISO @Israel Electricity Company (IEC)

    Nir Chernov - former CISO @IDF 8200 and winner of the Israel Security Award

    Daniel Suissa - former head of the Rad heat section @IDF cyber division

    Roni Roytman - Co-founder and CEO of Intensity Global

  • ¿Faltan episodios?

    Pulsa aquí para actualizar resultados

  • ื”ื›ื ืก ื”ืฉื ืชื™ 2024 ืฉืœ ืงื‘ื•ืฆืช ืื™ื ื˜ื ืกื™ื˜ื™ ื’ืœื•ื‘ืœ ื—ืœืง ืจืืฉื•ืŸ: ื”ืจืฆืื” ืฉืœ ืžื™ื™ืกื“ ืฉื•ืชืฃ ื•ืžื ื›"ืœ ื”ื—ื‘ืจื” ืจื•ื ื™ ืจื•ื™ื˜ืžืŸ ืขืœ ื”ืขืœื™ื” ื”ื—ื“ื” ื‘ืžืชืงืคื•ืช ืกื™ื™ื‘ืจ ืขืœ ื™ืฉืจืืœ ื•ืœื ืจืง, ื”ืชืžื•ื“ื“ื•ืช, ื ื™ื”ื•ืœ ืืจื•ืข ืกื™ื™ื‘ืจ ื•ืžื” ื”ื“ืจืš ื”ื ื›ื•ื ื” ืœื‘ื—ื•ืจ ื•ืœื”ืคืขื™ืœ ื—ื‘ืจืช IR

    The 2024 annual conference of the Intensity Global Group, part one: a lecture by the company's co-founder and CEO Roni Roytman on the sharp increase in cyber attacks on Israel and not only. Dealing with it, managing a cyber event and what is the right way to choose and operate an IR company

  • ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ืžื•ื˜ื™ ืงืจื™ืกื˜ืœ ืžื ื›"ืœ ื—ื‘ืจืช ืื .ืื™.ืืก.ื˜ื™. (ืืกื˜ืจื˜ื’ื™ื•ืช ืžื•"ืž) ืžื™ ืฉื”ืชื—ื™ืœ ืืช ื“ืจื›ื• ื›ื ื•ืฉื ื•ื ื•ืชืŸ ื‘ืฆื•ื•ืชื™ ื”ืžื•ืดืž ื”ืžื“ื™ื ื™ ืฉืœ ืœืฉื›ืช ืจืืฉ ื”ืžืžืฉืœื” ืจื‘ื™ืŸ ื•ื›ื™ื•ื ืžื‘ื›ื™ืจื™ ืžื ื”ืœื™ ื”ืžืฉื ื•ืžืชืŸ ื‘ืขื•ืœื ื‘ืžืฉื‘ืจื™ ืกื™ื™ื‘ืจ ื•ืžืคืชื— ืชื•ืจืช ื”ืžืฉื ื•ืžืชืŸ ื›ืชื—ื•ื ืืงื“ืžืื™, ื‘ืฉื™ื—ื” ืขืœ ื ื™ื”ื•ืœ ืžื•"ืž ื‘ืžืฆื‘ื™ ืžืฉื‘ืจ ื‘ื›ืœืœ ื•ืžืฉื‘ืจื™ ืกื™ื™ื‘ืจ ื‘ืคืจื˜. ืื™ืš ืžื ื”ืœื™ื ืžื•"ืž ืžื‘ืœื™ ืœื“ื‘ืจ (ื˜ื•ื ืฆื™ื”) ืื• ืœืจืื•ืช (ืฉืคืช ื’ื•ืฃ) ืืช ื”ืฆื“ ื”ืฉื ื™ ื•ืขื“ื™ื™ืŸ ืœื”ื‘ื™ืŸ ืžื™ ื ืžืฆื ืžื•ืœืš ื•ืžื” ืืคืฉืจ ืœื”ืกื™ืง ืžื”ื•ื“ืขื•ืช ื‘ื›ืชื‘ ื‘ืœื‘ื“

    Nachshon Pincu hosts Moty Cristal, CEO of NEST (negotiation strategies), who started his career as a subject and giver in the Israeli prime minister's office. He is now one of the most senior negotiators in the world and a developer of negotiation theory in an academic field, talking about managing negotiations in crises in general and Cyber in particular. How do you negotiate without speaking (voice tuition) or watching (body language) the other side and still understand who is in front of you and what can be concluded from written messages only?

  • ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ื“"ืจ ืฆ'ืง ืคืจื™ื™ืœื™ืš, ืœืฉืขื‘ืจ ืกื’ืŸ ืจืืฉ ื”ืžื•ืขืฆื” ืœื‘ื™ื˜ื—ื•ืŸ ืœืื•ืžื™ ื•ื›ื™ื•ื ื—ื•ืงืจ ื‘ื›ื™ืจ ื‘ืžื›ื•ืŸ ืœืžื—ืงืจื™ ื‘ื™ื˜ื—ื•ืŸ ืœืื•ืžื™, ื‘ืขืงื‘ื•ืช ืคืจืกื•ื ืžื—ืงืจื• ืžื–ื›ืจ 231 ืขืœ ืื™ื•ื ื”ืกื™ื™ื‘ืจ ื”ืื™ืจื ื™, ื‘ืฉื™ื—ื” ืขืœ ืืกื˜ืจื˜ื’ื™ื™ืช ื”ืกื™ื™ื‘ืจ ื”ืื™ืจื ื™ืช ื‘ื›ืœืœ ื•ืขืœื™ื™ืช ื”ืื™ื•ื ื”ืžื™ื™ื“ื™ ืขืœ ืžื“ื™ื ืช ื™ืฉืจืืœ ืžืื– ื”-7 ื‘ืื•ืงื˜ื•ื‘ืจ

    Nachshon Pincu hosts Dr. Chuck Freilich, former deputy head of the Israeli National Security Council and currently a senior researcher at the Institute for National Security Studies (NISS), following the publication of his study Memo 231 on the Iranian cyber threat, in a conversation about the Iranian cyber strategy in general and the rise of the immediate danger to the State of Israel since October 7th

  • ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ืื•ื“ื™ ืจื•ื˜ ื”ืกื™ืกื• ื”ืื’ื“ื™ ืฉืœ ื—ื‘ืจืช ืžืงื•ืจื•ืช, ืžื•ื•ืชื™ืงื™ ื”ืกื™ืกื•ื™ื™ื ื‘ื™ืฉืจืืœ, ืขื ื•ื•ืชืง ื•ื ื™ืกื™ื•ืŸ ืฉืœ ืžืขืœ ืขืฉืจื™ื ืฉื ื™ื ื‘ื ื™ื”ื•ืœ ืื‘ื˜ื—ืช ืกื™ื™ื‘ืจ ื‘ืžืขืจื›ื•ืช ืชืคืขื•ืœื™ื•ืช ื•ืื‘ื˜"ืž, ื‘ืฉื™ื—ื” ืขืœ ื”ื”ืชืžื•ื“ื“ื•ืช ื”ื™ื•ื ื™ื•ืžื™ืช ืžื•ืœ ืื™ื•ืžื™ื ื’ื“ืœื™ื ื•ื”ื•ืœื›ื™ื ืžืฆื“ ืžื“ื™ื ื•ืช ื•ืงื‘ื•ืฆื•ืช ืชืงื™ืคื” ื‘ืžืขืจื›ืช ืžื•ืจื›ื‘ืช ื”ืฉื ื™ื™ื” ื‘ื’ื•ื“ืœื” ืจืง ืœื—ื‘ืจืช ื—ืฉืžืœ. ืžื” ื”ืฉืชื ื” ืื ื‘ื›ืœืœ ืžืื– ื”-7 ื‘ืื•ืงื˜ื•ื‘ืจ ื•ืืœื• ืฉื™ื ื•ื™ื™ื ื ื“ืจืฉื™ื ื‘ืชืคื™ืกืช ื”ื”ื’ื ื”. ื•ืขื•ื“

    Nachshon Pincu hosts the legendary Udi Roth, the CISO of Mekorot Israel National Water Company, a veteran of CISO in Israel, with over twenty years of seniority and experience in managing cyber security in operational systems and IT, in a conversation about the day-to-day dealing with ever-increasing threats from countries and attack groups in a complex system that is only the second largest to Israel Electric Company. What has changed, if anything, since October 7th, and what changes are required in cyber defense attitude? and More

  • ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ื—ืŸ ื’ื™ืจืื˜ ื”ืกื™ืกื• ืฉืœ ื—ื‘ืจืช ื—ืฉืžืœ ืœื™ืฉืจืืœ ืฉื”ืชื—ื™ืœ ืืช ื“ืจื›ื• ื‘ืกื™ื™ื‘ืจ ื‘-770 (ื”ืจืฉื•ืช ื”ืžืžืœื›ืชื™ืช ืœืื‘ื˜ื—ืช ืžื™ื“ืข) ื•ื ื™ื”ืœ ืืช ื”ืื’ืฃ ื”ืžื‘ืฆืขื™ ื‘ืžืขืจืš ื”ืกื™ื™ื‘ืจ. ื‘ืฉื™ื—ื” ืขืœ ื”ื’ื ื” ืขืœ ื”ืชืฉืชื™ืช ื”ืงืจื™ื˜ื™ืช ื”ื’ื“ื•ืœื” ื‘ื™ื•ืชืจ ื‘ื™ืฉืจืืœ ื‘ื›ืœืœ ื•ื‘ื–ืžืŸ ืžืœื—ืžื” ื‘ืคืจื˜.

    ื•ืื™ืš ื”ืคื›ืชื™ ืžืžืจืื™ื™ืŸ ืœืžืจื•ืื™ื™ืŸ ๐Ÿ˜Š

    Nachshon Pincu hosts Chen Girat, the CISO of the Israel Electric Company (IEC), who started his career in cyber at the State Authority for Information Security, the base from which the Israel National Cyber Directorate grew, and managed the operations division INCD in a conversation about protecting the most significant critical infrastructure in Israel in general and during the war in particular.

    And how I turned from interviewer to interviewee ๐Ÿ˜Š

  • ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ืื™ืชื™ ื™ื ื•ื‘ืกืงื™ ื•ื ืžืจื•ื“ ืœื•ืจื™ื ืžื™ื™ืกื“ื™ ืื™ ืื•ื• ืืคืก ืื—ื“, ืฉื ื™ื”ื ื™ื“ื•ืขื™ื ื‘ืชืขืฉื™ื™ืช ื”ืกื™ื™ื‘ืจ ื”ื™ืฉืจืืœื™ืช ื›ื™ื–ืžื™ื ืžืฆืœื™ื—ื™ื ืขื ืกื˜ืืจื˜ืืคื™ื ื‘ืชื—ื•ื ืื‘ื˜ื—ืช ื”ืกื™ื™ื‘ืจ ืฉืœื”ื ืœืื•ืจืš ื”ืขืฉื•ืจื™ื ื”ืื—ืจื•ื ื™ื, ื•ืขื“ื™ื™ืŸ ืžืฉืชื“ืœื™ื ืœื”ื™ื•ืช ืžืชื—ืช ืœืจืื“ืจ, ื‘ืฉื™ื—ื” ืขืœ ื”ื’ื ืช ืกื™ื™ื‘ืจ ืœืžืขืจื›ื•ืช ืชืคืขื•ืœื™ื•ืช ื•ืขืœ ื”ื—ืฉื™ื‘ื•ืช ืฉืœ ื”ื›ืฉืจื” ืžืขืฉื™ืช ืœืžื™ ืฉืจื•ืฆื™ื ืœื”ืฆื˜ืจืฃ ืœืชื—ื•ื

    ืžื”ืŸ ืžืขืจื›ื•ืช ืกื™ื™ื‘ืจ-ืคื™ื–ื™ื•ืช (ืกื™.ืคื™.ืืก)

    ืžื“ื•ืข ืขืœ ื”ืชืขืฉื™ื™ื” ืœืฉื ื•ืช ืืช ื”ืœืš ื”ืจื•ื— ืฉืœื” ืžื ืจืื•ืช ืœื ืจืื•ืช ื•ื‘ืงืจื”

    ืžื”ื• ืคืชืจื•ืŸ ืื‘ื˜ื—ืช ื”ืกื™ื™ื‘ืจ ืงื“ื‘ืจื” ืฉืœ ืื™ ืื•ื• ืืคืก ืื—ื“

    ืžื”ื™ ื”ื—ืฉื™ื‘ื•ืช ืฉืœ ื”ื›ืฉืจื” ืžืขืฉื™ืช ื›ืฆื•ื•ืช ื›ื—ื•ืœ ื•ืฆื•ื•ืช ืื“ื•ื ืขื‘ื•ืจ ืืœื• ื”ืžืขื•ื ื™ื™ื ื™ื ืœื”ื™ื›ื ืก ืœืชืขืฉื™ื™ืช ืื‘ื˜ื—ืช ื”ืกื™ื™ื‘ืจ

    ื•ืขื•ื“

    Nachshon Pincu hosts Itay Yanovski and Nimrod Luria Co-Founders and CEOs at IO01. Both are well known in the Israeli cyber industry as successful Entrepreneurs with their cybersecurity startups for the last two decades, in a conversation about OT cybersecurity defense and the importance of hands-on training for ICS/OT cyber specialists.

    What is Cyber-Physical Systems (CPS)?

    Why must the industry change its mindset from only Visibility, aka IDS, to Visibility & Control?

    What is the CADABRA cybersecurity solution?

    What is the importance of hands-on training as a blue team & red team for those wishing to enter the OT cybersecurity industry?

    and more

  • ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ืจื•ื ื™ ืจื•ื™ื˜ืžืŸ ืžื•ืžื—ื” ืœื ื™ื”ื•ืœ ืžืฉื‘ืจื™ ืกื™ื™ื‘ืจ, ื™ื–ื ืกื“ืจืชื™, ืžื™ื™ืกื“ ืฉื•ืชืฃ ื•ืžื ื›"ืœ ื‘ื—ื‘ืจื•ืช ื”ืขื•ืกืงื•ืช ื‘ืื‘ื˜ื—ืช ืกื™ื™ื‘ืจ ื•ื ื™ื”ื•ืœ ืžืฉื‘ืจื™ื. ื‘ืฉื™ื—ื” ืขืœ ื”ืžืœื—ืžื” ื”ืงื‘ืจื ื˜ื™ืช ืฉื ืžืฆืืช ื‘ืขืฆื™ืžื•ืช ืฉื™ื ืžืื– ื”-7 ื‘ืื•ืงื˜ื•ื‘ืจ. ื”ืชืงืคื•ืช ืขืœ ื›ื•ืœ ื”ืžื’ื–ืจื™ื, ื’ื ื—ืœืงืŸ ืฉืœ ืžืขืจื›ื•ืช ืชืคืขื•ืœื™ื•ืช ืœื ื ื’ืจืข

    Nachshon Pincu hosts Roni Roytman, an expert in cyber crisis management and serial entrepreneur, co-founder, and CEO of companies dealing in cyber security and crisis management. In a conversation about the cybernetic war that has been at peak intensity since October 7th. Attacks on all sectors, including operational systems.

  • Nachshon Pincu Hosts Alexander Tartakovsky the founder and CEO of iOT365 OT Cyber Security Platform delivered as a SAAS. We discussed changing the mindset for traditional and innovative OT infrastructure as part of Industry 4.0, Open PLC, and digital twin technologies.

    Why should IDS and SIEM for OT cybersecurity Not be on two different platforms?

    Why is there a need to remove the OT and cloud computing bindings?

    How do you โ€œplayโ€ safe when implementing OT cyber security solutions?

    How do we get in the age of digital twins as labs for checking new firmware or training teams on their own OT infrastructure without risk?

    And more

  • ื”ื™ื” ืœื™ ืœื›ื‘ื•ื“ ืœื”ื™ื•ืช ืžื•ื–ืžืŸ ืขืœ ื™ื“ื™ ืขื•"ื“ ืจืžื™ ืชืžื, ืจืืฉ ื”ื”ืชืžื—ื•ืช ื‘ืชื•ืืจ ืฉื ื™ ื‘ืžื ื”ืœ ืขืกืงื™ื ื•ืกื™ื™ื‘ืจ ื‘ืžื›ืœืœื” ื”ืืงื“ืžื™ืช ืื•ื ื• ืœื”ืจืฆื•ืช ื•ืœื”ืฉืชืชืฃ ื‘ืคืื ืœ ืคืจืงื˜ื™ืงื” ืฉืœ ืžืฉืคื˜ ื•ืกื™ื™ื‘ืจ ืœืกื˜ื•ื“ื ื˜ื™ื ื‘ืชื•ื›ื ื™ืช ื”ื™ื™ื—ื•ื“ื™ืช

    It was an honor to be invited by Adv Rami Tamam from Ono Academic College to lecture and be part of an expert panel about practical cyber and law to the students of the MBA in Business & Cyber unique program.

  • Nachshon Pincu Hosts Shimi Cohen, the CISO of UBTECH, an ethical hacker and Cyber threat intelligence expert, the founder of โ€œShimiโ€™s Cyber worldโ€ and โ€œHacker Republicโ€ communities, talking about the cyber warfare in Israel since October 7th.

    Understanding the mass cyber attacks on Israeli companies, critical infrastructure, and governmental websites.

    The importance of Cyber threat intelligence, especially since October 7th

    Who is attacking, and for what purpose?

    And more

    ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ืฉื™ืžื™ ื›ื”ืŸ, ื”ืกื™ืกื• ืฉืœ ื—ื‘ืจืช ื™ื•ื‘ื™ื˜ืง, ื”ืืงืจ ืืชื™ ื•ืžื•ืžื—ื” ืœืžื•ื“ื™ืขื™ืŸ ืื™ื•ืžื™ ืกื™ื™ื‘ืจ, ืžื™ื™ืกื“ ืงื”ื™ืœื•ืช "ืขื•ืœื ื”ืกื™ื™ื‘ืจ ืฉืœ ืฉื™ืžื™" ื•"ื”ืืงืจ ืจื™ืคื‘ืœื™ืง", ื‘ืฉื™ื—ื” ืขืœ ืœื•ื—ืžืช ื”ืกื™ื™ื‘ืจ ื‘ื™ืฉืจืืœ ืžืื– ื”-7 ื‘ืื•ืงื˜ื•ื‘ืจ

    ื”ื‘ื ืช ื”ืชืงืคื•ืช ื”ืกื™ื™ื‘ืจ ื”ื”ืžื•ื ื™ื•ืช ืขืœ ื—ื‘ืจื•ืช ื™ืฉืจืืœื™ื•ืช, ืชืฉืชื™ื•ืช ืงืจื™ื˜ื™ื•ืช ื•ืืชืจื™ื ืžืžืฉืœืชื™ื™ื ืžืื– ืื•ืงื˜ื•ื‘ืจ 7

    ื”ื—ืฉื™ื‘ื•ืช ืฉืœ ืžื•ื“ื™ืขื™ืŸ ืื™ื•ืžื™ ืกื™ื™ื‘ืจ, ื‘ืžื™ื•ื—ื“ ืžืื– ื”-7 ื‘ืื•ืงื˜ื•ื‘ืจ

    ืžื™ ืชื•ืงืฃ, ื•ืœืื™ื–ื• ืžื˜ืจื”?

    ื•ืขื•ื“

  • Nachhson Pincu hosts Alberto (Deto) Hasson, VP CISO at ICL Group. I call him "The CISO of CISOs," one of the cybersecurity leaders in Israel and the former Head of Isreal National CERT. In a "Beat the expert " conversation about everything you should know about cyber defense in wartime, where hinterland, civilian networks, and critical infrastructure became the primary target for cyber attacks by attack groups, terrorists, and hostile governments.

    ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ืืœื‘ืจื˜ื• (ื“ื˜ื•) ื—ืกื•ืŸ, ืกืžื ื›"ืœ ืกื™ืกื• ื‘ืงื‘ื•ืฆืช ื›ื™"ืœ. ืื ื™ ืงื•ืจื ืœื• "ื”ืกื™ืกื• ืฉืœ ื”ืกื™ืกื•ื™ื™ื", ืžืžื•ื‘ื™ืœื™ ืื‘ื˜ื—ืช ื”ืกื™ื™ื‘ืจ ื‘ื™ืฉืจืืœ ื•ืœืฉืขื‘ืจ ื”ืžืงื™ื ื•ืจืืฉ ื”ืกืืจื˜ ื”ืœืื•ืžื™ ืฉืœ ื™ืฉืจืืœ

    ืฉื™ื—ืช "ื”ื›ื” ืืช ื”ืžื•ืžื—ื”" ืขืœ ื›ืœ ืžื” ืฉืฆืจื™ืš ืœื“ืขืช ืขืœ ื”ื’ื ืช ืกื™ื™ื‘ืจ ื‘ื–ืžืŸ ืžืœื—ืžื”, ืฉื›ืืฉืจ ื”ืขื•ืจืฃ: ืื–ืจื—ื™ื, ืžืขืจื›ื•ืช ืื–ืจื—ื™ื•ืช ื•ืชืฉืชื™ื•ืช ืงืจื™ื˜ื™ื•ืช, ื”ืคื›ื• ืœืžื˜ืจื” ืžืจื›ื–ื™ืช ืœืžืชืงืคื•ืช ืกื™ื™ื‘ืจ ืฉืœ ืงื‘ื•ืฆื•ืช ืชืงื™ืคื”, ื˜ืจื•ืจื™ืกื˜ื™ื ื•ืžืžืฉืœื•ืช ืขื•ื™ื™ื ื•ืช.

  • ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ืื—ืช ื”ืžื•ื‘ื™ืœื•ืช ื‘ื™ืฉืจืืœ ืœืจื’ื•ืœืฆื™ื” ื•ื ื™ื”ื•ืœ ืžืฉื‘ืจื™ ืกื™ื™ื‘ืจ, ืขื•"ื“ ื”ื“ืก ืชืžื ื‘ืŸ ืื‘ืจื”ื, ืกื’ื ื™ืช ื“ื™ืงืŸ ื•ืžื ื”ืœืช ืชื›ื ื™ื•ืช ืชื•ืืจ ืฉื ื™ื‘ืกื™ื™ื‘ืจ ื‘ืžื›ืœืœื” ื”ืืงื“ืžื™ืช ืื•ื ื•, ื‘ืฉื™ื—ื” ื—ื•ืคืฉื™ืช ืขืœ ื”ืžื’ื” ืชืจื•ืžื” ืฉืœ ื ืฉื™ื ื‘-7 ื‘ืื•ืงื˜ื•ื‘ืจ ื•ืœืื—ืจื™ื”, ื”ื™ื•ื ืฉื™ื ื” ืืช ื—ื™ื™ ื›ื•ืœ ื”ื™ืฉืจืืœื™ื

    ืžื“ื•ืข ื ื™ื”ื•ืœ ืื™ืจื•ืข ืกื™ื™ื‘ืจ ืข"ื™ ืฉื™ืœื•ื‘ ืฉืœ ื’ื‘ืจ ื•ืื™ืฉื” ื™ื—ื“, ื”ื•ื ืฆื•ื•ืช ื ื™ื”ื•ืœ ืžืฉื‘ืจื™ ื”ืกื™ื™ื‘ืจ ื”ื˜ื•ื‘ ื‘ื™ื•ืชืจ

    ื ื™ื”ื•ืœ ืžืฉื‘ืจ ืกื™ื™ื‘ืจ ื‘ืจืื™ื™ื” ืฉืœ ื”ืจื’ื•ืœืฆื™ื” ื•ืชื‘ื™ืขื•ืช ื”ื™ื•ื ืฉืื—ืจื™

    ืชื›ื ื•ืŸ ื•ืื™ืžื•ืŸ ืœืคื ื™, ืžืฆืžืฆืžื™ื ื“ืจืžื˜ื™ืช ืืช ื”ืฉืคืขืช ืžืฉื‘ืจ ื”ืกื™ื™ื‘ืจ ืขืœ ื”ืžื ื”ืœื™ื

    ื•ืขื•ื“

    Nachshon Pincu hosts one of Israel's leading experts for regulations and cyber crisis management, Lawyer Hadas Tamam Ben-Avraham, Vice Dean & E-MBA Programs Director at the Ono Academic College, in a free still conversation about women mega contributions in and after October 7th, the day changed every Israeli life.

    Why is a man and a woman together the best cyber crisis management team? Managing a cyber crisis in the eyes of regulations and Lawsuits "the day after.

    " Plan and train before dramatically reducing the impact of the cyber crisis on management.

    And more

  • ื•ื•ื‘ื™ื ืจ ืžื•ื“ืขื•ืช ืกื™ื™ื‘ืจ: ื—ืจื‘ื•ืช ื‘ืจื–ืœ, ื›ื™ืฆื“ ืœื”ื’ืŸ ืขืœ ื”ืžืจื—ื‘ ื”ื“ื™ื’ื™ื˜ืœื™ ื”ืื™ืฉื™ ื•ื”ืืจื’ื•ื ื™. ื”ืฉื‘ื•ืขื•ืช ื”ืื—ืจื•ื ื™ื ืžืฉืคื™ืขื™ื ืขืœ ื›ื•ืœื ื•, ื™ืฉืจืืœ ืขื•ื‘ืจืช ื˜ืœื˜ืœื” ื—ื–ืงื” ื•ืขื“ื™ื™ืŸ ืื™ืŸ ืกืคืง ืฉื ื ืฆื— ื‘ืžืขืจื›ื”. ื‘ื ื•ืกืฃ ืœืื™ื•ืžื™ื ื”ื‘ื™ื˜ื—ื•ื ื™ื™ื ื™ืฉื ืŸ ืกื›ื ื•ืช ื•ืื™ื•ืžื™ื ืจื‘ื™ื ื‘ืžืจื—ื‘ ื”ื“ื™ื’ื™ื˜ืœื™ ื”ื ื•ื‘ืขื™ื ืžื”ืžืฆื‘ ื”ืจื’ื™ืฉ ื‘ื• ืื ื—ื ื• ื ืžืฆืื™ื ื•ืžืกื›ื ื™ื ื›ื•ืœ ืื—ืช ื•ืื—ื“ ืžืื™ืชื ื•.

    ื™ื•ื’ื‘ ื ื—ื•ื ืžื—ื‘ืจืช ื•ื•ื™ื–ืจ ื™ื–ื ื•ื•ื‘ื™ื ืจ ื‘ื”ืฉืชืชืคื•ืช ืคืื ืœ ืžื•ืžื—ื™ื ืœืžื•ื“ืขื•ืช ืกื™ื™ื‘ืจ ืขื ืžื™ื™ ืงืžืคืœืจ ื‘ืจื•ืงืก, ืื™ืชืžืจ ืฉืœื™ื• ื•ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืขืœ ืžื ืช ืœื”ืกื‘ื™ืจ ืืช ื”ืกื›ื ื•ืช ื•ืื™ืš ืœืฆืžืฆื ืื•ืชืŸ ืœืžื™ื ื™ืžื•ื.

    ืคื•ืฉืขื™ ืกื™ื™ื‘ืจ ื‘ื™ืŸ ืื ื™ืฉ ืœื”ื ืงืฉืจ ืœืื•ื™ื‘ื ื• ืื• ืœื ืžื ืฆืœื™ื ืืช ื”ืื•ื•ื™ืจื” ื”ืžืชื•ื— ืœื˜ื•ื‘ืช ืคื’ื™ืขื” ืžื•ืจืœื™ืช, ื”ื•ื ืื•ืช ืคื™ื ื ืกื™ื•ืช ื•ื”ืฉืชืœื˜ื•ืช ืขืœ ื—ืฉื‘ื•ื ื•ืช ื‘ืžื“ื™ื•ืช ื”ื—ื‘ืจืชื™ื•ืช

    ืื™ืš ื”ื ืขื•ืฉื™ื ืืช ื–ื”ืžื”ื ื”ืื™ื•ืžื™ื ื”ืžืจื›ื–ื™ื™ื ืขืœ ืื ืฉื™ื ืคืจื˜ื™ื™ื, ืืจื’ื•ื ื™ื ื•ื—ื‘ืจื•ืชืžื” ื”ืคืขื•ืœื•ืช ื”ื ื“ืจืฉื•ืช (ืžืจื‘ื™ืชืŸ ืคืฉื•ื˜ื•ืช) ืœื”ืชืžื•ื“ื“ื•ืช ืขื ื”ืื™ื•ืžื™ื

    ืขื ื™ืฉืจืืœ ื—ื™ ื”ื™ื•ื, ืžื—ืจ ื•ืœืชืžื™ื“

    ื ื—ืฉื•ืŸ

  • Nachshon Pincu hosts Dadi David Gertler, Executive Director of Technology Systems at the Israeli National Cyber Directorate (INCD), Yuval Segev CISO at AIDOC Medical, and the Head of the cyber forum of the Israeli Directors' Union, former Director of advance technology at INCD in a conversation about cyber defense methodology and technology.

    How do you turn cyber defense methodology into a comprehensive one?

    "Cyber intelligence" is a well-known service used mainly by large companies (sometimes out of a regulatory requirement). These are significant costs, but this is a considerable need for the organization's cyber protection. Help me convince CISOs and managers of the importance of the issue.

    As you know, my motto is "Cyber protection is not technology." Cyberdefense technology is one of the last steps in the process. How do you cop with that say?

    The million-dollar question is, how do you choose cyber defense technology, and what are the criteria?

    We cannot ignore the Baz of AI, and there is a lot of talk about the subject and apocalyptic theories. How do you see it?

    We are at the end of the third quarter of 2023. Please address where we head in cyber protection in the operational environments, emphasizing cloud connections under Industry 4.0 and vendors' push to IT-OT Convergence.

    ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ื“ื“ื™ ื“ื•ื“ ื’ืจื˜ืœืจ, ื“ื™ืจืงื˜ื•ืจ ื‘ื›ื™ืจ ืœืžืขืจื›ื•ืช ื˜ื›ื ื•ืœื•ื’ื™ื•ืช ื‘ืžืขืจืš ื”ืกื™ื™ื‘ืจ ื”ืœืื•ืžื™ ื•ืืช ื™ื•ื‘ืœ ืฉื’ื‘ ืกื™ืกื• ื‘ื‘ื™.ืื™ ื“ื•ืงืก ื•ืจืืฉ ืคื•ืจื•ื ื”ืกื™ื™ื‘ืจ ื‘ืื™ื’ื•ื“ ื”ื“ื™ืจืงื˜ื•ืจื™ื ื”ื™ืฉืจืืœื™, ืœืฉืขื‘ืจ ื“ื™ืจืงื˜ื•ืจ ื˜ื›ื ื•ืœื•ื’ื™ื•ืช ืžืชืงื“ืžื•ืช ื‘ืžืขืจืš ื”ืกื™ื™ื‘ืจ ื‘ืฉื™ื—ื” ืขืœ ืžืชื•ื“ื•ืœื•ื’ื™ื•ืช ื•ื˜ื›ื ื•ืœื•ื’ื™ื•ืช ืœื”ื’ื ืช ืกื™ื™ื‘ืจ

    ืื™ืš ื”ื•ืคื›ื™ื ืžืชื•ื“ื•ืœื•ื’ื™ื™ืช ืœื™ื™ืฉื•ื ื‘ื”ื’ื ืช ืกื™ื™ื‘ืจ

    "ืžื•ื“ื™ืขื™ืŸ ืกื™ื™ื‘ืจ" ื”ื•ื ืฉื™ืจื•ืช ืžื•ื›ืจ ื”ืžืฉืžืฉ ื‘ืขื™ืงืจ ื—ื‘ืจื•ืช ื’ื“ื•ืœื•ืช (ืœืขื™ืชื™ื ืžืชื•ืš ื“ืจื™ืฉื” ืจื’ื•ืœื˜ื•ืจื™ืช). ืžื“ื•ื‘ืจ ื‘ืขืœื•ื™ื•ืช ืžืฉืžืขื•ืชื™ื•ืช, ืืš ืžื“ื•ื‘ืจ ื‘ืฆื•ืจืš ื ื™ื›ืจ ืœื”ื’ื ืช ื”ืกื™ื™ื‘ืจ ืฉืœ ื”ืืจื’ื•ืŸ. ืขื–ืจื• ืœื™ ืœืฉื›ื ืข ืกื™ืกื•ื™ื™ื ื•ืžื ื”ืœื™ื ื‘ื—ืฉื™ื‘ื•ืช ื•ื ื—ื™ืฆื•ืช ื”ื ื•ืฉื

    ื›ื™ื“ื•ืข, ื”ืžื•ื˜ื• ืฉืœื™ ื”ื•ื "ื”ื’ื ืช ืกื™ื™ื‘ืจ ื”ื™ื ืœื ื˜ื›ื ื•ืœื•ื’ื™ื”". ื˜ื›ื ื•ืœื•ื’ื™ื•ืช ืกื™ื™ื‘ืจ ื”ืŸ ืื—ื“ ื”ืฉืœื‘ื™ื ื”ืื—ืจื•ื ื™ื ื‘ืชื”ืœื™ืš. ืื™ืš ืืชื ืจื•ืื™ื ืืช ื”ืืžื™ืจื” ื”ื–ืืช

    ืฉืืœืช ืžื™ืœื™ื•ืŸ ื”ื“ื•ืœืจ ื”ื™ื, ืื™ืš ื‘ื•ื—ืจื™ื ื‘ื˜ื›ื ื•ืœื•ื’ื™ื™ืช ื”ื’ื ืช ืกื™ื™ื‘ืจ, ื•ืžื”ื ื”ืงืจื™ื˜ืจื™ื•ื ื™ื

    ืื™ ืืคืฉืจ ืœื”ืชืขืœื ืžื”ื‘ื– ืฉืœ ื”ื”ื™.ืื™. ื™ืฉ ื”ืจื‘ื” ืชื™ืื•ืจื™ื•ืช ืืคื•ืงืœื™ืคื˜ื™ื•ืช, ืื™ืš ืืชื ืžืชื™ื™ื—ืกื™ื ืœื ื•ืฉื

    ืื ื—ื ื• ื‘ืกื•ืฃ ื”ืจื‘ืขื•ืŸ ื”ืฉืœื™ืฉื™ ืฉืœ 2023. ืื ื ืคื ื™ื ื• ืžื•ืขื“ื•ืช ื‘ื”ื™ื‘ื˜ื™ื ืฉืœ ื”ื’ื ืช ืกื™ื™ื‘ืจ ื‘ืกื‘ื™ื‘ื•ืช ื”ืชืคืขื•ืœื™ื•ืช ืขื ื“ื’ืฉ ืขืœ ื—ื™ื‘ื•ืจื™ ืขื ืŸ ืชื—ืช ืชืขืฉื™ื™ื” 4.0 ื•ื“ื—ื™ืคื” ืฉืœ ื”ื™ืฆืจื ื™ื ืœื”ืชื›ื ืกื•ืช ืื™.ื˜ื™. ื•ืื•.ื˜ื™

  • Nachshon Pincu hosts a two-year follow-up interview with Israel's most active cyber regulators, Danny Lacker, Head of Water Emergency & Cyber Security at Israel Water Authority, and Yossi Shavit, Head of ICS Cyber Security Department at the Ministry of Environmental Protection.

    We last met on the podcast at the end of July 2021. Since then, there have been many changes in the cyber world. Today, we are much more mature in understanding the protection of critical infrastructures and factories with hazardous materials. Where do we stand today?

    The program to enforce cyber regulation on factories entered a high stage. Today, your unit controls hundreds of factories. Do you see changes in factories' mental treatment of the cyber issue?

    Implementing the required regulation for the water sector without stinging sanctions is difficult. How do you cope?

    What is happening in the world regarding cyber regulations for the water sector?

    The world is moving, and it seems that the connection of the OT to the Internet is inevitable and will be called at one point or another, whether it is necessary to change the existing regulation and how to continue protecting critical assets in the factory, especially for hazardous materials?

    I see a lot of activity in increasing awareness of cyber risks with the water corporations. Do you feel that the ice is breaking and that the corporations are starting to respond?

    SOC, Crisis management, and Incident Response (IR) are the three 2023 trends. Where do we find your units with those issues?

    We cannot escape the topic of AI and the need to invest thought in assessments for the massive entry of AI-based technologies or the use of end users in technologies without understanding the risks. How do you plan to deal with this issue?

    ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืจืื™ื•ืŸ ื”ืžืฉืš ืœืื—ืจ ืฉื ืชื™ื™ื ืขื ืจื’ื•ืœื˜ื•ืจื™ ื”ืกื™ื™ื‘ืจ ื”ืคืขื™ืœื™ื ื‘ื™ื•ืชืจ ื‘ื™ืฉืจืืœ, ื“ื ื™ ืœืงืจ, ืจืืฉ ืชื—ื•ื ื—ื™ืจื•ื ืžื™ื ื•ืื‘ื˜ื—ืช ืกื™ื™ื‘ืจ ื‘ืจืฉื•ืช ื”ืžื™ื, ื•ื™ื•ืกื™ ืฉื‘ื™ื˜, ืจืืฉ ืžื—ืœืงืช ืื‘ื˜ื—ืช ืกื™ื™ื‘ืจ ืœืžืขืจื›ื•ืช ืชืคืขื•ืœื™ื•ืช ื‘ืžืฉืจื“ ืœื”ื’ื ืช ื”ืกื‘ื™ื‘ื”

    ื ืคื’ืฉื ื• ื‘ืคืขื ื”ืื—ืจื•ื ื” ื‘ืคื•ื“ืงืืกื˜ ื‘ืกื•ืฃ ื™ื•ืœื™ 2021. ืžืื– ื—ืœื• ืฉื™ื ื•ื™ื™ื ืจื‘ื™ื ื‘ืขื•ืœื ื”ืกื™ื™ื‘ืจ. ื›ื™ื•ื, ืื ื—ื ื• ื”ืจื‘ื” ื™ื•ืชืจ ื‘ืฉืœื™ื ื‘ื”ื‘ื ืช ื”ื”ื’ื ื” ืขืœ ืชืฉืชื™ื•ืช ืงืจื™ื˜ื™ื•ืช ื•ืžืคืขืœื™ื ืขื ื—ื•ืžืจื™ื ืžืกื•ื›ื ื™ื. ืื™ืคื” ืื ื—ื ื• ืขื•ืžื“ื™ื ื”ื™ื•ื

    ื”ืชื•ื›ื ื™ืช ืœืื›ื™ืคืช ืจื’ื•ืœืฆื™ื™ืช ืกื™ื™ื‘ืจ ืขืœ ืžืคืขืœื™ื ื ื›ื ืกื” ืœืฉืœื‘ ื’ื‘ื•ื”. ื›ื™ื•ื, ื™ื—ื™ื“ืช ื”ืกื™ื™ื‘ืจ ืฉืœ ืžืฉืจื“ ืœืื™ื›ื•ืช ื”ืกื‘ื™ื‘ื” ืžื˜ืคืœืช ื›ื‘ืจ ื‘ืžืื•ืช ืžืคืขืœื™ื. ื”ืื ืืชื” ืจื•ืื” ืฉื™ื ื•ื™ื™ื ื‘ื”ืชื™ื™ื—ืกื•ืช ืฉืœ ื”ืžืคืขืœื™ื ืœื ื•ืฉื ื”ืกื™ื™ื‘ืจ

    ื™ื™ืฉื•ื ื”ืจื’ื•ืœืฆื™ื” ื”ื ื“ืจืฉืช ืœืžืฉืง ื”ืžื™ื ืœืœื ืกื ืงืฆื™ื•ืช ืขื•ืงืฆื ื™ื•ืช, ืงืฉื”. ืื™ืš ืžืชืžื•ื“ื“ื™ื? ื•ืžื” ืงื•ืจื” ื‘ืขื•ืœื ืœื’ื‘ื™ ืชืงื ื•ืช ืกื™ื™ื‘ืจ ืœืžืฉืง ื”ืžื™ื

    ื”ืขื•ืœื ื–ื–, ื•ื ืจืื” ืฉื”ื—ื™ื‘ื•ืจ ืฉืœ ื”ืžืขืจื›ื•ืช ืชืคืขื•ืœื™ื•ืช ืœืื™ื ื˜ืจื ื˜ ื”ื•ื ื‘ืœืชื™ ื ืžื ืข ื•ื™ืงืจื” ื‘ืฉืœื‘ ื–ื” ืื• ืื—ืจ, ื”ืื ื™ืฉ ืฆื•ืจืš ืœืฉื ื•ืช ืืช ื”ืจื’ื•ืœืฆื™ื” ื”ืงื™ื™ืžืช ื•ื›ื™ืฆื“ ืœื”ืžืฉื™ืš ืœื”ื’ืŸ ืขืœ ื ื›ืกื™ื ืงืจื™ื˜ื™ื™ื ื‘ืžืคืขืœ, ื‘ืžื™ื•ื—ื“ ืขื‘ื•ืจ ื—ื•ืžืจื™ื ืžืกื•ื›ื ื™ื

    ืื ื™ ืจื•ืื” ืคืขื™ืœื•ืช ืจื‘ื” ื‘ื”ื’ื‘ืจืช ื”ืžื•ื“ืขื•ืช ืœืกื™ื›ื•ื ื™ ืกื™ื™ื‘ืจ ืžื•ืœ ืชืื’ื™ื“ื™ ื”ืžื™ื. ืืชื” ืžืจื’ื™ืฉ ืฉื”ืงืจื— ื ืฉื‘ืจ ื•ืฉื”ืชืื’ื™ื“ื™ื ืžืชื—ื™ืœื™ื ืœื”ื’ื™ื‘

    ืกื•ืง, ื ื™ื”ื•ืœ ืžืฉื‘ืจื™ื ื•ืชื’ื•ื‘ื” ืœืื™ืจื•ืขื™ื ื”ืŸ ืฉืœื•ืฉืช ื”ืžื’ืžื•ืช ืฉืœ 2023. ืื™ืคื” ืื ื—ื ื• ืžื•ืฆืื™ื ืืช ื”ื™ื—ื™ื“ื•ืช ืฉืœื›ื ื‘ื ื•ืฉืื™ื ื”ืืœื•

    ืื ื—ื ื• ืœื ื™ื›ื•ืœื™ื ืœื‘ืจื•ื— ืžื”ื ื•ืฉื ื”ื”ื™.ืื™. ื•ื”ืฆื•ืจืš ืœื”ืฉืงื™ืข ืžื—ืฉื‘ื” ื‘ื”ืขืจื›ื•ืช ืœื›ื ื™ืกื” ืžืืกื™ื‘ื™ืช ืฉืœ ื˜ื›ื ื•ืœื•ื’ื™ื•ืช ืžื‘ื•ืกืกื•ืช ืื™ื ื˜ืœื™ื’ื ืฆื™ื” ืžืœืื›ื•ืชื™ืช ืื• ืฉื™ืžื•ืฉ ืฉืœ ืžืฉืชืžืฉื™ ืงืฆื” ื‘ื˜ื›ื ื•ืœื•ื’ื™ื•ืช ืžื‘ืœื™ ืœื”ื‘ื™ืŸ ืืช ื”ืกื™ื›ื•ื ื™ื. ืื™ืš ืืชื ืžืชื›ื ื ื™ื ืœื”ืชืžื•ื“ื“ ืขื ื”ื ื•ืฉื ื”ื–ื”ื•

  • Nachshon Pincu hosts Yosi Shneck, Founder and CEO at YSICONS company, former Head of cyber Entrepreneurship and BIZ DEV, and SVP for information and communication technologies at Israel Electric Corporation (IEC) in a conversation about critical infrastructure cyber defense for systems that are 50 years old, build synergy between IT and OT cyber teams.

    As a senior manager and one of the first to deal with cyber defense for critical infrastructures in the most significant infrastructure in Israel, what was the approach to cyber defense in such a conglomerate?

    The OT world of an electricity company includes systems that are 50 years old or older without Cybersecurity in the planning and execution considerations. How can we protect and control planets that did not have "cyber by design" and without supporting cyber OT technologies?

    What is the importance of divisional integration within the cyber IT and OT organizations?

    You said the readiness is a matter for the whole company. Awareness alone is not enough. It also requires cyber knowledge, so every employee should be a cyber specialist?

    The electric company is subject to many regulators (as many as 23). How do you enable practical progress in the face of so much regulation?

    How do you perceive the role of CISO in the organization and not necessarily at the electric company?

    You have proven there is room for business innovation, even in a company like IEC. How do you create an innovative business environment in a traditional corporation?

    Tell us a little about your activity today at YSICONS.

    ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ื™ื•ืกื™ ืฉื ืง, ืžื™ื™ืกื“ ื•ืžื ื›"ืœ ื—ื‘ืจืช ื•ื™.ืืก.ืื™ืงื•ื ืก, ืœืฉืขื‘ืจ ืจืืฉ ืชื—ื•ื ื™ื–ืžื•ืช ืกื™ื™ื‘ืจ ื•ืคื™ืชื•ื— ืขื™ืกืงื™ ื•ืกืžื ื›"ืœ ื‘ื›ื™ืจ ืœื˜ื›ื ื•ืœื•ื’ื™ื•ืช ืžื™ื“ืข ื•ืชืงืฉื•ืจืช ื‘ื—ื‘ืจืช ื”ื—ืฉืžืœ, ื‘ืฉื™ื—ื” ืขืœ ื”ื’ื ืช ืกื™ื™ื‘ืจ ื‘ืชืฉืชื™ื•ืช ืงืจื™ื˜ื™ื•ืช ืœืขื™ืชื™ื ื‘ื ื•ืช ื—ืžื™ืฉื™ื ืฉื ื”. ืื™ืš ื‘ื•ื ื™ื ืกื™ื ืจื’ื™ื” ื‘ื™ืŸ ืฆื•ื•ืชื™ ืกื™ื™ื‘ืจ ืฉืœ ืžืขืจื›ื•ืช ืžื™ื“ืข ื•ืชืฉืชื™ื•ืช ืงืจื™ื˜ื™ื•ืช ื•ืื™ืš ื™ื•ืฆืจื™ื "ืžื•ื›ื ื•ืช" ืกื™ื™ื‘ืจ

    ื›ืžื™ ืฉื”ื™ื” ืžื ื”ืœ ื‘ื›ื™ืจ ื•ืžื”ืจืืฉื•ื ื™ื ืœื”ืชืžื•ื“ื“ ืขื ื ื•ืฉื ื”ื’ื ืช ืกื™ื™ื‘ืจ ืœืชืฉืชื™ื•ืช ืงืจื™ื˜ื™ื•ืช ื‘ื’ื•ืฃ ื”ืชืฉืชื™ื•ืช ื”ื’ื“ื•ืœ ื‘ื™ืฉืจืืœ, ืื™ืš ื ื™ื’ืฉื™ื ื‘ื›ืœืœ ืœื”ื’ื ืช ืกื™ื™ื‘ืจ ื‘ื›ื–ื” ืงื•ื ื’ืœื•ืžืจื˜

    ื”ืžืขืจื›ื•ืช ื”ืชืคืขื•ืœื™ื•ืช ืฉืœ ื—ื‘ืจืช ื—ืฉืžืœ ื›ื•ืœืœื•ืช ืžืขืจื›ื•ืช ื‘ื ื•ืช ื—ืžื™ืฉื™ื ืฉื ื™ื ื•ื™ื•ืชืจ ื›ืžื• ืชื—ื ืช ื”ื›ื•ื— ื‘ื—ื“ืจื” ืฉื”ื•ืงืžื” ื‘ืฉื ื•ืช ื”ืฉื™ื‘ืขื™ื ืฉืœ ื”ืžืื” ื”ืงื•ื“ืžืช, ื”ื’ื ืช ืกื™ื™ื‘ืจ ืœื ื ืœืงื—ื” ื‘ืฉื™ืงื•ืœื™ ื”ืชื›ื ื•ืŸ ื•ื”ื‘ื™ืฆื•ืข, ืื™ืš ืžื™ื™ืฆืจื™ื ื”ื’ื ื” ื•ื‘ืงืจื•ืช ื‘ืžืงื•ื ืฉืœื ืชื•ื›ื ืŸ ืœืกื™ื™ื‘ืจ ื•ืœืœื ื˜ื›ื ื•ืœื•ื’ื™ื•ืช ืชื•ืžื›ื•ืช

    ืขืžืœืช ืจื‘ื•ืช ืขืœ ื‘ื™ืฆื•ืข ืื™ื ื˜ื’ืจืฆื™ื” ื•ืฉืช"ืค ื—ื˜ื™ื‘ืชื™ ื‘ื™ืŸ ืืจื’ื•ื ื™ ื”ืกื™ื™ื‘ืจ ืœืžืขืจื›ื•ืช ื”ืžื™ื“ืข ื•ื”ืžืขืจื›ื•ืช ื”ืชืคืขื•ืœื™ื•ืช, ืžื” ื”ื™ื™ืชื” ื”ืชื‘ื•ื ื” ืฉื”ื•ื‘ื™ืœื” ืื•ืชืš ืœืžื”ืœืš ื”ื–ื”

    ื“ื™ื‘ืจื ื• ืขืœ ื”ืฉืงืขื” ื‘ืžื•ื›ื ื•ืช ื•ืืžืจืช ืฉื–ื” ืขื ื™ื™ืŸ ืฉืœ ื›ื•ืœ ื”ื—ื‘ืจื”, ืžื•ื“ืขื•ืช ื‘ืœื‘ื“ ืื™ื ื” ืžืกืคื™ืงื” ืืœื ืžื—ื™ื™ื‘ืช ื’ื ื™ื“ืข ื‘ืกื™ื™ื‘ืจ, ืื– ื›ื•ืœ ืขื•ื‘ื“ ืฆืจื™ืš ืœื”ื™ื•ืช ืกื™ื™ื‘ืจื™ืกื˜

    ื—ื‘ืจืช ื”ื—ืฉืžืœ ื›ืคื•ืคื” ืœื›ืžื•ืช ืขืฆื•ืžื” ืฉืœ ืจื’ื•ืœื˜ื•ืจื™ื, ื›ืžื“ื•ืžื ื™ 23 ,ืื™ืš ืžืืคืฉืจื™ื ื”ืชืงื“ืžื•ืช ืžืขืฉื™ืช ืžื•ืœ ื›ื•ืœ ื›ืš ื”ืจื‘ื” ืจื’ื•ืœืฆื™ื”

    ืื™ืš ืืชื” ืชื•ืคืก ืืช ืชืคืงื™ื“ ื”ืกื™ืกื• ื‘ืืจื’ื•ืŸ ื•ืœืื• ื“ื•ื•ืงื ื‘ื—ื‘ืจืช ื”ื—ืฉืžืœ

    ื”ื•ื›ื—ืช ืฉื’ื ื‘ื—ื‘ืจื” ื’ื“ื•ืœื” ื•ืžืกื•ืจืชื™ืช ื›ืžื• ื—ื‘ืจืช ื”ื—ืฉืžืœ ื™ืฉ ืžืงื•ื ืœื”ืจื‘ื” ื—ื“ืฉื ื•ืช ืขืกืงื™ืช. ื ื–ื›ื™ืจ ืืช ืกื™ื™ื‘ืจื’'ื™ื, ื—ื‘ืจืช ืชืงืฉื•ืจืช ื”ืกื™ื‘ื™ื, ืžื›ื™ืจืช ืขืคืจ ืคื—ื ื•ื”ืจืฉื™ืžื” ืขื•ื“ ืืจื•ื›ื”. ืื™ืš ืžื™ื™ืฆืจื™ื ืกื‘ื™ื‘ื” ืขืกืงื™ืช ื—ื“ืฉื ื™ืช ื‘ื’ื•ืฃ ืžืกื•ืจืชื™

    ืกืคืจ ืœื ื• ืงืฆืช ืขืœ ื”ืคืขื™ืœื•ืช ืฉืœืš ื”ื™ื•ื ื‘ ื•ื™.ืืก.ืื™ืงื•ื ืก, ื”ื™ื•ืช ื•ื›ืจื’ื™ืœ ืืชื” ืœื ื ื— ืขืœ ื–ืจื™ ื”ื“ืคื ื”

  • Nachshon Pincu hosts Esti Peshin, VP and General Manager of the Cyber Division at IAI-ELTA, in a conversation about cybersecurity trends, cyber aviation challenges, and protection of state critical infrastructures.

    What are the cyber trends and the assessments required?

    On AI, we hear a lot of prophecies and, unfortunately, quite a bit of disinformation. Can you please make some order for us?

    Cyber protection in the aviation industry came into our awareness years ago after white hacker Chris Roberts broke into airplane systems during a flight. Let's start with the challenges facing those in charge of cyber protection for civilian aircraft.

    The regulation in the aviation industry is very tight. In the cyber issue, what are the trends of the regulatory bodies in Europe and the USA on this issue?

    Elta's cyber division provides systems to manage cyber risks and alerts at the country level. What are the primary defenses between SOC at the country level and SOC for a company?

    From where came the passion for flight and becoming a pilot?

    ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ืืกืชื™ ืคืฉื™ืŸ, ืกืžื ื›"ืœื™ืช ื‘ืืœืชื-ืชืขืฉื™ื™ื” ืื•ื•ื™ืจื™ืช ื•ืžื ื›"ืœื™ืช ื—ื˜ื™ื‘ืช ื”ืกื™ื™ื‘ืจ ื‘ืฉื™ื—ื” ืขืœ ืžื’ืžื•ืช ืื‘ื˜ื—ืช ืกื™ื™ื‘ืจ, ืืชื’ืจื™ ืกื™ื™ื‘ืจ ื‘ืชืขื•ืคื” ื•ื”ื’ื ืช ืกื™ื™ื‘ืจ ื‘ืจืžืช ืžื“ื™ื ื” ืžื”ืŸ ืžื’ืžื•ืช ื”ืกื™ื™ื‘ืจ ื”ืขืชื™ื“ื™ื•ืช ื•ืžื” ื”ื™ื ื”ื”ืขืจื›ื•ืช ื”ื ื“ืจืฉื•ืช

    ื ื•ืฉื ื”ืื™ื ื˜ืœื’ื ืฆื™ื” ื”ืžืœืื›ื•ืชื™ืช, ืื ื—ื ื• ืฉื•ืžืขื™ื ื”ืจื‘ื” ื ื‘ื•ืื•ืช ื–ืขื ื•ืœืžืจื‘ื” ื”ืฆืขืจ ื’ื ืœื ืžืขื˜ ื“ื™ืกืื™ื ืคื•ืจืžืฆื™ื”. ืืช ื™ื›ื•ืœื” ื‘ื‘ืงืฉื” ืœืขืฉื•ืช ืœื ื• ืงืฆืช ืกื“ืจ

    ื”ื’ื ืช ื”ืกื™ื™ื‘ืจ ื‘ืชืขืฉื™ื™ืช ื”ืชืขื•ืคื” ื”ื’ื™ืขื” ืœืžื•ื“ืขื•ืช ืฉืœื ื• ืœืคื ื™ ืฉื ื™ื ืœืื—ืจ ืฉื”ื”ืืงืจ ื”ืœื‘ืŸ ื›ืจื™ืก ืจื•ื‘ืจื˜ืก ืคืจืฅ ืœืžืขืจื›ื•ืช ืžื˜ื•ืกื™ื ื‘ืžื”ืœืš ื˜ื™ืกื”. ืžื” ื”ื ื”ืืชื’ืจื™ื ื”ืขื•ืžื“ื™ื ื‘ืคื ื™ ื”ืื—ืจืื™ื ืขืœ ื”ื’ื ืช ืกื™ื™ื‘ืจ ืœืžื˜ื•ืกื™ื ืื–ืจื—ื™ื™ื

    ื”ืจื’ื•ืœืฆื™ื” ื‘ืขื ืฃ ื”ืชืขื•ืคื” ืžืื•ื“ ื”ื“ื•ืงื” ื•ืื ื™ ืžื ื™ื— ืฉื’ื ื‘ืกื•ื’ื™ื™ืช ื”ืกื™ื™ื‘ืจ, ืžื”ืŸ ื”ืžื’ืžื•ืช ืฉืœ ื”ื’ื•ืคื™ื ื”ืจื’ื•ืœื˜ื•ืจื™ื™ื ื‘ืื™ืจื•ืคื” ื•ื‘ืืจื”"ื‘ ื‘ื ื•ืฉื ื–ื”

    ื—ื˜ื™ื‘ืช ื”ืกื™ื™ื‘ืจ ืฉืœ ืืœืชื ืžืกืคืงืช ืžืขืจื›ื•ืช ืœื ื™ื”ื•ืœ ืกื™ื›ื•ื ื™ ืกื™ื™ื‘ืจ ื•ื”ืชืจืื•ืช ื‘ืจืžืช ื”ืžื“ื™ื ื”. ืžื” ื”ื”ื‘ื“ืœื™ื ื”ืžืจื›ื–ื™ื ื‘ื™ืŸ ืกื•ืง ื‘ืจืžืช ืžื“ื™ื ื” ืœื‘ื™ืŸ ืกื•ืง ืขื‘ื•ืจ ื—ื‘ืจื”

    ืžื”ื™ื›ืŸ ื”ื’ื™ืข ื”ืชืฉื•ืงื” ืœื˜ื™ืกื” ื•ืœื”ื™ื•ืช ื˜ื™ื™ืกืช

  • Nachshon Pincu hosts Kirill Gelfand, Senior Solutions Architect at Trend Micro, in a conversation about Trend Micro's TXone OT cyber defense strategy, when a cyber-attack is an OT attack, and the fundamental difference between IT and OT cyber defense (if any).

    Who is Trend Micro company?

    What is the protection concept of Trend Micro (TXone) for OT?

    What is the difference in protecting IT versus OT? T

    here are differences of opinion among professionals in the definition of an OT attack. Let's try to sort things out.

    TXone protection strategy is by layers with different components in each layer. How does it work?

    Is the connection between IT and OT a disaster or an inevitability?

    The ATC engine was developed after the attack on power plants in Korea in 2014. What was the concept change?

    What is the connection between AI and "Deep exploit"? Is it an attacker's innovation?

    ื ื—ืฉื•ืŸ ืคื™ื ืงื• ืžืืจื— ืืช ืงื™ืจื™ืœ ื’ืœืคื ื“, ืืจื›ื™ื˜ืงื˜ ืคืชืจื•ื ื•ืช ื‘ื›ื™ืจ ื‘ื˜ืจื ื“ ืžื™ืงืจื• ื‘ืฉื™ื—ื” ืขืœ ืืกื˜ืจื˜ื’ื™ื™ืช ื”ื’ื ืช ื”ืกื™ื™ื‘ืจ ืฉืœ ื˜ืจื ื“ ืžื™ืงืจื• ืœืกื‘ื™ื‘ื•ืช ืชืคืขื•ืœื™ื•ืช. ืžืชื™ ืžืชืงืคืช ืกื™ื™ื‘ืจ ืชื—ืฉื‘ ื›ืžืชืงืคื” ืขืœ ืกื‘ื™ื‘ื•ืช ืชืคืขื•ืœื™ื•ืช, ื•ืžื” ื”ื”ื‘ื“ืœ ื”ืžื”ื•ืชื™ ื‘ื™ืŸ ื”ื’ื ืช ืกื™ื™ื‘ืจ ืขืœ ืžืขืจื›ื•ืช ืžื™ื“ืข ื•ืกื‘ื™ื‘ื•ืช ืชืคืขื•ืœื™ื•ืช (ืื ื‘ื›ืœืœ)

    ืžื™ื”ื™ ื—ื‘ืจืช ื˜ืจื ื“ ืžื™ืงืจื•?

    ืžื”ื™ ืชืคื™ืกืช ื”ื”ื’ื ื” ืฉืœ ื˜ืจื ื“ ืžื™ืงืจื• ื•ืกื•ื•ื™ื˜ืช ื˜ื™.ืืงืก ื•ื•ืืŸ ืœืกื‘ื™ื‘ื•ืช ืชืคืขื•ืœื™ื•ืช ืžื” ื”ื”ื‘ื“ืœ ื‘ื”ื’ื ืช ืกื™ื™ื‘ืจ ืขืœ ืžืขืจื›ื•ืช ืžื™ื“ืข ื•ืกื‘ื™ื‘ื•ืช ืชืคืขื•ืœื™ื•ืช

    ื™ืฉื ื ื—ื™ืœื•ืงื™ ื“ืขื•ืช ื‘ื™ืŸ ืื ืฉื™ ืžืงืฆื•ืข ื‘ื”ื’ื“ืจื” ืฉืœ ื”ืชืงืคื” ืขืœ ืกื‘ื™ื‘ื•ืช ืชืคืขื•ืœื™ื•ืช, ื‘ื•ื ื ื ืกื” ืœืขืฉื•ืช ืกื“ืจ

    ืืกื˜ืจื˜ื’ื™ื™ืช ื”ื”ื’ื ื” ืฉืœ ืกื•ื•ื™ื˜ืช ื˜ื™.ืืงืก ื•ื•ืืŸ ื”ื™ื ืœืคื™ ืฉื›ื‘ื•ืช ืขื ืจื›ื™ื‘ื™ื ืฉื•ื ื™ื ื‘ื›ืœ ืฉื›ื‘ื”. ืื™ืš ื–ื” ืขื•ื‘ื“

    ื”ืื ื”ืงืฉืจ ื‘ื™ืŸ ืžืขืจื›ื•ืช ืžื™ื“ืข ืœืกื‘ื™ื‘ื•ืช ืชืคืขื•ืœื™ื•ืช ื”ื•ื ืืกื•ืŸ ืื• ื‘ืœืชื™ ื ืžื ืข

    ื˜ืจื ื“ ืคื™ืชื—ื” ืžื ื•ืข ื™ื™ื—ื•ื“ื™ ืœืื—ืจ ืฉื”ืชืงืคืช ืชื—ื ื•ืช ื›ื•ื— ื‘ืงื•ืจื™ืื” ื‘-2014. ืžื” ื”ื™ื” ืฉื™ื ื•ื™ ื”ืงื•ื ืกืคื˜

    ืžื” ื”ืงืฉืจ ื‘ื™ืŸ ืื™ื ื˜ืœื™ื’ื ืฆื™ื” ืžืœืื›ื•ืชื™ืช ืœื“ื™ืค ืืงืกืคืœื•ื™ื˜? ื•ื”ืื ืžื“ื•ื‘ืจ ื‘ื—ื“ืฉื ื•ืช ืฉืœ ื”ืชื•ืงืคื™ื